STATE OF OREGON, Appellant, v. LANGSTON AMANI HARRIS, Respondent.
CC 20CR28186; SC S068481
Supreme Court of Oregon
April 28, 2022
369 Or 628; 509 P3d 83
Argued and submitted November 2, 2021, resubmitted January 25, 2022. On appeal from an order of the Washington County Circuit Court under ORS 138.045(1)(d), ORS 138.045(2), and ORAP 12.07. Janelle F. Wipper, Judge.
The order of the circuit court is affirmed.
Benjamin Gutman, Solicitor General, Salem, argued the cause and filed the briefs for appellant. Also on the briefs
Kevin Sali, Kevin Sali LLC, Portland, argued the cause and filed the brief for respondent. Also on the brief was John Robb.
Before Walters, Chief Justice, and Balmer, Flynn, Duncan, Nelson, Garrett, and DeHoog, Justices.**
FLYNN, J.
The order of the circuit court is affirmed.
This case involves the state‘s direct and interlocutory appeal of an omnibus pretrial order granting numerous defense motions to suppress evidence that the state obtained through wiretaps and search warrants. See
I. FACTS
Defendant has been charged with first-degree and second-degree murder, first-degree robbery, promoting prostitution, and other crimes. In this pretrial posture, the following facts are undisputed for purposes of this direct appeal.
The murder charges arise from the death of RBH, who was shot outside of his apartment building in the early morning hours of September 20, 2017. RBH had had an argument with his wife the evening before and had left their home to spend the night in his pickup truck. RBH‘s wife spoke to him about 3:00 a.m., while he was sitting in his truck in the parking lot outside of their building. Officers were called to the scene the next morning and found RBH on the ground near his truck, with a gunshot wound to the head. It appears that the shooting occurred at about 3:30 a.m., based on the report of a neighbor who heard sounds that might have been gunfire and saw a car driving away from where the body was found.
Based on that information, the state applied for a search warrant for records of phone number -2494 from the service provider, T-Mobile. The affidavit supporting the application explained that the “aforementioned” facts gave rise to probable cause “to believe that evidence of the crimes of Murder (
“[t]he records are going to provide evidence of the crime of murder because the records will help identify people who may be able to provide witness information or details about what was happening or have information about the murder because the calls were so close in time to reports of ‘pops’ by neighbors.”
The affidavit requested a warrant to obtain detailed records for the period from 8:00 a.m. on September 19, 2017, through 8:00 p.m. on September 21, including “location data” for the phone, “details of all voice, message, and data usages (incoming and outgoing),” and “all incoming and/or outgoing SMS and/or MMS messages and related records.” The warrant issued on September 22, 2017.
Around the time that officers received records in response to the September 22 warrant for phone number -2494, which the state later linked to defendant, officers learned from an analysis of RBH‘s phone records that he
Relying in part on the additional information from RBH‘s phone and in part on records obtained in response to the September 22 warrant, officers then sought and obtained orders for the records of multiple additional phone numbers. And those records, in turn, led to still other search warrants. As relevant here, the state would eventually obtain more than twenty additional search warrants directed against defendant based on the information developed from the September 22 warrant. Those additional warrants were primarily for phone numbers, but also included warrants for online accounts, that were owned or used by defendant.
In addition, the state applied for and obtained orders to intercept oral, electronic, and wire communications (wiretaps) for multiple phone numbers allegedly used by defendant, a process that is restricted under federal law. See
The state‘s theory of the case, which it expects the evidence will support, is that defendant and Sterling-Clark were part of a prostitution ring operating in Washington County. On the night that RBH was murdered, he had responded to an online ad for prostitution services and had arranged to meet Sterling-Clark. Defendant, who helped arrange the encounter, drove Sterling-Clark to meet RBH. At some point, defendant and Sterling-Clark decided to rob RBH, who had texted them a picture of a large amount of cash. In the course of the robbery, defendant shot and killed RBH. Later, defendant tried to intimidate Sterling-Clark into concealing his role in the murder.
After being indicted, defendant filed numerous pretrial motions, including motions to suppress evidence intercepted through the wiretaps and obtained through
II. DISCUSSION
As described at the outset, the state divides its challenges to the pretrial rulings into two assignments of error. The first assignment of error challenges the grant of defendant‘s motion to suppress evidence obtained through the wiretap orders on the basis that the applications failed to satisfy the requirements of federal law. The second assignment of error challenges the court‘s combined ruling granting two dozen motions to suppress evidence derived from search warrants for cell phone records on the basis that each warrant was invalid for multiple alternative reasons. As the facts are undisputed, we review the trial court‘s rulings on the motions to suppress for legal error. See State v. Turnidge (S059155), 359 Or 364, 399, 374 P3d 853 (2016). And we conclude that the trial court did not err.
