179 Wash. 2d 862 | Wash. | 2014
Lead Opinion
¶1 We consider whether a text message conversation was “a private affair [ ]” protected from a warrantless search by article I, section 7 of our state constitution. A police detective read text messages on a cell phone police seized from Daniel Lee, who had been arrested for possession of heroin. Among other things, the detective read an incoming text message from Shawn Hinton, responded to it posing as Lee, and arranged a drug deal. Hinton was consequently arrested and charged with attempted possession of heroin. Hinton contends that the detective’s conduct violated his rights under article I, section 7 and the Fourth Amendment to the United States Constitution.
¶2 We agree that Hinton’s text message conversation was a private affair protected by the state constitution from warrantless intrusion. We reverse both the Court of Appeals’ decision and Hinton’s conviction.
Background
¶3 City of Longview police arrested Lee for possession of heroin and seized his iPhone. The iPhone, which continually
¶4 Detective Sawyer booked Roden into jail and heard the iPhone signal receipt of a new text message. Detective Sawyer read the text message from “Z-Shawn Hinton,” which read, “ ‘Hey, what’s up dog? Can you call me? I need to talk to you.’ ” Verbatim Report of Proceedings (Apr. 29, 2010) at 22, 13. Sawyer again posed as Lee, responded to the message, arranged another drug transaction, and arrested Hinton when he arrived at the meeting location.
¶5 Hinton was charged with attempted possession of heroin. He moved to suppress the evidence obtained from the iPhone, arguing that the detective’s conduct violated article I, section 7 of the Washington State Constitution; the Fourth Amendment to the United States Constitution; and the Washington privacy act, ch. 9.73 RCW. The trial court denied the suppression motion and found Hinton guilty on stipulated facts. Hinton appealed and argued the constitutional issues. The Court of Appeals affirmed. State v. Hinton, 169 Wn. App. 28, 280 P.3d 476 (2012). We granted Hinton’s petition for review to decide whether the detective’s conduct violated the state or federal constitutions. State v. Hinton, 175 Wn.2d 1022, 291 P.3d 253 (2012).
¶6 This Court reviews a trial court’s legal conclusions on a motion to suppress de novo. State v. Schultz, 170 Wn.2d 746, 753, 248 P.3d 484 (2011) (citing State v. Smith, 165 Wn.2d 511, 516, 199 P.3d 386 (2009)).
Analysis
¶7 Whether individuals have an expectation of privacy in the content of their text messages under state law is an issue of first impression in Washington. Similarly, whether federal law protects the content of text messages has not been settled in federal courts. In City of Ontario v. Quon, 560 U.S. 746, 130 S. Ct. 2619, 177 L. Ed. 2d 216 (2010), the United States Supreme Court assumed, without deciding, that citizens do have a reasonable expectation of privacy in their text messages but upheld a police department’s review of an officer’s text messages as reasonable under the Fourth Amendment. Several lower courts have held that people have an expectation of privacy under the Fourth Amendment in the content stored on their cell phones, including text messages. See United States v. Zavala, 541 F.3d 562, 577 (5th Cir. 2008); United States v. Finley, 477 F.3d 250, 259 (5th Cir. 2007); United States v. Davis, 787 F. Supp. 2d 1165, 1170 (D. Or. 2011); United States v. Quintana, 594 F. Supp. 2d 1291, 1299 (M.D. Fla. 2009). Other courts have found a privacy interest in text messages stored by a service provider. See Missouri v. Clampitt, 364 S.W.3d 605, 611 (Mo. Ct. App. 2012); State v. Bone, 12-34 (La. App. 5 Cir. 9/11/12); 107 So. 3d 49, 63-67. Fewer courts have addressed the privacy interests of a sender when police access a sender’s text messages on a recipient’s device. Compare State v. Patino, No. P1-10-1155A, slip op. (R.I. Super. Ct. Sept. 4, 2012) (finding sender had reasonable expectation of privacy in sent text messages accessed by police during search of recipient’s cell phone),
¶8 When presented with arguments under both the state and federal constitutions, we start with the state constitution. State v. Athan, 160 Wn.2d 354, 365, 158 P.3d 27 (2007) (citing State v. Carter, 151 Wn.2d 118,125,85 P.3d 887 (2004)). It is well established that article I, section 7 is qualitatively different from the Fourth Amendment and provides greater protections. Id.; State v. O’Neill, 148 Wn.2d 564, 584, 62 P.3d 489 (2003); State v. Jackson, 150 Wn.2d 251, 259, 76 P.3d 217 (2003); see also State v. Gunwall, 106 Wn.2d 54, 720 P.2d 808 (1986). Article I, section 7 “is grounded in a broad right to privacy” and protects citizens from governmental intrusion into their private affairs without the authority of law. State v. Chacon Arreola, 176 Wn.2d 284, 291-92, 290 P.3d 983 (2012) (citing State v. Valdez, 167 Wn.2d 761, 772, 224 P.3d 751 (2009)).
