Lead Opinion
Affirmed in part, vacated in part, and remanded by published opinion. Judge LEGG wrote the opinion, in which Judge GREGORY joined. Judge MICHAEL wrote an opinion concurring in part and dissenting in part.
OPINION
This case requires us to determine whether the Appellants’ complaint, which the district court dismissed under FRCP 12(b)(6), alleges sufficient facts to proceed to discovery. We agree that their Fourth Amendment claims (count one), alleging an illegal interrogation and search of a townhouse and a computer, were properly dismissed, primarily on the basis of qualified immunity. We conclude, however, that the complaint sufficiently pleads a claim under the First Amendment that the Defendants searched Truloek’s home and computer in retaliation for a magazine article that Tru-lock wrote, criticizing the White House, the Federal Bureau of Investigation (“FBI”) and other departments of the federal government. Accordingly, we reverse and remand the First Amendment claim (count two) for further proceedings.
I.
Notra Trulock served as the Director of the Office of Intelligence of the U.S. Department of Energy (“DOE”) from 1994 to 1998. From 1995 to 1998, Trulock also served as the DOE’s Director of the Office of Counter intelligence. Trulock alleges that he uncovered evidence that Chinese spies had systematically penetrated U.S. weapons laboratories, most significantly the Los Alamos Nuclear Laboratory. Trulock contends that the White House, the FBI, and the Central Intelligence Agency (“CIA”) ignored his repeated warnings about the espionage. Congress eventually learned of the security breach and in 1998 invited Trulock to testify, which he did on several occasions. That same year, Trulock was demoted within the DOE; he was ultimately forced out in 1999.
In early 2000, Trulock wrote an account of his findings, which criticized the White House, the DOE, the FBI, and the CIA for turning a blind eye to the security breach. Trulock claims that the manuscript did not include any classified information. Nonetheless, in March of 2000, Trulock submitted the manuscript to the DOE for a security review, but the DOE declined to examine it. Afterward, Tru-lock sent the manuscript to the National Review, which published an excerpt in an edition that was circulated in early July of 2000. Although neither side placed the article in the record, the parties agree that it charged the administration with incompetence.
Plaintiff Linda Conrad has been the Executive Assistant to the Director of the Office of Intelligence at the DOE for more than six years. During Truloсk’s tenure
Conrad alleges that on the morning of July 14, 2000, when she arrived at work, Sanchez took her aside to say that the FBI wanted to question her about Trulock. Sanchez warned her that the agents had a warrant to search the townhouse and would break down the front door, in the presence of the media, if she refused to cooperate. Although the Plaintiffs allege that Sanchez made this statement to Conrad “on behalf of the FBI,” the complaint does not recite a factual basis for this assertion. Nor does the complaint allege that any of the five individual Defendants either directed Sanchez to make the threat or knew about it.
Later that day, around 4:00 p.m., FBI Special Agents Brian Halpin and Steven Carr arrived at DOE headquarters and escorted Conrad to a conference room. Although the complaint states that they were armed, Conrad does not contend that the agents displayed their weapons, raised their voices, or otherwise threatened her during the three hour interview.
According to the complaint, Conrad was able to receive two incoming telephone calls, one of which was from Trulock, but that the agents “would not let [her] take either telephone call in private.” (J.A. at 9.) The complaint further alleges that the agents refused to allow Conrad to make any outgoing calls. The complaint implies that Conrad was not at liberty to leave the conference room. When questioned on this point during oral argument, however, Conrad’s attorney could not assert that she ever tried to leave the room (e.g., to place a call in private) or that the agents told her that she was not free to terminate the interview and leave.
The agents queried Conrad about Tru-lock’s personal records and computer files. Conrad responded that she shared a computer with Trulock, but that each of them maintained separate, password-protected files on the hard drive. Conrad and Tru-lock did not know each other’s passwords and could not, therefore, access each other’s private files, Conrad stated.
