David P. Weeks, Criminal District Attorney, Hunstville, TX, for Appellant. Shane Phelps, Attorney at Law, Bryan, TX, J. Paxton Adams, Attorney at Law, Hunstville, TX, for Appellee.
David P. Weeks, Criminal District Attorney, Hunstville, TX, for Appellant. Shane Phelps, Attorney at Law, Bryan, TX, J. Paxton Adams, Attorney at Law, Hunstville, TX, for Appellee.
Before QUINN, C.J., and HANCOCK and PIRTLE, JJ.
BRIAN QUINN, Chief Justice.
Is a cell phone really a pair of trousers? The State argues as much here, at least when both come from someone who has been arrested. We disagree and affirm the trial court's decision to suppress evidence discovered during a warrantless search of an impounded cell phone.
The cell phone in question belonged to Anthony Granville and was taken from him after being arrested and jailed for causing a disturbance at his school. While the phone was within official custody, an officer, having nothing to do with the arrest or any investigation into the disturbance, acquired it. He did so because he had been told that Granville took a picture of a student urinating in a urinal at school the day before. This act was purportedly a crime which stimulated the officer to begin his search for evidence of it. So, without a search warrant, he ventured down to the jail, took Granville's cell phone from the property room, turned it on, and began scrolling through it for the picture in question. It was eventually discovered on the device, and that led to Granville's indictment for “Improper Photography or Visual Recording.”
Granville moved the trial court to suppress the evidence garnered from the phone. He believed that the officer's actions constituted an unlawful search. The trial court agreed and ordered the evidence suppressed. Authority
The standard of review is a familiar one. It is one of abused discretion. Swain v. State, 181 S.W.3d 359, 365 (Tex.Crim.App.2005). Under it, we defer to the trial court's resolution of historical fact but consider de novo its conclusions of law. Ford v. State, 158 S.W.3d 488, 493 (Tex.Crim.App.2005). So too does it obligate us to consider the totality of the circumstances in making our decision. Kothe v. State, 152 S.W.3d 54, 62–63 (Tex.Crim.App.2004).
Next, the Fourth Amendment to the United States Constitution as well as article I, § 9 of the Texas Constitution protect against unreasonable searches and seizures conducted by the government. Furthermore, a search conducted without a warrant is presumptively unreasonable, United States v. Karo, 468 U.S. 705, 717, 104 S.Ct. 3296, 82 L.Ed.2d 530 (1984) and, when it is initially shown that a warrantless search occurred, the State has the burden of legitimizing it in some manner. Roth v. State, 917 S.W.2d 292, 299 (Tex.App.-Austin 1995, no pet.). We now address whether the State carried its burden. Discussion 1. Tangential, Yet Pertinent, Observations
Various preliminary issues warrant comment. The first concerns whether the officer's actions viz the cell phone constituted a search. No one disputes that they do, nor do we.
Second, when asked about the grounds upon which it relied to justify perusing the contents of the cell phone, the prosecutor represented to the trial court that “... we are not arguing this is a search incident to arrest.” Rather, “[t]his is simply a probable cause search of jail property that is a person's effects when they go to jail” and various authorities “basically say you don't have any expectation of privacy and [sic] what is in your clothes.” Given the limited grounds proffered to support the search, the State's effort to attack the trial court's decision by now invoking legal theories related to searching incident to arrest or searching in “good faith” or searching under exigent circumstances were not preserved for consideration. This is so because grounds asserted on appeal to support an appellant's contention must comport with those uttered at trial. Heidelberg v. State, 144 S.W.3d 535, 537 (Tex.Crim.App.2004). If they differ, then the new ones cannot be considered by us since the trial court was denied the chance to assess them. See Ford v. State, 305 S.W.3d 530, 533 (Tex.Crim.App.2009) (recognizing that the need to preserve objections is founded upon the policy of affording the trial court the first opportunity to correct purported mistakes).
Third, the existence of probable cause to believe a crime occurred that justified a search was broached at trial. The accused argued that no such probable cause existed, given the absence of any evidence suggesting that the student whose picture was taken failed to consent. As indicated in its findings of fact and conclusions of law, the trial court found that there was no probable cause justifying the search. The State attacks that conclusion here by arguing, among other things, that “the victim was an autistic student at the high school” and “[t]hat alone [was] sufficient for probable cause that the photograph was taken without his consent.” No evidence was proffered to support the utterance. Furthermore, individuals such as John Elder Robinson (author, special effects technician, and vintage car restorer), Thomas McKean (advocate), Dawn Prince–Hughes (recipient of a Ph.D in primate anthropology), Satoshi Tajiri (creator of Pokémon) and many other successful personages are autistic. Certainly the State would not suggest them to be presumptively incompetent simply because of their condition. Indeed, their success, and that of many autistic people, belies the uninformed syllogism offered to us. So, we reject it and caution others against tendering courts of appeal such baseless conclusions.