¶9 The private affairs inquiry is broader than the Fourth Amendment’s reasonable expectation of privacy inquiry. Young, 123 Wn.2d at 181. Under the Fourth Amendment, a search occurs if the government intrudes on a subjective and reasonable expectation of privacy. Katz v. United States, 389 U.S. 347, 351-52, 88 S. Ct. 507,19 L. Ed. 2d 576 (1967). Under article I, section 7, a search occurs when the government disturbs “those privacy interests which citizens of this state have held, and should be entitled to hold, safe from governmental trespass absent a warrant.” State v. Myrick, 102 Wn.2d 506, 511, 688 P.2d 151 (1984) (emphasis added). The “authority of law” required by article I, section 7 is a valid warrant unless the State shows that a search or
¶10 To determine whether governmental conduct intrudes on a private affair, we look at the “nature and extent of the information which may be obtained as a result of the government conduct” and at the historical treatment of the interest asserted. Miles, 160 Wn.2d at 244 (citing State v. McKinney, 148 Wn.2d 20, 29, 60 P.3d 46 (2002)); see also, e.g., State v. Jorden, 160 Wn.2d 121,129,156 P.3d 893 (2007) (finding random, suspicionless searches of a motel guest registry unconstitutional because those searches may provide “ ‘intimate details about a person’s activities and associations’ ” (quoting McKinney, 148 Wn.2d at 30 n.2)); McKinney, 148 Wn.2d at 30 (finding no privacy interest in department of licensing records because they do not “reveal intimate details of the defendants’ lives, their activities, or the identity of their friends or political and business associates”).
¶11 Viewing the contents of people’s text messages exposes a “wealth of detail about [a person’s] familial, political, professional, religious, and sexual associations.” United States v. Jones,_U.S._, 132 S. Ct. 945, 955,181 L. Ed. 2d 911 (2012) (Sotomayor, J., concurring) (discussing GPS (global positioning system) monitoring). Text messages can encompass the same intimate subjects as phone calls,
¶12 The Court of Appeals relied on State v. Wojtyna, 70 Wn. App. 689, 855 P.2d 315 (1993), where the court held that Wojtyna’s phone number, displayed on a pager, was not a private affair protected under the state constitution. The court recognized that telephonic and electronic communications are strongly protected under Washington law but found that situation different because “all that was learned from the pager was the telephone number of one party, the party dialing.” Id. at 695 (emphasis added). In contrast, the nature and extent of information exchanged during a text messaging conversation can involve the same intimate details shared during personal phone calls. Sophisticated text messaging technology enables “[l]ayered interpersonal communication [s]” that reveal “intimate . . . thoughts and emotions to those who are expected to guard them from publication.” Patino, slip op. at 83, 70. Text messaging is an increasingly common mode of personal communication. Br. of Amicus Curiae Elec. Frontier Found, at 6 (noting statistic that users who text sent or received an average of 41.5 messages per day (citing Aaron Smith, Pew Research Ctr., Americans and Text Messaging (Sept. 19, 2011), available at http://www.pewinternet.org/2011/09/19 /americans-and-text -messaging/)). Text message use is expected to rise given
¶13 Many courts, in finding a legitimate expectation of privacy in the contents of one’s cell phone, have recognized the private nature of text messages. See Zavala, 541 F.3d at 577 (finding that “cell phones contain a wealth of private information, including ... text messages”); Finley, 477 F.3d at 259; Davis, 787 F. Supp. 2d at 1170; United States v. Gomez, 807 F. Supp. 2d 1134, 1140 (S.D. Fla. 2011); Quintana, 594 F. Supp. 2d at 1299; State v. Smith, 124 Ohio St. 3d 163, 169, 2009-Ohio-6426, 920 N.E.2d 949; cf. Quon, 560 U.S. at 760 (noting that text messaging communications are “so pervasive that some persons may consider them to be essential means or necessary instruments for self-expression, even self-identification”). Despite the fact that a cell phone is carried on a person in public, text messages often contain sensitive personal information about an individual’s associations, activities, and movements. Moreover, individuals closely associate with and identify themselves by their cell phone numbers, such that the possibility that someone else will possess an individual’s phone is “unreflective of contemporary cell phone usage.” Patino, slip op. at 70.
