STATE OF TENNESSEE v. ALEXANDER JOHNSON AND MICHAEL F. WILLIAMS
No. E2015-02486-CCA-R9-CD
IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT KNOXVILLE
April 12, 2017
December 20, 2016 Session
Appeal from the Criminal Court for Knox County No. 104964A, B Bob McGee, Judge
In this interlocutory appeal, the defendants, Alexander Johnson and Michael F. Williams, challenge the ruling of the Knox County Criminal Court granting the State‘s motion to quash subpoenas duces tecum issued to four State‘s witnesses. The State
Tenn. R. App. P. 3; Judgment of the Criminal Court Affirmed in Part; Reversed in Part; Remanded
JAMES CURWOOD WITT, JR., J., delivered the opinion of the court, in which THOMAS T. WOODALL, P.J., and NORMA MCGEE OGLE, J., joined.
Steven Ross Johnson and W. Thomas Dillard, Knoxville, Tennessee, for the appellant, Alexander Johnson.
David Eldridge and Loretta G. Cravens, Knoxville, Tennessee, for the appellant, Michael F. Williams.
OPINION
On February 12, 2015, the Knox County Grand Jury charged both of the defendants with two counts each of the November 2014 aggravated rape of C.C.1 As is relevant to this appeal, the presentment lists as witnesses C.C., Bridget Boland, and cellular telephone service providers New Cingular Wireless/AT&T Wireless and Sprint/Nextel Communications. Witnesses Anna Lawn and Natalie Tavares were later added to the presentment by order. The case proceeded, and discovery materials were exchanged by the parties.
On August 21, 2015, Mr. Johnson moved the trial court for an order to accompany subpoenas duces tecum for the production and pretrial inspection of “specified cellular telephone and social media communications and information.”2 He argued that the “requested communications are evidentiary and relevant,” that the communications were “not otherwise reasonably procurable in advance of trial by due diligence,” that he could not prepare for trial in the absence of this information, and that the motion was “made in good faith” and was “not intended as any general ‘fishing expedition.‘” In support of his motion,
According to Mr. Johnson, Ms. Lawn indicated to the police that she “immediately” began texting C.C.‘s roommates after Ms. Lawn left Mr. Johnson‘s bedroom, leaving C.C. in the company of both defendants. Mr. Johnson also alleged that interviews with the police indicated that the police “may have even instructed, advised, or at the very least insinuated to” C.C. and other State‘s witnesses that they should remove social media information “from public view” and should refrain from communicating about the offenses via social media. Mr. Johnson indicated that he had learned from the State that the police had searched, but had not preserved, any social media communications. He also noted that the police had preserved all the data from Mr. Johnson‘s cellular telephone but had preserved none from cellular telephones belonging to C.C. or any other State witness.
At the August 24, 2015 hearing on the defendants’ motion, counsel for Mr. Johnson indicated that after learning that the Knoxville Police Department (“KPD“) had “sent preservation letters under the Electronic Stored Communications Act to communication providers to preserve information from certain witnesses, namely, [C.C.] and Ms. Lawn,” the defendants sent a specific discovery request for that information. In its response to the specific discovery motion, the State related that the KPD “did not, in fact, obtain the messaging information of its witnesses.” Counsel insisted that the information was necessary to ensure that Mr. Johnson received a fair trial and moved the court to provide an order “that compels, along with the subpoenas that will be issued, the various service providers to provide the . . . data communications” to the trial court under seal.
The State opposed the motion on grounds that the motion, which was filed on the Friday before the first trial was set to begin,4 was untimely, noting that the State had “incurred a large expense . . . in preparing for this trial” and that several of the State‘s witnesses had obligations related to their status as student athletes that presented scheduling difficulties. The State also argued that the defendants had failed to allege specific facts to support the issuance of the subpoenas, describing the subpoena
With regard to timing, counsel for Mr. Johnson stated that the State had provided them with Mr. Johnson‘s cellular telephone data in the week before trial and that he had only learned two days before filing the motion that the State had not obtained any electronic communications from anyone other than Mr. Johnson. Citing United States v. Nixon, 418 U.S. 683 (1974), counsel argued that Mr. Johnson need only “establish that there could be information that‘s material and relevant on there.” He observed that the discovery materials were replete with information that “there was a lot of text messaging and social media communications that were going on about this party that night” and that, Ms. Lawn in particular, participated in social media and text messaging communications immediately after leaving C.C. in Mr. Johnson‘s bedroom in the company of the defendants. Counsel also pointed to KPD interviews where C.C. and other witnesses discussed with KPD detectives “about whether or not they should have their social media taken down.”
The State argued that the defendants had failed to satisfy the Nixon standard and argued that the information sought by the defendants qualified as witness statements, which would not be discoverable prior to trial under the terms of
At the conclusion of the hearing, the court granted the motion, stating that it felt “compelled to give the defendant[s] a full opportunity to gain any information that may be helpful to their case.” The court ordered that the materials be returned to chambers by September 8, 2015. In the written order, the court found “that specific and articulable facts establish[ed] reasonable grounds to believe that records and information pertaining to designated cellular telephone and social media communications are relevant and material to a pending criminal matter.” On that same day, the court entered a protective order that provided that “all materials produced to the court subject to the said Order and subpoenas duces tecum are to be filed under seal and made a part of the technical record in this matter.” The protective order also provided for “[e]xact duplicates of all materials . . . to be provided in their entirety to counsel for the parties.”
Immediately following the hearing, the defendant issued and served 21 subpoenas duces tecum:
| | Information Requested | Persons Covered | Timeframe |
|---|---|---|---|
| AT&T Mobility | “[a]ll stored electronic communications” “and the related account records, including but not limited to the call detail records (including all incoming and outgoing calls, the duration of said calls, the time and date of said calls, and the cell site addresses and/or cell tower information associated with said calls), audio recordings, saved contacts, geolocation data, text messages or iMessages sent or received, photographs, video recordings, and voicemail messages” | C.C. Ms. Lawn | 11/1/2014 - present |
| Instagram5 | “[a]ll stored electronic communications” including “basic subscriber information (including Instagram username, e-mail address, telephone number, and timestamps and IP addresses for account logins/logouts), photographs, photo captions, and other posts from the subscriber‘s Instagram accounts(s), and the content of messages, photos, comments, and location information” | C.C. Ms. Lawn Ms. Boland Ms. | 1/1/2014 - present |
| Twitter6 | “[a]ll stored electronic communications” including “account/user information (including username(s)), the associated ‘Twitter archive,’ communications and/or content (including following, followed, muted, and blocked accounts, status updates (‘tweets‘) posted and replies received, ‘tweets’ marked as a ‘favorite,’ direct messages sent and received, list memberships, lists subscribed to, and uploaded files (including photographs and video files and whether through pic.twitter.com, Periscope, Vine, or any other means)), and geolocation data” | C.C. Ms. Lawn Ms. Boland Ms. Tavares | 1/1/2014 - present |
| Snapchat7 | “[a]ll stored electronic communications” including “basic subscriber information (including Snapchat username, e-mail address, telephone number, and timestamps and IP addresses for account logins/logouts), logs (including sender, recipient, date, and time) of ‘snaps,’ ‘stories,’ and/or ‘chats’ sent to or from | C.C. Ms. Lawn Ms. Boland Ms. Tavares | 1/1/2014 - present |
| “[a]ll stored electronic communications” including “basic account/user information (including user identification number(s) and/or username(s), e-mail address(es), registered mobile telephone number, etc.), expanded subscriber content (including profile contact information, status update history, shares, notes, wall postings, list of ‘friends’ and other accounts ‘followed,’ list of ‘pages’ ‘liked,’ list of groups joined, future and past events, video files, etc.), user photos (whether uploaded by the user or by other users), private messages sent and received, activity logs, and geolocation data” | C.C. Ms. Lawn Ms. Boland Ms. Tavares | 1/1/2014 - present | |
| Yik Yak, Inc.8 | “[a]ll stored electronic communications” including “each message posted, the IP address from which each message was posted, the Global Positioning System (‘GPS‘) coordinates of the location from which each message was posted, the time and date when each message was posted, and the user-agent string associated with the device from which each message was posted” | C.C. Ms. Lawn Ms. Boland Ms. Tavares | 1/1/2014 - present |
On September 11, 2015, Mr. Johnson filed a motion asking the trial court “to set a date certain for the pretrial inspection of specified cellular telephone and social media communications and information sufficiently in advance of trial to permit the parties’ meaningful inspection and analysis” of the materials and “to issue the necessary process to secure the attendance at the pretrial inspection of the out-of-state witnesses with custody of said communications and information.” In support of his motion, counsel for Mr. Johnson indicated that they were “actively working” to obtain the requested materials from Yik Yak, which counsel deemed “likely to comply” with the subpoena. Additionally,
Without accepting the validity of the service providers’ objections, Mr. Johnson informed the court of his intention to issue additional subpoenas duces tecum to the four individual account holders requesting “the same communications and information previously subpoenaed from their service providers.” To facilitate this process for the three witnesses9 who were, at that time, residing out of state, Mr. Johnson moved the court to issue the necessary process to secure the attendance of each witness at the pretrial inspection of the materials.
