Find Laws Find Lawyers Free Legal Forms USA State Laws
Laws-info.com » Cases » Illinois » 2nd District Appellate » 2009 » People v. Prinzing
People v. Prinzing
State: Illinois
Court: 2nd District Appellate
Docket No: 2-07-0724 Rel
Case Date: 04/21/2009
Preview:No. 2--07--0724 Filed: 4-21-09 ______________________________________________________________________________ IN THE APPELLATE COURT OF ILLINOIS SECOND DISTRICT ______________________________________________________________________________ THE PEOPLE OF THE STATE OF ILLINOIS, ) Appeal from the Circuit Court ) of Kane County. ) Plaintiff-Appellee, ) ) v. ) No. 04--CF--2441 ) ROBERT S. PRINZING, ) Honorable ) Timothy Q. Sheldon, Defendant-Appellant. ) Judge, Presiding. ______________________________________________________________________________ JUSTICE BOWMAN delivered the opinion of the court: After a bench trial, defendant, Robert S. Prinzing, was convicted of possessing child pornography (720 ILCS 5/11--20.1(a)(6) (West 2004)) and sentenced to 30 months' probation. On appeal, he argues that the circuit court erred in denying his motion to suppress evidence, which maintained that the police illegally obtained his consent to search, through the use of trickery, deceit, or subterfuge. Defendant alternatively argues that, even if his consent was valid, the evidence should have been suppressed because the police exceeded the scope of his consent. We agree that the police exceeded the scope of the consent, and we reverse and remand. I. BACKGROUND On February 18, 2005, defendant was indicted for nine counts of possession of child pornography. The indictment alleged that on or about May 25, 2004, defendant knowingly possessed

No. 2--07--0724 pornographic computer images of children whom he knew or reasonably should have known to be under the age of 18. On February 4, 2005, defendant moved to quash the search and to suppress evidence that was obtained. In his motion, he stated that on October 29, 2003, Detective Keith Smith of the Kane County sheriff's department received information from a federal agent, Ronald Wolfick, regarding Kane County residents who had possibly purchased child pornography over the Internet. On November 18, 2003, Detective Smith was informed that defendant was one of those residents. On February 4, 2004, Detective Smith spoke to defendant's credit card company and was informed that there had been a disputed charge for his account number and that the account was closed and a new card was issued. He then obtained defendant's new credit card number and computer screen name. On May 25, 2004, Detective Smith and Detective Grimes1 went to defendant's residence under the guise of interviewing him about "possible fraudulent charges made on his credit card." Defendant agreed to discuss that matter and provided his credit card number to Detective Smith. Detective Smith knew that the number matched one reported to have been used to subscribe to a particular Web site, and he asked defendant for permission to search his computer in regard to the fraudulent credit card charges. Defendant consented, and the officers inserted a forensic preview program into the computer and began searching for photographic images, not fraudulent credit card charges. Detective Smith then obtained oral and written statements from defendant and took the computer, which belonged to defendant's wife. Defendant's motion further alleged that on May 26, 2004, Detective Smith asked defendant to pick up his wife's computer from the sheriff's office and conducted another interview with

1

Detective Grimes' first name is not contained in the record. -2-

No. 2--07--0724 defendant, which was audiotaped. After the interview, Detective Smith turned over the computer to defendant. Defendant argued that his consent to the search was involuntary because of the officers' trickery, deceit, or subterfuge. He argued further that the officers illegally obtained oral and written statements from defendant and illegally seized defendant's computers, digital cameras, and compact discs. Defendant argued that, because the search of the computer violated defendant's fourth amendment rights, the physical evidence and the statements subsequently obtained should have been suppressed. On March 3, 2005, the trial court held an evidentiary hearing on defendant's motion to suppress. Detective Smith testified as follows. He was employed with the Kane County sheriff's department and assigned to computer crimes and forensics. On October 29, 2003, he spoke with Ronald Wolfick, a special agent with Immigration and Customs Enforcement. Wolfick provided Detective Smith with information regarding online credit card purchases of child pornography and provided the credit card number used, which belonged to defendant. Detective Smith obtained a subpoena and contacted the bank that issued the credit card. The bank told Detective Smith that a fraudulent charge had been reported around the time that the card was used to purchase child pornography. The bank relayed that a new account number had been issued. On May 25, 2004, Detective Smith, along with Detective Grimes, went to defendant's residence at approximately 5 p.m. in an unmarked car. Detective Smith identified himself and stated that he was investigating fraud involving defendant's credit card. Detective Smith inquired "as to his card usage, the geographical area [in which] he might have used it, also if it was ever out of his control and through the course of the conversation trying to determine if he had lost control of that card where someone else could have acquired his credit card numbers." Defendant retrieved his credit card and gave it to Detective

