People v. McCavitt , 2021 IL 125550 ( 2021 )


Menu:
  •                                      
    2021 IL 125550
    IN THE
    SUPREME COURT
    OF
    THE STATE OF ILLINOIS
    (Docket No. 125550)
    THE PEOPLE OF THE STATE OF ILLINOIS, Appellant, v.
    JOHN T. McCAVITT, Appellee.
    Opinion filed October 21, 2021.
    JUSTICE MICHAEL J. BURKE delivered the judgment of the court, with
    opinion.
    Chief Justice Anne M. Burke and Justices Garman, Theis, Overstreet, and
    Carter concurred in the judgment and opinion.
    Justice Neville dissented, with opinion.
    OPINION
    ¶1      The Illinois State Police obtained warrants to seize and search a personal
    computer owned by defendant, John T. McCavitt, an officer of the Peoria Police
    Department. The warrant at issue in this appeal authorized law enforcement to
    search the computer for digital evidence of two unrelated incidents: the aggravated
    criminal sexual assault of a named victim and the unauthorized video recording and
    live video transmission of an unnamed victim. Defendant was tried and acquitted
    of the alleged sexual assault before the unauthorized video recording was
    investigated.
    ¶2       Following defendant’s acquittal and without seeking a new warrant, the Peoria
    Police Department acquired and searched a copy of the computer’s hard drive,
    uncovering evidence of the unauthorized video recording. The digital search also
    uncovered child pornography, which was not mentioned in the warrant.
    ¶3       Based on the images, defendant was convicted of several counts of child
    pornography. The appellate court reversed the judgment on the ground that the
    search violated the fourth amendment (U.S. Const., amend. IV). 
    2019 IL App (3d) 170830
    , ¶ 32.
    ¶4       This appeal concerns the extent to which defendant’s acquittal in the sexual
    assault proceedings affected his expectation of privacy in his computer data and
    whether the fourth amendment required the police to obtain a new warrant before
    searching the same data for evidence of another crime. The outcome turns on the
    interplay of four concepts: (1) a person’s reasonable expectation of privacy in data
    on an electronic storage device that is subject to search, (2) double jeopardy
    principles, (3) the fourth amendment’s particularity requirement as applied to
    electronic storage devices, and (4) the plain view doctrine.
    ¶5       In People v. Hughes, 
    958 N.W.2d 98
    , 104 (Mich. 2020) (en banc), the Michigan
    Supreme Court cogently explained that a search of an electronic storage device
    pursuant to a warrant must be reasonably directed at obtaining evidence relevant to
    the criminal activity alleged in the warrant. A search of digital data that is directed
    instead at uncovering evidence of criminal activity not identified in the warrant is
    effectively a warrantless search that violates the fourth amendment absent some
    exception to the warrant requirement. 
    Id.
    ¶6       The warrant at issue diminished defendant’s reasonable expectation of privacy
    in the images and videos he stored on his computer. When defendant was acquitted
    of the sexual assault, his reasonable expectation of privacy in his data relating to
    that offense was restored. However, the acquittal did not resolve the portion of the
    -2-
    warrant that authorized a search for digital evidence of the unauthorized video
    recording. The post-acquittal computer examination was reasonably directed at
    obtaining evidence of the unauthorized video recording, and the child pornography
    that was uncovered during the search was admissible because the images were
    found in plain view.
    ¶7         We hold that, under the unique facts of this case, the search that uncovered the
    child pornography did not violate defendant’s fourth amendment rights. Therefore,
    we affirm the circuit’s court’s order denying defendant’s motion to suppress the
    images and reverse the appellate court’s judgment reversing that order.
    ¶8                                      I. BACKGROUND
    ¶9         This appeal is part of a series of three criminal prosecutions against defendant.
    All three are based on incriminating images and video uncovered on defendant’s
    computer.
    ¶ 10       Defendant was charged in Peoria County case No. 13-CF-741 with aggravated
    criminal sexual assault (720 ILCS 5/11-1.30(a)(4) (West 2012)) and criminal
    sexual assault (id. § 11-1.20(a)(1)). Following defendant’s acquittal in that case, the
    Peoria Police Department launched an internal investigation of defendant, which
    led to the discovery of additional incriminating images and video. The investigation
    was suspended when defendant was charged. He was ultimately convicted of (1) the
    unauthorized video recording of two women (Peoria County case No. 14-CF-203)
    and (2) child pornography in this case (Peoria County case No. 14-CF-282).
    ¶ 11                          A. Peoria County Case No. 13-CF-741
    ¶ 12       Initially, defendant was investigated for criminal sexual assault against A.K., a
    female houseguest who was a friend and coworker of defendant’s live-in girlfriend,
    Rachel Broquard. On July 17, 2013, the Illinois State Police obtained a warrant to
    search defendant’s home for evidence of the alleged sexual assault, which
    defendant did not challenge.
    ¶ 13      The complaint for the warrant described A.K.’s account of the events. A.K.
    reported that defendant sexually assaulted her around 6 a.m. that day. A.K.,
    -3-
    Broquard, and defendant had gone out the previous night to celebrate with another
    coworker who was departing for graduate school. At approximately 4 a.m., A.K.,
    Broquard, and defendant arrived at his residence and continued socializing. At
    5:15 a.m., A.K. lay down, fully clothed, under the covers of a bed in a guest
    bedroom. A short time later, she awoke facedown wearing only her bra, which was
    pushed up. A.K. was in four-point restraints, and a black sleeping mask covered her
    head. She heard a “snap” that she believed to be from the cap of a lubricant
    container. A.K. also heard clicking noises that sounded like a camera shutter.
    Defendant sexually penetrated A.K. repeatedly and then released her from the
    restraints. A.K. quickly dressed, left the residence, and reported the incident.
    ¶ 14       The search warrant complaint alleged that digital evidence of criminal sexual
    assault could be found on defendant’s cellular phone. Accordingly, the warrant
    authorized the seizure of “any electronic media cable [sic] of video/audio
    recording” and “any electronic storage media capable of stor[ing] pictures, audio
    or video.” The warrant also authorized the seizure of any restraints that might have
    been used on the victim, physical evidence resulting from the assault, and any
    additional items of evidentiary value.
    ¶ 15       Officers of the Illinois State Police and the Peoria Police Department arrived at
    defendant’s home around 8:30 p.m. to execute the warrant. They waited two hours
    for defendant to answer the door and allow them inside. Defendant had called in
    sick to the police department that evening and had ignored telephone calls from his
    supervisors and the investigators. Defendant allegedly told Broquard that, while he
    kept the officers waiting outside, he removed the four-point restraints from the
    guest bedroom and placed them back under the mattress in the master bedroom.
    ¶ 16        The police officers seized defendant’s iPhone and his custom-built computer
    tower. The iPhone was found locked in a gun safe in the basement. The computer’s
    file history showed that more than 16,500 files had been recently deleted from the
    hard drive. The officers seized the restraints, a black blindfold, and lubricant. They
    also found a video recording system hidden inside two Kleenex tissue boxes.
    ¶ 17       An initial examination of the computer hard drive revealed photographs and
    video of A.K. lying motionless, facedown in four-point restraints. She was wearing
    only her top, which was pulled up, and a pillow covered her head. The officers
    -4-
    determined that the photographs and video of A.K. had been transferred from
    defendant’s iPhone to his computer.
    ¶ 18       The initial examination of the hard drive also revealed what appeared to be
    secretly recorded video from defendant’s bathroom of an unidentified woman
    stepping out of the shower. Defendant has not alleged that this initial examination
    of his computer data was unlawful.
    ¶ 19       On July 24, 2013, the Illinois State Police obtained a second warrant, which
    defendant also did not challenge. The warrant authorized “all peace officers in the
    state of Illinois” to search the computer for “any and all digital images, including,
    but not limited to JPG, GIF, TIF, AVI, MOV, and MPEG files” and “any evidence
    of” the offenses of (1) aggravated criminal sexual assault, (2) unlawful restraint,
    and (3) unauthorized video recording and live video transmission. The warrant
    authorized a search of “any and all stored/deleted data to determine which particular
    files are evidence or instrumentalities of criminal activity.”
    ¶ 20       The search warrant complaint restated A.K.’s account of the events on July 17,
    2013, but A.K. was not the only victim mentioned. The complaint specifically
    alleged that “[a]dditionally recovered videos display an unidentified female using
    the bathroom and taking a shower. The female appears to have no knowledge she
    was being recorded.” Accordingly, the warrant authorized the search of defendant’s
    computer for any evidence of the crimes listed “that may be discovered from
    separate incidents.”
    ¶ 21       Detective Jeff Avery, a computer forensics expert with the Peoria County
    Sheriff’s Department, examined defendant’s computer. He removed the hard drive
    and made an exact, unalterable digital copy of its contents using EnCase software.
    Avery saved the copy, called the EnCase file, to his work computer. Avery
    reinstalled the hard drive and returned defendant’s computer to the Illinois State
    Police.
    ¶ 22       Avery searched the EnCase file and found images relating to the incident
    involving A.K. On August 6, 2013, based on the images, the State charged
    defendant in Peoria County case No. 13-CF-741 with aggravated criminal sexual
    assault (720 ILCS 5/11-1.30(a)(4) (West 2012)) and criminal sexual assault (id.
    -5-
    § 11-1.20(a)(1)) of A.K. 1 A jury ultimately found him not guilty of all charges on
    March 19, 2014.
    ¶ 23      Immediately following the not guilty verdicts, defense counsel orally requested
    the return of defendant’s personal property. Counsel specifically mentioned
    “collector guns” but did not ask for the computer. The trial court deferred ruling
    and asked counsel to file a written motion, because the seized items were weapons.
    ¶ 24                             B. Internal Investigation of Defendant
    ¶ 25        The next day, on March 20, 2014, the Peoria Police Department initiated a
    formal investigation of defendant. 2 Detective James Feehan, a computer forensics
    examiner with the police department, requested and received a copy of the EnCase
    file from Avery.
    ¶ 26       On March 24, 2014, Feehan began a digital forensic analysis of the EnCase file
    and uncovered two images of what he believed to be child pornography. He also
    found video recordings of two unidentified women using the bathroom in
    defendant’s home. Feehan suspended his search to apply for a new warrant to
    further examine the EnCase file for child pornography.
    ¶ 27       Also on March 24, 2014, defendant filed a written motion in Peoria County case
    No. 13-CF-741, the sexual assault case, requesting the return of his property. The
    motion was silent as to the legal basis for the proposed disposition of defendant’s
    property. On April 24, 2014, the court ordered the return of defendant’s “guns +
    weapons instanter” but otherwise continued the motion. The motion was never fully
    resolved, and defendant’s computer was not returned.
    ¶ 28                             C. Peoria County Case No. 14-CF-203
    ¶ 29      On March 28, 2014, defendant was arrested and charged in Peoria County case
    No. 14-CF-203 with two counts of unauthorized video recording (720 ILCS 5/26-
    1
    The July 24, 2013, warrant authorized a search for evidence of unlawful restraint—presumably
    committed against A.K.—but defendant was not charged with the offense.
    2
    An arbitrator’s ruling and the police department’s collective bargaining agreement prohibited
    an internal investigation of defendant while the criminal case was pending.
    -6-
    4(a) (West 2014)) based on two incidents unrelated to the sexual assault charges.
    The pending criminal charges caused the Peoria Police Department to suspend its
    internal investigation of defendant.
    ¶ 30       The charges were based on the video recordings of two women, identified as
    Rachel G. and Whitney S., who were acquaintances of defendant and Broquard.
    People v. McCavitt, 
    2021 IL App (3d) 180399-U
    , ¶¶ 8-9. Defendant, using cameras
    concealed in the Kleenex boxes, secretly recorded the women using his bathroom.
    Defendant recorded Rachel on March 27, 2013, and recorded Whitney sometime
    between May 1, 2013, and the date his computer was seized. 3 Defendant
    transferred the video files to his computer.
    ¶ 31                            D. Peoria County Case No. 14-CF-282
    ¶ 32       On April 1, 2014, Feehan obtained the new warrant to search the EnCase file
    for additional images of child pornography, which he uncovered soon thereafter.
    On April 28, 2014, the State filed a 10-count indictment, charging defendant with
    7 counts of aggravated child pornography (720 ILCS 5/11-20.1B (West 2010)), a
    Class 2 felony, and 3 counts of child pornography (720 ILCS 5/11-20.1 (West
    2012)), a Class 3 felony, based on five images found in the EnCase file.
    ¶ 33       On August 15, 2014, defendant filed a motion to suppress, arguing that Feehan
    had no authority to obtain and examine the contents of the EnCase file in March
    2014. Defendant asserted that Feehan’s examination was a warrantless search in
    violation of the fourth amendment because no criminal charges were pending at the
    time of the search. He also claimed the trial court in Peoria County case No. 13-
    CF-741, the sexual assault case, had erroneously failed to order the return of his
    computer and all copies of the hard drive, pursuant to section 108-2 of the Code of