2. Substantive Analysis
Having disposed of the preliminaries, we now focus upon the crux of the dispute at bar. May an officer conduct a warrantless search of the contents or stored data in a cell phone when its owner was required to relinquish possession of the phone as part of the booking or jailing process? Again, we do not address situations involving the presence of exigent circumstances or other recognized exceptions to the warrant requirement. Instead, our review is limited to the grounds urged by the State during the suppression hearing, those grounds being the presence of probable cause to believe a crime was committed and the supposed lack of any reasonable expectation of privacy in the device.
a. Probable Cause
The first justification is easily disposed of. We know of no authority that allows the State to search property merely because its officers have probable cause to believe that a crime occurred and evidence of that crime can be found on the property to be searched. Those two indicia simply provide a basis to secure a warrant. See State v. Jordan, 342 S.W.3d 565, 568–69 (Tex.Crim.App.2011) (describing the prerequisites to obtaining a warrant). They alone do not allow a search. Without such a warrant, the search is presumptively unreasonable. McGee v. State, 105 S.W.3d 609, 615 (Tex.Crim.App.2003). So, the State's suggestion that the search of the phone was permissible since probable cause to believe a crime had occurred and that Granville's cell phone contained evidence of it, without more, is wrong.
b. Expectation of Privacy
As for the second and final ground, the State contends that the “search of that inmate's phone was an allowable search [because] ... [i]t was jail property and therefore Granville had no expectation of privacy.” It continues by arguing that it “was a phone taken pursuant to a lawful arrest and therefor was subject to being searched” and that the “manipulation of the phone is no different that [sic] looking at clothing or searching through papers an inmate has in his possession when ... booked into jail.” Added to those comments was one expressing that “society has never accepted or suggested an individual has an expectation of privacy in a jail setting.” Starting with the latter, we find it global and inaccurate.
It is true that prisoners have no reasonable expectation of privacy in their cells. Hudson v. Palmer, 468 U.S. 517, 525–26, 104 S.Ct. 3194, 82 L.Ed.2d 393 (1984). Similarly true is the notion that “attributes of privacy of the home are not shared with a jail.” Hernandez v. State, 819 S.W.2d 806, 815 (Tex.Crim.App.1991). Yet, the prosecutor is simply wrong in saying that no expectation of privacy in a jail setting has been recognized. Indeed, authority cited in the State's own brief holds otherwise. And, we cite it to Oles v. State, 993 S.W.2d 103 (Tex.Crim.App.1999), where our Court of Criminal Appeals said that arrestees still retain some level of privacy interest in personal effects or belongings taken from them after arrest. Id. at 108. Instead of having none, their expectations of privacy are “diminished.” McGee v. State, 105 S.W.3d 609, 617 (Tex.Crim.App.2003); accord United States v. Lilly, 576 F.2d 1240, 1244 (5th Cir.1978) (stating that the “history and purpose underlying the [F]ourth [A]mendment ... require that prisoners retain at least some degree of their fourth amendment protection”); see also Waddleton v. Jackson, 445 Fed.Appx. 808, 809 (5th Cir.2011) (stating that a search and seizure conducted upon prisoners must “be reasonable under all the facts and circumstances in which they are performed”), quoting Elliott v. Lynn, 38 F.3d 188, 190–91 (5th Cir.1994).
Next, we address the extent, if any, to which an arrestee has an expectation of privacy in the electronically stored data in his cell phone that was taken from him upon booking into jail. Forty years ago the average person could only dream of having a device that allowed individuals to walk about talking with whomever they chose. As with many dreams, this one grew to reality. The younger generation most likely know little of the multi-pound instrument carried in a bag and slung over one's shoulder. Those devices eventually gave way to lighter, but nonetheless bulky, instruments often seen in television shows of the 1980's, like “Seinfeld.” As the years went by, the mechanism came to look like the equipment Captain Kirk would flip open in the science fiction show “Star Trek” and command Scotty to “beam me up.” And, much like the transponder of “Star Trek” fame, cell phones of today are small enough to be easily carried or hidden in pockets and purses.