-3-

No. 2--07--0724 Smith. Detective Smith recognized the number as the one that had been used to purchase child pornography. Defendant told Detective Smith that he owned the credit card and maintained exclusive control over the card. Defendant stated that he used the card in the local area, when he went on trips, and occasionally for Internet purchases. Detective Smith asked defendant whether there had been any fraud reported on his credit card. Defendant stated that there had been an incident of fraud, his money was refunded, and he was issued a replacement card. Detective Smith told defendant that if he used the card on the Internet, there was opportunity for others to steal his information. Detective Smith asked defendant if he still possessed the computer that he used to make Internet purchases. If there was any evidence of his system being compromised by unsafe Internet Web sites or a virus, it would likely be on the computer used to make Internet purchases. Defendant denied noticing any suspicious activity on his credit card. Defendant worked for Comcast and was very knowledgeable about computers, impressing Detective Smith. Defendant denied having any suspicion that the security on his computer had been compromised. Detective Smith testified that a virus could infect a computer when a person received a spam e-mail or visited a particular Web site embedded with the virus. He had an investigatory tool that allowed him to check for such viruses. Detective Smith asked defendant if he could search his computer by using a special program, with the intent of trying to determine how his credit card information might have been stolen. Defendant consented. Defendant was present in the room when Detective Smith began the program, but he left the room several times. According to Detective Smith, he initially used a noninvasive tool to perform a "preview," which prevents any changes from happening to the computer when the system is turned off and on. The "preview" allows detectives to view the hard drive but prevents

-4-

No. 2--07--0724 them from making any changes to any of its files. Normally, after the "preview" program, Detective Smith would use a program called "Image scan." The image scan looks for images related to Web pages to get a history of pages that the user has visited. The program brings up thumbnail images from Web pages. Depending upon what is found, he then would use a tool that would look for viruses or any key stroke loggers, which capture key strokes and send the information to a remote location. Detective Smith began the search of defendant's computer by using the image scan program. He was looking for thumbnails with the Visa logo, not for child pornography. Detective Smith testified that he did not inform defendant that he believed that his credit card information had been used to access child pornography Web sites, because "at this point [he] didn't feel that [defendant] still had been--was the offender. [Detective Smith] was curious as to how his information could have been compromised." He was concerned that defendant's credit card may have been compromised not once, but twice. Detective Smith explained that "when you visit a web site, if you go to make a purchase, you will see a Visa logo. That will be captured. Whatever the merchandise is being offered on that particular web page, it will have graphics that will show that." A Visa credit card number will not be captured. Detective Smith would have to click on the image to get to the vendor's Web site. Detective Smith found several images that he suspected were child pornography. He found the images within 10 to 15 minutes after he began the scan. He denied that he was specifically looking for child pornography. Rather, he was looking for information related to defendant's credit card. He considered his investigation up to this point to be related to credit card fraud because there was evidence of only a few attempts to access the pornographic Web sites, whereas other investigations involved numerous attempts. He stopped the search and asked "for consent, asked

-5-

No. 2--07--0724 [defendant] to grant another interview regarding the images that [he] had seen." Defendant agreed to speak to him again. Detective Smith testified: "I explained to him that based on what he had told me that he had physical control of his credit card all the time and he had no reported compromises of his Internet service, was he familiar--I had some concern over the images and was he familiar with two particular web sites which I named for him." Defendant believed that one of the named sites was one that he had previously subscribed to. The disputed charge on his credit card involved one of the sites. Defendant stated that he was relieved that this was "out" so that he could get it behind him. He never asked to end the conversation, and Detective Smith asked him to provide a written statement summarizing his credit card usage. Defendant agreed and provided a statement. Detective Smith then told defendant that based on what he saw, he "had no choice but to take [defendant's] computers." Defendant was concerned about how long the computers would be gone, because one of the computers was his wife's work-related laptop. Detective Smith asked for and received oral and written consent to take the computers. Defendant assisted Detective Smith in gathering all the computers and media storage devices that were to be taken into evidence. Defendant asked Detective Smith whether he was going to be arrested, and Detective Smith stated that he did not know what the results would be of their computer analysis. He told defendant that the matter was still under investigation but that he would give him notice and an opportunity to turn himself in if he were to be arrested. The detectives then left defendant's home. The next day, May 26, 2004, Detective Smith called defendant and advised that the police were finished with his wife's computer and that Detective Smith could drop it off to him. Defendant