The agents questioned Conrad for about three hours. Towards the end of the interview, the agents gave Conrad a form, which they asked her to sign. The complaint alleges that the agents did not explain the form to Conrad and that Conrad did not read it, learning only afterwards that she had consented to a search of her house. The complaint does not allege that the agents claimed to have a search warrant, threatened to break down Conrad’s door if she refused to sign, or mentioned the media. Conrad does maintain, however, that she was fearful, crying and shaking.
At the end of the questioning, the agents followed Conrad to her townhouse, where Trulock was waiting. When Trulock asked to see the search warrant, the agents responded that they had no warrant but that Conrad had consented to the search. The complaint does not contend that Conrad tried to withdraw her consent or that Tru-lock tried to bar the search on the ground that his consent, as a resident of the house, was also necessary.
The agents located the computer in the bedroom. Special Agent Carr and an unidentified FBI computer specialist (named in the complaint as Jane Doe I) searched the computer’s files for about ninety minutes. The complaint alleges that Agent Carr looked at Trulock’s password protеcted files. When the search was over, the specialist, after giving Conrad a receipt, took the hard drive away.
Prior to discovery, the Defendants moved under Fed. R. Civ. P 12(b)(6) to dismiss the complaint, arguing that it failed to state a constitutional violation either for unlawful search and seizure or for retaliation. Each Defendant also argued that he was entitled to qualified immunity on both counts. The district court granted Defendants’ motion to dismiss, holding that the Defendants, having violated no clearly established law, were entitled to qualified immunity. With respect to Tru-lock’s retaliation claim, the district court concluded that “other than the timing of the interrogation and search, the complaint presents no indications that the actions by the defendants were other than a good faith effort to determine whether classified information was being unlawfully possessed.” (J.A. at 43.)
Because the district court granted Defendants’ motion to dismiss, our review is de novo. Stuart Circle Hospital Corp. v. Aetna Health Management,
II.
Qualified immunity shields government officials from civil liability “insofar as their conduct does not violate clearly established statutory or constitutional rights of which a reasonable person would have known.” Harlow v. Fitzgerald,
The first step in analyzing whether qualified immunity exists is to determine whether the plaintiff has alleged a violation of a statutory or constitutional right. Siegert v. Gilley,
Next, the trial court must assess whether the right at issue was clearly established at the time of the breach. The court should focus upon “the right [not] at its most general or abstract level, but at the level of its application to the specific conduct being challenged.” Wiley v. Doory,
Only if the plaintiff has alleged a violation of a clearly established right should the court next determine whether a reasonable person in the official’s position would have known that his actions violated that right. DiMeglio v. Haines,
III.
A.
Conrad first alleges that the agents, in violation of her Fourth Amendment rights, illegally seized her during their heavy-handed interrogation. The district court concluded that Ms. Conrad was not in custody during her interview. We agree.
A person is “seized” only when, by means of physical force or a show of authority, his freedom of movement is restrained. United States v. Mendenhall,
Conrad argues that a seizure took place because the agents would not allow her to call anyone during the interview, they would not allow her to take two incoming phone calls in private, and they told her not to tell anyone about the interview. Conrad also points to Sanchez’
These factors simply do not amount to a seizure. The interview transpired at a familiar setting, Conrad’s workplace. The agents wore no uniforms and displayed no weapons. There are no allegations that the agents used physical force, threatening language, or an intimidating tone. Concerning the phone calls, Conrad does not allege that she attempted to leave the room (to place or take a call in private) and was refused. Nor does she allege, either in the complaint or in her briefs, that the agents told her that she was not free to leave the conference room. Conrad apparently contends only that the agents would not themselves leave the room to give her privacy to talk.
Moreover, Sanchez’ statement, though heavy-handed, would not make a reasonable person feel that she was restricted from lеaving the interview. The conversation between Conrad and Sanchez pertained to the search of her home and not the ground rules for the interview. In addition, Sanchez made the statement when Conrad first arrived at work, whereas the FBI questioning of Conrad took place several hours later at the end of the day. There is no allegation that Conrad queried the agents about the warrant or the threat. Nor does Conrad allege that the agents knew about Sanchez’ statement. Accordingly, we affirm the district court’s decision that Conrad was not “seized” during her interview.
B.