A. Wiretap Evidence
1. Motion to suppress and trial court order
Defendant sought to suppress the evidence obtained as a result of the four wiretap orders. Federal law—enacted as Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (Wiretap Act), Pub L 90-351, 82 Stat 197 (1968)—restricts in several ways the ability of both state and federal government officials to obtain judicial wiretap orders. Most pertinent to this appeal, the act prohibits all courts, federal and state, from admitting any wiretap evidence obtained in violation of the act in any trial, hearing, or other similar proceeding.
The relevant restriction on wiretaps is set out in
In this case, all of the challenged applications for wiretaps were made by a deputy district attorney. The applications stated that the deputy district attorney was
“authorized by District Attorney Robert Hermann for Washington County, Oregon to make this application pursuant to
ORS 133.724(1)(a) [.]”
The affidavits provided no further information about the authorization.
In his motion to suppress, defendant argued that the “principal prosecuting attorney” under
The state did not dispute that the phrase “principal prosecuting attorney” in the federal act refers to the district attorney. It contended, however, that the federal law does not preclude Oregon from permitting district attorneys to delegate their authority to apply for wiretaps. It also argued in the alternative that, regardless of the validity of the wiretap applications, the evidence should not be suppressed because the state had acted in good faith.
2. Delegation by “principal prosecuting attorney”
The issue regarding the wiretap evidence is entirely one of federal law.2 To determine whether
The text of
We are not convinced.
Moreover, important context for the meaning of
“The Attorney General, Deputy Attorney General, Associate Attorney General, or any Assistant Attorney General, any acting Assistant Attorney General, or any Deputy Assistant Attorney General or acting Deputy Assistant Attorney General in the Criminal Division or National Security Division specially designated by the Attorney General * * *.”
(Footnote omitted.) Both provisions were adopted as part of the Omnibus Crime Control and Safe Streets Act of 1968. See Giordano, 416 US at 507 (so noting). The Court in Giordano concluded that Congress intended
But the Court rejected that argument.
The Court explained that the overall structure of the act showed a congressional intent to limit when wiretaps would be permitted at all.
The Court also examined the extensive legislative history behind the act, which dated back to an original proposal in 1961 that would have allowed the United States Attorney General, as well as the Executive Assistant and any United States Attorney, to apply for a wiretap.
The Court also reviewed the relevant sections of the Senate report regarding the act that created
The Court‘s conclusion—that Congress intended
The state contends, however, that a later congressional enactment provides context pointing to a different interpretation of
The state‘s proposal, however, extends beyond the inferences that reasonably may be drawn from the District of Columbia statute. At least with respect to the wiretapping provisions, there is no basis for inferring that the intent of the 1970 Congress can be imputed to the 1968 Congress. As defendant emphasizes, the composition of the two Congresses was different. Moreover, the drafters of the 1970 law identified the delegation provision as one that would “supersede” provisions of the 1968 wiretapping law “in cases of irreconcilable conflict.” Pub L 91-358, § 210(a), 84 Stat 627 (DC Code § 23-556(b)). At least one member of Congress described the 1970 legislation as containing “broad and general wiretap authority going far beyond the limited authority of Title III of the 1968 Omnibus Crime Bill[.]” Crime in the National Capital: Hearings on S. 2601 Before the S Comm on the District of Columbia, 91st Cong 2077 (Mar 23 and Apr 2, 1970) (statement of Sen Ervin).