-6-

No. 2--07--0724 stated that he could pick it up on his way home. When defendant arrived around 5 p.m., Detective Smith asked if he would consent to another interview and defendant agreed. Defendant agreed to have the interview audiotaped. On cross-examination, Detective Smith admitted that he was specifically assigned to review cases that involved Internet child pornography. He admitted that the information that he received from Wolfick involved child pornography purchased on the Internet and was obtained through a federal investigation known as Operation Falcon. He admitted that Wolfick never mentioned credit card fraud. He admitted that, when he testified before the grand jury to obtain subpoenas for defendant's credit card records, he was investigating the possibility that defendant purchased child pornography. He admitted that he spoke with defendant's credit card company and was told that there was a disputed charge of $565 on the card but that that account had been closed in June 2003. The bank told him that a new card had been issued, and he received both credit card numbers from Wolfick. The dates of the child pornography purchases were between May and June of either 2002 or 2003; Detective Smith could not recall the year in question. Detective Smith admitted that he was investigating defendant between February 20, 2004, and May 25, 2004, for possession of child pornography and had obtained on that ground grand jury subpoenas for defendant's Internet service, credit card, and e-mail address. Although he had no information that suggested that someone other than defendant used his card to visit child pornography sites, Detective Smith maintained that he was not sure that defendant was the actual person visiting the sites. He admitted that he had no information that defendant's credit card had actually been used fraudulently. He never mentioned the words "child pornography" when he visited defendant's home, and he did not inform defendant that his card may have been used to purchase

-7-

No. 2--07--0724 child pornography. Detective Smith claimed that he did not provide defendant with this information because he had no suspicion that defendant visited the child pornography sites. Detective Smith admitted that he continued to ask him questions about his computer after defendant told him that the disputed charge had been resolved and that he had no concerns about credit card fraud. Kathleen Ann Donovan, defendant's wife, testified as follows. She confirmed that Detective Smith and Detective Grimes arrived at her front door claiming that they were investigating potential fraud. The detectives asked about any fraudulent activity on their credit cards. She recalled having a dispute regarding some charges to their account but neither she nor her husband filed any police reports connected with that dispute. The detectives did not ask about any particular Web sites connected with any online purchases until after they inspected the computer. The detectives asked to look at the computer so that they could find evidence of any fraudulent credit card transactions. Defendant consented and later the detectives stated that they found child pornography images on the computer. They then began collecting all the computers in the home, three of which belonged to Donovan. She did not believe that she could stop the detectives from confiscating her computers. Detective Smith then asked defendant to make a written statement about the definition of pornography and had him sign a consent form that listed the computers that were being removed from the home. On May 26, 2004, Detective Smith was supposed to meet Donovan at the train station in Geneva to return her computer to her. When she arrived at the station, he was not there. Defendant called her to inform her that the detective could not meet her there. Defendant stated that he would go pick up the computer from the police station.

-8-

No. 2--07--0724 Defendant testified next. Around 5 p.m. on May 25, 2004, two detectives arrived at defendant's home. They told him that they were investigating a fraud case, which he thought was unusual considering that he did not have any complaints regarding any type of fraud. The detectives questioned him for approximately 10 or 15 minutes regarding his credit cards and credit card numbers. They asked if he had a particular credit card but did not inform him how they had acquired his credit card information. He produced all of the credit cards in his wallet. He told Detective Smith that he had a disputed charge at one time but that it had been resolved and he had been issued a new card. He thought that perhaps the credit card number that the detectives had was his old card number. His disputed charge took place sometime in June 2003. He had another disputed charge in August 2003, but a new card was not issued then. The detectives asked about his card usage and whether he was the sole user. They then asked to view his computer to check for viruses that could have stolen his credit card information. Defendant stated that "Detective Smith asked to view [the] computer to look for viruses, you know, signs that [a] hacker had been in [defendant's] computer, Trojan horses, worms, anything that might possibly capture key strokes that [he] was typing in to get [his] credit card information." He initially told the detectives that he did not feel it was necessary, because he had several firewalls in place and felt secure in his computer usage. Detective Smith insisted that it would be better for him to check defendant's computer because his programs were better than anything that is available commercially. After the third request, defendant agreed to allow Detective Smith to check his computer. Detective Smith then produced a USB port cable and a couple of disks that he retrieved from his briefcase. He inserted a disk into defendant's computer, rebooted it, and then began looking at images that were on the computer. Defendant stated that it appeared that the program was creating

-9-

No. 2--07--0724 files of pictures, because Detective Smith went to "a directory and [was] opening up different files, and every time he opened one up, it was populating with pictures from [the] computer." Defendant never saw any images with credit card logos; he saw only images that he had downloaded from the Internet or from his digital camera. Defendant was employed by Comcast, and he regularly checked systems for viruses. The programs he used to check for viruses never brought up images but only executable files. Viruses are not embedded in images but are executable programs. He thought it was odd that Detective Smith was looking only at pictures but defendant did not say anything. After about 15 to 20 minutes, Detective Smith stated that he was done looking at the computer and that he found an image that he felt was child pornography. Detective Smith then asked defendant about two Web sites and defendant admitted that he had visited them. Detective Smith then told defendant that he had to confiscate all the computers in the house and search all media that might contain pictures or other files. Detective Smith did not ask for permission to search the home for additional computers and media storage devices, such as defendant's digital camera. Defendant turned over these items because he did not feel that he had a choice. On May 25, 2004, Detective Smith was scheduled to meet Donovan at the train station at 2 p.m. to return her work laptop computer to her. However, he called defendant at 1:30 p.m. and stated that he could not make it and could not stop by their home for several days. Instead, defendant offered to pick the computer up after work. Detective Smith agreed and, when defendant arrived at the police station around 5:15 p.m., Detective Smith asked if he would agree to be interviewed. Defendant agreed and provided a taped statement. On May 19, 2005, the trial court denied defendant's motion to suppress. The trial court determined that Detective Smith was "steadfast" in his position that he went to defendant's residence