Appellants next allege that the search of their computer and home was illegal because (i) the agents had no warrant, and (ii) Conrad’s consent to search was involuntary. The Defendants concede that there was no warrant, but contend that the search was valid because Conrad signed a consent form.
Valid consent is a well-recognized exception to the Fourth Amendment prohibition against warrantless searches. Schneckioth v. Bustamonte,
Appellants rely primarily on Bumper v. North Carolina,
Conrad’s consent is invalid under the rationale of Bumper. Although the agents who conducted the search never claimed to have a warrant, Sanchez told Conrad that the FBI had a search warrant, Conrad believed that Sanchez was conveying this information on behalf of the FBI, and the complaint alleges that Sanchez was indeed acting at the FBI’s behest.
Nevertheless, the district court was correct in holding that the Defendants have qualified immunity. The Defendants fall into two categories, the first of which includes Special Agents Halpin and Carr, who secured the consent and conducted the search. There is neither an allegation nor аny evidence that these agents directed Sanchez to misrepresent that the FBI possessed a warrant or that the agents even knew about Sanchez’ statement. Conrad never mentioned the statement to them. The agents gave Conrad an explicit waiver form, which she signed. The agents truthfully told Trulock that they had no warrant, but that they had secured Conrad’s consent. Based upon these facts, no reasonable officer would have believed that Conrad’s consent was involuntary. Accordingly, Agents Halpin and Carr enjoy immunity.
The second group of defendants include former FBI Director Freeh and two FBI supervisors, Gallagher and Dillard. In a Bivens suit, there is no respondeat superi- or liability. Estate of Rosenberg v. Crandell,
C.
Trulock argues that the search of his password-protected files violated his Fourth Amendment rights. He asserts that the search was improper because: (i) there was no warrant; (ii) neither he nor Conrad consented voluntarily to the search; and (iii) even if Conrad’s consent were valid, she did not have the authority to consent to a search of his password-protected files. As we have previously stated, Bumper leads us to conclude that Conrad’s consent to search was involuntary. Even if her consent were voluntary, however, it would not authorize a search of Trulock’s private, password-protected files.
Consent to search in the absence of a warrant may, in some circumstances, be given by a person other than the target of the search. United States v. Block,
Authority to consent originates not from a mere property interest, but instead from “mutual use of the property by persons generally having joint access or control for most purposes, so that it is reasonable to recognize that any of the co-inhabitants has the right to permit the inspection in his own right and that others have assumed the risk that one of their number might permit the common area to be searched.” United States v. Matlock,
We conclude that, based on the facts in the complaint, Conrad lacked authority to consent to the search of Trulock’s files. Conrad and Trulock both used •a computer located in Conrad’s bedroom and each had joint access to the hard drive. Conrad and Trulock, however, protected their personal files with passwords; Conrad did not have access to Trulock’s passwords. Although Conrad had authority to consent to a general search of the computer, her authority did not extend to Trulock’s password-protected files. See Block,
In United States v. Block, this Court held that the defendant’s mother had authority to consent to a search of his room, which was located in the home they shared. The mother’s authority did not extend to a search of a locked footlocker located within the room, however. We noted that authority to consent “cannot be thought automatically to extend to the interiors of every discrete enclosed space capable of search within the area ... the rule has to be one of reason that assesses the critical circumstances indicating the presenсe or absence of a discrete expectation of privacy with respect to the particular object.” Id. at 541.
Trulock’s password-protected files are analogous to the locked footlocker inside the bedroom. By using a password, Tru-lock affirmatively intended to exclude Conrad and others from his personal files. Moreover, because he concealed his password from Conrad, it cannot be said that Trulock assumed the risk that Conrad would permit others to search his files. Thus, Trulock had a reasonable expectation of privacy in the password-protected computer files and Conrad’s authority to consent to the search did not extend to them. Trulock, therefore, has alleged a violation of his Fourth Amendment rights.
Nevertheless, the Defendants are entitled to immunity because a reasonable officer in their position would not have known that the search would violate clearly established law.