    Criminal Procedure of 1963. See 725 ILCS 5/108-2 (West 2012).
    ¶ 34      Feehan testified at the suppression hearing that, as soon as he discovered the
    two pornographic images, he stopped to apply for a search warrant. He explained
    3
    The State elected to prosecute the child pornography case first, but defendant ultimately was
    convicted of the two counts of unauthorized video recording. Defendant’s convictions were affirmed
    on direct appeal. McCavitt, 
    2021 IL App (3d) 180399-U
    .
    -7-
    that the application process “took a couple days because we were investigating
    other unlawful videotaping evidence as part of that internal investigation.” On April
    1, 2014, after obtaining the new warrant, Feehan resumed his search of the EnCase
    file and began looking specifically for child pornography.
    ¶ 35        Feehan testified that defendant had used White Canyon WipeDrive software, a
    utility program for permanently deleting data from a hard drive, at 9:23 p.m. on
    July 13, 2017, while the officers waited outside his home. However, Feehan was
    able to reconstruct how defendant had used the computer to search, download, and
    view child pornography from the Internet. Feehan referred to defendant’s work
    schedule to explain that defendant accessed the child pornography when he was off
    duty. Feehan recovered the file names of several permanently deleted images and
    videos that were labeled with child pornography acronyms, such as “PTHC,”
    meaning preteen hard core. Feehan was able to recover other files and identified
    their contents as child pornography.
    ¶ 36       Feehan pieced together the events during the hours between the alleged sexual
    assault and the computer seizure. Defendant called in sick to the police department
    at 6:01 p.m. Broquard used the computer for about 10 minutes, switched it off at
    6:18 p.m., and went to work. At 6:26 p.m., defendant logged on as “owner,” and
    around 8:15 p.m. the police began knocking on defendant’s front door. Defendant
    deleted data from the computer from 9:18 p.m. to 10:07 p.m. Defendant allowed
    the police to enter around 10:30 p.m., at which time they seized the computer.
    Defendant was charged for the images that Feehan found despite defendant’s
    attempt to delete them permanently.
    ¶ 37       On cross-examination, Feehan testified that the Illinois State Police excluded
    him from the initial criminal investigation of the sexual assault to avoid a potential
    conflict of interest arising from Feehan and defendant sharing the same employer.
    Feehan conceded that he knew defendant had been acquitted of the sexual assault
    charges on March 19, 2014, and that no other charges were pending when he
    received the EnCase file from Avery on March 21, 2014. Feehan confirmed that he
    requested the EnCase file as part of the internal investigation even though he knew
    defendant’s computer had been seized in connection with the sexual assault
    prosecution.
    -8-
    ¶ 38       Feehan testified, however, that at the time of his search, he “knew that there
    was [sic] other victims that could be identified during the formal [investigation]
    that would turn criminal.” Feehan did not believe he needed a search warrant or
    other court order to obtain and search the EnCase file “[b]ecause of case law that
    [he] was aware of” since defendant’s computer was previously seized “[p]ursuant
    to a lawful search warrant.”
    ¶ 39       On October 21, 2014, the trial court denied defendant’s motion to suppress,
    finding that law enforcement’s retention of defendant’s computer after the acquittal
    did not compel suppression of the child pornography. The court noted that
    defendant had not challenged (1) the warrants issued on July 17 and July 24, 2013,
    (2) the original search and seizure of his computer, or (3) Avery’s creation of the
    EnCase file. Regardless of whether the trial court in the sexual assault proceedings
    erred in failing to order the return of the computer, defendant had tried in that case
    to invoke section 108-2 of the Code of Criminal Procedure and had not alleged a
    fourth amendment violation. Moreover, returning the computer to defendant would
    not have prevented a search of the EnCase file, which Avery still possessed and had
    made available to Feehan. The trial court concluded that defendant’s suppression
    motion had raised an issue of search, not seizure. The seizure was presumptively
    reasonable because it was conducted pursuant to an unchallenged warrant, long
    before Feehan searched the EnCase file.
    ¶ 40       The trial court concluded that, once the police had the right to copy and examine
    the hard drive for evidence of certain crimes, defendant’s reasonable expectation of
    privacy in the information was substantially diminished but not totally frustrated.
    “[A]lthough the police had the right to search the hard drive for certain types of
    files and for evidence of certain types of offenses, the police did not have cart [sic]
    blanche to review everything on the hard drive.” For instance, the court noted,
    defendant still might have held expectations of privacy in a diary, daily planner,
    family history, drafts of papers for classes, and the like, but “he no longer held a
    ‘reasonable’ expectation of privacy in the types of files and directories which were
    or could be related to evidence of unlawful restraint and/or improper videotaping.”
    ¶ 41       The trial court found that Feehan did not violate defendant’s fourth amendment
    rights. Feehan’s search of files and folders for images and video did not exceed the
    scope of the original warrant because there was no testimony that the first two
    -9-
    images of child pornography were of a different file type or in different areas or
    directories of the computer than those previously subject to search under the
    warrant.
    ¶ 42        On July 10, 2015, the State amended its indictment and charged defendant with
    seven additional counts of child pornography (720 ILCS 5/11-20.1(a)(6) (West
    2014)), a Class 2 felony, based on seven additional images found in the EnCase
    file.
    ¶ 43       A jury found defendant guilty of 15 of the 17 counts of child pornography.
    Defendant filed posttrial motions, which the trial court denied. The trial court
    accepted the jury’s verdict on 1 count of Class 3 felony child pornography and 10
    counts of Class 2 felony child pornography. The court sentenced defendant on the
    Class 3 felony to five years’ imprisonment followed by mandatory supervised
    release of three years to life. The court imposed a sentence of 48 months’ probation
    on the remaining 10 counts, to be served consecutively to the prison sentence.
    ¶ 44       On direct appeal, defendant argued, inter alia, that the trial court erroneously
    denied his motion to suppress. He argued that “Feehan’s search of his EnCase file
    eight months after the initial warrant was issued and following his acquittal of
    sexual assault charges violated his fourth amendment rights.” 
    2019 IL App (3d) 170830
    , ¶ 13. The Appellate Court, Third District, agreed and reversed the
    convictions.
    ¶ 45       The majority opinion concluded that, when the police took possession of
    defendant’s computer, his expectation of privacy was significantly diminished until
    his sexual assault acquittal, which then triggered a statutory right to the return of
    his property and restored his expectation of privacy in the computer. Id. ¶ 24. The
    majority held that, although Avery created the EnCase file lawfully, Feehan
    violated defendant’s right to privacy when he searched the file and found the first
    two images of child pornography. Id. ¶ 25. The police were not entitled to retain
    the entire EnCase file indefinitely but could examine it and retain only those files
    within the scope of the initial warrant. The majority held that, once defendant’s
    sexual assault trial ended, the police were not entitled to retain any portion of the
    EnCase file, much less the entire file. Id. The majority concluded that, because the
    police had no authority to retain the EnCase file after defendant’s acquittal,
    Feehan’s initial search violated defendant’s fourth amendment rights. Id. ¶ 26.
    - 10 -
    ¶ 46       The majority also held that the images were not admissible under the good-faith
    exception to the exclusionary rule. Id. ¶ 31. Feehan, who had been a police officer
    for more than 20 years and a forensic examiner for 17 years, knew when he
    requested the EnCase file that defendant had been acquitted of the sexual assault
    charges and that no new charges had been filed. The majority concluded that,
    because the charges based on the files found pursuant to the initial warrant were no
    longer pending, Feehan should have known that the police had no right to retain,
    much less search, the EnCase file. Id. We note the majority opinion did not address
    the portion of the search warrant concerning the separate incident of unauthorized
    video recording.
    ¶ 47       The dissenting opinion concluded that defendant’s acquittal did not entitle him
    to the immediate return of his computer or the information harvested from it. Id.
    ¶ 37 (Wright, J., dissenting). The dissent noted that, after the acquittal, defendant
    did not pursue his oral and written requests for the return of his property. Id. ¶ 39.
    The dissent characterized the sexual assault court’s deferral of the oral request as a
    denial and concluded that the ruling stands as the law of the case and represents an
    unappealable order. Id. ¶ 40. The dissent also concluded that, because Feehan was
    merely reviewing information that had already been lawfully seized by another
    detective who had made it a part of his working file, defendant’s reasonable
    expectation of privacy remained diminished after he lawfully lost possession of the
    computer tower pursuant to the search warrant. Id. ¶ 44.
    ¶ 48       The State petitioned for leave to appeal, which we allowed pursuant to Illinois
    Supreme Court Rule 315(a) (eff. Oct. 1, 2019). We granted the American Civil
    Liberties Union and the American Civil Liberties Union of Illinois leave to submit
    briefs amicus curiae in support of defendant’s position, pursuant to Illinois
    Supreme Court Rule 345 (eff. Sept. 20, 2010).
    ¶ 49                                      II. ANALYSIS
    ¶ 50       On appeal, the State argues Feehan’s examination of the EnCase file did not
    violate defendant’s fourth amendment rights because the search arose from the
    original lawful seizure and search of his computer. The State characterizes the
    search as a permissible “second look” that was no broader than the “first look”
    authorized by the original search warrant, which was broadly written,
    - 11 -
    unchallenged, and presumptively valid. The State also contends defendant’s
    privacy and possessory interests in the EnCase file were so significantly reduced
    by the sexual assault prosecution that Feehan’s examination did not even constitute
    a “search” under the fourth amendment. Third, the State asserts that, even if
    Feehan’s examination qualifies as a warrantless search, the officer’s review was
    reasonable because it constituted, at most, a minimal intrusion on defendant’s
    privacy and possessory interests while diligently promoting compelling law
    enforcement interests. The State alternatively contends that the child pornography
    was admissible under the good-faith exception to the exclusionary rule.
    ¶ 51       Defendant renews his arguments that the child pornography should have been
    suppressed because Feehan’s examination was a search that violated his
    expectation of privacy under the fourth amendment and that the images are not
    admissible under the good-faith exception to the exclusionary rule. Defendant also
    argues his property interest in the computer conferred a reasonable expectation of
    privacy in the data at the time of Feehan’s search.
    ¶ 52                                  A. Standard of Review
    ¶ 53       We apply our familiar two-part standard of review to a ruling on a suppression
    motion. First, the circuit court’s findings of historical fact should be reviewed only
    for clear error, and a reviewing court must give due weight to any inferences drawn
    from those facts by the fact finder. People v. Luedemann, 
    222 Ill. 2d 530
    , 542
    (2006) (citing Ornelas v. United States, 
    517 U.S. 690
    , 699 (1996)). We defer to the
    court’s factual findings and will reverse those findings only if they are against the
    manifest weight of the evidence. 
    Id.
     (citing People v. Sorenson, 
    196 Ill. 2d 425
    , 431
    (2001)). Second, a reviewing court may undertake its own assessment of the facts
    as they relate to the issues and may draw its own conclusions when deciding what
    relief should be granted. 
    Id.
     (citing People v. Pitman, 
    211 Ill. 2d 502
    , 512 (2004)).
    Accordingly, the circuit court’s ultimate legal ruling on the suppression motion is
    reviewed de novo. 
    Id.
     As the relevant facts in this case are not in dispute, our review
    of the suppression ruling is de novo.
    - 12 -
    ¶ 54                                 B. Fourth Amendment
    ¶ 55       Defendant argued in his motion to suppress that Feehan’s examination violated
    his rights under the fourth amendment of the United States Constitution and article
    I, section 6, of the Illinois Constitution of 1970. The fourth amendment to the
    United States Constitution protects the “right of the people to be secure in their
    persons, houses, papers, and effects, against unreasonable searches and seizures.”
    U.S. Const., amend. IV; see also Elkins v. United States, 
    364 U.S. 206
    , 213 (1960)
    (the fourth amendment applies to state officials through the fourteenth amendment
    (U.S. Const., amend. XIV)). Similarly, article I, section 6, of the Illinois
    Constitution provides that the “people shall have the right to be secure in their
    persons, houses, papers and other possessions against unreasonable searches [and]
    seizures.” Ill. Const. 1970, art. I, § 6; see also 725 ILCS 5/108-7 (West 2012)
    (requiring the place or person to be searched and the items to be seized to be
    “particularly described in the warrant”). Under our limited lockstep doctrine, we
    construe the search and seizure clause of our state constitution in accordance with
    the United States Supreme Court’s interpretation of the fourth amendment unless
    any of the narrow exceptions to lockstep interpretation apply. People v. Holmes,
    