¶14 The historical treatment of phone calls and electronic communications supports finding that text messages are private affairs. In Gunwall, we noted Washington’s “long history of extending strong protections to telephonic and other electronic communications.” 106 Wn.2d at 66. We detailed the history of statutory protection for telegrams, which was rooted in the 1881 Code, adopted before statehood. Id. Washington’s privacy act, chapter 9.73 RCW, which prohibits anyone not operating under a court order from intercepting or recording certain private communications without the consent of all parties, is one of the most restrictive surveillance laws ever promulgated. State v. Roden, 179 Wn.2d 893, 898, 321 P.3d 1183 (2014) (citing State v. Faford, 128 Wn.2d 476,481,910 P.2d 447 (1996)). “In
¶15 Our legislature used sweeping language to protect personal conversations from intrusion. See RCW 9.73-.030(1)(a) (protecting “[p]rivate communication transmitted by telephone, telegraph, radio, or other device” (emphasis added)). Based on that broad language, this court has consistently extended statutory privacy in the context of new communications technology, despite suggestions that we should reduce the protections because of the possibility of intrusion. See Faford, 128 Wn.2d 476 (cordless phone); Christensen, 153 Wn.2d 186 (same); State v. Townsend, 147 Wn.2d 666, 674, 57 P.3d 255 (2002) (e-mails). In Roden, stemming from the same set of facts that gave rise to Hinton’s appeal, we determined that the privacy act protected Roden’s text messages from interception without consent or a court order. Roden, 179 Wn.2d at 906-07. We have “repeatedly emphasized in considering constitutional privacy protections [ that] the mere possibility that intrusion on otherwise private activities is technologically feasible will not strip citizens of their privacy rights.” Faford, 128 Wn.2d at 485 (citing Young, 123 Wn.2d at 186; Myrick, 102 Wn.2d at 513-14). Even under the Fourth Amendment, the United States Supreme Court found that an individual making a phone call in a telephone booth had a reasonable expectation of privacy even though he made the calls from a place where he could have been seen. Katz, 389 U.S. 347.
¶17 The Court of Appeals erred by finding that Hinton lost his privacy interest in the text message communications because he sent them to a device over which he had no control. Given the realities of modern life, the mere fact that an individual shares information with another party and does not control the area from which that information is accessed does not place it outside the realm of article I, section 7’s protection. In Jorden, 160 Wn.2d 121, we held that the practice of checking names in a motel registry for outstanding warrants without individualized or particularized suspicion violated a defendant’s privacy under article I, section 7. Because information contained in a motel registry
¶19 We are not persuaded that Hinton voluntarily exposed the text messages in a way that extinguished his privacy interest in the conversation. We reject the State’s argument that the text messages were in plain view. The observation of that which is in plain view does not constitute a search because voluntary exposure to the public extinguishes any privacy interest. See, e.g., Loran, 62 Wn.2d at 5. However, here only one nonincriminating message was arguably in the detective’s plain view. This case does not ask whether viewing a single isolated message that appeared on the screen violated Hinton’s rights, and describing the subsequent text messages as “in plain view” denies the scope and extent of the detective’s intrusive conduct, which involved operating the phone and posing as Lee to send text messages back and forth with Hinton.
