Davis v. Gracey , 111 F.3d 1472 ( 1997 )


Menu:
  •                           UNITED STATES COURT OF APPEALS
    Tenth Circuit
    Byron White United States Courthouse
    1823 Stout Street
    Denver, Colorado 80294
    (303) 844-3157
    Patrick J. Fisher, Jr.                                                        Elisabeth A.Shumaker
    Clerk                                                                         Chief Deputy Clerk
    May 13, 1997
    TO: All recipients of the captioned opinion
    RE: 95-6245, Davis v. Gracey
    April 21, 1997
    Please be advised of the following correction to the captioned decision:
    In the attorney designation section on the first page, the first name of
    Michael Salem, counsel for Plaintiffs-Appellants, is spelled incorrectly. On the
    top of page two, the designation of counsel for Defendants-Appellants should
    reflect her current married name, Stacey Haws Felkner.
    Please make the appropriate corrections.
    Very truly yours,
    Patrick Fisher, Clerk
    Susie Tidwell
    Deputy Clerk
    F I L E D
    United States Court of Appeals
    Tenth Circuit
    APR 21 1997
    PUBLISH
    PATRICK FISHER
    Clerk
    UNITED STATES COURT OF APPEALS
    TENTH CIRCUIT
    ANTHONY A. DAVIS, individually
    and doing business as Mid-America
    Digital Publishing Company, doing
    business as Oklahoma Information
    Exchange; GAYLA DAVIS, and
    JOHN BURTON, individuals; TSI
    TELECOMMUNICATION
    SPECIALISTS, INC., an Oklahoma
    corporation,
    Plaintiffs-Appellants,                          No. 95-6245
    v.
    ANTHONY GRACEY, MARK
    WENTHOLD, and GREGORY
    TAYLOR, Officers in their official
    capacities as Oklahoma City Police
    Officers and as individuals,
    Defendants-Appellees,
    Appeal from the United States District Court
    for the Western District of Oklahoma
    (D.C. No. CIV-94-335-L)
    Michael Salem, Salem Law Offices, Norman, Oklahoma (William R. Holmes,
    Norman, Oklahoma, with him on the brief), for Plaintiffs-Appellants.
    Stacey Haws Felkner (Robert E. Manchester and Susan A. Knight, with her on the
    brief), of Manchester & Pignato, Oklahoma City, Oklahoma, for Defendants-Appellees.
    Before SEYMOUR, Chief Judge, BARRETT and LIVELY, * Senior Circuit
    Judges.
    SEYMOUR, Chief Judge.
    *
    The Honorable Pierce Lively, Senior United States Circuit Judge for the Sixth
    Circuit, sitting by designation.
    -3-
    Anthony Davis operated a large computer bulletin board system in
    Oklahoma City. After Mr. Davis sold obscene CD-ROMs to an undercover
    officer, a warrant was obtained to search his business premises. During the
    execution of the warrant, police officers determined pornographic CD-ROM files
    could be accessed through the bulletin board and seized the computer equipment
    used to operate it. Following his criminal conviction and civil forfeiture of the
    computer equipment in state court proceedings, Mr. Davis, his related businesses,
    and several users of electronic mail (e-mail) on his bulletin board brought this
    action in federal court against the officers who executed the search, alleging that
    the seizure of the computer equipment, and e-mail and software stored on the
    system, violated several constitutional and statutory provisions. The district court
    granted summary judgment for the officers. We affirm.
    I
    Background
    Mr. Davis operated the Oklahoma Information Exchange, a computer
    bulletin board system. Computer users could subscribe to the bulletin board, dial
    in using a modem, then use the system to send and receive messages via e-mail,
    -4-
    access the Internet, utilize on-line databases, and download or upload software.
    According to Mr. Davis, approximately 2000 subscribers used his bulletin board.
    In April 1993, the Oklahoma City Police Department received an
    anonymous tip that Mr. Davis was selling obscene CD-ROMs from his business
    premises. On three different occasions, an undercover officer purchased “adult”
    CD-ROMs directly from Mr. Davis. During one of these visits, Mr. Davis
    mentioned to the officer that he operated a bulletin board, and that similar
    pornographic images could be accessed by dialing in to the bulletin board. The
    officer never actually saw the computer equipment used to operate the bulletin
    board. In his affidavit for a search warrant, the officer did not mention the
    possibility that a bulletin board was being operated on the premises, or the
    possibility that this bulletin board could be used to distribute or display
    pornographic images. A judge determined that two CD-ROMs acquired from Mr.
    Davis were obscene, and issued a warrant to search his business premises for
    pornographic CD-ROMs and “equipment, order materials, papers, membership
    lists and other paraphernalia pertaining to the distribution or display of
    pornographic material in violation of state obscenity laws set forth in O.S. Title
    21-1024.1.” Aplee. supp. app., vol. I at 45.
    Several officers, including defendants Anthony Gracey and Mark Wenthold,
    conducted the search at Mr. Davis’ business. During the search, the officers
    -5-
    discovered the bulletin board. Attached to it were CD-ROM drives housing
