Someone used the email address gslabs@hotmail.com to contact a Vietnamese website in an attempt to buy sassafras oil — a chemical that can be used to make the illegal drug known as ecstasy. The website was being monitored by the Drug Enforcement Administration, which began an investigation that culminated in Frank Caira being convicted on drug charges. A key step in the investigation was learning that Caira was the person behind the gslabs@hotmail.com address. The DEA made that discovery by issuing administrative subpoenas to technology companies, without getting a warrant. Arguing that the DEA conducted an “unreasonable search” in violation of the Fourth Amendment, Caira moved to suppress much of the evidence against him. The district court denied his motion and we affirm. Because Caira voluntarily shared the relevant information with technology companies, he did not have a reasonable expectation of privacy in the information, so his Fourth Amendment rights were not violated.
I. BACKGROUND
Between July and September 2008, emails were sent from gslabs@hotmail. com to an email address associated with a website hosted in Vietnam. The emails asked about buying sassafras oil, an ingredient in ecstasy. The DEA, which had been monitoring the website, sent an administrative subpoena to Microsoft Corporation (the owner of Hotmail, the web-based email service for @hotmail.com email addresses). The subpoena asked for:
[A]ll basic subscriber information, including the subscriber’s name, address, length of service (including start date) and types of services used including any temporarily assigned network address, Pаssport.net accounts, means and source of payment (including credit card or bank account number), and the account login histories (IP Login history) of, the following email account(s): gslabs® hotmail.com.
For this case, the request for “account login histories (IP Login history)” is key. Internet Protocol (abbreviated as “I.P.”) addresses are usеd to identify computers connected to the internet. The allocation of addresses is centrally managed so one can look up in a public registry which internet service provider “owns” a particular address.
Responding to the subpoena, Microsoft gave the DEA information about instances in which the gslabs@hotmail.cоm account was accessed between July 5 and September 15, 2008. For each instance, Microsoft provided the date, time, and an I.P. address associated with the computer that accessed the account. The DEA saw that 24.15.180.222 was an I.P. address frequently used to access the account, so it sent an administrative subpoenа to Comcast Corporation (the owner of that I.P. address). The subpoena asked for:
Any and all e-mail addresses associated with [24.15.180.222]; a) customer name and other user name(s); b) addresses; c) records of session times and durations; d) length of service (including start date) and types of service used; e) telephone or instrument number or оther subscriber number or identity, including any temporarily assigned network address; and f) means and source of payment for such service (including any credit card or bank account numbers).
Comcast responded that the address was assigned to Anna Caira, and Comcast gave the DEA Anna’s home address. The investigation continued from there and culminаted in Anna’s husband, Frank Caira, being charged with possessing and conspiring to manufacture illegal drugs, in violation of 21 U.S.C. sections 841(a)(1) and 846.
Caira moved to suppress evidence obtained through the subpoenas, arguing that the government’s inquiry was a “search” under the Fourth Amendment, and that a warrant was required. The district court denied that motion and Cairа pleaded guilty while reserving his right to appeal the denial of his suppression motion. This is that appeal. Caira also appeals his sentence because the district judge imposed conditions of supervised release without justifying the conditions on the record.
A. Caira Did Not Have a Reasonable Expectation of Privacy in His I.P. Addresses
The Fourth Amendment provides that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.” U.S. Const, amend. IV. Caira contends that the DEA’s actions amounted to an unreasonable search. The district court disagreed. We review the court’s legal conclusions de novo, as well as its treatment of mixed questions'of law and fact; we review its factual findings for clear error. United States v. Henderson,
Under the Fourth Amendment, a “search” occurs when “the government violates a subjective expectation of privacy that society recognizes as reasоnable.” Kyllo v. United States,
In Miller, the defendant had no reasonable expectation of privacy in his banking records, even though they contained sensitive financial information, because he had voluntarily shared the information with a third party — the bank.
Caira complains about the DEA’s inquiry into the I.P. addresses that were, used to access gslabs@hotmail.com. In United States v. Weast, the Fifth Circuit wrote that I.P. addresses are broadcast “far and wide in the course of normal internet use.”
Here, Caira shared his I.P. address with a third party — Microsoft. When he used his home computer and sent his username and password to Microsoft, he expected to see his Hotmail inbox displayed on his home computer screen. It would have done him no good if his inbox was instеad displayed on the screen attached to his computer at work, or a computer at the public library, or the computer he used years earlier when first signing up for a Hotmail account. So every time he logged in, he sent Microsoft his I.P. address, specifically so that Microsoft could send back information to be displayed where Caira was physically present. So this case is controlled by Miller and Smith. See Smith,
This case parallels the Tenth Circuit’s case in United States v. Perrine,
But Caira urges reversal, arguing that his case is special because the DEA discovеred the I.P. address associated with his home — and the DEA knew that would happen, because people often check their email from home — and the home is given special protection under the Fourth Amendment, see Payton v. New York,
Petitioner argues, however, that, whatevеr the expectations of telephone users in general, he demonstrated an expectation of privacy by his own conduct here, since he used the telephone in his house to the exclusion of all others. But the site of the call is immaterial for purposes of analysis in this case. Although petitioner’s conduct may have bеen calculated to keep the contents of his conversation private, his conduct was not and could not have been calculated to preserve the privacy of the number he dialed. Regardless of his location, petitioner had to convey that number to the telephone company in precisely the same way if he wished to complete his call. The fact that he dialed the number on his home phone rather than on some other phone could make no conceivable difference, nor could any subscriber rationally think that it would.
Citing United States v. Jones, — U.S. -,
Jones concerned GPS tracking technology, which is not at issue here. Nonetheless, Caira argues that “the government was essentially given data that was equivalent to placing a tracking device” on him. That is unhelpful exaggeration. In concluding that “longer term” use of GPS technology constitutes a Fourth Amendment search, id. at 955, 964, the Jones concurrences nоted that such technology can monitor “every single movement,” id. at 964, and so can reveal “trips to the psychiatrist, the plastic surgeon, the abortion clinic, the AIDS treatment center, the strip club, the criminal defense attorney, the by-the-hour motel, the union meeting, the mosque, synagogue or church, the gay bar and on and on,” id. at 955 (quoting People v. Weaver,
More fundamentally, Jones did not do away with the third-paNy doctrine. It had no occasion to, became the government used its own GPS device to track Jones’s location — he had not shared his location
The critique advanced by Caira, Justice Sotomayor, and others, is not new. It was madе in both Miller and Smith—in dissent. Miller,
B. Supervised Release Error Was Harmless
Caira also appealed his sentence. The district judge sentenced him to twenty-five years in prison, followed by fivе years of supervised release. The judgment specified fourteen conditions of supervised release, but those conditions were not justified on the record at Caira’s sentencing hearing. Ordinarily, that would require us to remand for resentencing. See United States v. Thompson,
But Caira’s case has a wrinkle. Before pleading guilty, in an attempt to avoid convictiоn, he tried to have the prosecutor and DEA agent murdered. For that, he was sentenced to life in prison. See United States v. Caira,
III. CONCLUSION
We Affirm the judgment of the district court.