¶21 But here, Detective Sawyer essentially posed as Lee and sent text messages to Hinton from Lee’s cell phone. Unlike a phone call, where a caller hears the recipient’s voice and has the opportunity to detect deception, there was no indication that anyone other than Lee possessed the phone, and Hinton reasonably believed he was disclosing information to his known contact. The disclosure of information to a stranger, Detective Sawyer, cannot be considered voluntary like Goucher’s choice to speak with someone he did not know who claimed to be “handling business” or Athan’s choice to engage in business with an unknown law firm that was actually fictitious. Law enforcement is certainly permitted to use some deception, but “ ‘ [experience should teach us to be most on our guard to protect liberty
Conclusion
¶22 The state constitution “ ‘clearly recognizes an individuals’ right to privacy with no express limitations.’ ” Young, 123 Wn.2d at 180 (quoting Simpson, 95 Wn.2d at 178). Protecting the privacy of personal communications is essential for freedom of association and expression. See Jones, 132 S. Ct. at 956 (Sotomayor, J., concurring) (“Awareness that the Government may be watching chills associational and expressive freedoms.”). This court noted in Rhinehart v. Seattle Times Co. that the right to privacy has been described as “ ‘the most comprehensive of rights,’ ” protecting citizens “ ‘in their beliefs, their thoughts, their emotions and their sensations.’ ” 98 Wn.2d 226, 240, 242, 654 P.2d 673 (1982) (quoting Olmstead, 277 U.S. at 478 (Brandeis, J., dissenting)). The use of text messaging for raw and immediate communications about private subjects is widespread and growing. To forgo sending text messages or to limit the use of text messaging to completely inconsequential matters is not only “unpalatable, [but] untenable, and disadvantageous relative to participating within our technologically dependent culture.” Patino, slip op. at 77.
¶23 We reverse the Court of Appeals and vacate the conviction without prejudice. Hinton’s private affairs were disturbed by the warrantless search of Lee’s cell phone. Article I, section 7 protects Washington citizens from gov
Roden claims in a separate case before this court that the detective’s actions violated Washington’s privacy act. State v. Roden, 179 Wn.2d 893, 321 P.3d 1183 (2014).
Generally, article I, section 7 rights may be enforced by exclusion of evidence only at the instance of one whose own privacy rights were infringed by government action. See State v. Goucher, 124 Wn.2d 778, 788, 881 P.2d 210 (1994). Our analysis therefore begins with the question of whether the State disturbed Hinton’s private affairs. See, e.g., Jorden, 160 Wn.2d at 125-27. In this case, that standing analysis basically duplicates the substantive article I, section 7 analysis discussed below. Simply put, Hinton had standing to challenge the search of Lee’s phone if the search disturbed a privacy interest he had in his text messages to Lee.
Concurrence Opinion
¶24 (concurring) — The dissent criticizes the majority’s analysis and conclusion recognizing the defendant’s standing to raise the constitutional violation. In doing so, however, the dissent disregards our cases defining the scope of article I, section 7 of the Washington Constitution. Our article I, section 7 cases not only support but compel the majority’s conclusion that a citizen’s constitutional private affairs may be invaded by a warrantless search of another’s cell phone. I write separately to point out the dissent’s disregard of our article I, section 7 cases establishing the scope of a person’s private affairs.
¶25 To have standing, a defendant must demonstrate a personal privacy interest in the place or item searched. Minnesota v. Carter, 525 U.S. 83, 88, 119 S. Ct. 469, 142 L. Ed. 2d 373 (1998); State v. Carter, 127 Wn.2d 836, 841, 904 P.2d 290 (1995). There can be no debate that Daniel Lee would have a privacy interest in his own phone. An individual’s cell phone often contains a wealth of private information about the owner, including e-mails, text messages, call histories, and address books, to name a few. United States v. Zavala, 541 F.3d 562, 577 (5th Cir. 2008). “Cell phone and text message communications are so pervasive that some persons may consider them to be essential means or necessary instruments for self-expression, even self-identification.” City of Ontario v. Quon, 560 U.S. 746, 760, 130 S. Ct. 2619, 177 L. Ed. 2d 216 (2010). Thus a cell phone owner such as Lee has standing to challenge a search of his phone. But Shawn Hinton, unlike Lee, does not have a privacy interest in Lee’s phone generally because it is not
¶26 The inquiry in this case, however, is narrower: we must determine whether an individual has a privacy interest in the actual text message received by and stored on another individual’s cell phone. Information transmitted through text messages has the potential to implicate highly personal matters. Contrary to the dissent’s conclusion, a person does not lose all privacy interest in text messages merely because they are disclosed to an intended recipient, who could potentially disclose it to others. Dissent at 887-90. Rather, as the majority correctly recognizes, while there may be a risk that the person to whom we impart private information could disclose it, we do not assume the risk that the government will conduct a warrantless intrusion into a person’s private affairs. See majority at 874-75. This is a rule well established by our article I, section 7 cases.