    sixteen CD-ROM discs, including four discs identified by Mr. Davis to the
    officers as containing pornographic material. The officers believed from the
    configuration of the bulletin board computers that the files accessible via the
    bulletin board included files from the four pornographic CD-ROMs. The officers
    called for assistance from officer Gregory Taylor, who was reputed to be more
    knowledgeable about computers than they were. He confirmed that the
    pornographic CD-ROMs could be accessed via the bulletin board. The officers
    seized the computer equipment used to operate the bulletin board, including two
    computers, as well as monitors, keyboards, modems, and CD-ROM drives and
    changers. The seizure of this computer equipment is the subject of the federal
    proceedings in this case.
    At the time of the seizure, the computer system contained approximately
    150,000 e-mail messages in electronic storage, some of which had not yet been
    retrieved by the intended recipients. The hard drive of the computer system also
    contained approximately 500 megabytes of software which had been uploaded
    onto the bulletin board by individual subscribers. Mr. Davis intended to republish
    this “shareware” on a CD-ROM for sale to the public. Mr. Davis had previously
    published three such compilations of shareware on CD-ROM.
    -6-
    Mr. Davis was convicted of several counts of possessing and distributing
    obscenity, and of using a computer to violate Oklahoma statutes. His conviction
    was upheld on appeal. Davis v. State, 
    916 P.2d 251
    , 254 (Okla. Crim. App.
    1996). The State also obtained civil forfeiture of the computer equipment used to
    operate the bulletin board. State ex rel. Macy v. One (1) Pioneer CD-ROM
    Changer, 
    891 P.2d 600
    , 607 (Okla. Ct. App. 1994). Law enforcement officials
    have apparently disclaimed any interest in the materials in electronic storage,
    either for purposes of evidence or forfeiture.
    Mr. Davis, Gayla Davis, John Burton, and TSI Telecommunications
    Specialists, Inc., 1 filed the instant suit in federal court alleging claims under 
    42 U.S.C. § 1983
     for violation of First and Fourth Amendment rights, and under the
    Privacy Protection Act (PPA), 42 U.S.C. §§ 2000aa - 2000aa-12, and the
    Electronic Communications Privacy Act (ECPA), 
    18 U.S.C. §§ 2510-2711
    . The
    crux of the complaint is that the seizure of the equipment was illegal because the
    warrant was not sufficiently particular and because the seized computer system
    contained e-mail intended for private subscribers to the bulletin board, and
    software intended for future publication by Mr. Davis. Plaintiffs contend these
    1
    Gayla Davis was, at the time of the search, Mr. Davis’ wife and co-owner of the
    Oklahoma Information Exchange bulletin board. TSI Telecommunications is a
    corporation owned by Anthony and Gayla Davis. The Davises and John Burton were
    users of the bulletin board.
    -7-
    stored electronic materials were outside the scope of the warrant, and are
    protected by several congressional enactments.
    Original defendants in this suit included the City of Oklahoma City, the
    Oklahoma City Police Department, and several officers of the Oklahoma City
    Police Department who executed the search and seizure of the computer
    equipment. The municipal entities were dismissed from the case. Plaintiffs do
    not dispute that their only remaining claims are against the officers in their
    individual capacities. The district court entered summary judgment for the
    officers, holding that their reliance on a valid warrant entitled them to qualified
    immunity on the constitutional claims, and entitled them to the statutory good
    faith defenses contained in the PPA and ECPA.
    II
    Preliminary Issues
    At the outset, we must note the narrow scope of our consideration of the
    issues before us. 2 We address here plaintiffs’ arguments only to the extent they
    concern the legality of the initial seizure of the computer equipment and the
    2
    Although plaintiffs have raised several new arguments on appeal, we dispose
    only of those arguments that were advanced in the district court in opposition to the
    officers’ motion for summary judgment. See Bancamerica Commercial Corp. v. Mosher
    Steel of Kansas, Inc., 
    100 F.3d 792
    , 798-99 (10th Cir. 1996).
    -8-
    electronic material stored therein. Plaintiffs make repeated references in their
    briefs to the retention by law enforcement authorities of the stored electronic
    material, and the failure of such authorities to copy or return the material when
    requested to do so. 3 A failure timely to return seized material which is without
    evidentiary value and which is not subject to forfeiture may state a constitutional
    or statutory claim. Cf. F ED . R. C RIM . P. 41 advisory committee’s note to 1989
    Amendment (stating that even when property is lawfully seized, “if the United
    States’ legitimate interests can be satisfied even if the property is returned,
    continued retention would become unreasonable”); In re Search of Kitty’s East,
    