Interestingly, though, while phones shrank in size, they expanded in versatility and technology. No longer are people limited to simply calling others over the airwaves. They now permit their owners to do much, much more. Indeed, they liken to mini-computers or laptops, capable of opening, in many respects, the world to those possessing them. In addition to seeking out information deemed important to its owner, cell phones have the capability of memorializing personal thoughts, plans, and financial data, facilitating leisure activities, pursuing personal relationships, and the like. Due to the abundance of programs or “apps” available, users also have the ability to personalize their phone; it is not farfetched to conclude that a stranger can learn much about the owner, his thought processes, family affairs, friends, religious and political beliefs, and financial matters by simply perusing through it. That such matters are intrinsically private cannot be reasonably doubted. The importance and private nature of such information has also led to the development of passwords, encrypted programs, and like security measures to prevent its disclosure. Given this, we cannot but hold that a person (whose category encompasses Granville) has a general, reasonable expectation of privacy in the data contained in or accessible by his cell, now “smart,” phone. Accord Schlossberg v. Solesbee, No. 10–6014–RC, 2012 U.S. Dist. Lexis 4431, at *14–15 (D.Or. Jan. 13, 2012) (so holding). And that expectation is subject to protection under both the Fourth Amendment of the United States Constitution and article 1, § 9 of the Texas Constitution. But, our so holding does not end our work.
We must next assess the effect, if any, of Granville's incarceration upon his expectation of privacy. As previously mentioned, being jailed tends to diminish, though not necessarily vitiate, such expectations. See Oles v. State, supra. The extent to which they survive in property lawfully seized as part of the jailing process depends, in large part, upon the owner's exhibition of subjective expectations of privacy, whether they are reasonable, and society's recognition of the same. Oles v. State, 993 S.W.2d at 109–10. Furthermore, the amount of control retained by the owner over the item is also of importance because it influences whether the detainee's expectation can truly be said to be reasonable. See id. (discussing Oles' loss of control over his pants). His use of precautionary measures to maintain his privacy in the item may also impact the outcome. Id. at 109. And, it was the court's consideration of those indicia that eventually led it to hold that Oles had no reasonable expectation of privacy in the clothing taken from him when jailed. Id.
We cannot deny that application of the foregoing criteria would lead us to the same end regarding aspects of a confiscated cell phone. The latter, once impounded, would be outside the control of its owner. So too would it be exposed to physical manipulation. And, much like the situation in Oles, third parties also would be exercising control over and otherwise physically touching the device. Consequently, we can see how our Court of Criminal Appeals could extend its interpretation of societal views in Oles to encompass a detainee's expectations of privacy in the physical structures of and components in a cell phone. But, here, we are not merely dealing with surfaces and spaces within clothing or cell phones.
We are looking at a privacy interest in data hidden within electrical components contained in the device as well as potential information not in the phone but accessible through its manipulation, that is, data saved on the internet. The State cited us to no evidence suggesting that such data can be scraped off the phone surfaces or components, like blood or DNA affixed to clothes. Nor is there evidence of record that the picture found by the officer was somehow playing or appearing upon the phone's screen. Quite the contrary. The cell phone had to be activated, or turned on, by the officer, and he had to pull up or scroll through the information imprinted on electronic chips to uncover the photo. It was not exposed to anyone happening to touch the item, which differentiates it from the miscellaneous things accessible on a prisoner's pants.
Evidence of the phone being off has other import, as well. That evinces some precautionary measure being taken to secure the data from curious eyes. The power button can be likened to the front door of a house. When on, the door is open and some things become readily visible. When off, the door is closed, thereby preventing others from seeing anything inside. And though some cell phones may require the input of a password before it can be used, no evidence suggests that Granville's was of that type. So, the officer's ability to venture into the phone's informational recesses by merely pressing the power button does not suggest that Granville's interest in assuring the privacy of his information was minimal. Whether the phone was locked or not via a password, a closed door is sufficient to illustrate an expectation of privacy. See Rodriguez v. State, 653 S.W.2d 305, 307 (Tex.Crim.App.1983).
Now we turn to the subject of society recognizing (or not) an arrestee's privacy interest in a cell phone impounded during the booking process.