Three days later, on September 14, 2015, Mr. Johnson moved the trial court to hold Facebook, Instagram, Snapchat, and Twitter in contempt for failing to comply with the court‘s order and subpoenas. Mr. Johnson noted that although those service providers had objected to the subpoenas via letter, none had filed a motion to quash. On the following day, Mr. Johnson moved the court “to compel the state to request search warrants to obtain the specified social media communications and information previously subpoenaed pursuant to the Court‘s Order of August 24, 2015.” Mr. Johnson claimed that responses from Facebook, Instagram, Snapchat, and Twitter indicated that those providers would release the subpoenaed information pursuant to a search warrant. Mr. Johnson also moved the court on September 15, 2015, “to issue the necessary process [to] secure the compliance of out-of-state service providers with the Court‘s previous Order and accompanying Subpoenas Duces Tecum regarding specific social media communications” and “to reset the date for compliance with the same to September 28, 2015.” In a supplemental motion also filed on September 15, 2015, Mr. Johnson informed the court that counsel
Following a hearing on September 17, 2015, the trial court held in abeyance the motion to hold the service providers in contempt. The court also modified the time for compliance with the subpoenas to September 28, 2015. Also on that date, the defendants issued subpoenas to the four witnesses that required production of each witness’ current and former cellular telephone handsets and copies “in native format” of all the data “associated with any and all” current and former Facebook, Instagram, Twitter, Snapchat, and Yik Yak accounts for the period between May 15, 2014, and December 31, 2014. Each subpoena contained directions for obtaining the necessary information from Facebook, Instagram, Twitter, and Snapchat. None explained how the data could be retrieved from Yik Yak. The trial court issued certificates of materiality to accompany the subpoenas.
On September 28, 2015, the State moved to quash the subpoenas issued to C.C., Ms. Boland, Ms. Lawn, and Ms. Tavares, claiming that “[c]ompliance with these [s]ubpoenas is unreasonable and oppressive” and that “the [s]ubpoenas are cumulative in that they seek information and records that are already being sought by subpoenas issued to various communications/social media providers.” In its motion, the State averred that “[i]n some instances, the witnesses never had social media accounts with the companies listed in the [s]ubpoenas,” that “[i]n some instances, the witnesses have found it impossible to limit data retrieval to the time period listed in the [s]ubpoenas,” and that “the [a]ttachment to the [s]ubpoenas provides no instructions at all for retrieving data from Snapchat or Yik Yak.” The State attached to its motion an email from Ms. Boland‘s mother that it claimed “detail[ed] the onerous nature of the data-retrieval portion of the [s]ubpoenas.” The State also noted that the attachment to the subpoenas issued to the four witnesses contained a requirement that the witnesses “provide for inspection any cellular telephone handset that they used primarily or exclusively between May 15, 2014 through December 31, 2014” when the trial court‘s order did not cover these cellular telephone handsets.
Also on September 28, 2015, the State moved the trial court “to modify all subpoenas issued concerning the communications/social media accounts of” C.C., Ms. Lawn, Ms. Boland, and Ms. Tavares, arguing that “the time frame for most of the subpoenaed materials is overly broad.” The State asked that the subpoenas issued to the social media service providers regarding C.C.‘s accounts be modified to cover communications between May 15, 2014, and December 31, 2014. The State asked that the subpoenas issued to the social media service providers regarding the remaining witnesses’ accounts be modified to cover communications from November 15, 2014, to December 31, 2014. In support of its request, the State posited that there had “been no showing that social media or telephonic activity concerning the event in question actually occurred before the offense.”
On October 20, 2015, Mr. Johnson moved the trial court to compel the four
According to Mr. Johnson, on September 22, 2015, C.C. sent a letter along with “an assortment of printouts from various social media service providers” to the trial court. This assortment did not include any electronic communications made during the week surrounding the alleged offenses in this case. It did include printouts from Instagram, Twitter, and Snapchat that appeared to explain why she had been unable to retrieve the subpoenaed information. The letter, which was filed under seal but appended to Mr. Johnson‘s motion, does support Mr. Johnson‘s statement that C.C. upgraded to a new cellular telephone handset on January 27, 2015. She claimed that the older handset had malfunctioned but stated that she had sold the telephone through a website after restoring it to the default factory settings. As of October 20, 2015, none of the remaining witnesses had returned any of the subpoenaed materials to the court. Mr. Johnson asked that the witnesses be made to show cause for their failure to comply and that the court enforce the statutory forfeiture for their noncompliance.
Mr. Johnson also stated that the responsive documents received from AT&T indicated that both C.C. and Ms. Lawn had disposed of their cellular telephone handsets “within 24 hours of one another on January 27 and 28, 2015.” In the letter, which was appended to the pleading, AT&T indicated that it had not stored the content of text messages for either C.C. or Ms. Lawn but that iMessages might be retrieved from either witness‘s iCloud10 account. AT&T also stated that it could not provide access to voicemail within a certain timeframe; that, generally, it retained voicemails only for 14 to 30 days; and that voicemails deleted by the customer could not be recovered at all. Mr. Johnson moved the court to require both C.C. and Ms. Lawn to provide their iCloud login credentials to Sword & Shield Enterprise Security, Inc., “to download the witnesses’ data, limit the data retrieved to the time periods stated in the [s]ubpoenas, and provide the responsive data to the Court and all counsel.”
On October 20, 2015, local counsel for Facebook, Instagram, Snapchat, and Twitter (hereinafter collectively “the social
On October 23, 2015, Mr. Johnson moved the court to dismiss the presentment, exclude the testimony of the witnesses, or issue an adverse inference instruction based upon the State‘s failure to preserve the electronic communications that were the subject of the subpoenas. He argued that because the police were aware that several of the witnesses in this case used text messaging and social media to communicate before and after the alleged offenses, they should have endeavored to preserve those communications. Mr. Johnson also noted that, following the alleged offenses, C.C. gave conflicting statements and that, following her interviews with KPD detectives, she had reset her cellular telephone to its factory settings, thereby deleting her text messages and contact information. Although she claimed that she disposed of the cellular telephone because it no longer worked, she stated that she sold the device on a website. She also deleted her Twitter and Instagram accounts and deactivated her Facebook account. Ms. Lawn similarly disposed of her cellular telephone. In that same pleading, Mr. Johnson indicated that he would not contest the State‘s motion to modify the timeframe of the subpoena.
On October 27, 2015, the State filed an amended motion to quash. In its amended motion, the State challenged the subpoenas issued to AT&T, the social media providers (including Yik Yak), and the four witnesses. The State argued that the defendants had failed to show that the subpoenas will produce material evidence and that compliance with the subpoenas was unreasonable and oppressive. The State asserted that the subpoena to C.C. violated her rights as a victim. Finally, the State claimed that granting subpoenas would have a chilling effect on rape reporting.
In his response to the State‘s amended motion to quash, Mr. Johnson argued that the court had already determined, following a contested hearing, that the information covered by the subpoenas was both relevant and material. He stated that the information already disclosed pursuant to the subpoenas confirmed the court‘s finding.