    905 F.2d 1367
    , 1375 (10th Cir. 1990) (same). However, plaintiffs have made no
    allegation that defendant officers are persons with authority to return materials
    once seized. The City and the Police Department have been dismissed from this
    action. We therefore do not consider any potential violations of plaintiffs’
    constitutional or statutory rights that derive from failure or delay in returning or
    copying materials once seized. We address only those claims arising out of the
    initial seizure of the computer equipment in question.
    The officers assert that plaintiffs’ claims are barred by collateral estoppel
    and res judicata arising out of the state court criminal and forfeiture proceedings.
    3
    It is not clear from the record whether plaintiffs made a proper request for the
    return of the electronically stored materials, or only for the computer equipment
    generally. The latter was subject to forfeiture, and thus plaintiffs were not entitled to
    its return.
    -9-
    We “must give the same preclusive effect to state court judgments that those
    judgments would be given in the courts of the state in which the judgments were
    rendered.” Comanche Indian Tribe of Oklahoma v. Hovis, 
    53 F.3d 298
    , 302 (10th
    Cir. 1995). Collateral estoppel only applies to issues actually and necessarily
    determined in the prior proceeding. Laws v. Fisher, 
    513 P.2d 876
    , 877 (Okla.
    1973). The officers concede the earlier proceedings in state court did not resolve
    the statutory claims raised by plaintiffs. The Oklahoma Court of Criminal
    Appeals did not address the issues. The Oklahoma Court of Appeals addressing
    the civil forfeiture declined to determine if a claim was stated under the ECPA or
    PPA, holding only that if such claims existed they would not affect the legality of
    the computer equipment forfeiture. One (1) Pioneer CD-ROM Changer, 
    891 P.2d at 605-07
    . Moreover, collateral estoppel applies only to persons who were parties
    or in privity with parties to the prior proceeding. Laws, 513 P.2d at 877. Without
    deciding if other plaintiffs are estopped from asserting their various claims, at a
    minimum we are not persuaded the officers have established that Mr. Burton is in
    privity with Mr. Davis. Consequently, at least one plaintiff is able to assert each
    claim on appeal; for convenience we will refer throughout to plaintiffs
    collectively.
    We address in turn each of the claims remaining in this appeal. 4
    4
    On appeal, plaintiffs do not pursue a distinct First Amendment claim, although
    (continued...)
    -10-
    III
    Fourth Amendment
    The officers claim they are entitled to qualified immunity on the
    constitutional claims. We review de novo the district court’s grant of qualified
    immunity on summary judgment, viewing the evidence in the light most favorable
    to the nonmoving party. Romero v. Fay, 
    45 F.3d 1472
    , 1475 (10th Cir. 1995).
    “We analyze assertions of qualified immunity under a two-part framework: first
    we determine whether the plaintiff has asserted a violation of a constitutional or
    statutory right, and then we decide whether that right was clearly established such
    that a reasonable person in the defendant’s position would have known that her
    conduct violated the right.” Garramone v. Romo, 
    94 F.3d 1446
    , 1449 (10th Cir.
    1996) (citing Siegert v. Gilley, 
    500 U.S. 226
    , 231 (1991)). “[T]he plaintiff must
    articulate the clearly established constitutional right and the defendant’s conduct
    which violated the right with specificity.” Romero, 
    45 F.3d at 1475
    . Once the
    plaintiffs have met this initial burden, “the defendant must demonstrate that no
    material issues of fact remain as to whether his or her actions were objectively
    reasonable in light of the law and the information he or she possessed at the
    4
    (...continued)
    they do assert that First Amendment concerns animate Fourth Amendment jurisprudence
    and the statutory remedies provided in the Privacy Protection Act.
    -11-
    time.” Coen v. Runner, 
    854 F.2d 374
    , 377 (10th Cir. 1988). If we determine that
    plaintiffs have failed to show the officers’ conduct constituted a violation of a
    constitutional or statutory right, we need not address the other elements of the
    qualified immunity inquiry.
    Plaintiffs assert that the warrant did not specifically authorize the seizure of
    the computer equipment and thus was unconstitutionally overbroad. They suggest
    the officers misled the magistrate in procuring the warrant. Even if the warrant
    authorized the seizure of the computer equipment, plaintiffs contend the warrant
    should not have been executed in a manner resulting in the incidental seizure of e-
    mail and other files stored on the hardware which were clearly outside the scope
    of the warrant. We address each of the contentions in turn.
    A. The Warrant
    We review de novo whether the warrant was overbroad under the Fourth
    Amendment. United States v. Leary, 
    846 F.2d 592
    , 600 (10th Cir. 1988). “The
    fourth amendment requires that a search warrant describe the things to be seized
    with sufficient particularity to prevent a ‘general, exploratory rummaging in a
    person’s belongings.’” Voss v. Bergsgaard, 
    774 F.2d 402
    , 404 (10th Cir. 1985)
    (quoting Coolidge v. New Hampshire, 
    403 U.S. 443
    , 467 (1971)). “The
    particularity requirement ensures that a search is confined in scope to particularly
    -12-
    described evidence relating to a specific crime for which there is demonstrated
    probable cause.” 
    Id.
     “The requirement that warrants shall particularly describe
    the things to be seized makes general searches under them impossible and
    prevents the seizure of one thing under a warrant describing another. As to what
    is to be taken, nothing is left to the discretion of the officer executing the
    warrant.” Marron v. United States, 
    275 U.S. 192
    , 196 (1927).
    We have stated that “[t]he test applied to the description of the items to be
    seized is a practical one,” Leary, 
    846 F.2d at 600
    , and the language in warrants is
    to be read in a “common sense fashion,” In re Search of Kitty’s East, 
    905 F.2d at 1374
    . Thus, “‘[a] description is sufficiently particular when it enables the
    searcher to reasonably ascertain and identify the things authorized to be seized.’”
    Leary, 
    846 F.2d at 600
     (quoting United States v. Wolfenbarger, 
    696 F.2d 750
    , 752
    (10th Cir. 1982)) (internal quotation omitted). “As an irreducible minimum, a
    proper warrant must allow the executing officers to distinguish between items that
    may and may not be seized.” 
    Id. at 602
    . Moreover, “[e]ven a warrant that
    describes the items to be seized in broad or generic terms may be valid ‘when the
    description is as specific as the circumstances and the nature of the activity under
    investigation permit.’” 
    Id. at 600
     (quoting United States v. Santarelli, 
    778 F.2d 609
    , 614 (11th Cir. 1985)).
    -13-
    Plaintiffs suggest that the warrant’s failure to indicate explicitly that
    “equipment” encompassed computer equipment or electronics was a fatal defect.
    We do not agree. We ask two questions: did the warrant tell the officers how to
    separate the items subject to seizure from irrelevant items, and were the objects
    seized within the category described in the warrant? Here, we answer both of
    these questions in the affirmative. The warrant directed the officers to search for
    “equipment . . . pertaining to the distribution or display of pornographic material
    in violation of state obscenity laws set forth in O.S. Title 21-1024.1.” Aplee.
    supp. app., vol. I, at 45. Computer equipment which fell into this category could
    be legally seized. Plaintiffs do not dispute that the bulletin board could be used
    for dial-in access to and copying of pornographic files from the loaded CD-
    ROMs. The seized computer equipment fell within the scope of the warrant.
    Alternatively, plaintiffs argue that if the computer equipment was
    encompassed in the language of the warrant, the warrant was overly broad. We
    disagree. The description given in the warrant was sufficient to provide a
    meaningful limitation on the search, and was far narrower than those we have
    found lacking sufficient particularity. We have invalidated warrants for
    overbreadth where the language of the warrants authorized the seizure of
    “virtually every document that one might expect to find in a . . . company’s
    office,” including those with no connection to the criminal activity providing the
    -14-
    probable cause for the search. Leary, 
    846 F.2d at 602
    ; see also Voss, 
    774 F.2d at 405
    . We have also held that an “unadorned reference to a broad federal statute
    does not sufficiently limit the scope of a search warrant.” Leary, 
    846 F.2d at 602
    ;
    see also United States v. Brown, 
    984 F.2d 1074
    , 1077 (10th Cir. 1993) (holding
    overbroad language authorizing a search for “other item which the officers
    determine or have reasonable belief is stolen”). Similarly, the Ninth Circuit
    found insufficiently particular a warrant which “authorized the seizure of virtually
    every document and computer file” at the target company. United States v. Kow,
    