    2017 IL 120407
    , ¶ 24. Defendant does not argue that an exception applies here.
    ¶ 56       The fourth amendment contains two separate clauses: the reasonableness clause
    and the warrant clause. U.S. Const., amend. IV; Kentucky v. King, 
    563 U.S. 452
    ,
    459 (2011). The reasonableness clause requires that all government searches and
    seizures be reasonable. King, 
    563 U.S. at 459
    ; Brigham City v. Stuart, 
    547 U.S. 398
    , 403 (2006) (the touchstone of fourth amendment analysis always is
    “reasonableness”). The warrant clause permits courts to issue warrants only if (1)
    the warrant is supported by probable cause and (2) the warrant includes
    particularized descriptions of “the place to be searched” and “the persons or things
    to be seized.” U.S. Const., amend. IV; King, 
    563 U.S. at 459
    . The second condition
    of the warrant clause is known as the particularity requirement.
    ¶ 57       A search warrant is not always required before searching or seizing a citizen’s
    personal effects (see Stuart, 
    547 U.S. at 403
    ), but there is a “strong preference for
    searches conducted pursuant to a warrant” (Illinois v. Gates, 
    462 U.S. 213
    , 236
    (1983)), and police officers generally must obtain a warrant for a search to be
    reasonable under the fourth amendment (see, e.g., Riley v. California, 
    573 U.S. 373
    ,
    - 13 -
    382 (2014); Arizona v. Gant, 
    556 U.S. 332
    , 338 (2009) (searches conducted outside
    the judicial process, without prior approval by a judge or magistrate, are per se
    unreasonable under the fourth amendment, subject only to a few specifically
    established and well-delineated exceptions).
    ¶ 58                  C. Reasonable Expectation of Privacy in Digital Information
    ¶ 59       A search is constitutional if it does not violate a person’s “reasonable” or
    “legitimate” expectation of privacy. Katz v. United States, 
    389 U.S. 347
    , 361 (1967)
    (Harlan, J., concurring). To claim protection under the fourth amendment, a person
    must have exhibited an actual subjective expectation of privacy in the place
    searched or thing seized, and this expectation must be one that society is willing to
    recognize as reasonable. People v. Rosenberg, 
    213 Ill. 2d 69
    , 77 (2004). As in most
    cases, this appeal concerns whether defendant’s actual expectation of privacy was
    objectively reasonable.
    ¶ 60       There is no bright line rule indicating whether an expectation of privacy is
    constitutionally reasonable. See O’Connor v. Ortega, 
    480 U.S. 709
    , 715 (1987).
    Whether a defendant has a legitimate expectation of privacy in the place searched
    or the property seized thus depends on factors including (1) property ownership,
    (2) whether the defendant was legitimately present in the area searched, (3) the
    defendant’s possessory interest in the area searched or the property seized, (4) prior
    use of the area searched or property seized, (5) the ability to control or exclude
    others’ use of the property, and (6) a subjective expectation of privacy in the
    property. People v. Lindsey, 
    2020 IL 124289
    , ¶ 40. Whether a person’s expectation
    of privacy in an area searched is legitimate is determined by an objective standard
    drawn from common experience and based on the totality of the circumstances. 
    Id.
    ¶ 61       In the context of the fourth amendment, computers and other electronic storage
    devices have historically been viewed as closed containers. Because individuals
    generally retain a reasonable expectation of privacy in the contents of a closed
    container that conceals its contents from plain view (see United States v. Ross, 
    456 U.S. 798
    , 822-23 (1982)), they also generally retain a reasonable expectation of
    privacy in data stored on electronic devices.
    - 14 -
    ¶ 62       Accessing information stored in an electronic storage device will implicate the
    owner’s reasonable expectation of privacy in the information. United States v.
    Heckenkamp, 
    482 F.3d 1142
    , 1147 (9th Cir. 2007) (an individual generally has a
    reasonable expectation of privacy in their personal computers and data files). For
    instance, in Riley, the Supreme Court of the United States held that law enforcement
    generally must obtain a warrant before conducting a search of cell phone data.
    Riley, 573 U.S. at 386. The court described cell phones as “minicomputers that also
    happen to have the capacity to be used as telephones.” Id. at 393. Cell phones and
    personal computers share the notable distinguishing features of immense storage
    capacity and the ability to collect many distinct types of information, including a
    user’s Internet browsing history and “a cache of sensitive personal information”
    concerning nearly every aspect of a person’s life. Id. at 393-95.
    “[A] cell phone search would typically expose to the government far more than
    the most exhaustive search of a house: A phone not only contains in digital form
    many sensitive records previously found in the home; it also contains a broad
    array of private information never found in a home in any form—unless the
    phone is.” (Emphasis omitted.) Id. at 396-97.
    As the cell phone privacy concerns expressed in Riley apply to personal computers,
    we conclude that Feehan’s examination of the EnCase file constituted a search
    under the fourth amendment.
    ¶ 63       The State cites United States v. Edwards, 
    415 U.S. 800
     (1974), for the
    proposition that the valid “first look” diminished defendant’s expectation of privacy
    and permitted Feehan’s examination. Edwards held that, when a person is lawfully
    arrested and taken into custody, the items in his possession when arrested—which
    were lawfully subject to search at the time and place of his arrest—may also be
    lawfully searched and seized without a warrant even though a “substantial period
    of time” has elapsed between the arrest and the time that the items are later
    searched. 
    Id. at 807
    . Edwards does not apply because all the searches in this case
    were purportedly conducted pursuant to a warrant, not incident to defendant’s
    arrest. Furthermore, Riley instructs that law enforcement generally must obtain a
    warrant to search data on an electronic storage device, even if it was seized incident
    to arrest.
    - 15 -
    ¶ 64                         D. Defendant’s Expectation of Privacy
    ¶ 65        Although an individual retains a reasonable expectation of privacy in a
    computer under his control, special circumstances may affect that expectation. In
    this case, the trial court correctly observed that defendant did not challenge the
    warrants authorizing the seizure of his computer, Avery’s creation of the EnCase
    file, or Avery’s subsequent search for digital evidence of the sexual assault. The
    unchallenged warrants made the initial seizure and search of defendant’s computer
    presumptively reasonable.
    ¶ 66        Defendant, however, challenges Feehan’s initial examination of the EnCase
    file, which uncovered evidence of the two incidents of unauthorized video
    recording and two images of child pornography. The State argues that Feehan’s
    examination was not even a “search” under the fourth amendment because the
    initial warrant diminished defendant’s privacy and possessory interests. In support,
    the State points out that the item searched was not the original hard drive but a copy
    that Avery created and stored on his work computer. The State asserts defendant
    did not have a legitimate expectation of privacy in the EnCase file because he did
    not create, own, or have lawful access to it. See Lindsey, 
    2020 IL 124289
    , ¶ 42.
    ¶ 67       The State focuses on defendant’s lack of a formal property interest in the
    EnCase file itself and disregards defendant’s informal privacy interest in his
    personal data. Defendant persuasively argues that “Feehan’s examination of the
    police-generated forensic copy of [defendant’s] original for information pertaining
    to a criminal investigation is no less a search and no less an infringement on his
    property rights than had Feehan examined the original.” The right to exclude others
    is one of the main rights attaching to property, and allowing access to a copy defeats
    that right. See Rakas v. Illinois, 
    439 U.S. 128
    , 143 n.12 (1978); see also United
    States v. Jefferson, 
    571 F. Supp. 2d 696
    , 702 (E.D. Va. 2008) (“the Fourth
    Amendment protects an individual’s possessory interest in information itself,” and
    copying interferes with the owner’s possession and interest in privacy of the
    information contained in the documents).
    ¶ 68      The evidentiary value of data resides in the data itself, not in the medium on
    which it is stored. To suggest that defendant lacked an expectation of privacy in the
    contents of his personal computer because those contents were copied to another
    medium contravenes the requirement of reasonableness, which is the touchstone of
    - 16 -
    any fourth amendment analysis. See Stuart, 
    547 U.S. at 403
    . “[I]maging a computer
    should be regulated by the Fourth Amendment and searches of copies should be
    treated the same as searches of the original” (Orin S. Kerr, Searches and Seizures
    in a Digital World, 
    119 Harv. L. Rev. 531
    , 532 (2005)) because “computers work
    by copying and recopying information” (id. at 564). Treating a digital copy as the
    original recognizes that the key to fourth-amendment reasonableness is the access
    to data, regardless of whether the data is copied, transferred, or otherwise
    manipulated. 
    Id.
    ¶ 69       We agree with defendant that his privacy interest in the computer’s contents
    extended to the EnCase file. But he goes further, asserting his property interest in
    the data obviates the need to show an expectation of privacy. He claims “[h]e is not
    required to prove that he had an expectation of privacy in his computer, his hard
    drive, the forensic duplicate of the hard drive, or his personal information stored on
    these electronic devices in order to show that the police performed a search.”
    Defendant’s property interest in the data is not dispositive of the search’s
    reasonableness, otherwise mere proof of ownership in a place or item to be searched
    would be sufficient for suppression.
    ¶ 70       To summarize, defendant’s privacy interests in the original hard drive and the
    EnCase file were the same. However, the privacy interest conferred by his
    ownership of the computer is not dispositive to our inquiry. The appeal turns on
    defendant’s privacy interest in light of the warrant and the reasonableness of
    Feehan’s examination of the EnCase file following defendant’s acquittal in the
    sexual assault proceeding.
    ¶ 71                  E. Restoration of Defendant’s Expectation of Privacy
    ¶ 72       Defendant argues that, once he was acquitted in the sexual assault case, (1) he
    was entitled by statute to the return of his property, (2) his expectation of privacy
    in the computer was restored, and (3) it was unreasonable for law enforcement to
    look at the data without obtaining a new warrant. We conclude that defendant’s
    acquittal only partially restored his reasonable expectation of privacy in his
    computer.
    - 17 -
    ¶ 73                                1. Criminal Sexual Assault
    ¶ 74        The parties do not dispute that defendant’s sexual assault trial culminated in an
    acquittal for double jeopardy purposes. An acquittal triggers the double jeopardy
    clause of the fifth amendment to the United States Constitution, which provides
    that no person shall “be subject for the same offence to be twice put in jeopardy of
    life or limb.” U.S. Const., amend. V. Similarly, article I, section 10, of the Illinois
    Constitution provides that no person shall “be twice put in jeopardy for the same
    offense.” Ill. Const. 1970, art. I, § 10. The prohibition against double jeopardy is
    animated by the principle that
    “ ‘the State with all its resources and power should not be allowed to make
    repeated attempts to convict an individual for an alleged offense, thereby
    subjecting him to embarrassment, expense and ordeal and compelling him to
    live in a continuing state of anxiety and insecurity, as well as enhancing the
    possibility that even though innocent he may be found guilty.’ ” People v.
    Williams, 
    188 Ill. 2d 293
    , 307 (1999) (quoting Green v. United States, 
    355 U.S. 184
    , 187-88 (1957)).
    ¶ 75       “The prohibition against double jeopardy ‘protects against three distinct abuses:
    (1) a second prosecution for the same offense after acquittal; (2) a second
    prosecution for the same offense after conviction; and (3) multiple punishments for
    the same offense.’ ” People v. Henry, 
    204 Ill. 2d 267
    , 283 (2003) (quoting People
    v. Placek, 
    184 Ill. 2d 370
    , 376-77 (1998)); see also United States v. Wilson, 
    420 U.S. 332
    , 343 (1975). “An acquittal triggers the bar against double jeopardy only if
    the acquittal ‘actually represents a resolution, correct or not, of some or all of the
    factual elements of the offense charged.’ ” Henry, 
    204 Ill. 2d at 283
     (quoting United
    States v. Martin Linen Supply Co., 
    430 U.S. 564
    , 571 (1977)).
    ¶ 76       When the jury found defendant not guilty of aggravated criminal sexual assault
    and criminal sexual assault, the verdicts represented a resolution of the factual
    elements of the offenses charged. The bar against double jeopardy protected
    defendant against a second prosecution for those offenses, restoring defendant’s
    reasonable expectation of privacy concerning the data that constituted evidence of
    those crimes. Defendant, newly freed from “a continuing state of anxiety and