Neither party presented evidence at the November 3, 2015 hearing on the motion to quash. The State argued that the defendants had made “no showing that these subpoenas will lead to material and admissible evidence,” explaining that materiality was “the main reason that we‘re here in court today.” The State claimed that the defendants had failed to make even a showing that each of the witnesses had accounts with each of the social media providers. The State insisted that the defendants could obtain text messages exchanged between them and any of the witnesses from the defendants’ cellular telephones. The State asserted that the defendants had presented no proof of the need to confiscate the cellular telephones of C.C. and Ms. Lawn. The State emphasized that the “main issue” as far as the State was concerned was “that these subpoenas are unsupported by material or admissible evidence.” The State also argued, however, that “these subpoenas are oppressive and unreasonable, under Rule 17,” citing as proof the email sent to the prosecutor by Ms. Boland‘s mother as exhibited to their motion to quash, in which Ms. Boland‘s mother claimed that she and her husband had spent several hours attempting to assist Ms. Boland in complying with the subpoena and that compliance had been more time consuming than anticipated, to support its assertion that compliance with the subpoenas was unreasonable. Finally, the State asserted, as it had in its amended motion to quash, that requiring C.C. to comply with the subpoenas would create a chilling effect on rape reporting and prosecuting.
The defendants argued that the State had failed to establish any need for the court to revisit its earlier ruling that the subpoenaed materials were material and relevant. The defendants also asserted that the State‘s motion to quash was untimely because some of the witnesses and some of the providers had already begun to comply with the subpoenas. Finally, the defendants maintained that the subpoenas were not unreasonable or oppressive and that there was no practical or legal reason to stop the subpoena process after compliance had begun and so close to trial. The defendants suggested that if the witnesses were experiencing technical difficulties, then the court should appoint an expert to help them at the defendants’ expense.
At the conclusion of the hearing, the trial court granted the motion to quash as to the four witnesses and denied the motion as to all the service providers, ruling as follows:
As we said over and over, we‘re plowing new ground here. This is new territory. We‘re faced with the reality of the computer age and the generation of incredible amounts of communication and the ability to store these communications and access them. It is a new world and there‘s much more information available now than there has been in the past.
And the way that legal principles concerning the acquisition of information in litigation is — is struggling to keep up. We are not — our legal processes have not fully embraced and resolved the manner in which this immense amount of information is to be shared, distributed. So we are without a great deal of guidance and authority in making these decisions and in managing this case.
In the beginning, this started with the defense argument — which the Court accepted. The Court accepted defense counsel‘s representations that Federal case law and Federal statutes are advancing the proposition that stored media communication should be made available to defendants in criminal prosecutions. That‘s how all of this started. The Court accepted that proposition. The Court reviewed 18 United States Code Annotated, 2701 et seq. And this is the Stored Wire and Electronic Communications and Transactional Records and Access Act. And that‘s how we began this journey into the business of computer recorded and stored communication information.In . . . accord with that finding, and with that proposition, this Court did approve the subpoena duces tecum and the accompanying orders to cause social media service providers to provide to the Court the social media communication information relevant to this case. That was the next step.
Some information was provided to the Court pursuant to the subpoenas from some of the providers. Other servers reported that it was their policy to leave it to the end users, or customers, to provide the communication information to others.
In response, counsel for the defense sought approval by this Court for subpoenas and orders directed to the end users, or customers, identified in this case as [C.C.], Bridget Boland, Anna Lawn and Natalie Tavares.
At this point, it appeared to the Court that there was some consensus between the State and the defense that it was appropriate for the end users, or customers, to provide this information to the Court. There was some agreement that the State‘s attorneys would attempt to help these end users provide this information.
In the attempt to do so, however, it became apparent that the end users, or customers, were not able to access the information in spite of what appeared to be sincere efforts to do so.
At this point, the State filed the motion to quash the subpoena. Under these circumstances, this Court finds that those circumstances justify the extension of the time allowable to the State to file its motion. There w[ere] circumstances that developed after — during the attempt to comply with the subpoena that the State learned that this, in their view, was oppressive and the subpoena should be quashed.
At this point today, this morning . . . the defense is asking the Court to enforce the subpoenas and the State is asking the Court to quash the subpoenas.
It now falls to this Court, in this case, to try to find the proper response of a State trial court to evolving Federal law pertaining to access for both the prosecution and the defense to the expediential increase of stored social media communication information available today.
First, this Court is going to distinguish between two types of social media communication information. The first type the Court will refer to as structural information. By this, the Court means the existence of communications, their duration, the identities of the end users, or customers, who are sending or receiving the communications and, where possible, the location of the senders and receivers. Other types of information might also be considered as structure.
The second type of social media communication information this Court will recognize is content.
The Court now considers the four subpoenas on the individuals, [C.C.], Ms. Boland, Ms. Lawn and Ms. Tavares. First of all, the Court does find that the State has standing to move to quash subpoenas that are being used to try to seize information from their witnesses or potential witnesses. In considering the relationship between Tennessee law and the Federal statutes and case law pertaining to subpoenas, this Court finds as follows:
Part A. In the context of this case, the term “content,” . . . is equivalent to the legal phrase “statements of witnesses.”
Tennessee Rule of Procedure, Rule 17 , clearly excludes statements of witnesses from the subpoena power. The Federal statute deals only with the production of information by service providers and not by end users, or customers. That‘s the second part.The third part — the third finding of the Court is: That this Court does find that the subpoenas on the individuals in this case are oppressive and unreasonably demanding. The contention made by the State — rather by the defense, that the Court should appoint a computer expert to assist compliance with the subpoena only underscores the unreasonableness of the subpoena obligation as to those private end users.
And for those three reasons, the fact that
Tennessee Rule of Procedure, Rule 17 , excludes statements of witnesses, and the Federal law deals only with the service providers and not the end users, and in this case, certainly, the Court is finding that the subpoenas turn out to be oppressive and unreasonably demanding. For these three reasons, the Court does now grant the State‘s motion to quash the subpoenas that have been issued to [C.C.], Bridget Boland, Anna Lawn and Natalie Tavares.The Court does find that the State lacks standing to move to quash the subpoenas that were issued to the service providers themselves.
In response to questions by the defense, the court stated that the subpoenas issued to the service providers “remain intact,” explaining, “Those people truly are third . . . parties to this litigation. And they‘re all perfectly capable of hiring lawyers and moving to quash if they choose to.” The court specifically did not rule on whether the providers had to provide the content of the communications.
Following the trial court‘s November 3, 2015 order, both parties moved the trial court for permission to seek interlocutory appeal. The trial court granted permission, and this court agreed to interlocutory review, framing the scope of review as follows:
To be clear, this interlocutory review concerns only the trial court‘s November 3, 2015 order granting, in part, and denying, in part, the State‘s motion to quash subpoenas of the alleged victim, witnesses, and social media service providers, as limited by the trial court‘s November 3 order and order granting permission to seek interlocutory appeal.
Thus, we review the trial court‘s conclusion that the State had standing to quash the subpoenas duces tecum issued to the witnesses, the court‘s ruling quashing those subpoenas, and the court‘s ruling that the State did not have standing to quash the subpoenas duces tecum issued to the various service providers.
I. Standing
The defendants argue that the State lacks standing to file a motion to quash any of the subpoenas issued in this case because the State lacks “a personal right, privilege, or proprietary interest” in the materials the defendants seek via the subpoenas.
As the defendants correctly observe, the trial court did not apply the test for standing to challenge a third party subpoena adopted in State v. Harrison, 270 S.W.3d 21 (Tenn. 2008), and instead concluded, without any analysis, “that the State has standing to move to quash subpoenas that are being used to try to seize information from their witnesses or potential witnesses.” Similarly, the court found, in conclusory fashion, “that the State lacks standing to move to quash the subpoenas that were issued to the service providers themselves.” In response to a question from defense counsel, the court clarified that the service providers “truly are third . . . parties to this litigation. And they‘re all perfectly capable of hiring lawyers and moving to quash if they choose to.”