Conversely, we are aware of no reported cases answering whether an individual has a reasonable expectation of privacy in password-protected files stored in a shared computer. Truloek, though conceding the absence of computer specific caselaw, urges us to recognize a clearly established right based upon Block and other similar cases. We decline to do this. Although cases involving computers are not mi gen-eris, the law of computers is fast evolving, and we are reluctant to recognize a retroactive right based on cases involving footlockers and other dissimilar objects. Thus, a reasonable officer in the Defendants’ position would not have known that Conrad’s consent did not authorize them to search Trulock’s files; the Defendants are, therefore, entitled to qualified immunity.
D.
In his final claim, Truloek alleges that the Defendants trammeled his First Amendment right to free speech by retaliating for his National Review article.
The First Amendment guarantees an individual the right to speak freely, including the right to criticize the government and government officials.
To establish a First Amendment retaliation claim, a plaintiff must prove three elements: (i) that his speech was protected; (ii) that the defendant’s alleged retaliatory action adversely affected his constitutionally protected speech; and (iii) that a causal relationship existed between his speech and the defendant’s retaliatory action. Suarez,
In count two of the complaint, Truloek alleges that the Defendants retaliated against him for publishing the critical article. The Defendants argue that dismissal was justified because: (i) the complaint does not allege facts which, if proven, would show the causal relationship bеtween Trulock’s speech and the Defendants’ actions; and (ii) the Defendants are entitled to qualified immunity.
The liberal pleading requirements of Rule 8(a) demand only a “short and plain” statement of the claim. A plaintiff often must offer more detail, however, than the bald statement that he has a valid claim of some type against the defendant. Migdal v. Rowe Price-Fleming Int’l,
Whether Trulock’s claim can survive a motion for summary judgment remains to be seen, but we find that Trulock has alleged sufficient facts in support of his retaliation claim to withstand a motion to dismiss and proceed to discovery. The complaint contains facts that bolster Trulock’s claim of improper motive. First, the timing of the search raises an inference of retaliatory motive. Stever v. Independent School District No. 625,
Having found that Trulock alleged the violation of a constitutional right, we must next address the Defendants’ claim of qualified immunity. It is well established that a public official may not misuse his power to retaliate against an individual for the exercise of a valid constitutional right. Suarez v. McGraw,
Finally, we turn to whether a reasonable officer would have known that retaliatory conduct was impermissible. The Defendants make only one contention on this issue. They argue that a reasonable officer could have believed that the magazine article, because of its content, did not enjoy First Amendment protection. The Defendants’ effort to support this argument is half-hearted at best. They have not placed the article on the record. They have not stated why the contents would lack First Amendment protection. They have made no effort to show that a prudent officer of the FBI could reasonably have believed that the article did not enjoy First Amendment protection. Simply put, Defendants have done nothing more than offer their bald assertions that they are entitled to qualified immunity. Accordingly, we remand the case to the district court to proceed on the retaliation claim.
IV.
For the reasons stated herein, we vacate that portion of the district court’s order that dismissed Trulock’s First Amendment retaliation claim and remand for further proceedings consistent with this opinion.
AFFIRMED IN PART, VACATED IN PART, AND REMANDED.
Notes
. Under Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics,
. The Fourth Amendment provides that "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated....” Not all interaction between a police officer and an individual, however, results in a "seizure” in violation of the Fourth Amendment. Terry v. Ohio,
. The complaint alleges that Sanchez made the statement on behalf of the FBI but does not state the basis for this knowledge. Nevertheless, because we are operating under the motion to dismiss standard, we must accept this allegation as true.
. In criminal cases, the burdеn is on the Government to prove the voluntariness of an individual's consent. Schneckloth,
. According to the allegations in the complaint, Agent Carr and the unidentified computer specialist were the only Defendants directly involved in the search and seizure of Trulock’s password-protected files. Although Agent Halpin was present at the townhouse, the complaint does not allege that he participated in the search. Furthermore, there is no allegation that the supervising Defendants (Freeh, Gallagher, and Dillard) either ordered the search of the files or knew about the password-protection.
. As previously stated, the complaint does not allege that the agents knew of Sanchez’s statement about a warrant. They had no reason, therefore, to believe that Conrad's consent was anything but voluntary.