¶27 In State v. Gunwall, 106 Wn.2d 54, 720 P.2d 808 (1986), we established a clear distinction in defining the scope of a person’s private affairs under article I, section 7. Gunwall dealt with whether a warrant was required to seize and search telephone records from the telephone company who, for business purposes, compiled those records. In concluding that a warrant was required, we adapted the reasoning from other state cases:
“A telephone subscriber . . . has an actual expectation that the dialing of telephone numbers from a home telephone will be free from governmental intrusion. . . . The concomitant disclosure to the telephone company, for internal business purposes, of the numbers dialed by the telephone subscriber does not*880 alter the caller’s expectation of privacy and transpose it into an assumed risk of disclosure to the government.”
Gunwall, 106 Wn.2d at 67 (first alteration in original) (quoting People v. Sporleder, 666 P.2d 135,141 (Colo. 1983)). We concluded Gunwall holding that absent a warrant, the police “unreasonably intruded into [the defendant’s] private affairs.” Gunwall, 106 Wn.2d at 68.
¶28 Further, in State v. Boland, 115 Wn.2d 571, 800 P.2d 1112 (1990), we determined the scope of an individual’s private affairs with regard to garbage. We noted that while it might be unreasonable to expect that after placing a garbage can on the curb for collection “children, scavengers, or snoops will not sift through one’s garbage,” it is reasonable to believe the garbage we place in our trash cans will be protected from warrantless government intrusion. Boland, 115 Wn.2d at 578. “ ‘People reasonably believe that police will not indiscriminately rummage through their trash bags to discover their personal effects.’ ” Boland, 115 Wn.2d at 578 (quoting State v. Tanaka, 67 Haw. 658, 662, 701 P.2d 1274 (1985)).
¶29 These cases, along with others defining the scope of a person’s private affairs,
¶30 Likewise, in transmitting his text messages to Lee, Hinton could reasonably believe Lee would receive and read those messages, but this does not lead to the belief that the government would acquire this information absent a war
¶31 Further, considering the wealth of personal and private information that is potentially stored on a cell phone, we should continue to recognize a rule that does not incentivize warrantless searches of cell phones. The dissent’s holding, however, would create such an incentive. If, under the dissent’s reading, Hinton had no privacy interest in the text message — and thus no standing to challenge the search of the text message — the police would suffer no consequences for the warrantless search. Allowing for such a situation would diminish our constitutional private affairs recognized under article I, section 7.
¶32 The sender of a text message assumes a limited risk that the recipient may voluntarily expose that message to a third party, but under our cases, the sender does not assume the risk that the police will search the phone in a manner that violates the phone owner’s rights. Article I, section 7 establishes protection against such warrantless intrusion, and the majority correctly recognizes this principle. Contrary to the dissent’s view, it is the determination that a private affair has been invaded that gives rise to the ability to challenge the search.
¶33 To illustrate, the police may seize an individual’s phone pursuant to a lawful search incident to arrest to prevent the destruction of evidence, State v. Valdez, 167 Wn.2d 761, 776, 224 P.3d 751 (2009), but may search the phone (including text messages) only with a warrant, a valid exception to the warrant requirement, or the phone owner’s express consent. In the absence of express consent from the phone owner, however, the sender of a text message should be allowed to stand in the shoes of the phone owner for purposes of challenging the search of the phone through which the text message was viewed.
¶35 Respectfully, I concur.
The dissent also points out that a person’s private affairs do not include information voluntarily exposed to the general public. Dissent at 888 (quoting State v. Goucher, 124 Wn.2d 778, 784, 881 P.2d 210 (1994)). While this may be correct, it is irrelevant to this case because Hinton did not expose his information to the public generally. The question presented here is whether the police illegally accessed the text message without a warrant.
See State v. Miles, 160 Wn.2d 236, 156 P.3d 864 (2007) (privacy interest in banking records); State v. Jorden, 160 Wn.2d 121, 156 P.3d 893 (2007) (privacy interest in motel registry).
Dissenting Opinion
¶36 (dissenting) — In this case, the majority goes too far, failing to distinguish between the extent of protections under article I, section 7 of the Washington Constitution for a search of one’s own cell phone and a search of a cell phone owned by a third party. I acknowledge that article I, section 7 protections are robust, extending further than the Fourth Amendment in many contexts. Nevertheless, these rights are personal and therefore may not be vicariously asserted. State v. Goucher, 124 Wn.2d 778,787, 881 P.2d 210 (1994) (citing State v. Foulkes, 63 Wn. App. 643, 647, 821 P.2d 77 (1991)). While the constitutionality of a warrantless search of one’s own cell phone is certainly in need of clarification, it is a question for another day.