The subpoenas in this case were issued pursuant to
Absent a showing that the State had standing to challenge the subpoenas, the controversy is not justiciable. West v. Schofield, 468 S.W.3d 482, 490 (Tenn. 2015) (“To determine whether a particular case involves a legal controversy, Tennessee courts use justiciability doctrines that ‘mirror the justiciability doctrines employed by the United States Supreme Court and the federal courts,’ and these doctrines ‘include: (1) the prohibition against advisory opinions, (2) standing, (3) ripeness, (4) mootness, (5) the political question doctrine, and (6) exhaustion of administrative remedies.‘” (citations omitted)); City of Memphis v. Hargett, 414 S.W.3d 88, 96 (Tenn. 2013) (“Justiciability encompasses several distinct doctrines, two of which are . . . mootness and standing.“). As the moving party, the State bore the burden of establishing its standing to challenge the subpoenas in this case. ACLU of Tenn. v. Darnell, 195 S.W.3d 612, 620 (Tenn. 2006). Because standing presents a question of law, we review the issue de novo with no presumption of correctness afforded to the trial court. Massengale v. City of East Ridge, 399 S.W.3d 118, 123 (Tenn. Ct. App. 2012) (citing Cox v. Shell Oil Co., 196 S.W.3d 747, 758 (Tenn. Ct. App. 2005)).
Standing, “‘a judge-made doctrine,‘” Fannon v. City of LaFollette, 329 S.W.3d 418, 424 (Tenn. 2010) (quoting Knierim v. Leatherwood, 542 S.W.2d 806, 808 (Tenn. 1976)), is designed “to determine whether a particular litigant is entitled to have a court decide the merits of a dispute or of particular issues,” Darnell, 195 S.W.3d at 619. “Grounded upon ‘concern about the proper—and properly limited—role of the courts in a democratic society,’ the doctrine of standing precludes courts from adjudicating ‘an action at the instance of one whose rights have not been
In Harrison, the supreme court considered whether Harrison had standing to challenge a subpoena directing Dr. Dennis Wilson, a clinical psychologist who had conducted a forensic examination of Harrison, “to produce ‘[a]ny and all records’ retained by him related to his psychological evaluation.” State v. Harrison, 270 S.W.3d 21, 26 (Tenn. 2008). Although the Harrison court was examining a judicial subpoena issued under the terms of Code section 40-17-123, which prescribes the procedure to “be employed when a law enforcement officer, as defined in § 39-11-106,” requests “the production of books, papers, records, documents, tangible things, or information and data electronically stored for the purpose of establishing, investigating or gathering evidence for the prosecution of a criminal offense,”
In keeping with the general rule reached by numerous courts that “[a] party has standing to move to quash a subpoena addressed to another if the subpoena infringes upon the movant‘s legitimate interests,” see United States v. Raineri, 670 F.2d 702, 712 (7th Cir. 1982), our supreme court concluded that “[a] person who does not have a legally protectable interest in subpoenaed materials has no standing to challenge either the form of a subpoena issued to a third party or the manner in which the subpoena was issued,” see Harrison, 270 S.W.3d at 28. In consequence, the court held that only “a person who has a personal right, privilege, or proprietary interest in materials subject to a third-party subpoena has standing to challenge the subpoena.” Harrison, 270 S.W.3d at 28-29. Accordingly, the court held that Harrison had standing to challenge the subpoena.
Citing Raineri, the State argues that it has a legally protectable interest in the subpoenas arising from its “interests in preventing undue lengthening of the trial, undue harassment of its witness, and prejudicial over-emphasis on [witness] credibility.” See Raineri, 670 F.2d at 712. The State also asserts that it has standing to advocate the four witnesses’ personal rights to the subpoenaed materials by virtue of its statutory and constitutional duty to protect the privacy rights of the victims and witnesses of crime. We consider each claim in turn.
A. The State‘s Own Interest
The State, because of its unique position as “the representative not of an ordinary party to a controversy” but of the people of the State of Tennessee, see Berger v. United States, 295 U.S. 78, 88 (1935), will often lack standing in a criminal case “to challenge a subpoena issued to a third party because of the absence of a claim of privilege, or the absence of a proprietary interest in the subpoenaed material or of some other interest in the subpoenaed documents,” United States v. Beckford, 964 F. Supp. 1010, 1023 (E.D. Va. 1997). That is the case here. The State has no personal right, privilege, or proprietary interest in the electronic communications at issue. That being said, courts have recognized that the State does have legitimate interests
In Raineri, the Seventh Circuit Court of Appeals concluded that the government had standing to challenge a subpoena issued by Raineri to a government witness during trial. The prosecution presented out-of-state witness Cira Gasbarri as its first witness during Raineri‘s trial on charges that he ran a prostitution ring. The defendant subjected her to two days’ cross-examination. Id. Nearly three weeks later, Raineri issued an ex parte subpoena for Gasbarri to appear as a defense witness. Id. The prosecution successfully moved to quash the subpoena. The court stated, without analysis, discussion, or citation to any authority, that “[t]he prosecution‘s standing rested upon its interest in preventing undue lengthening of the trial, undue harassment of its witness, and prejudicial over-emphasis on Gasbarri‘s credibility.” Id. A number of state and federal courts have applied the holding in Raineri to the determination whether the prosecution in a criminal case has standing to challenge a subpoena issued by the defendant to a third party. See, e.g., United States v. Segal, 276 F. Supp. 2d 896, 900 (N.D. Ill. 2003); United States v. Daniels, 95 F. Supp. 2d 1160, 1164 (D. Kan. 2000); United States v. Nachamie, 91 F. Supp. 2d 552, 558 (S.D.N.Y. 2000); Schreibvogel v. State, 228 P.3d 874, 880 (Wyo. 2010); Com. v. Lam, 827 N.E.2d 209, 214 (Mass. 2005); State v. DeCaro, 745 A.2d 800, 816 (2000).
Because Harrison involved the defendant‘s challenge to a third party subpoena, our supreme court had no occasion to determine when the State would have standing to challenge a third party subpoena. Thus, Harrison‘s holding is expressed in terms of what “a person” must show to establish standing: “a personal right, privilege, or proprietary interest.” As indicated above, it will be difficult if not impossible for the State in a criminal case to establish specifically “a personal right, privilege, or proprietary interest.” The Harrison court made it clear, however, that its holding was grounded in the conclusion that “[a] person who does not have a legally protectable interest in subpoenaed materials has no standing to challenge either the form of a subpoena issued to a third party or the manner in which the subpoena was issued.” Harrison, 270 S.W.3d at 28 (emphasis added). That the high court cited Raineri in support of that conclusion suggests that “a legally protectable interest,” as applied to the State in a criminal case, may extend beyond the concepts of “personal right, privilege, or proprietary interest” to cover the State‘s legitimate interests in “preventing undue lengthening of the trial, undue harassment of its witness, and prejudicial over-emphasis on [witness] credibility,” as described in Raineri. Harrison, 270 S.W.3d at 29; Raineri, 670 F.2d at 712.
In our view, none of the interests identified in Raineri are implicated by the third party subpoenas issued in this case.
First, because the subpoenas were issued prior to trial, there is no danger of undue lengthening of the trial. “To the contrary, a subpoena returnable before trial will avoid delay in the government‘s prosecution of the case.” United States v. Tomison, 969 F. Supp. 587, 596 (E.D. Cal. 1997) (citing Bowman Dairy Co. v. United States, 341 U.S. 214, 220 (1951)). The Supreme Court has observed that the “chief innovation” of Rule 17 was, in fact, “to expedite the trial
Second, nothing in the record suggests that the subpoenas issued to the witnesses in this case caused “undue harassment” of the witnesses or that any of the witnesses, including C.C., was in a particularly vulnerable position. Asking a witness to provide his or her evidence to the court in compliance with a validly issued subpoena, standing alone, cannot qualify as “undue harassment.” In our adversarial system of justice, “[t]he need to develop all relevant facts . . . is both fundamental and comprehensive.” United States v. Nixon, 418 U.S. 683, 709 (1974). To this end, “it is imperative to the function of courts that compulsory process be available for the production of evidence needed either by the prosecution or by the defense.” Id. Consequently, it is “a fundamental maxim that the public . . . has a right to every man‘s evidence.” United States v. Bryan, 339 U.S. 323, 332 (1950). “The defendant‘s right to compulsory process is itself designed to vindicate the principle that the ‘ends of criminal justice would be defeated if judgments were to be founded on a partial or speculative presentation of the facts.‘” Taylor v. Illinois, 484 U.S. 400, 411-12 (1988) (quoting Nixon, 418 U.S. at 709); see also Nixon, 418 U.S. at 711 (“The right to the production of all evidence at a criminal trial similarly has constitutional dimensions.“). To be sure, complying with the subpoenas in this case will require some sacrifice on the part of the witnesses, but “[t]he personal sacrifice involved is a part of the necessary contribution of the individual to the welfare of the public.” Blair v. United States, 250 U.S. 273, 282 (1919); see also Blackmer v. United States, 284 U.S. 421, 438 (1932) (“It is also beyond controversy that one of the duties which the citizen owes to his government is to support the administration of justice by attending its courts and giving his testimony whenever he is properly summoned.“).