    insecurity” that he would be retried for sexual assault (Williams, 
    188 Ill. 2d at 307
    ),
    - 18 -
    regained a reasonable expectation that the police would not search his computer for
    evidence of the offenses of which he was acquitted.
    ¶ 77       Defendant renews his argument that the acquittal entitled him to the return of
    his computer and to any copies of his personal data and that therefore his reasonable
    expectation of privacy in the data was restored entirely. We disagree. To establish
    a legitimate expectation in the place to be searched, a defendant must point to a
    source outside the constitution—namely, formal property interests or informal
    privacy interests. United States v. Jones, 
    565 U.S. 400
    , 408 (2012); Rakas, 439 U.S.
    at 143 n.12 (“Legitimation of expectations of privacy by law must have a source
    outside of the Fourth Amendment, either by reference to concepts of real or
    personal property law or to understandings that are recognized and permitted by
    society.”).
    ¶ 78       Defendant asserts his formal property interests in the computer, relying on
    section 108-2 of the Code of Criminal Procedure, which governs the return of
    property after a person is released from custody. But the statute applies to items
    seized without a warrant, stating
    “An inventory of all instruments, articles or things seized on a search without
    warrant shall be given to the person arrested and a copy thereof delivered to the
    judge before whom the person arrested is taken, and thereafter, such
    instruments, articles or things shall be handled and disposed of in accordance
    with Sections 108-11 and 108-12 of this Code. If the person arrested is released
    without a charge being preferred against him all instruments, articles or things
    seized, other than contraband, shall be returned to him upon release.” (Emphasis
    added.) 725 ILCS 5/108-2 (West 2012).
    ¶ 79       Section 108-2 arguably did not apply to defendant’s computer because the
    statute applies to “things seized without a warrant.” Defendant’s acquittal does not
    negate the fact that the defendant’s computer was seized on July 17, 2013, pursuant
    to a warrant.
    ¶ 80       In contrast to section 108-2, section 108-10 applies to items seized with a
    warrant, like defendant’s computer. Section 108-10 provides for the items seized
    by law enforcement to be returned to the court:
    - 19 -
    “A return of all instruments, articles or things seized shall be made without
    unnecessary delay before the judge issuing the warrant or before any judge
    named in the warrant or before any court of competent jurisdiction. An
    inventory of any instruments, articles or things seized shall be filed with the
    return and signed under oath by the officer or person executing the warrant.
    The judge shall upon request deliver a copy of the inventory to the person from
    whom or from whose premises the instruments, articles or things were taken
    and to the applicant for the warrant.” (Emphases added.) Id. § 108-10.
    ¶ 81       Regardless of which statute governed the custody of defendant’s computer, we
    agree with the trial court and the dissenting appellate opinion that defendant failed
    to invoke any authority for the return of his computer or copies of its hard drive. In
    fact, defendant states in his brief that his “items have never been returned,” but he
    does not accuse the State of any wrongdoing.
    ¶ 82       Moreover, defendant cites no authority to suggest that his acquittal
    automatically entitled him to the immediate return of his computer and the
    information harvested from it. In fact, section 108-11 provides that “[t]he court
    before which the instruments, articles or things are returned shall enter an order
    providing for their custody pending further proceedings.” Id. § 108-11. Thus, the
    statute contemplates a motion and a hearing before an order is entered disposing of
    seized items. See, e.g., City of Chicago v. Pudlo, 
    123 Ill. App. 3d 337
    , 345 (1983)
    (order denying defendants’ motion for return of weapons was reversed because trial
    court erroneously failed to conduct hearing). Here, the State argued at the
    suppression hearing that, if defendant had noticed up his motion, the State would
    have opposed the return of the computer to defendant on the ground that the hard
    drive contained contraband. In any event, the record indicates that defendant neither
    pursued his written motion for the return of his computer nor appealed any order in
    Peoria County case No. 13-CF-741.
    ¶ 83       Defendant asserts a possessory interest in the computer and claims it extends to
    the digital copies of the hard drive, but the trial court never reached the issue, which
    was governed by statute and was subject to an evidentiary hearing. As defendant
    did not press his rights in the sexual assault proceeding, he cannot claim his
    property interest fully restored his expectation of privacy in his data.
    - 20 -
    ¶ 84                             2. Unauthorized Video Recording
    ¶ 85       The acquittal resolved the portion of the July 24, 2013, search warrant that was
    directed toward the offense of aggravated criminal sexual assault. However, the
    acquittal did not resolve any of the factual elements of unauthorized video
    recording, which was also specified in the warrant. Contrary to defendant’s
    suggestion, the acquittal did not nullify the warrant entirely. The State concludes
    that the sexual assault acquittal did not restore defendant’s expectation of privacy
    concerning evidence of the uncharged offenses described in the July 24, 2013,
    warrant, including unauthorized video recording.
    ¶ 86       Defendant responds that the State has forfeited the issue. Village of Lake Villa
    v. Stokovich, 
    211 Ill. 2d 106
    , 121 (2004) (issues not raised in the trial court generally
    are forfeited and may not be raised for the first time on appeal). Defendant cites the
    appellate majority’s observation that “[t]he State concedes that the July 17, 2013,
    warrant ‘did not authorize Feehan’s search, as that warrant had already been
    executed and, after investigation and criminal proceedings, defendant was
    acquitted.’ ” (Emphasis added.) 
    2019 IL App (3d) 170830
    , ¶ 30. But the State has
    argued throughout the proceedings that the July 24, 2013, warrant authorized
    Feehan’s search.
    ¶ 87       For instance, the State argues in its opening brief that it had an ongoing interest
    in investigating defendant because, “based on prior searches of defendant’s
    computer data, phone data, and email account, the [Peoria Police Department]
    suspected defendant of committing criminal conduct in addition to the conduct that
    resulted in the charges for which he was acquitted.” The State narrows its argument
    in the reply brief, asserting that the search warrant described “separate incidents”
    besides the sexual assault of A.K. We consider the issue adequately preserved.
    Dillon v. Evanston Hospital, 
    199 Ill. 2d 483
    , 504-05 (2002) (the forfeiture rule is
    an admonition to the parties and not a limitation on the jurisdiction of this court).
    ¶ 88                                  F. Scope of the Warrant
    ¶ 89       The validity of Feehan’s search depends on whether it was within the scope of
    the portion of the warrant that was unresolved by the acquittal. It is well established
    that a search warrant need not contain “ ‘[a] minute and detailed description of the
    - 21 -
    property to be seized.’ ” People v. McCarty, 
    223 Ill. 2d 109
    , 151 (2006) (quoting
    People v. Prall, 
    314 Ill. 518
    , 523 (1924)). “Rather, ‘the property must be so
    definitely described that the officer making the search will not seize the wrong
    property.’ ” 
    Id.
     (quoting Prall, 314 Ill. at 523). When a type of property, rather than
    particular property, is to be seized, a description of its characteristics is sufficient.
    Id. at 152.
    ¶ 90       The Michigan Supreme Court has recently explained how the fourth
    amendment’s particularity requirement applies to digital evidence. In Hughes, the
    defendant was under investigation for drug trafficking, and law enforcement
    obtained a warrant to search his cell phone for evidence related to separate criminal
    allegations of that crime. Hughes, 958 N.W.2d at 105. The warrant affidavit
    contained no information concerning armed robbery. Id. The warrant provided that
    “ ‘[a]ny cell phones or *** other devices capable of digital or electronic storage
    seized by authority of this search warrant shall be permitted to be forensically
    searched and or manually searched, and any data that is able to be retrieved there
    from shall be preserved and recorded.’ ” Id. The warrant authorized the seizure of
    any drug paraphernalia and “ ‘any records pertaining to the receipt, possession and
    sale or distribution of controlled substances including but not limited to documents,
    video tapes, computer disks, computer hard drives, and computer peripherals.’ ”
    (Emphasis omitted.) Id. at 106.
    ¶ 91       After the cell phone was seized, the defendant was charged with an armed
    robbery that occurred a week before the warrant was issued. Id. The police
    examined the phone and extracted all the data. About a month after the extraction
    and at the request of the prosecutor in the armed-robbery case, a detective searched
    the cell-phone data again. Id. The searches uncovered evidence of the defendant’s
    involvement in the armed robbery, and the evidence was used to convict the
    defendant of armed robbery. Id. at 106-07.
    ¶ 92       On appeal from the armed-robbery conviction, the defendant argued that “the
    phone records should have been excluded from trial because the warrant supporting
    a search of the data only authorized a search for evidence of drug trafficking and
    not armed robbery.” Id. at 107. The Michigan Supreme Court agreed, concluding
    that the seizure and search of cell-phone data pursuant to a warrant does not
    - 22 -
    extinguish the “otherwise reasonable expectation of privacy in the entirety of that
    seized data.” Id. at 111. Specifically, the Hughes court held
    “the police were permitted to seize and search that data, but only to the extent
    authorized by the warrant. Any further review of the data beyond the scope of
    that warrant constitutes a search that is presumptively invalid under the Fourth
    Amendment, absent some exception to that amendment’s warrant requirement.”
    Id. at 115.
    ¶ 93       The Hughes court then considered “whether the review of [the] defendant’s data
    for evidence of an armed robbery fell within the scope of the warrant issued in the
    drug-trafficking case.” Id. The court held that a search of cell-phone data “must be
    ‘reasonably directed at uncovering’ evidence of the criminal activity alleged in the
    warrant and that any search that is not so directed but is directed instead toward
    finding evidence of other and unrelated criminal activity is beyond the scope of the
    warrant.” (Emphasis omitted.) Id. (quoting United States v. Loera, 
    923 F.3d 907
    ,
    917 (10th Cir. 2019)).
    ¶ 94      The court acknowledged that a “criminal suspect will not always store or
    organize incriminating information on his or her digital devices in the most obvious
    way or in a manner that facilitates the location of that information.” Id. at 117.
    Nonetheless, the court declined
    “to adopt a rule that it is always reasonable for an officer to review the entirety
    of the digital data seized pursuant to a warrant on the basis of the mere
    possibility that evidence may conceivably be found anywhere on the device or
    that evidence might be concealed, mislabeled, or manipulated.” Id.
    ¶ 95       “Such a per se rule would effectively nullify the particularity requirement of the
    Fourth Amendment in the context of cell-phone data and rehabilitate an
    impermissible general warrant that ‘would in effect give “police officers unbridled
    discretion to rummage at will among a person’s private effects.” ’ ” (Emphasis
    omitted.) Id. at 118 (quoting Riley, 573 U.S. at 399, quoting Gant, 
    556 U.S. at 345
    ).
    An officer’s search of seized digital data, as with any other search conducted
    pursuant to a warrant, must be reasonably directed at finding evidence of the
    criminal activity identified within the warrant. 
    Id.
    - 23 -
    ¶ 96        The Hughes court explained that the test in the digital context is whether the
    forensic steps of the search process were reasonably directed at uncovering the
    evidence specified in the search warrant. 
    Id.
     Whether a data search that uncovers
    evidence of criminal activity not identified in the warrant was reasonably directed
    at finding evidence relating to the criminal activity alleged in the warrant turns on
    a number of considerations, including (1) the nature of the criminal activity alleged
    and the type of digital data likely to contain evidence relevant to the alleged
    activity; (2) the evidence provided in the warrant affidavit for establishing probable
    cause that the alleged criminal acts have occurred; (3) whether nonresponsive files
    are segregated from responsive files on the device; (4) the timing of the search in
    relation to the issuance of the warrant and the trial for the alleged criminal acts;
    (5) the technology available to allow officers to sort data likely to contain evidence
    related to the criminal activity alleged in the warrant from data not likely to contain
    such evidence without viewing the contents of the unresponsive data and the
    limitations of this technology; (6) the nature of the digital device being searched;
    (7) the type and breadth of the search protocol employed; (8) whether there are any