The state also points to one sentence in the senate report for the 1968 Act, which refers to “[t]he issue of delegation” being “a question of State law.” S Rep 90-1097, 90th Cong, 2d Sess, reprinted in 1968 USCCAN 2112, 2187. The broader context of the report‘s discussion of
Those statements of intent to centralize and limit the authority of state officials to pursue wiretaps are similar to the statements of intent to centralize and limit the authority of federal officials that the Court in Giordano considered to be so persuasive. See Giordano, 416 US at 520 (discussing S Rep 90-1097, 90th Cong, 2d Sess, 96-97). The statements of intent persuaded the Court in Giordano that
That conclusion should mean that the applications by a deputy district attorney here were not authorized applications for wiretaps. But the state urges us to follow the holdings of some courts from other states and federal districts that have upheld wiretaps despite something less than literal compliance with the application limits of
What the state misses in proposing a focus on congressional intent is that, as we have already explained, Congress‘s purpose in narrowly circumscribing the state and federal officials who may apply for wiretaps was to centralize and limit the exercise of that authority. Even the purpose-driven decisions most favorable to the state do not stray as far from the requirements of
In this case, we need not decide whether to reject the reasoning that has motivated other courts to conclude that “substantial compliance” with the application requirements of the federal wiretap act is enough, because the wiretap applications in this case fall below even the standards set in the decisions that the state views as persuasive. The most that is shown here regarding involvement of the “principal prosecuting attorney” in the wiretap applications at issue is a generic claim that the Washington County District Attorney had delegated his authority to file wiretap applications. As far as the applications show, the district attorney could have given a blanket oral authorization to all assistant district attorneys to file wiretap applications in any case where they see fit. Indeed, the state affirmatively argues that “it is irrelevant whether the district attorney was specifically aware of any particular wiretap application.” That is far too similar to the blanket delegation that the Court in Giordano refused to authorize. See United States v. Giordano, 469 F2d 522, 524 (4th Cir 1972), aff‘d, 416 US 505, 94 S Ct 1820, 40 L Ed 2d 341 (1974) (referring to “the ‘Alice in Wonderland’ world of [United States] Justice Department wiretap applications,” in which “neither [Attorney General] Mitchell nor [Assistant Attorney General] Wilson had heard of the Giordano application or signed the letters
3. Whether there is a “good faith” exception to suppression
The state argues that, regardless of whether the wiretaps were lawful, the trial court erred in suppressing the evidence that the state obtained through those wiretaps. It asks us to conclude that law enforcement had obtained the evidence in good faith reliance on the wiretap warrants and, on that basis, that the evidence should not be suppressed. We reject that argument.
The “good faith” principle on which the state relies is a court-created exception to the court-created rule that evidence obtained in violation of the Fourth Amendment should be excluded. The “good faith” doctrine was first recognized in United States v. Leon, 468 US 897, 104 S Ct 3405, 82 L Ed 2d 677 (1984), regarding an invalid search warrant. The Court there held “that the marginal or nonexistent benefits produced by suppressing evidence obtained in objectively reasonable reliance on a subsequently invalidated search warrant cannot justify the substantial costs of exclusion.” Id. at 922. The Court premised its creation of a good faith exception on the fact that “[t]he Fourth Amendment contains no provision expressly precluding the use of evidence obtained in violation of its commands.” Id. at 906. It reasoned that “[t]he wrong condemned by the [Fourth] Amendment is fully accomplished by the unlawful search or seizure itself, and the exclusionary rule is neither intended
There is no basis for applying the doctrine in the context of a statute that specifically provides for the suppression and exclusion of evidence intercepted through an unlawful wiretap. As noted above, suppression is required by two different provisions of the federal wiretap act. The first is
“Whenever any wire or oral communication has been intercepted, no part of the contents of such communication and no evidence derived therefrom may be received in evidence in any trial, hearing, or other proceeding in or before any court * * * of the United States, a State, or a political subdivision thereof if the disclosure of that information would be in violation of this chapter.”
The second is
“Any aggrieved person in any trial, hearing, or proceeding in or before any court *** of the United States, a State, or a political subdivision thereof, may move to suppress the contents of any wire or oral communication intercepted pursuant to this chapter, or evidence derived therefrom, on the grounds that—
“(i) the communication was unlawfully intercepted[.]”
In addition to those suppression provisions, the law prohibits the intentional disclosure or use of the content of intercepted communications, if the person knows or has reason to know that they were unlawfully intercepted.
The Court in Giordano emphasized that “‘unlawfully intercepted‘” is “not limited to constitutional violations,” and it concluded that “Congress intended to require suppression where there is failure to satisfy any of those statutory requirements that directly and substantially implement the congressional intention to limit the use of intercept procedures to those situations clearly calling for the employment of this extraordinary investigative device.” 416 US at 527 (quoting
“We are confident that the provision for pre-application approval was intended to play a central role in the statutory scheme and that suppression must follow when it is shown that this statutory requirement has been ignored.”
Although Giordano predates the Court‘s adoption of a “good faith” exception to the Fourth Amendment exclusionary rule, Giordano remains controlling precedent on the question of whether evidence intercepted through an unlawful wiretap must be suppressed. Moreover, the Court has since reiterated Giordano‘s holding, albeit in a different context. Dahda v. United States, ___ US ___, ___, 138 S Ct 1491, 1499, 200 L Ed 2d 842 (2018). Whereas Giordano had involved suppression due to a defective wiretap application under
In summary: We agree with the trial court that the wiretap applications here were not made by an authorized applicant under
B. Search Warrants
1. Motions to suppress and trial court order
The state‘s second assignment of error challenges the court‘s consolidated ruling that granted “Defense Motions 104, 107-129,” all of which sought suppression of evidence obtained from the search warrants for cell phone records. Defendant‘s motions separately challenged the validity of 24 different search warrants but raised arguments that were common to all.