Although the State argues otherwise, there has been no showing that any of the witnesses are “peculiarly vulnerable.” Other courts have concluded that the prosecution has standing to challenge a subpoena issued to a “peculiarly” or “particularly” vulnerable witness such as the minor victim of a sexual assault, see Com. v. Lam, 27 N.E.2d 209, 214 (2005) (subpoena issued to the father of the minor victim); People v. Spykstra, 234 P.3d 662, 667 (Colo. 2010) (subpoena issued to the parents of the minor victim), or witnesses in a case where there exists a real potential for violence or threats of violence to the witnesses, see United States v. Orena, 883 F. Supp. 849, 853 (E.D.N.Y. 1995) (subpoena issued to the cooperating witnesses in the witness protection program and their
That the defendants moved the court to hold the witnesses in contempt for failure to comply with the subpoenas does not alter our analysis. The State implies, without any evidence, that the motion for contempt was designed to harass, intimidate, or retaliate against the witnesses. As indicated, “there is a general duty to give what [evidence] one is capable of giving,” see Bryan, 339 U.S. at 332, and the appropriate recourse when a party fails to comply with a subpoena, absent some showing of an adequate excuse for failure to comply, is a motion for contempt, see
Finally, there is no evidence to suggest that the subpoenas in this case will lead to “a prejudicial over-emphasis on [witness] credibility.” Indeed, in a case such as this, in which the determination of the defendants’ guilt or innocence will depend solely on the credibility of the witnesses, we cannot fathom that the credibility of the State‘s witnesses could be overemphasized. That being said, because the subpoenas were issued prior to the trial, issues of credibility of the witnesses or the emphasis thereon are not ripe for our review.
Aside from the three interests mentioned in Ranieri, the State will have standing to challenge a subpoena issued to a third party when compliance with the subpoena is “unreasonable or oppressive” as applied to the State. See, e.g., United States v. Daniels, 95 F. Supp. 2d 1160, 1164 (D. Kan. 2000); Tomison, 969 F. Supp. 587, 596 (E.D. Cal. 1997). Nothing in this case, however, suggests that compliance with the subpoenas will work any particular
B. The State as Proxy for the Witnesses’ Interests
The State also asserts that its statutory and constitutional duty “to protect the interests of victims and witnesses” in criminal cases creates in the State a legal interest giving rise to standing to challenge the subpoenas in this case. In support of its position, the State points to the supreme court‘s statement in Harrison that a legal right or interest in subpoenaed materials “may, but not must, be created or defined by statute.” Harrison, 270 S.W.3d at 27. “[I]n cases where a party is seeking to vindicate a statutory right of interest, the doctrine of standing requires the party to demonstrate that its claim falls within the zone of interests protected or regulated by the statute in question.” Id. at 28 (quoting Wood v. Metro. Gov‘t of Nashville & Davidson Cnty., 196 S.W.3d 152, 158 (Tenn. Ct. App. 2005)).
The State notes that article one, section 35 of our state constitution confers on crime victims the rights “to justice and due process” and entitles them to, among other “basic rights,” “confer with the prosecution.”
In our view, the State‘s argument misapprehends the role of the district attorney general in a criminal prosecution. The prosecutor is not an advocate for the victim of a crime or the witnesses for the State but is instead the representative of the sovereign state of Tennessee charged with “safeguarding and advocating the rights of the people.” Quillen v. Crockett, 928 S.W.2d 47, 51 (Tenn. Crim. App. 1995). “District attorneys general are officers of the executive branch, who are entrusted by the citizens of this state with the duty to seek justice.” State v. Head, 971 S.W.2d 49, 51 (Tenn. Crim.App. 1997) (citing State v. Gilliam, 901 S.W.2d 385, 389 (Tenn. Crim. App. 1995); State v. Mario Pendergrass, No. 01C01-9504-CR-00121, 1997 WL 83777 (Tenn. Crim. App., Nashville, Feb. 28, 1997)); see also State v. Griffis, 964 S.W.2d 577, 598 (Tenn. Crim. App. 1997) (“The district attorney general is a ‘quasi-judicial officer,’ who represents the state in criminal prosecutions. However, it is as much the district attorney general‘s responsibility to enforce the laws as it is to see the accused receives a fair and impartial trial.“). Thus, the prosecutor “is in a peculiar and very definite sense the servant of the law, the twofold aim of which is that guilt shall not escape or innocence suffer.” Berger, 295 U.S. at 88.
Neither the codification of the duties of the district attorney general nor the statutory and constitutional provisions conferring certain rights upon the victims of crime alters the prosecutor‘s role as the representative of the people of Tennessee. Nor do they endow the State with the power to represent the victim or the witnesses proffered by the State. The State “cannot undertake to act as counsel to its witnesses,” even the victim, because the State‘s “interests and that of its witnesses are not identical.” Nachamie, 91 F. Supp. 2d at 560-61. The prosecutor‘s highest interest “in a criminal prosecution is not that it shall win a case, but that justice shall be done.” Berger, 295 U.S. at 88.
Additionally, the State lacked a sufficient legal relationship with any of the witnesses in this case to allow the State to assert the witnesses’ own interests in the subpoenaed material. It is well-established that “a victim in a criminal case does not meet the definition of a ‘party‘” in a criminal trial. State v. Flood, 219 S.W.3d 307, 314 (Tenn. 2007) (citing City of Chattanooga v. Swift, 442 S.W.2d 257, 258 (Tenn. 1969)); see also State v. Brown, 29 S.W.3d 427, 442 (Tenn. 2000) (“A victim in a sexual assault case is not a party for purposes of a party opponent admission.“). Even though the four women have been identified as State‘s witnesses, “[i]t is hornbook law that generally no party ‘owns’ a witness.” State v. Womack, 591 S.W.2d 437, 444 (Tenn. Ct. App. 1979). We also note that the Harrison court did not factor Harrison‘s psychologist‘s potential as a witness for either party into its analysis of Harrison‘s standing to challenge the subpoena issued to his psychologist. Harrison, 270 S.W.3d at 26. In fact, the court found that Harrison had standing to challenge the subpoena despite the fact that he “did not intend to call Dr. Wilson as a witness at trial or to rely on Dr. Wilson‘s records as evidence in his case-in-chief at trial,” id., because he had “a legitimate personal interest in the report and records of the clinical psychologist he retained to ascertain whether he is competent to stand trial and whether he could viably assert an insanity defense,” id. at 29.
Finally, we disagree with the State that it has standing to challenge the subpoenas because it is in “the best position to assist the trial court” in determining whether the subpoenas amount to an impermissible “fishing expedition.” The record establishes that the information that is the subject of the subpoenas is and always hasbeen in the exclusive control of the witnesses and the providers. Indeed, the record suggests that the State has gone to great lengths to avoid collecting the requested information. Under these circumstances, we cannot see how the State is in a unique position to comment on the content of the information requested. Indeed, the State appears to have engaged in a “hide the ball” strategy which is inimical to the constitutional rights laboriously described above.
Because the State has failed to establish that it has a legitimate interest in the subpoenas at issue, we conclude that the State lacks standing to challenge the subpoenas. In consequence, we reverse the trial court‘s ruling that the State had standing to challenge the subpoenas issued to the witnesses in this case and affirm the trial court‘s ruling that the State did not have standing to challenge the subpoenas issued to the service providers.
Although our conclusion that the State lacks standing to challenge the subpoenas renders the remaining issues nonjusticiable, in the interests of judicial economy and potential further appellate review, we address the merits of each party‘s claim regarding the subpoenas.