    indications that the data has been concealed, mislabeled, or manipulated to hide
    evidence relevant to the criminal activity alleged in the warrant, such as when
    metadata is deleted or when data is encrypted; and (9) whether, after reviewing a
    certain number of a particular type of data, it becomes clear that certain types of
    files are not likely to contain evidence related to the criminal activity alleged in the
    warrant. Id. at 118-20.
    “To be clear, a court will generally need to engage in such a ‘totality-of-
    circumstances’ analysis to determine whether a search of digital data was
    reasonably directed toward finding evidence of the criminal activities alleged
    in the warrant only if, while searching digital data pursuant to a warrant for one
    crime, officers discover evidence of a different crime without having obtained
    a second warrant and a prosecutor seeks to use that evidence at a subsequent
    criminal prosecution.” Id. at 120.
    ¶ 97       The Hughes court found the search for armed robbery evidence was outside the
    scope of the warrant, which authorized a data search only for evidence of drug
    trafficking and “did not even mention” the armed robbery or its surrounding
    circumstances. Id. at 121. The second search of the phone violated the fourth
    amendment because the “review was directed exclusively toward finding evidence
    - 24 -
    related to the armed-robbery charge, and it was grounded in information obtained
    during investigation into that crime.” (Emphasis omitted.) Id. at 122.
    ¶ 98        We are persuaded by Hughes that an officer’s search of seized digital data, as
    with any other search with a warrant, must be reasonably directed at finding
    evidence of the criminal activity identified within the warrant.
    ¶ 99        The warrants in this case and in Hughes make the cases factually
    distinguishable. The Hughes warrant authorized a data search for evidence of drug
    trafficking, but the supporting affidavit did not mention armed robbery, let alone
    claim probable cause that the defendant committed armed robbery. As a result, the
    warrant did not authorize a search for digital evidence related to the armed robbery.
    ¶ 100       By contrast, the search warrant in this case was not limited to uncovering
    evidence of the sexual assault of which defendant was acquitted. The July 24, 2013,
    warrant also authorized a search for digital evidence of unauthorized video
    recording. Double jeopardy protected defendant from retrial on the sex offenses,
    but defendant still could be charged with unauthorized video recording, because the
    issuing court found there was probable cause to search defendant’s data for
    evidence of that offense.
    ¶ 101       The Hughes factors indicate Feehan’s search was reasonably directed at finding
    evidence of the unauthorized video recording. Specifically, the complaint for the
    July 24, 2013, search warrant stated that “[a]dditionally recovered videos display
    an unidentified female using the bathroom and taking a shower” and that this
    “unidentified female appears to have no knowledge she was being recorded.” The
    complaint expressly targeted the crime of “Unauthorized Video Recording/Live
    Video Transmission in violation of 720 ILCS 5/26-4,” and the warrant authorized
    the search of all digital images for “Unauthorized Video Recording/Live Video
    Transmission 720 ILCS 5/26-4.”
    ¶ 102       The warrant permitted a search of “any and all digital images, including, but
    not limited to JPG, GIF, TIF, AVI, MOV, and MPEG files,” which are image and
    video file formats likely to contain evidence relevant to unauthorized video
    recording. Moreover, the evidence provided in the search warrant application
    described the bathroom video in sufficient detail to establish probable cause.
    Defendant has not challenged Feehan’s methodology concerning search protocols
    - 25 -
    and the sorting of responsive and unresponsive data, and Feehan testified to
    defendant’s attempts to hide relevant evidence by permanently deleting files. See
    Hughes, 958 N.W.2d at 118.
    ¶ 103       The concurring opinion in Hughes stated that an officer’s subjective intention
    in conducting the search also should be considered as a potentially dispositive
    factor in determining whether the search of seized data is reasonably directed at
    finding evidence of the criminal activity identified in the warrant. Id. at 124
    (Viviano, J., concurring). The concurrence concluded that, if the officer
    purposefully searches for evidence of a crime other than the one identified in the
    warrant, the search cannot be reasonably directed at uncovering evidence of the
    criminal activity alleged in the warrant. Id. at 124-25.
    ¶ 104       Feehan’s conduct adhered to the special concurrence in Hughes. Feehan
    testified at the suppression hearing that he was not searching for evidence of the
    criminal sexual assault, because defendant already had been acquitted of that
    charge. But contrary to defendant’s assertion, the detective did not engage in a
    fishing expedition. Feehan testified that “we were investigating other unlawful
    videotaping evidence as part of [the] internal investigation” and that he “knew that
    there was [sic] other victims” besides A.K. Also, Feehan actually uncovered
    evidence of the offense described in the warrant. The July 24, 2013, warrant
    authorized law enforcement to search for digital evidence of the unauthorized video
    recording of another victim, and Feehan’s search and subjective intent were
    consistent with the warrant.
    ¶ 105                                 G. Timeliness of Search
    ¶ 106       Defendant primarily argues that his acquittal restored his expectation of privacy
    in all the data, but he also suggests that Feehan’s search was unreasonable because
    it was conducted eight months after the warrant was issued. Following the acquittal,
    the warrant still authorized a search for evidence of unauthorized video recording,
    and as the appellate majority noted, the fourth amendment does not place explicit
    limits on the duration of any forensic analysis authorized by a warrant. 
    2019 IL App (3d) 170830
    , ¶ 19 (“ ‘under current law there is no established upper limit as to
    when the government must review seized electronic data to determine whether the
    - 26 -
    evidence seized falls within the scope of a warrant.’ ” (quoting United States v.
    Metter, 
    860 F. Supp. 2d 205
    , 215 (E.D.N.Y. 2012))).
    ¶ 107       Courts have upheld forensic analyses begun months after law enforcement
    acquires the electronic storage device. See United States v. Syphers, 
    426 F.3d 461
    ,
    469 (1st Cir. 2005) (a five-month delay in processing a computer already in police
    custody “did not invalidate the search *** because there is no showing that the
    delay caused a lapse in probable cause, that it created prejudice to the defendant, or
    that federal or state officers acted in bad faith to circumvent federal requirements”);
    United States v. Burns, No. 07 CR 556, 
    2008 WL 4542990
    , at *8-9 (N.D. Ill. Apr.
    29, 2008) (10-month delay); United States v. Gorrell, 
    360 F. Supp. 2d 48
    , 55 n.5
    (D.D.C. 2004) (10-month delay for off-site forensic analysis). The fourth
    amendment does not subject data searches to any rigid time limit because they may
    involve much more information than an ordinary document search and require more
    preparation and a greater degree of care in their execution. 
    2019 IL App (3d) 170830
    , ¶ 19 (citing United States v. Triumph Capital Group, Inc., 
    211 F.R.D. 31
    ,
    66 (D. Conn. 2002)). Nevertheless, the fourth amendment requires the government
    to complete its review of digital data “ ‘within a “reasonable” period of time.’ ” 
    Id.
    (quoting Metter, 860 F. Supp. 2d at 215). A search of digital data that takes several
    years may be reasonable as long as the search ends before trial and does not exceed
    the scope of the original search warrant. See United States v. Johnston, 
    789 F.3d 934
    , 942-43 (9th Cir. 2015).
    ¶ 108       We agree with defendant that the acquittal eliminated the probable cause to
    search for evidence of the sexual assault. But to the extent that defendant argues the
    eight-month delay in conducting the search was unreasonable, he does not claim
    that probable cause to search for unauthorized video recording dissipated while the
    sexual assault prosecution was pending, nor could he, because his data remained
    secured and unaltered in the EnCase file. He also does not claim prejudice by the
    delay or that the police department acted in bad faith. See Burns, 
    2008 WL 4542990
    , at *9 (search upheld despite “lengthy” delay because the defendant did
    not assert that “the time lapse affected the probable cause to search the computer
    (nor could he, given that suspected child pornography had already been found on
    the hard drive), that the government has acted in bad faith, or that he has been
    prejudiced in any way by the delay”); see also Syphers, 
    426 F.3d at 469
     (the fourth
    amendment “ ‘contains no requirements about when the search or seizure is to occur
    - 27 -
    or the duration’ ” (quoting United States v. Gerber, 
    994 F.2d 1556
    , 1559-60 (11th
    Cir. 1993)), but “ ‘unreasonable delay in the execution of a warrant that results in
    the lapse of probable cause will invalidate a warrant’ ” (quoting United States v.
    Marin-Buitrago, 
    734 F.2d 889
    , 894 (2d Cir. 1984)). The passage of eight months
    from the warrant issuance to Feehan’s search was reasonable under the
    circumstances, considering the intervening sexual assault prosecution, which
    required the police department to delay its internal investigation, and the sheer
    volume of data in the EnCase file.
    ¶ 109                                      H. Plain View
    ¶ 110      Hughes contrasted its facts with
    “a circumstance in which the officer was reasonably reviewing data for
    evidence of drug trafficking and happened to view data implicating defendant
    in other criminal activity. If such were the case and the data’s ‘incriminating
    character [was] immediately apparent,’ the plain-view exception would likely
    apply and permit the state to use the evidence of criminal activity not alleged in
    the warrant at a subsequent criminal prosecution.” Hughes, 958 N.W.2d at 122.
    The court’s hypothetical matches this case.
    ¶ 111       Evidence of a crime may be seized without a warrant under the plain view
    exception to the warrant requirement. A police officer may properly seize evidence
    of a crime without a warrant if (1) the officer was lawfully in a position from which
    to view the object seized in plain view, (2) the object’s incriminating character was
    immediately apparent, meaning the officer had probable cause to believe the object
    was contraband or evidence of a crime, and (3) the officer had a lawful right of
    access to the object itself. Horton v. California, 
    496 U.S. 128
    , 134-36 (1990).
    However, “the ‘plain view’ doctrine may not be used to extend a general
    exploratory search from one object to another until something incriminating at last
    emerges.” Coolidge v. New Hampshire, 
    403 U.S. 443
    , 466 (1971).
    ¶ 112      This case presents the most common use of the plain view doctrine in the
    context of digital data, which occurs when law enforcement examines a computer
    pursuant to a search warrant and discovers evidence of a separate crime that falls
    - 28 -
    outside the scope of the search warrant. The inquiry focuses on whether an officer
    is exploring hard drive locations and opening files responsive to the warrant,
    considering both the types of files accessed and the crimes specified in the warrant.
    Johnston, 789 F.3d at 941-43. For example, in United States v. Wong, 
    334 F.3d 831
    , 838 (9th Cir. 2003), an agent uncovered child pornography on a hard drive
    while conducting a valid search of the drive for evidence of a murder. Because the
    agent was properly searching graphics files for evidence of the murder, the child
    pornography was properly seized and subsequently admitted under the plain view
    doctrine. 
    Id.
    ¶ 113       We agree with the State that the child pornography was admissible under the
    plain view doctrine, despite the warrant seeking evidence related to unauthorized
    video recording. The July 24, 2013, warrant authorized Feehan to search the
    EnCase file for evidence of the unauthorized video recording, including “any and
    all digital images, including, but not limited to JPG, GIF, TIF, AVI, MOV, and
    MPEG files.” Feehan testified that the child pornography was in the JPG file
    format. The trial court found there was no testimony that the first two images of
    child pornography were of a different file type or in different areas or directories of
    the computer than those previously subject to search under the warrant. Defendant
    does not quarrel with the court’s finding, which is not against the manifest weight
    of the evidence.
    ¶ 114        Defendant does not allege that Feehan accessed an area of the hard drive that
    fell outside the scope of the warrant or that Feehan would have reason to know,
    before opening the digital images, that they would not contain evidence of the
    crimes listed on the warrant. Feehan had lawful access to the EnCase file to search
    for images and video of unauthorized video recording, and he testified that the
    incriminating character of the two JPG files containing the child pornography was
    immediately apparent, meaning he had probable cause to believe the files were
    evidence of a crime. See Horton, 
    496 U.S. at 134
    . Finding the first two images