¶37 We are asked to consider only the narrow question of whether a person has a constitutionally protected privacy right in a text message received on a third party’s cell phone. Because Hinton did not retain a privacy interest in text messages he sent that were delivered to a third party’s cell phone, he does not have the requisite standing to challenge the government action in this case. I, therefore, dissent.
¶38 A thorough recitation of the facts and procedural history is necessary to illustrate precisely what is — and is not — before this court. When Detective Kevin Sawyer arrived for his shift on November 3, 2009, he came into possession of Daniel Lee’s iPhone.
¶39 The cell phone was sitting on the passenger seat of Detective Sawyer’s vehicle when he heard a tone indicating that a new message had been received. Id. at 22. He did not have to push any buttons or access the cell phone to read the message. The text message simply appeared on the iPhone screen. Id. at 13. Detective Sawyer picked up the cell phone to examine it and saw a text message from someone listed as “Z-Shawn Hinton.” Id. at 22. This message read, “ ‘Hey, what’s up dog? Can you call me? I need to talk to you.’ ” Id. Detective Sawyer responded, “ ‘Can’t now. What’s up?’ ” Id. The iPhone then indicated a response from “Z-Shawn Hinton,” which read, “ T need to talk to you about business. Please call when you get a chance.’ ” Id. at 23-24. Detective Sawyer then wrote back, “ ‘I’m about to drop off my last.’ ” Id. at 24. Hinton responded, “ ‘Please save me a
¶40 By information, the Cowlitz County prosecutor charged Hinton with one count of attempted possession of heroin. Clerk’s Papers (CP) at 1. Hinton then filed a motion to suppress. The court concluded that Hinton did not have automatic or general standing to contest the search of Lee’s iPhone. VBP (Apr. 29, 2010) at 61. The court further held that he did not have a privacy interest in the text messages sent to Lee. Id. at 63. The motion to suppress was accordingly denied. Id.
¶41 Following entry of findings of fact and conclusions of law, Hinton stipulated to facts sufficient to convict and was found guilty. CP at 34-36. He was then sentenced within the standard range and filed a timely notice of appeal. CP at 38-49, 50. Division Two of the Court of Appeals held that neither article I, section 7 of the Washington State Constitution nor the Fourth Amendment to the United States Constitution protects Hinton’s text messages on the recipient’s cell phone. The court accordingly affirmed the superior court’s ruling denying Hinton’s motion to suppress. State v. Hinton, 169 Wn. App. 28, 45, 280 P.3d 476 (2012). Hinton then filed a petition for review, which was granted. State v. Hinton, 175 Wn.2d 1022, 291 P.3d 253 (2012).
Analysis
¶42 This is not the first time that this court has failed to acknowledge that article I, section 7 rights are nontransferable. In State v. Ibarra-Cisneros, 172 Wn.2d 880, 885-86,
¶43 Chief Justice Madsen’s dissent in Ibarra-Cisneros is on point:
Under a fundamental constitutional analysis, there must be a protectable privacy interest at stake before there can possibly be any constitutional violation or any need to address taint or suppression of evidence. When, as in this case, a record unequivocally shows that no such interest exists, a court should not conclude that evidence must be suppressed as the only fair thing to do. There is nothing unfair about declining to suppress evidence when no privacy interest has been at stake and consequently none has been violated.
Id. at 888-89.
¶44 Chief Justice Madsen ultimately concluded that “Ibarra-Cisneros had no protected privacy interest in his brother’s cell phone or in any information stored on it.” Id. at 890 (Madsen, C.J., dissenting). I agree with the Chief Justice’s analysis in that case and find it applicable to the case at hand. Here, as in Ibarra-Cisneros, it is improper for the court to gloss over the standing doctrine, effectively
¶45 In this case, Hinton does not have standing to contest the search of Lee’s cell phone that ultimately led to his arrest. Fourth Amendment and article I, section 7 rights are personal and therefore may not be vicariously asserted. Goucher, 124 Wn.2d at 787 (citing Foulkes, 63 Wn. App. at 647).