The earliest warrant that defendant challenged was the September 22 warrant for records related to the -2494 phone number (Defense Motion 104).7 He argued that the affidavit in support of that warrant failed to establish probable cause and, alternatively, that the warrant lacked specificity and was overbroad. Because of those defects, defendant contended, evidence obtained through the warrant must be excluded from trial and must be stricken from all subsequent warrant applications before the court analyzed defendant‘s challenges to those later warrants. In his separate motions challenging the later warrants, defendant argued that the affidavits in support failed to establish probable cause, especially once the court struck the evidence that had been unlawfully obtained through the prior warrants. He also argued that the later warrants themselves lacked specificity and were overbroad.
The state filed a consolidated response to defendant‘s motions to suppress the evidence obtained through the cell phone search warrants (“Omnibus Consolidated Responses to Defense Motions #104-129“). The response did not specifically address defendant‘s motion 104 regarding the September 22 warrant; it instead asserted generically that all of the search warrants were based on probable cause and were sufficiently specific and not overbroad.
The trial court agreed with defendant and granted the motions to suppress cell phone records. In its written order, the court addressed defendant‘s “Motions 104,
“Finally, to the extent that affidavits rely on evidence obtained from earlier search warrants that have been suppressed, the court struck that evidence from subsequent affidavits and concludes there is no probable cause to support the warrant.”
On appeal, the state argues that all of the warrants were supported by probable cause and were sufficiently specific and that none of the warrants was overbroad.
2. September 22 warrant
We begin with the trial court‘s ruling that the September 22 warrant for records related to the -2494 phone number was invalid and that the evidence obtained must be suppressed and stricken from all later affidavits. Because the trial court struck that information from later search warrant applications and then concluded that the resulting warrants lacked probable cause, and because the later warrants all relied to some extent on evidence obtained from the September 22 warrant, the fall of that warrant was effectively the domino that caused the rest of the chain to fall.9
The first part of the resulting search warrant was consistent with the stated probable cause: that is, it directed T-Mobile to provide information relevant to who owned the phone (e.g., subscriber‘s name, address, date of birth). The warrant went on, however, to request the production of an extensive amount of additional information regarding the -2494 number. For a 60-hour period surrounding the estimated time of the murder—“from 8:00 a.m. (Pacific Coast Time) September 19th, 2017 through 8:00 p.m. (Pacific Coast Time) September 21[st], 2017“—the warrant directed T-Mobile to produce “complete call detail records” of every phone call and text message sent or received by -2494, “including, but not limited to, dates and times of use, duration of use, and the destination and origination numbers“; details of all “data usages” by -2494 (including the addresses for every website visited); and all “location data including any and all cell site data and GPS location information.” As particularly relevant here, the warrant required T-Mobile to produce the content of defendant‘s communications:
“Any and all incoming and/or outgoing SMS and/or MMS messages and related records from 8:00 a.m. (Pacific Coast Time) September 19th, 2017 through 8:00 p.m. (Pacific Coast Time) September 21[st], 2017; including all metadata such as date, time, destination phone (or IP) number and origination phone (or IP) number, and geotags (or geographical coordinates)[.]”
The trial court granted suppression of the material obtained through the September 22 warrant under Article I, section 9, of the Oregon Constitution. That section provides:
“No law shall violate the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable search, or seizure; and no warrant shall issue but upon probable cause, supported by oath, or affirmation, and particularly describing the place to be searched, and the person or thing to be seized.”
This court recently explained that
The standard for whether a warrant is issued “upon probable cause,”
In this case, the affidavit in support of the September 22 warrant set out precisely the state‘s asserted probable cause: that the caller was a witness whom the state needed to identify:
“The records are going to provide evidence of the crime of murder because the records will help identify people who may be able to provide witness information or details about what was happening or have information about the murder because the calls were so close in time to reports of ‘pops’ by neighbors.”