    58 F.3d 423
    , 427 (9th Cir. 1995). The court emphasized that the warrant
    “contained no limitations on which documents within each category could be
    seized or suggested how they related to specific criminal activity.” 
    Id.
    The warrant here was confined to that equipment “pertaining to the
    distribution or display of pornographic material.” Aplee. supp. app., vol. I at 45.
    This description included only that equipment directly connected to the suspected
    criminal activity, not a wide range of equipment used for purposes unrelated to
    the suspected criminal activity. Nor did it encompass all the equipment one might
    expect to find at a legitimate business. Furthermore, the criminal activity
    referenced in the warrant was very narrow, providing a ready guide to determine
    if a given item was one that might be the instrument or evidence of the criminal
    activity. The warrant was not overbroad.
    -15-
    Our approval of the particularity of the warrant is bolstered by the
    execution of the search itself. The officers did not conduct a general search of
    the premises. They left behind approximately 2000 CD-ROM discs that Mr.
    Davis represented to be of his own manufacture and non-pornographic in nature.
    There is no evidence the officers attempted to search or seize computer equipment
    that was not connected to the CD-ROM drives or the bulletin board. The
    executing officers consulted with a more expert officer to confirm that the
    computer equipment was in fact used to distribute or display pornographic
    material and therefore fell within the scope of the warrant. If the executing
    officers had flagrantly disregarded the limitations of the warrant, an otherwise
    constitutional warrant might have been transformed into a general search. United
    States v. Medlin, 
    842 F.2d 1194
    , 1199 (10th Cir. 1988). There is no indication of
    such behavior here.
    B. The Warrant Application
    Plaintiffs also infer that the magistrate was misled by the failure of the
    affidavit for the warrant to mention either the possible existence of the bulletin
    board, or the possible distribution of pornography via computer, when the
    -16-
    swearing officer knew of these possibilities. However, plaintiffs do not suggest
    the magistrate was unaware that “equipment . . . pertaining to the . . . display of
    pornographic material” contained on CD-ROM discs was likely to include
    computers and related accessories. Indeed, the affidavit informed the magistrate
    that the swearing officer viewed one of the obscene discs “on a computer with a
    CD-ROM drive.” Aplee. supp. app., vol. I at 43.
    Plaintiffs assert that because the officers knew about the bulletin board but
    did not include this knowledge in the affidavit supporting the warrant their
    reliance on the warrant could not be in good faith. “Only where the warrant
    application is so lacking in indicia of probable cause as to render official belief in
    its existence unreasonable . . . will the shield of immunity be lost.” Malley v.
    Briggs, 
    475 U.S. 335
    , 344-45 (1986) (citing United States v. Leon, 
    468 U.S. 897
    ,
    923 (1984)). The warrant was amply supported by probable cause. Plaintiffs
    have offered no theory why a reasonable officer would believe that omitting
    mention of the bulletin board would vitiate the probable cause contained in the
    affidavit. Plaintiffs’ argument reduces to the narrow claim that the warrant was
    invalid because the affidavit failed to recite that a computer system might also be
    configured to allow remote viewing of the pornographic material via a computer
    bulletin board. We decline to invalidate a warrant supported by probable cause
    simply because officers executing it suspect, and then discover, that the target of
    -17-
    the search has employed an unstated methodology for using the objects specified
    in the warrant for commission of the crime referenced in the warrant.
    C. Incidental Seizure of Electronically Stored Materials
    Plaintiffs appear to argue that even if the warrant authorized the seizure of
    the computer equipment, such a seizure was nonetheless illegal because of the
    concomitant incidental seizure of e-mail and software stored therein. 5 We can
    discern no doctrinal support for this proposition. The argument appears to draw
    its force from plaintiffs’ efforts to distinguish between the computer hardware--
    the “container”--and its contents. They repeatedly urge that the seizure was
    unlawful because no probable cause was asserted to seize the contents
    independent of the probable cause asserted to seize the computer equipment. The
    question then is whether the incidental temporary seizure of stored electronic
    materials invalidated the seizure of the computer within which they were stored.
    We hold that it did not.
    Plaintiffs’ argument fails for the simple reason that the computer equipment
    was more than merely a “container” for the files; it was an instrumentality of the
    crime. In the typical case, the probable cause supporting seizure of a container is
    probable cause to believe that the container’s contents include contraband or
    5
    We consider below the similar issues raised by plaintiffs’ statutory claim under
    the ECPA.
    -18-
    evidentiary material. Here, in contrast, the probable cause supporting the seizure
    of the computer/container related to the function of the computer equipment in
    distributing and displaying pornographic images, not to its function in holding the
    stored files. The fact that a given object may be used for multiple purposes, one
    licit and one illicit, does not invalidate the seizure of the object when supported
    by probable cause and a valid warrant.
    We also note the obvious difficulties attendant in separating the contents of
    electronic storage from the computer hardware during the course of a search.
    Perhaps cognizant of the potential burdens of equipment, expertise, and time
    required to access, copy, or remove stored computer files, plaintiffs have not
    suggested any workable rule. In short, we can find no legal or practical basis for
    requiring officers to avoid seizing a computer’s contents in order to preserve the
    legality of the seizure of the computer hardware.