¶46 We recognize two different types of standing in the search and seizure context. Under general standing rules:
A defendant may challenge a search or seizure only if he or she has a personal Fourth Amendment privacy interest in the area searched or the property seized. The defendant must personally claim a justifiable, reasonable, or legitimate expectation of privacy that has been invaded by governmental action.
Id. (citations omitted).
f47 A defendant has automatic standing to contest a search or seizure of contraband under article I, section 7 if (1) the charged offense involves possession of contraband as an essential element of the offense and (2) the defendant was in possession of the contraband at the time of the contested search or seizure. Id. at 787-88 (citing State v. Zakel, 119 Wn.2d 563, 568, 834 P.2d 1046 (1992)); see also State v. Simpson, 95 Wn.2d 170, 175-79, 622 P2d 1199 (1980) (lead opinion) (affirming automatic standing under article I, section 7 of the Washington Constitution, notwithstanding the United States Supreme Court’s decision to abolish the automatic standing rule under the Fourth Amendment in United States v. Salvucci, 448 U.S. 83, 85, 100 S. Ct. 2547, 65 L. Ed. 2d 619 (1980)); accord State v. Williams, 142 Wn.2d 17, 22-23, 11 P.3d 714 (2000). The automatic standing doctrine is inapplicable here because the search at issue does not involve Hinton’s possession of contraband.
Generally, article I, section 7 rights may be enforced by exclusion of evidence only at the instance of one whose own privacy rights were infringed by government action. Our analysis therefore begins with the question of whether the State disturbed Hinton’s private affairs. In this case, that standing analysis basically duplicates the substantive article I, section 7 analysis____Simply put, Hinton had standing to challenge the search of Lee’s phone if the search disturbed a privacy interest he had in his text messages to Lee.
Majority at 869 n.2 (citations omitted).
¶49 I would hold that because the alleged search of Lee’s cell phone did not disturb a privacy interest Hinton had in the text messages he sent to Lee, he does not have standing to challenge the government action. I would accordingly affirm the Court of Appeals.
A. Automatic Standing
¶50 Hinton does not have automatic standing because he was not in possession of contraband at the time that the search took place. Furthermore, Lee’s cell phone was not the contraband for which he was ultimately convicted. Thus, we must consider whether he has a “justifiable, reasonable, or legitimate expectation of privacy” in the area searched or the property seized. Goucher, 124 Wn.2d at 787.
B. General Standing
¶51 In deciding whether a particular conversation is private, we consider the subjective intentions of the parties to the conversation, as well as their reasonable expectations. State v. Clark, 129 Wn.2d 211, 225, 916 P.2d 384 (1996). “A communication is not private where anyone may turn out to be the recipient of the information or the recipient may disclose the information.” Id. at 227 (citing State v. Wojtyna, 70 Wn. App. 689, 695-96, 855 P.2d 315
¶52 Although the scope of article I, section 7 protections for text messages is an issue of first impression, this court has considered several cases that are similar and should guide our analysis in this case. In Goucher, detectives searched a third party’s residence pursuant to a search warrant. During the search, the telephone rang and was answered by a task force detective. An adult male asked for Luis, and the detective told him that Luis had gone for a run and that he was handling business until Luis returned. 124 Wn.2d at 780-81. The caller identified himself and asked if he could come over to buy “ ‘an eighth,’ ” which the detective understood to mean an eighth of an ounce of cocaine. Id. at 781. The two set up a purported drug transaction, and the defendant was arrested when he showed up. Id. The defendant was charged with one count of possessing cocaine. He filed a motion to suppress the evidence obtained as a result of the detective answering the telephone, which was denied. Id. His appeal was certified to this court, and we considered whether the defendant’s rights were violated under article I, section 7 when the detective answered the third party’s telephone and engaged him in conversation. Id. at 783.
¶53 We held that the defendant did not have the requisite standing to challenge the scope of the third-party search. Id. at 789. We noted that “ ‘what is voluntarily exposed to the general public’ is not considered part of a person’s private affairs.” Id. at 784 (quoting State v. Young, 123 Wn.2d 173, 182, 867 P.2d 593 (1994)).