-10-

No. 2--07--0724 to investigate credit card fraud and that defendant consented to the search of his computer. After discovering the child pornography, Detective Smith stopped the search and obtained defendant's voluntary written statement and consent to seize the computers in the home. The next day, defendant agreed to go to the police station and agreed to be interviewed on tape. The trial court did not find that Detective Smith engaged in trickery, deceit, or subterfuge. On July 14, 2005, defendant filed a motion to reconsider the denial of his motion to suppress. He argued that the trial court failed to consider all the testimony and failed to consider that Detective Smith's testimony was impeached by his grand jury testimony, and thus, the trial court erred in finding that defendant's consent to the computer search was valid. On February 24, 2006, the trial court denied defendant's motion for reconsideration. The trial court found that Detective Smith was not impeached because during his grand jury testimony he was only asked whether the tip he received was related to a child pornography investigation. He did not change this testimony at the motion to suppress hearing but was steadfast in his stance that his investigation began as one of potential credit card fraud. It further found that defendant did not do anything to attempt to stop the search and had voluntarily turned over various compact disks that contained images. The court did not ignore defendant's testimony or his wife's testimony but, rather, found that the testimony did not support defendant's position that Detective Smith used trickery to obtain his consent for the search and seizure of his computers or to obtain his written and taped statements. On August 31, 2006, defendant filed a motion for reconsideration based on newly disclosed evidence. Defendant argued that he did not have the transcripts from the grand jury subpoena hearing when he filed his motion to suppress and earlier motion for reconsideration. According to defendant, the grand jury testimony directly impeached Detective Smith's testimony at the hearing

-11-

No. 2--07--0724 on defendant's motion to suppress. The sole witness at the grand jury hearing was Detective Smith, who testified that the subpoenas being sought were for the limited purpose of investigating child pornography cases. Detective Smith further testified that he was investigating five individuals implicated in a federal investigation and was "trying to determine if these people, in fact, had knowledge of that credit card and their Internet service provider accounts having been used." He was seeking information from the credit card companies to determine the accuracy of the information received about the suspected purchases. He answered "yes" when asked if the credit card information was being obtained solely for the purpose of investigating child pornography cases against the individuals. The trial court denied this motion on October 18, 2006. In its ruling, the trial court stated that it believed that Detective Smith's investigation of defendant initially related to child pornography, morphed into a credit card fraud investigation when he discovered that there was a disputed charge on defendant's card, and then, after he discovered child pornography on defendant's computer, morphed back to a child pornography investigation. The State nol-prossed counts three and eight, and the matter proceeded to a bench trial on the remaining seven counts. The trial court found defendant not guilty on count one and guilty on the remaining six counts. Defendant was sentenced to 30 months' probation on July 13, 2007, and this timely appeal followed. II. ANALYSIS When reviewing a trial court's ruling on a motion to suppress evidence, we apply a two-part standard of review adopted by the Supreme Court in Ornelas v. United States, 517 U.S. 690, 699, 134 L. Ed. 2d 911, 920, 116 S. Ct. 1657, 1663 (1996). People v. Harris, 228 Ill. 2d 222, 230 (2008).

-12-

No. 2--07--0724 Under this standard, we reject the trial court's findings of historical fact only if they are against the manifest weight of the evidence, and we review de novo the trial court's ultimate legal ruling as to whether suppression was warranted. Harris, 228 Ill. 2d at 230. In this case, the trial court believed Detective Smith when he claimed he was investigating credit card fraud and not child pornography when he sought defendant's consent to search his computer. We review this factual finding under the manifest t of the evidence standard. We will review de novo the ultimate legal conclusion by applying fourth amendment rules to the facts. It is well settled under the fourth and fourteenth amendments that warrantless searches are unreasonable subject only to a few established exceptions. Schneckloth v. Bustamonte, 412 U.S. 218, 219, 36 L. Ed. 2d 854, 858, 93 S. Ct. 2041, 2043 (1973). One established exception to the warrant requirement is a search that is conducted with voluntary consent. Schneckloth, 412 U.S. at 219, 36 L. Ed. 2d at 858, 93 S. Ct. at 2043-44. It is the State's burden to show by a preponderance of the evidence that the consent was voluntary. People v. Alvarado, 268 Ill. App. 3d 459, 464 (1994). Whether consent was voluntary is a question of fact to be determined from the totality of the circumstances. Schneckloth, 412 U.S. at 227, 36 L. Ed. 2d at 863, 93 S. Ct. at 2048. The two competing concerns that must be accommodated in determining the meaning of a voluntary consent are: (1) the legitimate need for such searches and (2) the equally important requirement of assuring the absence of coercion. Schneckloth, 412 U.S. at 227, 36 L. Ed. 2d at 863, 93 S. Ct. at 2048. Whether consent was voluntary is a question of fact for the trial court, and its decision will not be disturbed unless it is against the manifest t of the evidence. People v. Smith, 214 Ill. 2d 338, 350 (2005).