    In any event, we are well able to distinguish between the legality of the
    initial seizure of a container, and any subsequent search or retention of the
    contents. See, e.g., United States v. Corral, 
    970 F.2d 719
    , 725 (10th Cir. 1992);
    United States v. Donnes, 
    947 F.2d 1430
    , 1436 (10th Cir. 1991). Even in the
    typical case, seizure of a container need not be supported by probable cause to
    believe that all of the contents of the container are contraband. The seizure of a
    container is not invalidated by the probability that some part of its “innocent”
    -19-
    contents will be temporarily detained without independent probable cause. We
    will not hold unlawful the otherwise constitutional seizure of the computer
    equipment in order to prevent the temporary deprivation of plaintiffs’ rights to the
    contents. However, our conclusion that the seizure of the computer equipment
    pursuant to a warrant here allowed the incidental seizure of files stored therein
    should not be read as approval of any subsequent efforts by the police to search or
    retain the stored files without a warrant. 6
    Finally, plaintiffs suggest that once the CD-ROMs and CD-ROM drives
    were seized, the officers lacked cause to remove the remainder of the computer
    equipment. Again, we are unable to discern a practical or doctrinal basis for this
    proposed rule of minimization. The computer equipment as a whole was an
    instrumentality of the crime of distributing obscenity, and the equipment was
    covered by the warrant.
    Viewing the evidence in the light most favorable to plaintiffs, the conduct
    of the officers did not rise to a constitutional violation. The district court
    therefore properly granted summary judgment to the officers on plaintiffs’
    constitutional claim.
    6
    Not only is there no evidence that the officers ever read the e-mail or files in
    question, the law enforcement personnel involved in this action repeatedly, both in state
    and federal court, disclaimed any interest in the contents thereof.
    -20-
    IV
    Privacy Protection Act
    Plaintiffs assert that the seizure of the stored electronic materials
    constituted a violation of the Privacy Protection Act (PPA), 42 U.S.C. §§ 2000aa -
    2000aa-12. The PPA provides that
    it shall be unlawful for a government officer or employee, in
    connection with the investigation or prosecution of a criminal
    offense, to search for or seize any work product materials possessed
    by a person reasonably believed to have a purpose to disseminate to
    the public a newspaper, book, broadcast, or other similar form of
    publication.
    42 U.S.C. 2000aa(a). 7 The PPA requires law enforcement officers, absent exigent
    circumstances, id. § 2000aa(a)(2), to rely on subpoenas to acquire materials
    intended for publication unless “there is probable cause to believe that the person
    possessing [work product] materials has committed or is committing the criminal
    offense to which the materials relate,” id. § 2000aa(a)(1).
    The statute creates a civil cause of action for damages resulting from a
    search or seizure of materials in violation of the Act. Id. § 2000aa-6. This cause
    of action is available against the United States, against a State (if the State has
    7
    The PPA also provides protection to “documentary materials, other than work
    product materials,” which are not themselves intended for publication but which are
    “possessed . . . in connection with a purpose to disseminate” a public communication.
    42 U.S.C. § 2000aa(b).
    -21-
    waived sovereign immunity), or against “any other governmental unit.” Id. §
    2000aa-6(a)(1). A cause of action is available against the officers or employees
    of a State only if the State has not waived its sovereign immunity. Id. 2000aa-
    6(a)2). 8 The Act provides that “[i]t shall be a complete defense to a civil action
    [against a government officer or employee] that the officer had a reasonable good
    faith belief in the lawfulness of his conduct.” 42 U.S.C. § 2000aa-6(b). The
    district court here granted summary judgement for the officers, holding them
    entitled to the good faith defense due to their reliance on a warrant.
    We hold instead that we lack subject matter jurisdiction over defendant
    officers under the PPA. The statute provides:
    8
    Section 2000aa-6(a) reads in full:
    Civil actions by aggrieved persons
    (a) Right of action
    A person aggrieved by a search for or seizure of materials in
    violation of this chapter shall have a civil cause of action for damages for
    such search or seizure--
    (1) against the United States, against a State which
    has waived its sovereign immunity under the Constitution to
    a claim for damages resulting from a violation of this
    chapter, or against any other governmental unit, all of which
    shall be liable for violations of this chapter by their officers
    or employees while acting within the scope or under color of
    their office or employment; and
    (2) against an officer or employee of a State who has
    violated this chapter while acting within the scope or under
    color of his office or employment, if such State has not
    waived its sovereign immunity as provided in paragraph (1).
    42 U.S.C. 2000aa-6(a).
    -22-
    The remedy provided by [section 2000aa-6(a)(1)] against the United
    States, a State, or any other governmental unit is exclusive of any
    other civil action or proceeding for conduct constituting a violation
    of this chapter, against the officer or employee whose violation gave
    rise to the claim, or against the estate of such officer or employee.
    Id. § 2000aa-6(d). Thus, an action under the PPA may only be brought against
    the governmental entity, unless the state has not waived sovereign immunity in
    which event state employees may be sued. Id. § 2000aa-6(a)(2). The PPA by its
    terms does not authorize a suit against municipal officers or employees in their
    individual capacities. The statute therefore provides no cause of action against
    these defendants. Although the parties stipulated below to subject-matter
    jurisdiction, “no action of the parties can confer subject-matter jurisdiction upon a
    federal court,” Insurance Corp. of Ireland v. Compagnie des Bauxites de Guinee,
    