    caused Feehan to suspend his search before securing another warrant to search for
    additional images of child pornography.
    ¶ 115      As Feehan’s search was within the scope of the July 24, 2013, warrant and the
    images of child pornography were admissible under the plain view doctrine, we
    need not address the State’s alternate argument that the child pornography was
    - 29 -
    admissible under the good-faith exception to the warrant requirement.
    ¶ 116                                    III. CONCLUSION
    ¶ 117       To summarize, the warrant authorizing the search of defendant’s computer data
    diminished his expectation of privacy in the types of files described in the warrant.
    However, any postacquittal search of the same data, directed toward uncovering
    further evidence of the sexual assault, would have exceeded the scope of the
    warrant. In this case, Feehan’s data search was within the scope of the warrant
    because it was reasonably directed at uncovering evidence of unauthorized video
    recording, which was alleged in the warrant. Feehan’s search was not directed at
    finding evidence of criminal activity not described in the warrant. Therefore, the
    search was reasonable under the fourth amendment and resulted in the lawful
    discovery of child pornography in plain view.
    ¶ 118       For the preceding reasons, we hold that the appellate court erred in reversing
    the trial court’s denial of defendant’s motion to suppress evidence. We reverse the
    judgment of the appellate court and affirm the trial court’s denial of defendant’s
    motion to suppress the digital images supporting his convictions of child
    pornography.
    ¶ 119      Appellate court judgment reversed.
    ¶ 120      Circuit court judgment affirmed.
    ¶ 121      JUSTICE NEVILLE, dissenting:
    ¶ 122       In this case, the majority holds that the police did not violate McCavitt’s privacy
    rights after his acquittal for criminal sexual assault when they searched a copy of
    the data on his computer hard drive on March 24, 2014, with a search warrant issued
    on July 24, 2013, because (1) McCavitt’s acquittal of criminal sexual assault (a)
    only partially restored his right to privacy in his computer data involving charges
    of criminal sexual assault but (b) his acquittal did not restore his privacy rights in
    evidence of the second offense listed in the July 24, 2013, search warrant—an
    unauthorized video recording—and (2) police conducted the March 24, 2014,
    - 30 -
    search within a “reasonable time” after the circuit court issued the July 24, 2013,
    search warrant.
    ¶ 123       I agree with the majority that McCavitt had a reasonable expectation of privacy
    in the data on his computer hard drive. Supra ¶ 69. I also agree with the majority
    that McCavitt’s March 19, 2014, acquittal affected his privacy rights in his
    property. Supra ¶ 70. I disagree with the majority that (1) the search warrant issued
    on July 24, 2013, remained valid for 243 days until March 24, 2014, for searches
    for evidence of crimes for which McCavitt was not acquitted that were listed in the
    July 24, 2013, search warrant and (2) the police could lawfully remain in possession
    of McCavitt’s hard drive data for 243 days (from July 24, 2013, until March 24,
    2014) before the hard drive was searched for data.
    ¶ 124       I would find that the State’s March 24, 2014, search of McCavitt’s data violated
    his constitutional and statutory rights for three reasons: (1) McCavitt had a
    constitutional right to privacy in the personal data on his hard drive and his right to
    privacy cannot be interfered with or intruded upon without a valid warrant issued
    after a showing of probable cause; (2) section 108-6 of the Code of Criminal
    Procedure of 1963 (Code) (725 ILCS 5/108-6 (West 2020)) gave the police 96
    hours to execute the July 24, 2013, search warrant and search McCavitt’s hard drive
    for data, and once the 96 hours expired the search warrant was void (id.); and
    (3) once McCavitt was acquitted on March 19, 2014, section 108-11 of the Code
    mandated that the trial judge enter an order directing the State to return McCavitt’s
    property (id. § 108-11). Accordingly, I respectfully dissent.
    ¶ 125                                     BACKGROUND
    ¶ 126        On July 17, 2013, the circuit court issued its first warrant to search the single-
    family residence located at 1710 W. West Aire Avenue in Peoria, Illinois, and the
    Illinois State Police (ISP) executed the warrant and seized McCavitt’s computer
    and hard drive.
    ¶ 127       On July 24, 2013, the circuit court issued its second warrant, at 2:05 p.m., to
    “search and examine in greater detail” (1) a telephone possessing telephone number
    (309) 657-4*** and (2) an LG Computer Tower SN No. WMAZA2914641 that
    were seized on July 17, 2013, for digital images, for stored and deleted data, for
    - 31 -
    evidence of criminal activity, and for any evidence of aggravated criminal sexual
    assault, unlawful restraint, or unauthorized video recording.
    ¶ 128       The parties stipulated that on July 25, 2013, the ISP transported McCavitt’s
    hard drive to Detective Jeff Avery, a member of the Peoria County Sheriff’s
    Department (PCSD) and a forensic examiner on special assignment to the U.S.
    Attorney’s office. Detective Avery testified that he removed the hard drive from
    McCavitt’s computer, copied it, and saved the copy, called an “EnCase file,” to the
    State’s computer. Detective Avery did not testify about the exact date he began his
    search, but he performed an examination of the EnCase file and found images and
    videos pertaining to a sexual assault.
    ¶ 129       After Detective Avery’s search, a grand jury indicted McCavitt on August 6,
    2013, for the first time, on multiple counts of criminal sexual assault and aggravated
    criminal sexual assault. On March 19, 2014, a jury found McCavitt not guilty on
    all of the sexual assault charges. Once the not guilty verdict was returned in open
    court, McCavitt’s attorney made an oral motion requesting that the trial court return
    items confiscated from McCavitt, including some “collector guns.” The court
    instructed McCavitt’s attorney to make his request “in the form of a motion.”
    ¶ 130        On March 21, 2014, two days after McCavitt’s acquittal, Detective James
    Feehan, a computer forensic examiner for the Peoria Police Department (PPD),
    requested a copy of the EnCase file for purposes of an internal affairs investigation
    of McCavitt regarding allegations of sexual assault and other possible offenses. On
    March 24, 2014, Detective Feehan received a copy of Detective Avery’s EnCase
    file, searched it for images of sexual assault “as the [July 24, 2013, search] warrant
    had authorized,” and discovered two images of child pornography.
    ¶ 131       Also on March 24, 2014, five days after McCavitt’s acquittal and pursuant to
    the trial judge’s instructions, his attorney filed a written motion for return of
    confiscated property.
    ¶ 132      On March 28, 2014, police arrested McCavitt and charged him with
    unauthorized video recording. On April 1, 2014, 13 days after McCavitt’s acquittal,
    Feehan obtained a third warrant. Once the circuit court issued the third warrant,
    Feehan resumed his search and located additional images of child pornography. On
    - 32 -
    April 23, 2014, a grand jury indicted McCavitt on 10 counts of child pornography
    and aggravated child pornography.
    ¶ 133       On April 24, 2014, the circuit court entered a written order that (1) directed ISP
    to return all guns and weapons to McCavitt instanter and (2) “generally continued”
    McCavitt’s motion for return of confiscated property.
    ¶ 134       On August 15, 2014, McCavitt filed a motion to suppress evidence in the child
    pornography case. On October 21, 2014, the circuit court denied McCavitt’s motion
    to suppress evidence. On July 10, 2015, McCavitt was indicted on seven additional
    counts of child pornography. On July 14, 2015, a jury found McCavitt guilty of 15
    of 17 counts of child pornography. On December 1, 2017, the circuit court
    sentenced McCavitt to five years’ imprisonment. The appellate court, with one
    justice dissenting, reversed McCavitt’s conviction. 
    2019 IL App (3d) 170830
    . We
    allowed the State’s petition for leave to appeal. Ill. S. Ct. R. 315 (eff. Oct. 1, 2019).
    ¶ 135                                        ANALYSIS
    ¶ 136                                   A. Standard of Review
    ¶ 137       This appeal involves a determination of McCavitt’s rights under Illinois’s
    constitution (Ill. Const. 1970, art. I, § 6) and statutory provisions (725 ILCS 5/108-
    6, 108-11 (West 2020)). When construing a constitutional provision, this court’s
    goal is to determine and effectuate the common understanding of the persons who
    adopted it—the citizens of this state—and to that end, we will consider the natural
    and popular meaning of the words used as well as the object to be attained or the
    evil to be remedied. Walker v. McGuire, 
    2015 IL 117138
    , ¶ 16. Where the language
    of a constitutional provision is unambiguous, we give it effect without resort to aids
    for construction (id.), meaning that we will not depart from the plain language of a
    provision by construing it so that any part is rendered meaningless or superfluous;
    nor will we read into a provision exceptions, limitations, or conditions that do not
    appear on its face or that conflict with its intent (People v. Burge, 
    2021 IL 125642
    ,
    ¶ 34 (citing People v. Perry, 
    224 Ill. 2d 312
    , 323 (2007))). The interpretation and
    application of constitutional provisions presents a question of law that we review
    de novo. Gregg v. Rauner, 
    2018 IL 122802
    , ¶ 23 (citing Hawthorne v. Village of
    Olympia Fields, 
    204 Ill. 2d 243
    , 254-55 (2003)). We follow the same rules for
    - 33 -
    statutory interpretation that we use to construe constitutional provisions, and
    statutory interpretation also presents a question of law that we review de novo.
    People v. Wise, 
    2021 IL 125392
    , ¶ 23.
    ¶ 138       The ultimate issue in this case is whether the March 24, 2014, search of the
    State’s EnCase file with a search warrant issued 243 days earlier, on July 24, 2013,
    violated McCavitt’s constitutional and statutory rights. The legality of the March
    24, 2014, search is a question of law we review de novo. People v. Bonilla, 
    2018 IL 122484
    , ¶ 10 (citing People v. Caballes, 
    221 Ill. 2d 282
    , 289 (2006)).
    ¶ 139                         B. McCavitt Had a Constitutional Right
    to Privacy in His Data Under Article I, Section 6,
    of the Illinois Constitution
    ¶ 140       The Illinois Constitution, unlike the federal constitution, specifically codifies a
    person’s right to privacy in one’s person, house, papers, and possessions against
    unreasonable searches and seizures. Ill. Const. 1970, art. I, § 6. Privacy rights are
    so important to Illinois citizens that the delegates to the sixth constitutional
    convention codified them in Illinois’s constitution. See also id. § 1. “This court has
    observed that the Illinois Constitution goes beyond federal constitutional
    guarantees by expressly recognizing a zone of personal privacy, and that the
    protection of that privacy is stated broadly and without restrictions.” Kunkel v.
    Walton, 
    179 Ill. 2d 519
    , 537 (1997); see also Ill. Const. 1970, art. I, § 1. Therefore,
    article I, section 6, of the Illinois Constitution gives McCavitt a right to privacy in
    the data on his hard drive. Ill. Const. 1970, art. I, § 6.
    ¶ 141                           C. The July 24, 2013, Search Warrant
    Was Void 96 Hours After
    Its Issuance Under Section 108-6 of the Code
    ¶ 142      The majority maintains that the March 24, 2014, search pursuant to the search
    warrant issued on July 24, 2013, was reasonable (1) because of “the intervening
    sexual assault prosecution” and (2) because of “the sheer volume of data in the
    EnCase file.” Supra ¶ 108.
    - 34 -
    ¶ 143      The majority completely ignores the plain language of section 108-6 of the
    Code (725 ILCS 5/108-6 (West 2020)). See supra ¶¶ 105-08. Section 108-6
    provides, in pertinent part, as follows: “The warrant shall be executed within 96
    hours [(four days)] from the time of issuance. *** Any warrant not executed within
    such time shall be void and shall be returned to the court of the judge issuing the
    same as ‘not executed’.” 725 ILCS 5/108-6 (West 2020).
    ¶ 144       The plain language of section 108-6 requires warrants to be executed and
    searches to be conducted within 96 hours, or four days, after the date and time they
    were issued, or the warrant is void. See id. The July 24, 2013, search warrant
    directed the police who seized possession of McCavitt’s computer on July 17, 2013,
    to “search and examine in greater detail *** an LG computer tower.” There is no
    language in section 108-6 that tolls the running of the 96 hours (1) because of
    intervening prosecutions, (2) because of the volume of data in a file being searched,
    or (3) because of an arbitrator’s ruling or the police department’s collective
    bargaining agreement (supra ¶ 25 n.2). See 725 ILCS 5/108-6 (West 2020). There
    is also no evidence that the police requested that the trial judge extend the time for
    the police to search the data on McCavitt’s hard drive. Finally, this court may not
    depart from section 108-6’s plain language by reading into it exceptions,
    limitations, or conditions the legislature did not express. Burge, 
    2021 IL 125642
    ,
    ¶ 20.
    ¶ 145       The United States Supreme Court provides guidance on what happens when a
    limitation provision in a search warrant statute expires. In Sgro v. United States,
    