-13-

No. 2--07--0724 Courts may consider many factors when evaluating the totality of the circumstances. Knowledge of the right to refuse consent is one factor to be considered, but the State does not need to establish such knowledge to prove an effective consent. Schneckloth, 412 U.S. at 227, 36 L. Ed. 2d at 863, 93 S. Ct. at 2048. Factors surrounding coercion or duress are also considered. Consent is not voluntary where it is the result of coercion, intimidation, or deception. People v. Graf, 265 Ill. App. 3d 746, 750 (1994). An initial refusal to a police request to search is a factor that could demonstrate involuntariness. Graf, 265 Ill. App. 3d at 752. Further, consent obtained by means of deception may also be invalid. People v. Daugherty, 161 Ill. App. 3d 394, 399 (1987). While some forms of deception may not invalidate the consent, we must review the voluntariness of the consent in light of traditional notions of fairness and society's needs for effective police investigations. Daugherty, 161 Ill. App. 3d at 399. Here, defendant first alleges that his consent to the computer search was invalid because Detective Smith deceptively claimed that he was looking for evidence of computer viruses that could have led to credit card fraud when in fact he was looking for images of child pornography. This leaves us to first determine whether the trial court's factual determination that Detective Smith did not engage in trickery, deceit, or subterfuge when he asked to search defendant's computer for fraudulent credit card activity is against the manifest weight of the evidence. Defendant likens his case to Daugherty. In Daugherty, police officers went to the defendant's home, identified themselves, and said that they wanted to discuss the theft that she reported a few days earlier. Daugherty, 161 Ill. App. 3d at 396-97. The theft case had already been solved, and, in the process of solving it, the police received information that marijuana was in the defendant's home. Daugherty, 161 Ill. App. 3d at 396. The defendant agreed to speak to the officers and let them inside her home.

-14-

No. 2--07--0724 Daugherty, 161 Ill. App. 3d at 396. The officers then asked to see where the theft had occurred, and the defendant showed them to the master bedroom; they then proceeded to the kitchen, where the officers saw marijuana on the counter. Daugherty, 161 Ill. App. 3d at 396-97. The trial court ruled that the real reason that the officers went to the defendant's home was to look for marijuana and that the theft investigation was just a ruse. This court agreed and also agreed that the officers' misrepresentation was so unfair that it rendered the defendant's consent invalid. Daugherty, 161 Ill. App. 3d at 400. We stated: "Where, as here, the law enforcement officer without a warrant uses his official position of authority and falsely claims that he has legitimate police business to conduct in order to gain consent to enter the premises when, in fact, his real reason is to search inside for evidence of a crime, we find that this deception under the circumstances is so unfair as to be coercive and renders the consent invalid. *** This police conduct offends the fourth amendment and is fundamentally unfair when compared with the need for effective police investigation." Daugherty, 161 Ill. App. 3d at 400. While Daugherty appears to be the only Illinois case invalidating consent on the ground that it was obtained through trickery, defendant also likens his case to those that invalidated consent on the ground that the police had misrepresented the defendants' rights. See Bumper v. North Carolina, 391 U.S. 543, 549-550, 20 L. Ed. 2d 797, 802-03, 88 S. Ct. 1788, 1791-92 (1968) (holding consent invalid when given under coercive circumstances in which police misrepresented that they had a warrant to search the home); People v. Casazza, 144 Ill. 2d 414, 418, 424 (1991) (finding consent invalid where the police officers misrepresented that, if the defendant would not consent to a search of his yacht, they could seize the yacht while they obtained a search warrant); People v. Bailey, 273