The asserted probable cause—that the person (or people) who called from phone number -2494, at approximately the time that shots might have been fired, “may
The state also asserts on appeal that the affidavit in support of the September 22 warrant showed probable cause for a reasonable magistrate to conclude that the user of phone -2494 was “involved in the homicide.” Among the multiple impediments to that argument is that the premise is not sound. The fact that someone repeatedly tried to reach the victim, and ultimately connected for a short phone conversation, shortly before the victim was shot does not make it probable that the caller was involved in the shooting. And the state does not explain how that evidence establishes an objectively reasonable probability that the caller was involved in the murder. At best, that might be a possible explanation for the calls; but possibility is not enough. See Foster, 350 Or at 173 (observing that “probable cause is harder to establish based on observations” that would be “equally or more consistent with innocent circumstances“); State v. Carter/Grant, 316 Or 6, 13, 848 P2d 599 (1993) (“Probable cause is necessary to support a warrant, not merely one possibility, among many.“).
We therefore agree with the trial court: The September 22 warrant was overbroad.
3. Partial suppression as remedy for September 22 warrant
As a form of alternative argument, the state contends that some of the evidence obtained through the unlawful search warrant should not have been suppressed
Defendant disagrees with the state‘s “third-party” reasoning. According to defendant, the principles that govern a person‘s privacy interest in information contained on a cell phone apply equally when that information is maintained by a cell phone service.
We need not resolve in this case the parties’ dispute over the extent of defendant‘s protected privacy interest, because the state‘s alternative argument for partial suppression is unpreserved. And we decline to undertake in the first instance the kind of parsing of information obtained through the warrant that the state now seeks with its alternative argument. As indicated above, the state filed a consolidated response to all defendant‘s motions to suppress the warrants at issue here. In it, the state asserted that the supporting affidavits for the warrants established probable cause; that the warrants themselves described with sufficient particularity the items to be seized; and that the warrants were narrowly tailored so as not to exceed the probable cause shown. The state did not separately address defendant‘s motion to suppress evidence obtained through the September 22 warrant—either to explain why the breadth of the warrant was supported by probable cause or to identify the records that the state believed it could have obtained without a warrant.
To the extent that the state addressed the scope of protected privacy interests with respect to any of the search
In other words, the state litigated the motions to suppress on an all-or-nothing basis. It did not argue that the court should deny the motion to suppress only in part even if the court agreed with defendant‘s challenge to the warrant. Under the circumstances, the state did not preserve its argument that the trial court should have suppressed only some—but not all—of the evidence obtained unlawfully. See State v. Jones, 339 Or 438, 441, 121 P3d 657 (2005) (when “the state did not argue to the trial court that differing circumstances surrounding each interview provided separate grounds for admitting the evidence pertaining to each interview,” state had failed “to preserve for appeal any alternative argument supporting the admissibility of any part of the evidence“); see also State v. Sarich, 352 Or 601, 618, 291 P3d 647 (2012) (explaining that, “when a party offers evidence as a whole and the evidence is rejected by the trial court, the appellate court will affirm the trial court‘s ruling if any part of the evidence is inadmissible“). Before us, the state does not dispute that it obtained at least some information in which defendant had a protected privacy interest through the overbroad September 22 warrant. See State v. Johnson, 340 Or 319, 336, 131 P3d 173 (2006) (“Defendant clearly had a cognizable privacy interest in the content of his telephone calls.” (Emphasis in original.)). Thus, the trial court
4. Later warrants
Our conclusion that we must affirm the trial court‘s suppression of all evidence obtained through the overbroad September 22 warrant cascades into our analysis of the rest of the search warrants at issue here. The state relied on evidence obtained through the September 22 warrant to obtain the next round of warrants a few days later, and then continued to rely on the evidence derived from the September 22 warrant to obtain each subsequent warrant that defendant challenged. In its ruling, the trial court expressly found that,
“to the extent that affidavits [for later search warrants] rely on evidence obtained from earlier search warrants that have been suppressed, the court struck that evidence from subsequent affidavits and concludes there is no probable cause to support the warrant.”
The state has not challenged that conclusion, except in challenging the court‘s underlying conclusion that the evidence obtained with the earlier warrants must be suppressed. The state, for example, did not (and does not) argue that the affidavits for any of the later suppressed search warrant established probable cause even after excising the evidence that the state unlawfully obtained from the overbroad September 22 warrant and those warrants that relied on that evidence to establish probable cause. And the state did not (and does not) make an argument of that type with respect to any of the subsequent affidavits that the state relied on to obtain the subsequent search warrants. Thus, the court did not err in concluding that the 23 subsequent search warrants were not supported by probable cause, after excising from the supporting affidavits evidence that the state derived from the unlawful September 22 search.
III. CONCLUSION
For the foregoing reasons, we affirm the challenged rulings by the trial court.
The order of the circuit court is affirmed.