II. Remaining Issues
At this point we provide a brief reminder of the events that led to this appeal. The defendants moved the trial court in August 2015 for a court order to accompany subpoenas duces tecum issued to AT&T, Facebook, Twitter, Instagram, Snapchat, and Yik Yak to obtain the electronic communications of four State‘s witnesses. The defendants argued that the information was relevant, material, necessary to prepare for trial, and not obtainable from
After the defendants received pushback from four of the social media providers and after learning that AT&T did not possess the content information the defendants desired, the defendants notified the trial court of their intention to issue subpoenas directly to the four witnesses asking for identical information. Those subpoenas issued in September 2015. Only C.C. attempted to comply with the subpoenas, sending printouts from some social media sites accompanied by a letter to the trial court explaining why she was unable to provide more information.
The defendants asked that the witnesses be held in contempt for their failure to fully comply with the subpoenas, and the State moved to quash the subpoenas. The trial court granted the State‘s motion to quash the subpoenas issued to the four witnesses on grounds that the materials covered by the subpoenas qualified as “statements of witnesses,” which cannot be obtained by a
In this appeal, the State maintains that the trial court correctly concluded that the requested information qualified as witness statements, rendering them undiscoverable by subpoena, and that the subpoenas were unreasonable and oppressive. The State also contends that the trial court‘s decision to quash the subpoenas to the witnesses did not violate the defendants’ constitutional rights to compulsory process and to present a defense. The defendants assert that the trial court erred on all points.
A. What Can the Defendants Obtain?
Both the state and federal constitutions guarantee a criminal accused the right to compulsory process for obtaining evidence in his favor. See
Because [Sixth Amendment] rights are basic to our adversary system of criminal justice, they are part of the ‘due process of law’ that is guaranteed by the Fourteenth Amendment to defendants in the criminal courts of the States. The
rights to notice, confrontation, and compulsory process, when taken together, guarantee that a criminal charge may be answered in a manner now considered fundamental to the fairadministration of American justice—through the calling and interrogation of favorable witnesses, the cross-examination of adverse witnesses, and the orderly introduction of evidence. In short, the Amendment constitutionalizes the right in an adversary criminal trial to make a defense as we know it.
Faretta v. California, 422 U.S. 806, 818 (1975); see also Washington v. Texas, 388 U.S. 14, 18 (1967) (“The right of an accused to have compulsory process for obtaining witnesses in his favor stands on no lesser footing than the other Sixth Amendment rights that we have previously held applicable to the States.“).
In constitutional law, as in all things in life, however, there are limits. “The accused does not have an unfettered right to offer [evidence] that is incompetent, privileged, or otherwise inadmissible under standard rules of evidence. The Compulsory Process Clause provides him with an effective weapon, but it is a weapon that cannot be used irresponsibly.” Taylor, 484 U.S. at 410; Chambers v. Mississippi, 410 U.S. 284, 295 (1973) (observing that the criminal defendant‘s right to present evidence “is not absolute and may, in appropriate cases, bow to accommodate other legitimate interests in the criminal trial process“). Indeed, “[t]he adversary process could not function effectively without adherence to rules of procedure that govern the orderly presentation of facts and arguments to provide each party with a fair opportunity to assemble and submit evidence to contradict or explain the opponent‘s case.” Taylor, 484 U.S. at 410-11. “Rules that provide for pretrial discovery . . . . minimize[] the risk that a judgment will be predicated on incomplete, misleading, or even deliberately fabricated” evidence. Id. at 411-12.
In addition to the constitutional right to compulsory process, our Code contains a statutory right to compulsory process, see
Tennessee Rule of Criminal Procedure 17 provides, in pertinent part, as follows:
(d) Documents and Objects. A subpoena may order a person to produce the books, papers, documents, or other objects the subpoena designates.
(1) Production to Permit Inspection. The court may direct that the designated items be produced in court before trial or before they are to be offered in evidence. When the items arrive, the court may permit the parties and their attorneys to inspect all or part of them.
(2) Compliance Unreasonable. On motion made promptly and in any event by the time specified in the subpoena for compliance therewith, the court may quash or modify the subpoena if compliance would be unreasonable or oppressive. The court may condition denial of the motion on the advancement by the party in whose behalf the subpoena is issued of the reasonable cost of producing
the books, papers, documents, or other objects. . . . .
(g) Contempt. When a subpoena is served on a person, the court issuing the subpoena may deem the person‘s refusal to obey the subpoena to be contempt of court unless the person has an adequate excuse.
(h) Information not Subject to Subpoena. Statements by witnesses or prospective witnesses may not be subpoenaed from the state or the defendant under this rule, but are subject to production only in accordance with the provisions of Rule 26.2.
Against this backdrop, we begin our analysis with the claim we believe to be the easiest to dispose of: that the subpoenaed materials were “statements by witnesses” and were thus undiscoverable pursuant to the rules of criminal procedure. Rule 17 is “similar to its federal counterpart” in that it “makes it clear that the proper method to secure witness statements from the opposing side--either at trial or at a pretrial hearing under Rule 12(b)--is as set forth in Rule 26.2.”
[a]fter a witness other than the defendant has testified on direct examination, the court, on motion of a party who did not call the witness, shall order the attorney for the state or the defendant and the defendant‘s attorney to produce, for the examination and use of the moving party, any statement of the witness that is in their possession and that relates to the subject matter of the witness‘s testimony.
Based upon the plain language of the two rules, neither operates to bar the subpoenas for the electronic communications in this case. First, the defendants did not attempt to subpoena any of the electronic communications “from the [S]tate” as prohibited by Rule 17 because, as the State has made clear, none of the desired communications has ever been in the possession of the State. See
Our conclusion that the rules of criminal procedure do not expressly prohibit the
The Supreme Court has “recognized” that “the subpoena duces tecum” provided for in the federal counterpart to Rule 17 “was not intended to provide a means of discovery for criminal cases” and that “its chief innovation was to expedite the trial byproviding a time and place before trial for the inspection of subpoenaed materials.”13 Nixon, 418 U.S. at 698-99 (citing Bowman Dairy Co. v. United States, 341 U.S. 214, 220 (1951)). Importantly, “[a] subpoena for documents may be quashed if their production would be ‘unreasonable or oppressive, but not otherwise.‘” Id. at 698. In consequence, the party seeking production of evidence via the federal rule prior to trial must show:
(1) that the documents are evidentiary and relevant; (2) that they are not otherwise procurable reasonably in advance of trial by exercise of due diligence; (3) that the party cannot properly prepare for trial without such production and inspection in advance of trial and that the failure to obtain such inspection may tend unreasonably to delay the trial; and (4) that the application is made in good faith and is not intended as a general ‘fishing expedition.’
Nixon, 418 U.S. at 699-700. To carry this burden, the moving party “must clear three hurdles: (1) relevancy; (2) admissibility; (3) specificity.” Id. at 700. The defendants argue that they have met this burden. The State argues that they have not.
The decision whether to enforce “a pretrial subpoena duces tecum must necessarily be committed to the sound discretion of the trial court since the necessity for the subpoena most often turns upon a determination of factual issues.” Id., 418 U.S. at 702.
In Nixon, the Special Prosecutor handling the indictment of John N. Mitchell, H. R. Haldeman, John D. Ehrlichman, Charles W. Colson, Robert C. Mardian, Kenneth W. Parkinson, and Gordon Strachan on charges of conspiracy to defraud the United States and obstruction of justice caused to be issued a subpoena directed at President Nixon, who had been named in the indictment as an unindicted co-conspirator, to produce “in advance of the September 9 trial date . . . certain tapes, memoranda, papers, transcripts or other writings relating to certain precisely identified meetings between the President and others.” Nixon, 418 U.S. at 686, 689. “The Special Prosecutor was able to fix the time, place, and persons present at these discussions because the White House daily logs and appointment records had been delivered to him.” Id. at 689.
The Supreme Court determined that although “the contents of the subpoenaed tapes could not at that stage be described fully by the Special Prosecutor,” the evidence offered by the Special prosecutor in the form of “the sworn testimony or statements of one or more of the participants in the conversations as to what was said at the time” as well as “the identity of the participants and the time and place of the conversations,” evinced “a sufficient likelihood that
With this foundation, we turn to the present case.