-15-

No. 2--07--0724 Ill. App. 3d 431, 437 (1995) (holding that consent was invalid where the defendant initially refused request for search and officers made unsupportable legal threat to detain the defendant's bag); People v. Cardenas, 237 Ill. App. 3d 584, 588-89 (1992) (finding consent to search vehicle invalid where the defendant initially refused request by stating " 'no, is that legal" and officers gave misleading information that they perform such searches regularly (emphasis omitted)); People v. Purchase, 214 Ill. App. 3d 152, 155 (1991) (finding consent to search home invalid where police officers made false threats to the defendant's wife that they would take her to jail and she would lose custody of her baby). We find this case distinguishable from Daugherty and the other cases cited by defendant. It was undisputed that Detective Smith was informed by defendant's credit card company that there was a disputed charge that had been resolved by crediting back the charge and a new card number having been issued. It was also undisputed that the disputed charge in June 2003 was around the time that the child pornography Web site charges had been incurred. While Detective Smith did not mention the potential for child pornography purchases, he was not required to provide defendant with every piece of information that he possessed while investigating the matter. In Daugherty, the theft case had been resolved and the police employed purely deceptive tactics to obtain consent whereas, in this case, the police had not resolved whether the disputed credit card charge was related to the child pornography Web site charges. The remaining cases cited by defendant involved the police affirmatively misrepresenting the defendants' rights whereas here, the police made no such misrepresentations. Therefore, it was not against the manifest weight of the evidence to find that when Detective Smith asked for consent to search defendant's computer for viruses that may have compromised his credit card information, Detective Smith did not engage in trickery, deceit or

-16-

No. 2--07--0724 subterfuge, but, rather, he had a twofold purpose in his visit. Even if Detective Smith did use trickery, that would not necessarily render defendant's consent involuntary, as trickery is just one factor the court may consider in determining the validity of consent. See People v. Minnitti, 373 Ill. App. 3d 55, 69 (2007) (discussing effect of police trickery on voluntariness of confession). Having determined that defendant' s consent was voluntary, we now examine whether the police exceeded the scope of the consent. When determining whether a search is reasonable under the fourth amendment, we must determine first whether the officer's action was justified at its inception and second whether it was reasonably related in scope to the circumstances that justified the intrusion in the first place. People v. Lampitok, 207 Ill. 2d 231, 241 (2003). In evaluating the scope of a defendant's consent, the court considers what a reasonable person would have understood by the exchange between the officer and the defendant. People v. James, 163 Ill. 2d 302, 314 (1994). "[T]he parameters of a search are usually defined by the purpose of the search." James, 163 Ill. 2d at 314. In this case, principles of law and technology collide. The court in People v. Berry, 314 Ill. App. 3d 1, 11-12 (2000), addressed the scope of consent with respect to electronic devices, specifically a cellular phone. Relying on various federal cases, the Berry court stated that the lack of knowledge of what the officer is searching for does not change the effect of a "general" consent. Berry, 314 Ill. App. 3d at 12. If a consent to search is entirely open-ended, a reasonable person would have no cause to believe that the search will be limited in some way, and the consent would include consent to search the memory of electronic devices. Berry, 314 Ill. App. 3d at 12. The Berry court then considered the totality of the circumstances, which involved a detective asking to look at the defendant's cell phone and the defendant responding " 'go right ahead.' " Berry, 314 Ill. App. 3d

-17-

No. 2--07--0724 at 12. The officer, after receiving the defendant's response, opened the phone and retrieved the phone number of the phone by pressing a button. Berry, 314 Ill. App. 3d at 13. The defendant knew when the detective asked to search the phone that he was investigating a murder and that he was trying to determine whether the defendant owned the phone, and the defendant placed no explicit limitations on the scope of the search, either when he gave his general consent or while the officer examined the phone. Berry, 314 Ill. App. 3d at 14. Therefore, the court determined that, based on the totality of the circumstances, the detective did not exceed the scope of the defendant's general consent to search his phone when the detective activated the phone and retrieved the phone number. Berry, 314 Ill. App. 3d at 14. Federal courts have also considered the scope of electronic device searches. In United States v. Lemmons, 282 F.3d 920, 925 (7th Cir. 2002), the court determined based on the totality of the circumstances that a police search did not exceed the defendant's general consent to search his computer. The police originally obtained consent to search for video recordings of the defendant's neighbor's bedroom. Once inside, the defendant showed police a sexually explicit photograph of his 17-year-old daughter. The police then asked whether there was anything on the defendant's computer that they should be aware of, and the defendant turned the computer on and invited the officers to look. Lemmons, 282 F.3d at 926. The officers then opened images saved on the computer that were pornographic images of children. Lemmons, 282 F.3d at 926. The court stated that the officers' search of the computer may have been illegal if the defendant had stuck to his original consent to search for a camera or recording device, or if he had limited his consent to search his computer to images of his neighbor, depending on the defendant's labeling system or other variables. Lemmons,