    456 U.S. 694
    , 702 (1982). We dismiss the PPA claim for lack of subject-matter
    jurisdiction.
    V
    Electronic Communications Privacy Act
    Plaintiffs claim that the seizure of the e-mail on the bulletin board violated
    the Electronic Communications Privacy Act (ECPA), 
    18 U.S.C. §§ 2510-2711
    .
    -23-
    Title II of the ECPA, 
    id.
     §§ 2701-2711, bars unauthorized access to stored
    electronic communications. Section 2701 provides criminal penalties for whoever
    (1) intentionally accesses without authorization a facility
    through which an electronic communication service is provided; or
    (2) intentionally exceeds an authorization to access that
    facility; and thereby obtains, alters, or prevents authorized access to
    a wire or electronic communication while it is in electronic storage in
    such system.
    Id. § 2701(a). In addition to criminal penalties, the ECPA provides a civil cause
    of action for “any provider of electronic communication service, subscriber, or
    other person aggrieved by any violation of this chapter.” Id. § 2707(a). However,
    “[a] good faith reliance on . . . a court warrant or order . . . is a complete defense
    to any civil or criminal action brought under this chapter or any other law.” Id. §
    2707(e).
    Plaintiffs contend that by seizing the e-mail and dismantling the bulletin
    board, the officers “obtain[ed] . . . or prevent[ed] authorized access to a[n] . . .
    electronic communication while it is in electronic storage” within the meaning of
    section 2701(a). 9 This claim raises a question of first impression in this or any
    9
    We note that section 2703 establishes the requirements for governmental access
    to the contents of electronic communications held in electronic storage. 
    18 U.S.C. § 2703
     (see note 11 infra). The State disclaimed any interest in the contents of the seized
    e-mail and did not seek forfeiture of the e-mail. Defendant officers also disclaim any
    such interest. Plaintiffs have not alleged that the officers have attempted to access or
    read the seized e-mail. The gravamen of the complaint is not unauthorized
    governmental access to the contents of the e-mail, but seizure of the e-mail and its
    delivery system which prevented access by the intended recipients.
    -24-
    circuit. There are few cases interpreting the reach of the substantive provisions
    of the ECPA or applying the good faith defense to violations of Title II of the
    ECPA, although a body of decisions does address the parallel good faith defense
    in Title I of the ECPA, 
    18 U.S.C. § 2520
    (d). 10 See, e.g., Heggy v. Heggy, 
    944 F.2d 1537
    , 1541-42 (10th Cir. 1991); Halperin v. Kissinger, 
    807 F.2d 180
    , 183-88
    (D.C. Cir. 1986); Campiti v. Walonis, 
    611 F.2d 387
    , 394-95 (1st Cir. 1979).
    Plaintiffs rely heavily on the decision in Steve Jackson Games, Inc. v.
    United States Secret Serv., 
    816 F. Supp. 432
     (W.D.Tex. 1993), aff’d, 
    36 F.3d 457
    (5th Cir. 1994), which contains the most extensive discussion of the substantive
    provisions of the ECPA we have found. In that case, federal law enforcement
    officers sought a sensitive computer document stolen by computer hackers as well
    as evidence of related codebreaking activity. The officers had reason to believe
    that a suspect employed by Steve Jackson Games may have uploaded such
    documents to the company’s computer bulletin board, which the suspect used and
    helped operate. No illegal activity by the company itself was alleged. The
    officers obtained a warrant to seize a variety of computer files and documents
    10
    The earlier version of Title I of the ECPA is commonly referred to as part of
    Title III of the Omnibus Crime Control and Safe Streets Act. In their First Amended
    Complaint, plaintiffs also alleged a claim for illegal interception of electronic
    communications under Title I of the ECPA, 
    18 U.S.C. §§ 2510-2521
    . Title I amended
    Title III of the Omnibus Crime Control and Safe Streets Act governing the use of
    wiretapping. The district court held that the seizure here did not constitute an
    “interception” and granted summary judgment to the officers on that claim. Plaintiffs
    do not appeal on that issue.
    -25-
    from the company’s bulletin board. The trial court found that, despite their
    denials, Secret Service personnel did in fact read all electronic communications
    seized, including private e-mail not mentioned in the search warrant or affidavit,
    and also deleted some of the seized files. The court held that the Secret Service’s
    conduct with respect to the private e-mail failed to comply with the requirements
    of Title II of the ECPA relating to the disclosure of the contents of stored
    electronic communications, 
    18 U.S.C. § 2703
    . The court also declined to find the
    defendants entitled to a good faith defense for their reliance on the search
    warrant. Although the Title II issue was not appealed, the circuit court in its
    discussion of other issues on appeal referred approvingly to the district court’s
    conclusion “that Title II of the ECPA clearly applies to the conduct of the Secret
    Service.” Steve Jackson Games, Inc. v. United States Secret Serv., 
    36 F.3d 457
    ,
    462 (5th Cir. 1994).
    We do not find this scant precedent helpful. The circumstances here are far
    different from those in Steve Jackson Games. Most centrally, that case involved
    both a seizure of electronic communications and the subsequent review, reading,
    and deletion of files in electronic storage. The court focused on the provisions of
    section 2703, which establishes the procedures for government access to “the
    contents of an electronic communication.” 11 We assume without deciding that an
    11
    Titled, “Requirements for governmental access,” section 2703 reads:
    (continued...)
    -26-
    additional warrant in compliance with section 2703 would have been required for
    the law enforcement officials in the instant case to gain access to the contents of
    the seized e-mail. Plaintiffs have not alleged that the officers attempted to access
    or read the seized e-mail, and the officers disclaimed any interest in doing so. We
    are therefore faced with the entirely distinct question of whether an incidental
    seizure of electronic communications, standing alone, is a violation of the ECPA.
    Section 2703 does not appear to address this situation. 12
    11
    (...continued)
    (a) Contents of electronic communications in electronic storage.--A
    governmental entity may require the disclosure by a provider of electronic
    communication service of the contents of an electronic communication,
    that is in electronic storage in an electronic communications system for
    one hundred and eighty days or less, only pursuant to a warrant . . . . A
    governmental entity may require the disclosure by a provider of electronic
    communications services of the contents of an electronic communication
    that has been in electronic storage . . . for more than one hundred and
    eighty days by the means available under subsection (b) . . . .
    (b) Contents of electronic communications in a remote computing
    service.--(1) A governmental entity may require a provider of remote
    computing service to disclose the contents of any electronic
    communication . . . --
    (A) without required notice to the subscriber or customer, if
    the governmental entity obtains a warrant . . . .
    