With regard to relevancy, the evidence presented by the defendants supports a conclusion that the four witnesses named in the subpoenas communicated electronically, either via text message or social media, about the party where the events transpired and the offenses themselves. Although the defendants cannot describe fully the contents of the electronic communications, the ubiquitous nature of electronic communication and the type of “smart phones” used to send text messages and engage in social media, see Riley v. California, 134 S. Ct. 2473, 2484 (2014) (observing that “modern cell phones . . . are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy“), coupled with the admissions by various witnesses about their electronic communications relevant to the offenses, “permit a rational inference that at least part of the conversations relate to the offenses charged in the indictment,” Nixon, 418 U.S. at 700.
With regard to admissibility, we observe, as did the Court in Nixon, that the requested communications are “a collection of out-of-court statements by declarants who will not be subject to cross-examination.” Id. That being said, the rules of evidence do not bar the admission of all out-of-court statements so long as they fit within an exception to the hearsay rule. Additionally, as was the case in Nixon, the requested materials “may also be admissible for the limited purpose of impeaching the credibility of” any witness who testifies at trial. Id. at 701 (observing that “[g]enerally, the need for evidence to impeach witnesses is insufficient to require its production in advance of trial” but pretrial production is justified when “there are other valid potential evidentiary uses for the same material” and the production “may take a significant period of time“).
This brings us to the demand included in the subpoenas that C.C. and Ms. Lawn produce their cellular telephones for inspection and examination. Nothing at the hearing on the defendants’ motion suggested that the defendants were seeking production of the cellular telephones themselves, and the trial court made no findings in this regard. The defendants presented no evidence of a need for production of the cellular telephones. Indeed, the evidence presented at the hearing and other evidence included in the record indicates that both women had replaced their cellular telephone handsets within days of one another in January 2015 and that C.C. had sold her old handset online, despite expressing to the police that the handset was not in working order, and that Ms. Lawn had disposed of hers as well. Based on these facts, the defendants have failed to establish that pretrial production of the
Finally, we observe that although the defendants’ arguments, both in their motion and at the hearing, suggested subpoenas for the production of electronic communications about the offenses made during the period of time surrounding the offenses and the ensuing investigation, the subpoenas actually issued in this case lack that same specificity. The subpoenas request from the social media providers and the four witnesses every piece of both content-related and non-content-related electronic communications generated by the four witnesses for the 18-month period prior to the issuance of the subpoenas. This broad, general request spanning a lengthy and open-ended time frame finds no support in either the case law or the record. As indicated, the defendants have established that some of the witnesses’ electronic communications are likely to contain relevant, admissible evidence. The relevant time frame for theelectronic communications of Ms. Lawn, Ms. Boland, and Ms. Tavares, based upon the evidence and argument presented at this stage in the proceedings, would be the period beginning the day of the party and ending when the witnesses were cautioned by the KPD to avoid discussing the offenses on social media. Because of the nature of the relationship alleged between C.C. and Mr. Johnson, the relevant time frame for her electronic communications would be broader, spanning from the beginning of their relationship until she closed her social media accounts.
In summary, the defendants established, under the Nixon standard, an entitlement to pretrial production of the electronic communications of each of the witnesses within the above-described relevant time frames. Because the subpoenas actually issued lack specificity as discussed, rendering them overly broad, we would have concluded that the subpoenas should be modified to require the production only of those materials as outlined above had we not previously concluded that the State lacked standing to challenge the subpoenas.
B. From Whom Can the Defendants Obtain Information?
Having determined what the defendants are entitled to, we now consider from whom they may acquire it.
1. Service Providers
In the trial court, the social media providers responded to the subpoena by letter stating that the terms of the Stored Communications
The trial court, the parties, and the providers assumed without analysis that the SCA applied to the social media communications requested by the defendants. As we discuss more fully below, the application of the SCA to these communications is not quite so clear.
“The privacy of stored Internet communications in the United States is governed by” the
“The Stored Communications Act is best understood by considering its operation and purpose in light of the technology that existed in 1986” because it “is not built around clear principles that are intended to easily accommodate future changes in technology; instead, Congress chose to draft a complex statute based on the operation
The United States Code defines “electronic communication service” (“ECS“) as “any service which provides to users thereof the ability to send or receive wire or electronic communications.”
The Code defines “remote computing service” (“RCS“) as “the provision to the public of computer storage or processing services by means of an electronic communications system.”
A few remaining definitions are in order. Electronic communication is defined as
any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system that affects interstate or foreign commerce, but does not include—
(A) any wire or oral communication;
(B) any communication made through a tone-only paging device;
(C) any communication from a tracking device (as defined in section 3117 of this title); or
(D) electronic funds transfer information stored by a financial institution in a communications system used for the electronic storage and transfer of funds.
The
Code section 2702, which regulates the voluntary disclosure of information provides, in pertinent part, as follows:
(a) Prohibitions.--Except as provided in subsection (b) or (c)--
(1) a person or entity providing an electronic communication service to the public shall not knowingly divulge to any person or entity the contents of a communication while in electronic storage by that service; and
(2) a person or entity providing remote computing service to the public shall not knowingly divulge to any person or entity the contents of any communication which is carried or maintained on that service--
(A) on behalf of, and received by means of electronic transmission from (or created by means of computer processing of communications received by means of electronic transmission from), a subscriber or customer of such service;
(B) solely for the purpose of providing storage or computer processing services to such subscriber or customer, if the provider is not authorized to access the contents of any such communications for purposes of providing any services other than storage or computer processing; and
(3) a provider of remote computing service or electronic communication service to the public shall not knowingly divulge a record or other information pertaining to asubscriber to or customer of such service (not including the contents of communications covered by paragraph (1) or (2)) to any governmental entity.
(b) Exceptions for disclosure of communications.-- A provider described in subsection (a) may divulge the contents of a communication--
(1) to an addressee or intended recipient of such communication or an agent of such addressee or intended recipient;
(2) as otherwise authorized in section 2517, 2511(2)(a), or 2703 of this title;
(3) with the lawful consent of the originator or an addressee or intended recipient of such communication, or the subscriber in the case of remote computing service;
. . . .
(c) Exceptions for disclosure of customer records.--A provider described in subsection (a) may divulge a record or other information pertaining to a subscriber to or customer of such service (not including the contents of communications covered by subsection (a)(1) or (a)(2))--
(1) as otherwise authorized in section 2703;
(2) with the lawful consent of the customer or subscriber;
. . . .
(a) Contents of wire or electronic communications in electronic storage.--A governmental entity may require the disclosure by a provider of electronic communication service of the contents of
a wire or electronic communication, that is in electronic storage in an electronic communications system for one hundred and eighty days or less, only pursuant to a warrant issued using the procedures described in the Federal Rules of Criminal Procedure (or, in the case of a State court, issued using State warrant procedures) by a court ofcompetent jurisdiction. A governmental entity may require the disclosure by a provider of electronic communications services of the contents of a wire or electronic communication that has been in electronic storage in an electronic communications system for more than one hundred and eighty days by the means available under subsection (b) of this section. (b) Contents of wire or electronic communications in a remote computing service.--(1) A governmental entity may require a provider of remote computing service to disclose the contents of any wire or electronic communication to which this paragraph is made applicable by paragraph (2) of this subsection--
(A) without required notice to the subscriber or customer, if the governmental entity obtains a warrant issued using the procedures described in the Federal Rules of Criminal Procedure (or, in the case of a State court, issued using State warrant procedures) by a court of competent jurisdiction; or
(B) with prior notice from the governmental entity to the subscriber or customer if the governmental entity--
(i) uses an administrative subpoena authorized by a Federal or State statute or a Federal or State grand jury or trial subpoena; or
(ii) obtains a court order for such disclosure under subsection (d) of this section;
except that delayed notice may be given pursuant to section 2705 of this title.
(2) Paragraph (1) is applicable with respect to any wire or electronic communication that is held or maintained on that service--
(A) on behalf of, and received by means of electronic transmission from (or created by means of computer processing of communications received by means of electronic transmission from), a subscriber or customer of such remote computing service; and
(B) solely for the purpose of providing storage or computer processing services to such subscriber or customer, if the provider is not authorized to access the contents of any such communications for purposes ofproviding any services other than storage or computer processing.