    287 U.S. 206
    , 208 (1932), a commissioner under the National Prohibition Act
    (Prohibition Act) issued a search warrant on July 6, 1926, pursuant to 
    18 U.S.C. §§ 613-616
     (1926) (repealed). Section 11 of the Prohibition Act required that the
    “ ‘warrant must be executed and returned to the *** commissioner who issued it
    within ten days after its date.’ ” Sgro, 
    287 U.S. at 210
     (quoting 
    18 U.S.C. § 621
    (1926)). The Prohibition Act also provided that “ ‘after the expiration of [the 10
    days] the warrant, unless executed, is void.’ ” 
    Id.
     (quoting 
    18 U.S.C. § 11
     (1926)).
    The government did not execute the warrant within 10 days of July 6, 1926. On
    July 27, 1926, the commissioner redated and reissued the warrant, and the
    government conducted the search. Id. at 208-09. The trial court denied the
    defendant’s motion to suppress evidence seized under the invalid warrant and
    admitted the evidence over the defendant’s objection. Id. at 208. The Second Circuit
    - 35 -
    Court of Appeals affirmed. Id. (citing Sgro v. United States, 
    54 F.2d 1083
     (2d Cir.
    1932)).
    ¶ 146       The Supreme Court noted that there was no provision in the statute that
    authorized the commissioner to extend the life of the warrant or to revive it. Instead,
    the government was required to obtain a new warrant and to follow all of the
    procedures under the statute. Id. at 211. The Supreme Court held that, because the
    original warrant was issued on July 6 and was not executed within 10 days, it
    became void and could not be redated or reissued by the commissioner. Id. at 210-
    11 (citing 
    18 U.S.C. § 621
     (1926)).
    ¶ 147       On March 24, 2014, 239 days after the search warrant expired on July 28, 2013,
    Detective Feehan conducted a search of the EnCase file, leading to the discovery
    of suspected child pornography. Because the July 24, 2013, search warrant expired
    on July 28, 2013, and therefore was void (see id. at 208-09), the search warrant did
    not confer any rights on the State or Detective Feehan to conduct the March 24,
    2014, search of McCavitt’s data. The 243-day delay in searching McCavitt’s data
    was unreasonable and violated McCavitt’s constitutional and statutory rights. Ill.
    Const. 1970, art. I, § 6; 725 ILCS 5/108-6 (West 2020).
    ¶ 148       The July 24, 2013, search warrant expired on July 28, 2013, and was void (see
    Sgro, 
    287 U.S. at 208-09
    ), and the search the police conducted on March 24, 2014,
    239 days after the search warrant expired, violated section 108-6 (see 725 ILCS
    5/108-6 (West 2020); see also Sgro, 
    287 U.S. at 212
    ). Moreover, any evidence that
    Detective Feehan may have discovered in plain view on March 24, 2014, pursuant
    to the void July 24, 2013, search warrant was the fruit of the illegal search and must
    be suppressed. See Wong Sun v. United States, 
    371 U.S. 471
    , 485-88 (1963)
    (holding that evidence seized during an unlawful search cannot be used as proof
    against the victim of the search when the unlawful conduct of the police cannot be
    purged from the primary taint). Therefore, following Sgro, I submit that the July
    24, 2013, search warrant became void on July 28, 2013, and that, without a new
    warrant, no search could take place after that date and any evidence seized was the
    fruit of the illegal search. 
    Id.
    - 36 -
    ¶ 149                           D. McCavitt Had a Right to Have
    His Hard Drive Returned Under Section 108-11
    ¶ 150       The majority takes the position that section 108-11 “contemplates a motion and
    a hearing before an order is entered disposing of seized items.” Supra ¶ 82. I submit
    that the majority is ignoring the plain language of the statute and, therefore, the trial
    court’s failure to order the return of McCavitt’s property, instanter, cannot be
    justified by McCavitt’s failure to file a written motion. See 725 ILCS 5/108-11
    (West 2020).
    ¶ 151       Section 108-11 of the Code provides: “The court before which the instruments,
    articles or things are returned shall enter an order providing for their custody
    pending further proceedings.” 725 ILCS 5/108-11 (West 2020). There is nothing in
    the plain language of section 108-11 to support the majority’s position that the
    statute has a written motion or hearing requirement. See id. The majority has read
    conditions into the statute—a requirement for a motion and a hearing—that are not
    contained in the plain language of the statute. See id. The majority violates this
    court’s well-established rules of statutory construction that the court will not depart
    from the plain statutory language by reading in exceptions, limitations, or
    conditions not expressed by the legislature. People v. Wise, 
    2021 IL 125392
    , ¶ 23.
    The majority ignored the language in section 108-11 of the Code when it found that
    McCavitt failed to file a motion or request a hearing for return of his computer and
    the data on his hard drive. Supra ¶ 82.
    ¶ 152       When the State seizes property pursuant to a valid warrant (the July 24, 2013,
    search warrant expired on July 28, 2013, and was void), the custody and disposition
    of the seized property is controlled by section 108-11 of the Code. See People
    ex rel. Carey v. Covelli, 
    61 Ill. 2d 394
     (1975); 725 ILCS 5/108-11 (West 2020).
    This court has construed section 108-11 to be the applicable statute when a person
    seeks the return of property seized by the State. See Covelli, 
    61 Ill. 2d 394
    . In
    Covelli, the plaintiffs sought the return of their deceased father’s property that
    police seized pursuant to a search warrant to discover the identity of the person who
    murdered their father. 
    Id. at 398
    . The plaintiffs argued that section 114-12(a) of the
    Code (Ill. Rev. Stat. 1973, ch. 38, ¶ 114-12) did not provide a remedy for the return
    of their father’s property because there were no “defendants” in the case, as no one
    had been charged with the murder. Covelli, 
    61 Ill. 2d at 402
    . This court rejected the
    - 37 -
    plaintiffs’ argument and pointed out that the plaintiffs had “failed to consider article
    108 of the Code.” 
    Id.
     This court held that section 108-11 of the Code provided
    protection to the plaintiffs’ interests in their “property and privacy.” 
    Id. at 403
    .
    ¶ 153       Section 108-11 gave the trial court, upon McCavitt’s March 19, 2014, acquittal
    with the entry of the not guilty jury verdict, the authority to order the return of
    McCavitt’s property instanter since the statute did not require McCavitt to file a
    motion or the judge to hold a hearing. 725 ILCS 5/108-11 (West 2020). It should
    be noted that, after a hearing on McCavitt’s written motion, the trial judge ordered
    the return of McCavitt’s guns but continued the remainder of the motion. The trial
    judge abused his discretion by failing to order a return of the EnCase file upon
    McCavitt’s acquittal and his attorney’s oral motion on March 19, 2014, because,
    without a motion or hearing requirement, section 108-11 of the Code gave the trial
    court authority, sua sponte, to enter an order directing the State to return McCavitt’s
    seized property. See 
    id.
    ¶ 154                      1. McCavitt’s Right to His Computer Data
    Was Never Lost So It Did Not Need to Be Restored
    ¶ 155       The majority maintains, without citation of authority, that McCavitt’s acquittal
    only partially restored his expectation of privacy in his data. Supra ¶ 72. The
    majority takes the position that, after the March 19, 2014, acquittal, the July 24,
    2013, search warrant “still authorized a search for evidence of unauthorized video
    recording[s].” Supra ¶ 106. The majority cites the double jeopardy provision in
    support of its position that upon McCavitt’s acquittal he only “regained a
    reasonable expectation that the police would not search his computer for evidence
    of the offenses of which he was acquitted [on March 19, 2014.]” Supra ¶ 76.
    ¶ 156       I disagree. The double jeopardy provision only prevents McCavitt from being
    tried a second time for the criminal sexual assault offenses for which he was
    acquitted. See Ill. Const. 1970, art. I, § 10 (“No person shall be *** twice put in
    jeopardy for the same offense.”). The double jeopardy provision did not determine
    whether McCavitt’s article I, section 6, right to privacy in his computer data was
    fully restored upon his acquittal.
    - 38 -
    ¶ 157       Illinois’s constitution and statutes codify a right to vote, serve on a jury, and
    hold public office. See Ill. Const. 1970, art. III, § 1; id. art. XIII, § 1; 705 ILCS
    305/1, 2 (West 2020); see Hoskins v. Walker, 
    57 Ill. 2d 503
    , 508-09 (1974) (finding
    the right to be a candidate for office is not absolute and limitations may be imposed
    by the legislature). Upon conviction of a felony, Illinois’s constitution and statutes
    provide that a person shall lose the rights to vote, to serve on a jury, and to hold
    public office. See Ill. Const. 1970, art. III, § 2; id. art. XIII, § 1; 705 ILCS
    305/2(a)(3) (West 2020). Illinois’s constitution and statutes also provide that
    certain rights that are lost because of a conviction of a felony are immediately
    restored upon completion of the sentence. Ill. Const. 1970, art. III, § 2; 730 ILCS
    5/5-5-5(a), (b), (c) (West 2020); 705 ILCS 305/2(a)(3) (West 2020) (“Jurors must
    be: *** [f]ree from all legal exception”). Illinois statutes also provide that the rights
    to vote, to serve on a jury, and to hold public office are automatically restored no
    later than upon the completion of any sentence for a felony conviction. 705 ILCS
    305/2(a)(3) (West 2020); 730 ILCS 5/5-5-5(a), (b), (c) (West 2020). A conviction
    does not result in the loss of any “civil rights” except as provided by section 5-5-5
    of the Unified Code of Corrections (730 ILCS 5/5-5-5 (West 2020)) or sections 29-
    6 and 29-10 of the Election Code (10 ILCS 5/29-6, 29-10 (West 2020)).
    ¶ 158       It should be noted that neither Illinois’s constitution nor its statutes provide for
    a loss of the right to privacy at any time. See Ill. Const. 1970; 730 ILCS 5/5-5-5
    (West 2020). I submit that the right to privacy in one’s property, like the rights to
    vote, serve on a jury, and hold public office, can only be lost, if lost at all, upon
    conviction of a felony. See Ill. Const. 1970, art. III, § 2; id. art. XIII, § 1; 705 ILCS
    305/2(a)(3) (West 2020).
    ¶ 159       Here, McCavitt was only charged with criminal offenses for which he was
    presumed innocent. See People v. Robinson, 
    167 Ill. 2d 53
    , 74 (1995). Because
    McCavitt was acquitted and had not been convicted of a felony on March 19, 2014,
    he never lost his right to his property and was not required by section 108-11 to
    take any action, including filing a motion, to have the trial judge return his property.
    725 ILCS 5/108-11 (West 2020); see also Ill. Const. 1970, art. I, § 6; id. art. I, § 13;
    id. art. XIII, § 1; 705 ILCS 305/2(a)(3) (West 2020); 730 ILCS 5/5-5-5(a), (b), (c)
    (West 2020). Therefore, since McCavitt’s article I, section 6, right to his property
    was never lost, and since the two images of child pornography were found by
    Detective Feehan on March 24, 2014, five days after McCavitt’s acquittal, his
    - 39 -
    property should have been returned instanter upon his acquittal by the trial judge
    because he had an inherent and inalienable right to “the protection of [his]
    property.” Ill. Const. 1970, art. I, § 1.
    ¶ 160                  2. The Majority’s Reliance on Hughes Is Misplaced
    ¶ 161       The majority maintains that McCavitt’s acquittal did not nullify the July 24,
    2013, search warrant entirely (supra ¶ 85) and cites People v. Hughes, 
    958 N.W.2d 98
     (Mich. 2020) (en banc), to support its position (supra ¶ 90). According to the
    majority, the March 24, 2014, search for evidence of McCavitt’s video recordings
    was within the scope of that portion of the void July 24, 2013, search warrant for
    the uncharged offenses ((1) unlawful restraint and (2) unauthorized video recording
    and live video transmission) that were not resolved by McCavitt’s acquittal. Supra
    ¶ 89. Therefore, the majority argues the March 24, 2014, search was “consistent
    with the warrant.” Supra ¶ 104.
    ¶ 162       The majority’s argument presumes the July 24, 2013, search warrant was valid
    and ignores section 108-6 of the Code, which provides that a warrant must be
    executed and the search conducted within 96 hours after it is issued or it is void.
    See 725 ILCS 5/108-6 (West 2020). The majority never explains how a search
    warrant that was issued on July 24, 2013, and that became void on July 28, 2013,
    could be used to execute a search of McCavitt’s computer hard drive and data on
    March 24, 2014, fully 243 days after it was issued. See id.; Riley v. California, 
    573 U.S. 373
    , 403 (2014) (requiring a warrant before the state may search electronic
    data).
    ¶ 163       Finally, the majority’s reliance on Hughes is misplaced. Hughes was a
    Michigan case where the police obtained a warrant for drug dealing and, during a
    search of the defendant’s cell phone data, discovered evidence of the defendant’s
    involvement in an armed robbery. Hughes, 958 N.W.2d at 105-06. The Hughes
    court held that the police were permitted to seize and search the data on the cell
    phone “only to the extent reasonably consistent with the scope of the warrant.” Id.
    at 111.
    ¶ 164       First, Hughes is inapposite because the Michigan warrant in Hughes was valid,
    but in this case the police based their search on the July 24, 2013, search warrant
    - 40 -
    that was void because it was issued 243 days before the search was conducted by
    the police. Id. Second, Hughes is also inapposite because there was no Michigan
    statute like section 108-6 of the Code that placed a 96-hour limit on the execution
    of a search warrant by the police. See id. at 106; 
    Mich. Comp. Laws § 780.651
    (2014). Third, Hughes is inapposite because the defendant in Hughes was not
    acquitted of certain charges delineated in the warrant. Hughes, 958 N.W.2d at 104-
    05. Therefore, because Detective Feehan could not conduct a search for data within
    the scope of the void July 24, 2013, search warrant, Hughes provides no support
    for the majority’s position.
    ¶ 165                                      CONCLUSION
    ¶ 166       McCavitt had a constitutional right to the control and possession of his data
    until the issuance of the July 17, 2013, and July 24, 2013, search warrants. Riley,
    573 U.S. at 386. Upon the issuance of the July 17, 2013, and July 24, 2013, search
    warrants, McCavitt’s right to his property was temporarily suspended but was never
    lost because he had not been convicted of a felony on March 24, 2014, and the
    warrants gave the police 96 hours to search the data on his hard drive. In light of
    the fact that the July 24, 2013, search warrant became void on July 28, 2013,
    McCavitt’s March 19, 2014, acquittal immediately restored his right to the
    immediate return of the data in the State’s EnCase file. The evidence the police
    discovered after July 28, 2013, was the fruit of an illegal search with a void search
    warrant and should not have been admitted into evidence against McCavitt. The
    legislature should amend section 108-11 of the Code and make it clear that, after
    an acquittal, a citizen’s property (1) that is seized pursuant to a valid search warrant
    and (2) that is not contraband or obscene must be returned instanter. Therefore, I
    respectfully dissent, and I would affirm the appellate court’s judgment and remand
    this case to the circuit court with directions to exclude all evidence that was
    discovered by the police during the illegal search conducted by the police after July
    28, 2013.
    - 41 -
    