    18 U.S.C. § 2703
     (emphasis added).
    12
    The various provisions of section 2703 refer repeatedly to the procedure by
    which the government may require a service provider to disclose communications or
    information of a subscriber or customer. The section provides a mechanism for a
    service provider to contest such a requirement, § 2703(d), and shields the service
    provider from liability for cooperating with the government pursuant to a court order, §
    2703(e). Steve Jackson Games involved the seizure and subsequent search of e-mail
    from a bulletin board where the owner of the bulletin board was not a suspect in the
    crime. Steve Jackson Games, Inc. v. United States Secret Serv., 
    816 F. Supp. 432
    , 436
    (continued...)
    -27-
    We assume without deciding that plaintiffs have described conduct which
    constitutes a violation of section 2701, that is, that the officers “intentionally
    access[ed] without authorization a facility through which an electronic
    communication service is provided . . . and thereby . . . prevent[ed] authorized
    access to a wire or electronic communication while it [was] in electronic storage
    in such a system.” 
    18 U.S.C. § 2701
    (a). 13 We further accept as true plaintiffs’
    assertion that a reasonable officer with the computer skills of defendant officers
    should have known that seizure of computer hardware would result in the seizure
    and disruption of e-mail. Nevertheless, we hold that the officers were entitled to
    summary judgment because they qualify for the statutory good faith defense as a
    matter of law.
    Plaintiffs suggest that the officers could have made a lawful seizure of the
    electronically stored communications only by satisfying one of the listed
    12
    (...continued)
    n.4 (W.D. Texas 1993), aff’d, 
    36 F.3d 457
     (5th Cir. 1994). Here, the provider of the
    bulletin board was himself the target of the investigation, and the computer equipment
    storing the electronic communications was an instrumentality of the crime subject to
    seizure pursuant to a valid warrant.
    13
    We note it is unclear whether this section was intended to apply to the sort of
    law enforcement activities involved here. Cf. State Wide Photocopy Corp. v. Tokai Fin.
    Servs., Inc., 
    909 F. Supp. 137
    , 145 (S.D.N.Y. 1995) (“[I]t appears that the ECPA was
    primarily designed to provide a cause of action against computer hackers, (i.e.,
    electronic trespassers).”). It is also unclear whether the term “access” encompasses the
    simple physical dismantling of the operating hardware.
    -28-
    exceptions to liability under section 2701 of the ECPA. 14 The exceptions listed
    contemplate that no liability attaches for “obtain[ing], alter[ing] or prevent[ing]
    authorized access to a . . . electronic communication,” § 2701(a), if such
    disruption is incident to the government’s access to the contents through the
    procedures for disclosing, § 2703, copying, § 2704, or intercepting, § 2518. In
    short, these exceptions all excuse government officers from liability based upon a
    required showing to a magistrate that the intrusive activity is necessary for a law
    enforcement purpose.
    In addition to the enumerated exceptions, however, the statute contains the
    general good faith defense of section 2707(e) for reliance on a warrant. The
    officers relied on the warrant to seize the computer equipment, and the seizure of
    the stored electronic communications was incidental to the execution of the
    warrant. To be in good faith, the officers’ reliance must have been objectively
    reasonable. Malley v. Briggs, 
    475 U.S. at 344-45
    . We have already concluded in
    our discussion of plaintiffs’ Fourth Amendment claim that the warrant was valid
    14
    Section 2701(c) reads:
    Exceptions.--Subsection (a) of this section does not
    apply with respect to conduct authorized--
    (1) by the person or entity providing a wire or
    electronic communications service;
    (2) by a user of that service with respect to a
    communication of or intended for that user; or
    (3) in section 2703, 2704 or 2518 of this title.
    -29-
    and encompassed the computer equipment. The officers’ reliance on the warrant
    was therefore objectively reasonable.
    Finally, plaintiffs contend the officers are not entitled to a good faith
    defense because they did not inform the magistrate of the possible existence of
    the stored electronic communications. We have held in our discussion of
    plaintiffs’ constitutional claim that plaintiffs’ inference of subjective bad faith in
    the officers’ omission of information from the affidavit does not eliminate the
    officers’ ability to rely on a valid warrant supported by probable cause. The
    plaintiffs have not persuaded us the statute imposes a requirement stricter than the
    Fourth Amendment in this respect. To the extent plaintiffs’ contention is based
    on their view that the warrant must contain probable cause to seize the contents
    independent of the probable cause supporting the seizure of the computer, we
    have likewise concluded otherwise. The officers established a good faith defense
    as a matter of law. 15
    15
    We reiterate that we do not address here any potential statutory liability for
    failure to promptly copy or return stored electronic communications pursuant to a
    proper request to do so.
    -30-
    VI
    Conclusion
    We hold that the officers’ reliance on a valid warrant entitled them to
    qualified immunity on plaintiffs’ Fourth Amendment claim, and established a
    good faith defense under the ECPA. 16 We also hold that we lack subject matter
    jurisdiction over plaintiffs’ asserted claim against the officers under the PPA. We
    AFFIRM the district court’s entry of summary judgment for the officers.
    16
    Although we have determined here that plaintiffs failed to allege conduct which
    created constitutional or statutory liability, we note that salutary benefits may accrue
    from a practice in the application for warrants of informing magistrates as fully as
    practicable of the officer’s knowledge of the possible presence of publication materials
    or equipment for electronic storage or communication. Other cases may present closer
    questions of the applicability of required statutory procedures. Sufficient information
    will enable magistrates to set bounds which will minimize the potential for liability
    arising out of the initial search and seizure, or the post-seizure disposition of seized
    materials.
    -31-
    