It must be rememberedthat Granville was simply a pretrial detainee. This is of import since detainees, in some ways, are accorded greater constitutional protection than a convicted individual. Ex parte Green, 688 S.W.2d 555, 556 (Tex.Crim.App.1985) (punishment); Rocha v. Potter County, ––– S.W.3d ––––, –––– – ––––, 2010 WL 1558690, at *4, 2010 Tex.App. Lexis 2859, at *10–11 (Tex.App.-Amarillo 2010, no pet.) (due process). They also have a greater chance of being freed soon after their detention through posting bond or other measure. In fact, if the officer who took the cell phone is to be believed, Granville was subject to being released quickly, given that he was arrested for a class C misdemeanor. It also lessens the duration of any control law enforcement officials may exercise over the instrument.
This concept also poses a curiosity. Determining what society would deem reasonable or unreasonable seems little more than an exercise in self-expression. Though it connotes the idea of gauging the collective conscious of the people to see what they would think about the subject, no polls are taken, surveys conducted, or investigations made. E.g., Oles v. State, 993 S.W.2d 103 (Tex.Crim.App.1999) (opining that society would not recognize the legitimacy of Oles' expectation of privacy without mentioning any polls or the like). Nor is Everyman sought out and asked. Rather, those drafting the opinion just seem to arrive upon a consensus as to what millions of other people would find acceptable or not. It would seem as though the answer could differ depending upon the “hood” from which the decision-maker came. Truly, Oliver Wendell Holmes was right in saying that law is not logic but experience.
That the data within the phone was capable of use as a weapon or posed some threat to Granville, inmates, or jail security has no evidentiary support, either. So, social views regarding the need to maintain prison discipline and decorum are of lesser concern here.
So too is the potential for exceptional intrusion in one's private matters worth reiteration. Should the State's contention be accepted, it would be free to look for whatever it cared to just because it could. Exposing a detainee to having his private thoughts, relationships, finances, and the like to arbitrary intrusion seems antithetical to the societal and civil norm mandating the presumption of innocence until proven guilty. A detainee, like Granville, who is jailed for a class C misdemeanor is not even the type of prisoner that society thought should be placed in extended governmental control. Indeed, those convicted of such a misdemeanor are not susceptible to imprisonment upon conviction. Tex. Penal Code Ann. § 12.23 (West 2011) (stating that the punishment applicable to a class C misdemeanor is a fine).
Due to the potential invasiveness of the search, Granville's status as a pretrial detainee, the fact that his stay in jail for a class C misdemeanor would be of short duration, the utter lack of any nexus between the cell phone and the crime for which appellant was jailed, and the lack of evidence suggesting that the phone and its contents posed any risk to the jail's penalogical interests, we conclude that society would recognize his continued, and reasonable, privacy interest in the instrument despite his temporary detention. Indeed, holding that the mere impoundment of property does not vitiate all reasonable expectation of privacy in the item confiscated is nothing new. Law enforcement officials have long been barred from searching impounded vehicles in any manner that they may care to. See South Dakota v. Opperman, 428 U.S. 364, 372–73, 96 S.Ct. 3092, 3098–99, 49 L.Ed.2d 1000 (1976) (prescribing the way in which an inventory search of an impounded vehicle must occur for it to pass Fourth Amendment restrictions). As we recently acknowledged, if impoundment vitiated all reasonable expectation of privacy, then there would be no reason for the requirements described by the United States Supreme Court in South Dakota v. Opperman, 428 U.S. at 372, 96 S.Ct. 3092, our own Court of Criminal Appeals in Kelley v. State, 677 S.W.2d 34, 37 (Tex.Crim.App.1984), or in State v. Hill, No. 07–11–0054–CR, 2011 WL 3587435, at *2–3, 2011 Tex.App. Lexis 6510, at *7–8 (Tex.App.-Amarillo, August 16, 2011, no pet.) (not designated for publication). Thus, the simple act of a governmental body taking custody over personal property of another “does not put an end to all expectations of privacy.” State v. Hill, supra. Nor should it. So, under the particular circumstances appearing of record, we cannot say that the search at bar passed constitutional muster.
In effect, the State fights to enable any, if not every, law enforcement officer the ability to walk into a property room, pick up whatever cell phone, ipad, ipod, or like device he may discover therein, turn it on, and use it as he cares to just because the device was within the property room. The State pursues this end by saying little to nothing about the nature of the electronic instrument involved or the vast quantity of personal information about their owner and others that may be contained in them. Instead, it merely compares cell phones to articles of clothing despite their obvious difference. More importantly, the authorities it cites in support of its position fall short of doing so.