Document Info

Docket Number: 125550

Citation Numbers: 2021 IL 125550

Filed Date: 10/21/2021

Precedential Status: Precedential

Modified Date: 11/20/2021

Authorities (43)

People v. Pitman , 211 Ill. 2d 502 ( 2004 )

United States v. Jones , 132 S. Ct. 945 ( 2012 )

People v. Burge , 2021 IL 125642 ( 2021 )

People v. Perry , 224 Ill. 2d 312 ( 2007 )

United States v. Donald Syphers , 426 F.3d 461 ( 2005 )

United States v. Martin Linen Supply Co. , 97 S. Ct. 1349 ( 1977 )

Village of Lake Villa v. Stokovich , 211 Ill. 2d 106 ( 2004 )

Brigham City v. Stuart , 126 S. Ct. 1943 ( 2006 )

Coolidge v. New Hampshire , 91 S. Ct. 2022 ( 1971 )

Horton v. California , 110 S. Ct. 2301 ( 1990 )

Walker v. McGuire , 2015 IL 117138 ( 2015 )

People v. Bonilla , 2018 IL 122484 ( 2019 )

People Ex Rel. Carey v. Covelli , 61 Ill. 2d 394 ( 1975 )

United States v. Raymond Wong , 334 F.3d 831 ( 2003 )

Hawthorne v. Village of Olympia Fields , 204 Ill. 2d 243 ( 2003 )

United States v. Gorrell , 360 F. Supp. 2d 48 ( 2004 )

Kunkel v. Walton , 179 Ill. 2d 519 ( 1997 )

Sgro v. United States , 53 S. Ct. 138 ( 1932 )

Gregg v. Rauner , 2018 IL 122802 ( 2019 )

People v. Wise , 2021 IL 125392 ( 2021 )

View All Authorities »