Document Info

Docket Number: 95-6245

Citation Numbers: 111 F.3d 1472, 1997 WL 192018

Judges: Seymour, Barrett, Lively

Filed Date: 4/21/1997

Precedential Status: Precedential

Modified Date: 11/4/2024

Authorities (25)

Francesco G. Campiti v. Michael A. Walonis , 58 A.L.R. Fed. 579 ( 1979 )

Marron v. United States , 48 S. Ct. 74 ( 1927 )

Bancamerica Commercial Corp. v. Mosher Steel of Kansas, Inc. , 100 F.3d 792 ( 1996 )

In Re the Matter of the Search of Kitty's East, 735 E. ... , 905 F.2d 1367 ( 1990 )

george-coen-v-william-runner-superintendent-of-brand-inspectors-for , 854 F.2d 374 ( 1988 )

Coolidge v. New Hampshire , 91 S. Ct. 2022 ( 1971 )

Garramone v. Romo , 94 F.3d 1446 ( 1996 )

United States v. Dominic Santarelli , 778 F.2d 609 ( 1985 )

Morton H. Halperin v. Henry A. Kissinger , 807 F.2d 180 ( 1986 )

Steve Jackson Games, Inc. v. United States Secret Service , 36 F.3d 457 ( 1994 )

United States v. Richard J. Leary, and F.L. Kleinberg & Co. , 846 F.2d 592 ( 1988 )

State Ex Rel. MacY v. One (1) Pioneer CD-ROM Changer, Mdl. ... , 66 O.B.A.J. 884 ( 1994 )

United States v. Leon , 104 S. Ct. 3405 ( 1984 )

Steve Jackson Games, Inc. v. United States Secret Service , 816 F. Supp. 432 ( 1993 )

United States v. Arvle Edgar Medlin , 842 F.2d 1194 ( 1988 )

United States v. Cruz Corral , 970 F.2d 719 ( 1992 )

comanche-indian-tribe-of-oklahoma-a-federally-recognized-indian-tribe-v , 53 F.3d 298 ( 1995 )

Catherine A. Heggy v. T.L. Heggy , 944 F.2d 1537 ( 1991 )

United States v. Edward Lee Donnes , 947 F.2d 1430 ( 1991 )

john-a-voss-john-e-grandbouche-joseph-p-gorman-sandra-l-gorman , 774 F.2d 402 ( 1985 )

View All Authorities »