For instance, the court in United States v. Finley, 477 F.3d 250 (5th Cir.2007), did conclude that text messages on a phone may be perused incident to an arrest. Despite not undertaking any type of analysis like that required by Oles, there is verbiage in the opinion suggesting that the court reached its decision because the search was truly incident to the arrest. “[A]s long as the administrative processes incident to the arrest and custody have not been completed, a search of effects seized from the defendant's person is still incident to the defendant's arrest,” it observed. Id. at 260 n. 7. It “ was still substantially contemporaneous with his arrest and was therefore permissible.” Id. (Emphasis added.) That language hardly encompasses the situation we have here, that is, one where the suspect has had his property inventoried into the custody of the state as part of the jailing process and, several hours later, some stranger to the arrest comes to handle it for purposes completely unrelated to the arrest.
The same can be said of United States v. Curtis, 635 F.3d 704 (5th Cir.2011), cert. denied,––– U.S. ––––, 132 S.Ct. 191, 181 L.Ed.2d 99 (2011), the other opinion relied upon by the State. It involved a search incident to arrest and relied on Finley to conclude as it did. But, then it took care to distinguish the circumstances before it from those encompassing perusal of the cell phone's contents as part of an inventory search. That an inventory search “must not be a ruse for a general rummaging in order to discover incriminating evidence” was acknowledged in Curtis. Id. at 712,quoting Florida v. Wells, 495 U.S. 1, 110 S.Ct. 1632, 109 L.Ed.2d 1 (1990). And, upon acknowledging it, the panel said:
... [t]his was not an inventory search. The police were not cataloguing the items found in portions of Curtis's car outside of his reach. The search extended only to Curtis's person and the area within his immediate control. Finley authorizes a police officer to search the electronic contents of a cell phone recovered from the area within an arrestee's immediate control.
Id. In view of the language and caveats in both Curtis and Finley, neither suggest that any law enforcement officer is free to search cell phones inventoried as part of the booking process.
Research also reveals that there are courts that refuse to follow Finley. They do so after analyzing the purpose of a cell phone, the quantity of data stored in them, and the private nature of those contents. For example, the court in Schlossberg v. Solesbee, 2012 U.S. Dist. Lexis 4431, at *13, noted that cell phones and cameras “are capable of holding large volumes of private information” and that “legitimate concerns exist regarding the effect of allowing warrantless searches of such devices.” Often they “include some combination of email services and internet browsing” and the information stored within them may include “phonebook information, appointment calendars, text messages, call logs, photographs, audio and video recordings, web browsing history, electronic documents and user location information.” Id. Consequently, “warrantless searches of such devices are not reasonable incident to a valid arrest absent a showing that the search was necessary to prevent the destruction of evidence, to ensure officer safety, or that other exigent circumstances exist,” according to the court.
The court also determined that it was “impractical to distinguish between electronic devices-between a laptop and a traditional cell phone or a smart phone and a camera, before an officer decides whether to proceed with a search of the electronic device incident to arrest.” Schlossberg v. Solesbee, No. 10–6014–TC, 2012 U.S. Dist. Lexis 4431, at *14–15 (D.Or. January 13, 2012). While we need not go so far, we nevertheless acknowledge the similarities between each of those electronic devices and the privacy implications that may arise when each is manipulated by strangers.
The same was done in State v. Smith, 124 Ohio St.3d 163, 920 N.E.2d 949 (Ohio 2009), cert. denied,––– U.S. ––––, 131 S.Ct. 102, 178 L.Ed.2d 242 (2010). And, that analysis lead the Ohio Supreme Court to hold that 1) Smith had a reasonable expectation of privacy in his cell phone, 2) the phone was not a container, and 3) a warrant was needed before it could be searched. Id. at 954–55.
As we cautioned early on, we deal not with a warrantless search incident to arrest or one undertaken due to exigent circumstances. Nor do we deal with property found in a jail cell. Rather, we consider a warrantless search, by a stranger to an arrest, of a cell phone taken as part of an inventory-conducted incident to jailing for evidence of a crime distinct from that underlying the owner's arrest. Nothing in those circumstances or the others mentioned herein nullify Granville's reasonable expectation of privacy in the phone searched. Nothing in them allowed the officer to act without a warrant. While assaults upon the Fourth Amendment and article I, § 9 of the United States and Texas Constitutions regularly occur, the one rebuffed by the trial court here is sustained. A cell phone is not a pair of pants.
The order of suppression entered below is affirmed.