People v. McCavitt ( 2020 )


Menu:
  •                                                                           Digitally signed by
    Reporter of
    Decisions
    Reason: I attest to
    Illinois Official Reports                         the accuracy and
    integrity of this
    document
    Appellate Court                            Date: 2020.05.22
    18:36:11 -05'00'
    People v. McCavitt, 
    2019 IL App (3d) 170830
    Appellate Court     THE PEOPLE OF THE STATE OF ILLINOIS, Plaintiff-Appellee, v.
    Caption             JOHN T. McCAVITT, Defendant-Appellant.
    District & No.      Third District
    No. 3-17-0830
    Filed               November 26, 2019
    Decision Under      Appeal from the Circuit Court of Peoria County, No. 14-CF-282; the
    Review              Hon. Albert L. Purham Jr., Judge, presiding.
    Judgment            Reversed and remanded.
    Counsel on          Joshua B. Kutnick and Taylor Spratt, both of Chicago, for appellant.
    Appeal
    Jerry Brady, State’s Attorney, of Peoria (Patrick Delfino, David J.
    Robinson, and Justin A. Nicolosi, of State’s Attorneys Appellate
    Prosecutor’s Office, of counsel), for the People.
    Panel               JUSTICE LYTTON delivered the judgment of the court, with
    opinion.
    Justice McDade concurred in the judgment and opinion.
    Justice Wright dissented, with opinion.
    OPINION
    ¶1       Defendant John T. McCavitt was charged with 17 counts of child pornography based on
    images found on his personal computer. He filed a motion to suppress, arguing that the search
    of his computer was unlawful. Following a hearing, the trial court denied defendant’s motion,
    and the case proceeded to trial. The jury found him guilty of 15 counts of child pornography.
    The trial court sentenced defendant on 11 counts to five years in prison, probation, and
    mandatory supervised release. On appeal, defendant argues that (1) the trial court erred in
    denying his motion to suppress, (2) he was denied effective assistance of counsel, (3) the trial
    court erred in admitting certain evidence at trial, and (4) the prosecutor’s statements during
    closing argument warrant reversal. We reverse, finding that the trial court erred in denying
    defendant’s motion to suppress.
    ¶2                                        I. BACKGROUND
    ¶3       On July 17, 2013, the Illinois State Police obtained a search warrant to search the home of
    defendant, a police officer employed by the Peoria Police Department. The warrant authorized
    the seizure of “any electronic media cable [sic] of video/audio recording” and “any electronic
    storage media capable of stor[ing] pictures, audio or video.” During the execution of the
    warrant, officers seized defendant’s computer.
    ¶4       On July 24, 2013, the Illinois State Police sought and obtained a subsequent search warrant
    authorizing law enforcement personnel to search defendant’s computer for “any and all digital
    images” and “any evidence of” aggravated criminal sexual assault, unlawful restraint, and
    unauthorized video recording/live video transmission. Detective Jeff Avery of the Peoria
    County Sheriff’s Department, a forensic examiner, examined defendant’s computer. He
    removed the hard drive from the computer and made an exact copy, or mirror image, of it using
    EnCase software. A copy of the hard drive, called “EnCase evidence file,” was saved on
    Avery’s computer.
    ¶5       Based on images police found on defendant’s computer, the State charged defendant with
    aggravated criminal sexual assault (720 ILCS 5/11-1.30(a)(4) (West 2012)) and criminal
    sexual assault (id. § 11-1.20(a)(1)) on August 6, 2013. That case proceeded to trial. On March
    19, 2014, defendant was found not guilty of all charges. On that same day, defendant orally
    requested the return of his personal property, including his computer. The court denied the
    request, stating that defendant’s property would be returned to him when everything “cooled
    down.”
    ¶6       On March 20, 2014, the Peoria Police Department initiated a formal investigation of
    defendant. The next day, Peoria police detective James Feehan, a computer forensics examiner,
    requested a copy of the EnCase file from Avery. Avery delivered the EnCase file to Feehan
    the same day. On March 24, 2014, Feehan began a digital forensic analysis on the EnCase file
    and saw two images of what he believed to be child pornography. On the same day, defendant
    filed a written motion seeking to have his property returned to him. That motion was never
    ruled on. On March 28, 2014, defendant was arrested and charged with unauthorized video
    recording (720 ILCS 5/26-4(a) (West 2014)).