-18-

No. 2--07--0724 282 F.3d at 926. Because the defendant did not limit the consent to search his computer, the police did not exceed the scope by searching random images. Lemmons, 282 F.3d at 926. In United States v. Brooks, 427 F.3d 1246, 1249 (10th Cir. 2005), the police requested to search the defendant's computer for child pornography by means of a "pre-search" disk. The police told the defendant that the pre-search disk would bring up all the images on the computer in a thumbnail format so that they could check for images of child pornography. Brooks, 427 F.3d at 1248-49. Defendant asked if it would search text files and he was told that it would not. For some reason, the disk was not operating on the defendant's computer, so the officers performed a manual search of images. Brooks, 427 F.3d at 1248. The defendant complained that the police exceeded the scope of his consent because they did not use the pre-search disk as he was told. The court disagreed, finding that the method in which the search was performed was irrelevant because the defendant knew that images would be searched and the officers searched only images and nothing more. Brooks, 427 F.3d at 1250. We find this case distinguishable from Berry, Lemmons, and Brooks because those cases dealt with general consents to search. Here, Detective Smith, by his own words, limited the scope of the intended computer search. Detective Smith specifically requested to search defendant's computer for viruses or key-logging programs to find out if defendant's credit card number had been stolen. The exchange between Detective Smith and defendant involved only an investigation of credit card fraud and the potential that someone had stolen defendant's credit card number by way of a computer virus. By Detective Smith's own description of the scanning programs that he normally used, the image scan disk searched images and Web site pages on the computer. According to Detective Smith's testimony, if an image came up with a Visa logo, Detective Smith could click on

-19-

No. 2--07--0724 it and he would be brought to the Web page of the vendor. He did not testify that the vendor Web page would indicate whether defendant's credit card number was compromised. In fact, according to defendant, who worked for Comcast, no image would lead Detective Smith to discover a virus that could steal defendant's credit card number, as viruses and key-logging programs are executable files and not embedded in any image. Defendant consented to a search only for viruses, not images. Thus, we find that Detective Smith's search exceeded the scope of defendant's consent. Our analysis is similar to the analysis in United States v. Richardson, 583 F. Supp. 2d 694, 716 (W.D. Pa. 2008). In Richardson, the police obtained consent to search the defendant's computer on the ground that they suspected "illegal" credit card activity over the Internet, insinuating that the defendant was a victim of credit card fraud. Richardson, 583 F. Supp. 2d at 713. The police then used a forensic image scanning disk to search the computer's hard drive for images, which the court determined exceeded the scope of the defendant's original consent to search for evidence of credit card fraud on the Internet. Richardson, 581 F. Supp. 2d at 716. The court noted that the officers chose to indicate to the defendant that they wanted to search for illegal credit card activity; they chose to impart to the defendant that he was a victim and not a suspect, and, thus, they chose to limit the scope of the search. Richardson, 581 F. Supp. 2d at 719. Likewise, Detective Smith made the same choices and must accept his self-imposed limitations on the search. The State mentions that defendant did not object to the search when he saw Detective Smith bringing up images and that his failure to do so expanded the scope of the consent. The State failed to cite to any authority on this issue. Failure to cite to any authority results in forfeiture of the argument. 210 Ill. 2d R. 341(h); People v. Emerson, 189 Ill. 2d 436, 478 (2000). Regardless, we reject the State's argument on this point. Defendants have the right to place explicit limitations on

-20-

No. 2--07--0724 the scope of their consent and have the right to withdraw consent once it is given. People v. Baltazar, 295 Ill. App. 3d 146, 151 (1998). However, police officers remain constrained by the bounds of reasonableness in conducting their searches. Baltazar, 295 Ill. App. 3d at 151. Defendant's failure to object once Detective Smith began his search did not serve to transform his original limited consent to search for evidence of credit card fraud into a general consent to search all types of files and images on his computer. See Baltazar, 295 Ill. App. 3d at 151-52 (finding the defendant's failure to object to the police's exceeding of scope of original consent did not transform limited consent to general consent). If Detective Smith wanted a general consent from defendant, he should have refrained from including limitations in his request. Having determined that Detective Smith exceeded the scope of defendant's consent, we review de novo the trial court's ultimate legal conclusion as to whether it should have granted defendant's motion to suppress, and we accordingly conclude that suppression was warranted. Further, the computer images were obtained through an illegal search, and defendant's ensuing statements were acquired within 24 hours of the search. The police did not present any new evidence to defendant in order to obtain his statements. As such, the evidence seized from defendant's home and his oral and written statements must be suppressed as there was no intervening event that broke the connection between the illegal search and the collection of evidence from the computers and his statements. See People v. Foskey, 136 Ill. 2d 66, 87 (1990) (finding that evidence obtained through illegal search and seizure must be suppressed unless there were intervening circumstances or events that were sufficient to purge the taint of the illegality). III. CONCLUSION Based on the foregoing reasons, we reverse the judgment of the circuit court of Kane County and remand for further proceedings consistent with this opinion. -21-