(c) Records concerning electronic communication service or remote computing service.--(1) A governmental entity may require a provider of electronic communication service or remote computing service to disclose a record or other information pertaining to a subscriber to or customer of such service (not including the contents of communications) only when the governmental entity—
(A) obtains a warrant issued using the procedures described in the Federal Rules of Criminal Procedure (or, in the case of a State court, issued using State warrant procedures) by a court of competent jurisdiction;
(B) obtains a court order for such disclosure under subsection (d) of this section;
(C) has the consent of the subscriber or customer to such disclosure;
(D) submits a formal written request relevant to a law enforcement investigation concerning telemarketing fraud
for the name, address, and place of business of a subscriber or customer of such provider, which subscriber or customer is engaged in telemarketing (as such term is defined in section 2325 of this title); or (E) seeks information under paragraph (2).
(2) A provider of electronic communication service or remote computing service shall disclose to a governmental entity the—
(A) name;
(B) address;
(C) local and long distance telephone connection records, or records of session times and durations;
(D) length of service (including start date) and types of service utilized;
(E) telephone or instrument number or other subscriber number or identity, including any temporarily assigned network address; and
(F) means and source of payment for such service (including any credit card or bank account number),
of a subscriber to or customer of such service when the governmental entity uses an administrative subpoena authorized by a Federal or State statute or a Federal or Stategrand jury or trial subpoena or any means available under paragraph (1).
(3) A governmental entity receiving records or information under this subsection is not required to provide notice to a subscriber or customer.
(d) Requirements for court order.--A court order for disclosure under subsection (b) or (c) may be issued by any court that is a court of competent jurisdiction and shall issue only if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation. In the case of a State governmental authority, such a court order shall not issue if prohibited by the law of such State. A court issuing an order pursuant to this section, on a motion made promptly by the service provider, may quash or modify such order, if the information or records requested are unusually voluminous in nature or compliance with such order otherwise would cause an undue burden on such provider.
Importantly, the
At the lowest threshold, only a simple subpoena is needed to compel basic subscriber information. Higher up the pyramid, a 2703(d) order compels all noncontent records. A simple subpoena combined with prior notice compels three categories of information: basic subscriber information, plus any opened e-mails or other permanently held files (covered by the RCS rules), plus any contents in temporary “electronic storage” such as unretrieved e-mails in storage for more than180 days. A 2703(d) order plus prior notice is sufficient to compel all noncontent records, plus any opened e-mails or other permanently
held files (covered by the RCS rules), plus any contents in temporary “electronic storage” such as unretrieved e-mails in storage for more than 180 days. Put another way, a 2703(d) order plus prior notice compels everything except contents in temporary “electronic storage” 180 days or less. Finally, a search warrant is needed to compel everything stored in an account.
Id. at 1222-23 (footnotes omitted); see also Matter of Warrant to Search a Certain E-Mail Account Controlled & Maintained by Microsoft Corp., 829 F.3d 197, 207-08 (2d Cir. 2016) (hereinafter ”Microsoft“).16 “Data stored by a remote computing service (RCS) . . . receives fewer privacy protections than communications held by an ECS.” Robison, supra, 1208.
Because the framework created in the
courts faced with the issue have concluded that the
We agree with those courts that have concluded that the
To obtain any information other than “[b]asic subscriber and transactional information,” which “can be obtained simply with an administrative subpoena,”Microsoft, 829 F.3d at 207, the defendants had to show that (1) a defendant in a criminal case qualifies as a “governmental entity” under the terms of the
2. Witnesses
Although the defendants cannot obtain the witnesses’ electronic communications directly from the social media providers, nothing prevents them from obtaining the information as outlined above directly from the witnesses themselves. See John G. Browning, Digging for the Digital Dirt: Discovery and Use of Evidence from Social Media Sites, 14 SMU Sci. & Tech. L. Rev. 465, 473 (2011) (“The most effective methods of obtaining discovery of the contents of a party‘s social networking profile are propounding specific, well-tailored discovery requests to the party himself . . . .“). By its terms, the
Although courts have indicated that privacy considerations may be implicated when dealing with electronic communications, see, e.g., United States v. Warshak, 631 F.3d 266, 283-88 (6th Cir. 2010), a privacy claim cannot place those communications totally beyond the reach of a criminal defendant who has shown that the communications are likely to contain relevant, material evidence. To hold otherwise would be to apply a sort of privilege to electronic communications that does not exist for other forms of communication, a privilege that would serve only “to withhold evidence that is demonstrably relevant in a criminal trial” and “cut deeply into the guarantee of due process of law and gravely impair the basic function of the courts.” Nixon, 418 U.S. at 712. “Certain exemptions from” providing evidence “are recognized by all courts,” “[b]ut every such exemption is grounded in a substantial individual interest which has been found, through centuries
We have elected to employ an adversary system of criminal justice in which the parties contest all issues before a court of law. The need to develop all relevant facts in the adversary system is both fundamental and comprehensive. The ends of criminal justice would be defeated if judgments were to be founded on a partial or speculative presentation of the facts. The very integrity of the judicial system and public confidence in the system depend on full disclosure of all the facts, within the framework of the rules of evidence. To ensure that justice is done, it is imperative to the function of courts that compulsory process be available for theproduction of evidence needed either by the prosecution or by the defense.
Nixon, 418 U.S. at 709. Privileges erected by the Court to place evidence beyond the reach of compulsory process “are designed to protect weighty and legitimate competing interests . . . . Whatever their origins, these exceptions to the demand for every man‘s evidence are not lightly created nor expansively construed, for they are in derogation of the search for truth.” Id. at 709-10. Even where a privilege exists, such as in the case of the presidential communications at issue in Nixon, “[t]he generalized assertion of privilege must yield to the demonstrated, specific need for evidence in a pending criminal trial.” Id. at 713.
The defendants have satisfied the Nixon requirements with regard to those electronic communications falling within the relevant time frames outlined above. No evidence suggests that the witnesses enjoy a blanket privilege with regard to their electronic communications.18
Moreover, we disagree with the trial court‘s finding that the subpoenas issued to the witnesses were oppressive. First, the evidence relied on by the court to support this finding, the letter from Ms. Boland‘s mother, does not indicate anything more than a minor difficulty in obtaining the requested information experienced by one of the witnesses. Ms. Boland‘s mother complained to the assistant district attorney via email that Ms. Boland and her parents had had to spend several hours during a weekend visit attempting to comply with the subpoena. We hardly think this too onerous a burden when juxtaposed with the defendants’ constitutional trial rights. When put in perspective, the expense of a few hours’ time and a few dollars are less than “oppressive.” Courts have recognized that complying with that “fundamental maxim that the public has a right to every man‘s evidence,” Bryan, 339 U.S. at 332, will necessarily involve “personal sacrifice” but that the sacrifice “is a part of the necessary contribution of the individual to the welfare of the public,” even when “onerous,” Blair, 250 U.S. at 281.
Conclusion
We hold that the State lacks standing to challenge the subpoenas issued to C.C., Ms. Lawn, Ms. Boland, and Ms. Tavares. The State also lacks standing to challenge the subpoenas issued to any of the service providers in this case. Accordingly, we affirm
JAMES CURWOOD WITT, JR., JUDGE
Notes
Riley, 134 S. Ct. at 2494-95.Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans “the privacies of life.” The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought. Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple—get a warrant.
Microsoft, 829 F.3d at 207-08.Basic subscriber and transactional information can be obtained simply with an administrative subpoena. Other non-content records can be obtained by a court order (a “§ 2703(d) order“) . . . . The government may also obtain some user content with an administrative subpoena or a § 2703(d) order, but only if notice is provided to the service provider‘s subscriber or customer. § 2703(b)(1)(B). To obtain “priority stored communications” (our phrase), as described below, the Act generally requires that the government first secure a warrant that has been issued “using the procedures described in the Federal Rules of Criminal Procedure,” or using State warrant procedures, both of which require a showing of probable cause. Priority stored communications fall into two categories: For electronic communications stored recently (that is, for less than 180 days) by an ECS, the government must obtain a warrant. § 2703(a). For older electronic communications and those held by an RCS, a warrant is also required, unless the Government is willing to provide notice to the subscriber or customer.“).