. It should be noted that the article itself is not part of the record. We know only that it was highly critical of the FBI and other departments of the federal government.
.The First Amendment provides that “Congress shall make no law ... abridging the freedom of speech.”
. "The presence [ ] of a few conclusory legal terms does not insulate a complaint from dismissal under Rule 12(b)(6) when the facts alleged in the complaint” do not support the legal conclusion. Young v. City of Mount Ranter,
. "[Gjovernment officials in general, and police officers in particular, may not exercise their authority for personal motives, particularly in response to real or perceived slights to their dignity. Surely anyone who takes an
Concurrence in Part
concurring in part and dissenting in part:
I dissent from part III.C. of the majority’s opinion, but otherwise concur. The owner of password-protected computer files has a clear expectation of privacy in those files that is protected by the Fourth Amendment. Another person who does not know the passwords has no authority to consent to a search of these private files because he lacks the “joint access or control” required by United States v. Matlock,
I.
The majority holds that Conrad lacked the authority to consent to a search of Trulock’s password-protected computer files. Ante at 406. I agree. I also agree with the majority’s conclusion, see id., that
Qualified immunity shields a government official from civil liability so long as his conduct “does not violate clearly established statutory or constitutional rights of which a reasonable person would have known.” Harlow v. Fitzgerald,
The central question here is whether in the light of pre-existing law it would have been apparent to a reasonable FBI agent that Conrad’s general consent to search the computer she shared with Trulock did not authorize the search of Trulock’s password-protected files stored in that computer. In answering this question, we look to Supreme Court cases, “ ‘cases of controlling authority in [this] jurisdiction,’ [and] the ‘consensus of cases of persuasive authority’ from other jurisdictions” as sources of clearly established law. Amaechi v. West,
A warrantless search can sometimes be authorized by a third party who is not the target of the search. Matlock established that third-party consent is valid only when the third party and the target have “common authority” over the area or item sought to be searched. Matlock,
In Block we applied Matlock in deciding whether a third party’s consent to the search of a general area over which she has common authority validates the search of every item within that area. The mother in Block had general access to the room in which her defendant son’s footlocker was located, and she signed a written consent form authorizing a “complete search” of her son’s room. Block,
The majority readily agrees that “Tru-lock’s password-protected files are analogous to the locked footlocker inside the bedroom” in Block and that Trulock has therefore “alleged a violation of his Fourth Amendment rights.” Ante at 403. That conclusion is unassailable becausе the factual parallels between this case and Block are striking. The mother in Block had common authority over her son’s bedroom, just as Conrad had common authority over the computer she shared with Trulock. The mother gave consent to search the bedroom, just as Conrad gave consent to search the computer. The mother told the police that the footlocker belonged to her son, that he kept it locked, and that she did not have the key. Block,
While it is true that knowing a legal principle and knowing whether to apply it in a particular circumstance are two different things, see Lappe v. Loejfelholz,
Any reasonable officer should have recognized that the privacy expectations attaching to a password-protected computer file are essentially the same as those attaching to a locked footlocker. A computer file is a repository for information and images in electronic form, just as a footlocker is a repository for more tangible items such as papers and other personal effects. Once password protection attaches to a computer file, that protection is the electronic equivalent of the lock on a footlocker containing items that are intended to remain private. The password is аn electronic key. While the medium for ensuring privacy is different, the result — a clear signal that privacy is expected against all those who lack the key (or the password)- — is the same. There is simply no reason why a reasonable officer who understood that a locked footlocker signals a discrete expectation of privacy would believe that a password-protected computer file does not. The physical differences between the two repositories have no legal significance.