No. 2--07--0724 Reversed and remanded. SCHOSTOK, J., concurs. JUSTICE O'MALLEY, dissenting: Under the facts of this case, I would hold that any police deception had no bearing on the validity of defendant's consent, and I would hold that the search actually conducted fell within the scope of defendant's consent. I would therefore affirm defendant's conviction. I begin by discussing the effect of the alleged police deception on the validity of defendant's consent. Illinois law provides unclear guidance on the point. The law as recited by the majority says at once that "[c]onsent is not voluntary where it is the result of official coercion, intimidation, or deception" (Graf, 265 Ill. App. 3d at 750), that consent obtained by deception may be invalid (Daugherty, 161 Ill. App. 3d at 399), that deception is a factor to be considered in assessing the voluntariness of a confession (Minniti, 373 Ill. App. 3d at 69), and that police tactics are unconstitutional where they are "purely deceptive" (as opposed to partially deceptive). See slip op. at 14, 16-17. These cases (and the majority) offer little to explain their conflicting views of the effect of police deception on consent. I therefore offer my own analysis of the issue. Most authorities that would hold a consent procured by police deception to be invalid, including the Illinois cases cited by the majority, rely on the fourth and fourteenth amendment requirement that a consent be voluntary in order to be effective. Before the Supreme Court's 1973 decision in Schneckloth, which articulated the standards to be applied in determining the voluntariness of a consent to search, courts employed more elusive, and more subjective, measures of voluntariness. For example, in Alexander v. United States, 390 F.2d 101 (5th Cir. 1968), the Fifth Circuit rejected the argument that the defendant, who had been detained by postal inspectors, voluntarily consented to a search of his wallet, in part because the arrest may have coerced the -22-

No. 2--07--0724 consent and in part because the postal inspectors told the defendant that they were looking for stolen jewels when they were actually looking for stolen (and marked) cash. On the latter point, the court opined that "[i]ntimidation and deceit are not the norms of voluntarism" and that, "[i]n order for the response to be free, the stimulus must be devoid of mendacity." Alexander, 390 F.2d at 110. The court went on to analogize the defendant's consent to a "fraudulently induced contract," and it stated that condoning police deception of the type at issue would " ' "obliterate one of the most fundamental distinctions between our form of government, where officers are under the law, and the police-state where they are the law." ' " Alexander, 390 F.2d at 110, quoting United States v. Como, 340 F.2d 891, 894-95 (2d Cir. 1965), quoting Johnson v. United States, 333 U.S. 10, 17, 92 L. Ed. 436, 442, 68 S. Ct. 367, 370-71 (1948). The court thus concluded that " 'civilized standards of fundamental fairness' " required that the consent be deemed involuntary. Alexander, 390 F.2d at 110, quoting Como, 340 F.2d at 894-95. The Fifth Circuit's holding stood as a stern repudiation of consent induced by police deception of any kind. However, its reasoning was not unassailable, and its decision provided little practical guidance. On the former point, the analogy between consent to search on one hand and contract on the other has been rejected (see M. Friedman, Another Stab at Schneckloth: The Problem of Limited Consent Searches and Plain View Seizures, 89 J. Crim. L. & Criminology 313, 337 n.151 (1998) (hereinafter Friedman) (collecting cases)) and, in any event, is untenable due to the imbalance in bargaining power between police and suspect (Friedman, 89 J. Crim. L. & Criminology at 338) and also the failure of consideration. On the latter point, concepts of "fundamental fairness" prove too subjective to form the basis of a predictable standard for voluntariness. The Fifth Circuit found police deception antithetical to our notions of fairness, and other courts have since shared the opinion. For example, the Ninth Circuit has stated that individuals -23-

No. 2--07--0724 should be able to rely on government agents' representations and thus held it " 'clearly improper for a government agent to gain access to records which would otherwise be unavailable to him by invoking the private individual's trust in his government, only to betray that trust.' " United States v. Bosse, 898 F.2d 113, 115 (9th Cir. 1990), quoting Securities & Exchange Comm'n v. ESM Government Securities, Inc., 645 F.2d 310, 316 (5th Cir. 1981). However, other courts, including the Supreme Court, have taken a more practical view. See Sherman v. United States, 356 U.S. 369, 372, 2 L. Ed. 2d 848, 851, 78 S. Ct. 819, 820-21 (1958) (police inducement short of entrapment is acceptable because "[c]riminal activity is such that stealth and strategy are necessary weapons in the arsenal of a police officer"); United States v. Peters, 153 F.3d 445, 464 (7th Cir. 1998) (Easterbrook, J., concurring) ("Deception plays an important and legitimate role in law enforcement"); People v. Zamora, 940 P.2d 939, 942 (Colo. App. 1996) (collecting cases in which police deception leading to consent deemed fair or consent deemed voluntary); see also Model Penal Code,
Download People v. Prinzing.pdf

Illinois Law

Illinois State Laws
Illinois Tax
Illinois Court
Illinois Labor Laws
    > Minimum Wage in Illinois
Illinois Agencies
    > Illinois DMV

Comments

Tips