¶54 As in Goucher, Hinton does not have standing to contest the search of Lee’s cell phone. To assert general standing, he must “personally claim a justifiable, reasonable, or legitimate expectation of privacy that has been
¶55 Wojtyna, 70 Wn. App. 689, a Court of Appeals, Division One case, is also persuasive in this context. It has been favorably cited by this court in several cases. See State v. Luther, 157 Wn.2d 63, 80, 134 P.3d 205 (2006); State v. Townsend, 147 Wn.2d 666, 682-83, 57 P.3d 255 (2002); Goucher, 124 Wn.2d at 786. In Wojtyna, 70 Wn. App. at 691, police seized a pager pursuant to the arrest of a cocaine dealer. Incoming calls were monitored over the next six days. A detective called a number that was sent to the pager and arranged a purported drug deal with Wojtyna. Wojtyna was then arrested and charged with attempted possession of a controlled substance. Id. He challenged the denial of his motion to suppress. Evaluating the case on Fourth Amendment grounds, the Court of Appeals held that monitoring the defendant’s incoming number on a pager was not an illegal search. Id. at 694-95.
¶56 The court in Wojtyna noted that transmissions to pagers are less private than phone conversations. The same logic can be applied to text messages. The court reasoned:
“When one transmits a message to a pager, he runs the risk that the message will be received by whomever is in possession of the pager. Unlike the phone conversation where a caller can hear a voice and decide whether to converse, one who sends a message to a pager has no external indicia that the message actually is received by the intended recipient. Accordingly,*890 when a person sends a message to a pager, he runs the risk that either the owner or someone in possession of the pager will disclose the contents of his message. Since the actual confidentiality of a message to a pager is quite uncertain, we decline to protect appellant’s misplaced trust that the message actually would reach the intended recipient.”
Id. at 694 (quoting Meriwether, 917 F.2d at 959).
¶57 In choosing to communicate via text message, Hinton assumed the risk that another party with control over the cell phone would respond to the text message. This is an assumption of risk commensurate with choosing to communicate with a stranger by phone and assuming that the stranger is in fact who he says he is.
¶58 Notably, the mere fact that the communication at issue arose from a police ruse does not suggest that Hinton’s rights were violated. In State v. Athan, 160 Wn.2d 354, 363, 158 P.3d 27 (2007), police used a ruse to cause Athan to send an envelope by mail to what Athan believed was a law firm but was actually the police. His DNA (deoxyribonucleic acid) was found on the envelope flap. We held that Athan lost any privacy interest he may have had in his saliva when he voluntarily placed the letter in the mail. Once he sent the letter, what was done with it was out of his control. Id. at 367-68. Furthermore, we noted that “[p]ublic policy allows for a limited amount of deceitful police conduct in order to detect and eliminate criminal activity.” Id. at 377.
¶59 Like Athan, Hinton lost his privacy protection when he voluntarily sent a text message to a third party’s cell phone. The fact that a police ruse encouraged him to send the messages does not change the result.
Conclusion
¶60 True, technological advances, particularly those that have become pervasive in everyday life, pose challenges in the article I, section 7 arena. Cases such as this one provide
It’s not even clear that we need a rule of law specific to cell phones or other computers. If police are entitled to open a pocket diary to copy the owner’s address, they should be entitled to turn on a cell phone to learn its number. If allowed to leaf through a pocket address book, . . . they should be entitled to read the address book in a cell phone.
United States v. Flores-Lopez, 670 F.3d 803, 807 (7th Cir. 2012). I agree wholeheartedly with this approach.
¶61 It is unwise to make sweeping changes to existing law based on hypothetical facts not currently before this court. This is the precise wisdom that underlies our standing doctrine.
¶62 Here, the majority errs by acting as though a search of a text message viewed on a third party’s cell phone is identical to a search of one’s own cell phone. The majority’s approach is inconsistent with this court’s article I, section 7 jurisprudence and ignores precedent established in cases such as Goucher.
¶63 When Detective Sawyer viewed Hinton’s text message on Lee’s cell phone and responded to it, it was not a disturbance of Hinton’s private affairs. See State v. Valdez, 167 Wn.2d 761, 772, 224 P.3d 751 (2009). Hinton simply does not have standing to contest the government action because he does not have a “justifiable, reasonable, or legitimate expectation of privacy” in information viewable
Daniel Lee is not a party to this action.
A “ball” is a drug weight. It is about 3.54 grams. VRP (Apr. 29, 2010) at 10. “Sick” is a drug term for when a user is coming off a high and looking to obtain more drugs. Id. at 8.