This conclusion is not undercut by the majority’s observation that the law of computers is “fast evolving.” Ante at 403. In fact, the case law supports my point that
While the majority bases its grant of qualified immunity primarily on the factual differences between this case and Block, it also suggests that there is no clearly established law governing the search of Tru-lock’s protected files because at least one district court opinion from another circuit has upheld the search of a shared computer based on third-party consent. Ante at 403 (citing United States v. Smith,
In Smith the court upheld a search of the defendant’s computer files based on third-party consent, but the facts were significantly different from those presented here. There, the defendant’s housemate consented to a search of the defendant’s computer, which was located in an alcove in the housemate’s bedroom. The court found that the housemate had the necessary joint control and access to the computer and its surrounding area because the. computer was accessible to all members of the household, it had been used by the housemate’s daughter, and the defendant had tried to teach the housemate to use it. Smith,
I would hold, therefore, that the search of Trulock’s password-protected files violated clearly established law because the unconstitutionality of the search was readily apparent in light of the core principles applied in Matlock and Block. This position is supported by the government’s own conclusions about how Fourth Amendment principles apply to computer technology. In a manual designed to educate federal agents about the law governing searсhes
Qualified immunity is intended “to protect those officers who reasonably believe that their actions do not violate federal law,” Doe v. Broderick,
II.
In part III.B. of its opinion the majority concludes that although Conrad did not voluntarily consent to the search of her house, the defendants are entitled to qualified immunity from any liability for that search. While I agree with the majority’s conclusion, I write separately because my reasons for granting the defendants qualified immunity on the house search may differ from the majority’s.
Although Conrad signed a written consent form authorizing the FBI to search her house, she alleges that this consent was involuntary because it was prompted by her belief that the FBI already had a search warrant and that the FBI would break down her front door and search the house in the presence of the media and local police if she refused to cooperate. Although the voluntariness of consent for Fourth Amendment purposes is “a question of fact to be determined from the totality of all the circumstances,” Schneckloth v. Bustamonte,
The government claims that there are two reasons why this case is not controlled by Bumper, in which the Supreme Court held that consent is involuntary when given after “the official conducting the search has asserted that he possesses a warrant.” Bumper,
The majority and I may differ, however, in our reasons for concluding that the defendants are entitled to qualified immunity on the house search. Qualified immunity protects government officials who make reasonable mistakes of fact as well as those who make reasonable mistakes about what the law requires in a particular situation. Karnes v. Skrutski,
In explaining its qualified immunity holding, the majority also emphasizes the defendants’ lack of knowledge of the conversation between Sanchez and Conrad. Thus, the majority and I may agree that qualified immunity is justified only because the defendants made a rеasonable mistake of fact. I wish to be explicit on the point, however, because I could not accept the proposition that the defendants in this case made a reasonable mistake of law. Specifically, I would refuse to grant the defendants qualified immunity if the complaint had alleged that any of the defendants had personally directed Sanchez to threaten Conrad or that the defendants knew that Sanchez had conveyed threats to Conrad at the behest of someone in the FBI. On those facts, the defendants’ only argument for qualified immunity would have been that the invalidity of Conrad’s consent was not readily apparent in light of the factual distinctions between this case and Bumper. For example, the government might have argued that this case differs from Bumper because there the officers who claimed to possess a warrant also conducted the search, whereas here Sanchez claimed that the FBI had a warrant but the agents who conducted the search did not make that claim. I would reject such arguments for reasons similar to those given in part I above. Bumper clearly establishes that there can be no valid consent when the government has led a рerson to believe that her consent is irrelevant, and there is no reason why a reasonable officer would think that the factual differences between Bumper and this case are legally significant.
III.
In sum, I agree with the majority’s disposition of this case, except that I respectfully dissent from its decision to grant the defendants qualified immunity on Tru-lock’s claim that the warrantless search of his password-protected computer files violated his Fourth Amendment rights. I would therefore reverse the district court’s order granting the defendants’ motion to dismiss that claim.
. Knowledge of the passwords is necessary, but not sufficient, to establish common authority over password-protected files. The third party must also have "joint access" to the files "for most purposes.” Matlock,
. These analogies have limitations, of course. For example, the Tenth Circuit rejected an argument based on the file cabinet analogy in deciding that a detective exceeded the scope of a search warrant when he opened certain of the defendant's computer files. See United States v. Carey,
. On this point, the contrast with Wilson v. Layne is instructive. There, the Supreme Court buttressed its finding of qualified immunity by stating that the police reasonably relied on a U.S. Marshals Service policy governing media ride-alongs which clearly contemplated that media members might accompany police into private homes. See Wilson,