    ¶7       On April 1, 2014, Feehan sought and obtained a search warrant to search defendant’s
    EnCase file for images of child pornography. After further examination, Feehan discovered
    -2-
    additional images of child pornography. On April 28, 2014, the State filed a 10-count
    indictment against defendant, charging him with seven counts of aggravated child pornography
    (720 ILCS 5/11-20.1B (West 2010)), a Class 2 felony, and three counts of child pornography
    (720 ILCS 5/11-20.1 (West 2012)), a Class 3 felony, based on five images found in defendant’s
    EnCase file.
    ¶8          Defendant filed a motion to suppress, arguing that Feehan had no authority to obtain and
    examine the contents of the EnCase file in March 2014. A hearing was held on the motion. At
    the hearing, Feehan testified that he was aware that defendant was acquitted of the sexual
    assault charges on March 19, 2014, and that no other charges were pending. On March 21,
    2014, Feehan requested defendant’s EnCase file from Avery based on the Peoria Police
    Department’s internal investigation of defendant. Feehan knew that the EnCase file had been
    seized in connection with the sexual assault charges filed against defendant. Feehan testified
    that he “knew that there was [sic] other victims that could be identified during the formal
    [investigation] that would turn criminal.” Feehan did not believe he needed a search warrant
    or other court order to obtain the EnCase file “[b]ecause of case law that [he] was aware of”
    since defendant’s computer was previously seized “[p]ursuant to a lawful search warrant.” The
    trial court entered an order denying defendant’s motion to suppress.
    ¶9          On July 10, 2015, the State amended its indictment and charged defendant with seven
    additional counts of child pornography (720 ILCS 5/11-20.1(a)(6) (West 2014)), a Class 2
    felony, based on seven additional images found in defendant’s EnCase file. The case proceeded
    to a jury trial in July 2016.
    ¶ 10        At trial, Feehan testified that he has been a police officer for 21 years and been employed
    by the Peoria Police Department for 18 years. He has been a digital forensic examiner for 17
    years and completed approximately 500 hours of digital forensics training. The State
    introduced into evidence 12 images Feehan found in defendant’s EnCase file. Those images
    formed the basis of the child pornography charges against defendant.
    ¶ 11        The jury found defendant guilty of 15 of the 17 counts of child pornography. Defendant
    filed posttrial motions, which the trial court denied. The trial court accepted the jury’s verdict
    as to 10 counts of Class 2 felony child pornography and one count of Class 3 felony child
    pornography. The trial court sentenced defendant to five years in prison on one count, followed
    by mandatory supervised release of three years to life. The court sentenced defendant to
    probation of 48 months on the remaining 10 counts, to be served consecutively to defendant’s
    prison sentence.
    ¶ 12                                        II. ANALYSIS
    ¶ 13       Defendant first argues that the trial court erred in denying his motion to suppress. He
    contends that Feehan’s search of his EnCase file eight months after the initial warrant was
    issued and following his acquittal of sexual assault charges violated his fourth amendment
    rights. The State responds that defendant had no expectation of privacy in his EnCase file,
    which had been confiscated pursuant to a valid warrant. The State alternatively contends that
    even if a fourth amendment violation occurred, the evidence should not be suppressed because
    Feehan acted in good faith.
    -3-
    ¶ 14                                         A. Fourth Amendment
    ¶ 15       The fourth amendment to the United States Constitution protects the “right of the people
    to be secure in their persons, houses, papers, and effects, against unreasonable searches and
    seizures.” U.S. Const., amend. IV. Similarly, article I, section 6, of the Illinois Constitution
    states that “people shall have the right to be secure in their persons, houses, papers and other
    possessions against unreasonable searches [and] seizures.” Ill. Const. 1970, art. I, § 6. Illinois
    courts have interpreted the search and seizure provisions of the Illinois Constitution in “limited
    lockstep” with the fourth amendment. People v. Caballes, 
    221 Ill. 2d 282
    , 313-14 (2006).
    ¶ 16       Fourth amendment protections apply where (1) the person subject to a search or seizure
    had a subjective expectation of privacy in the thing seized or place searched and (2) that
    expectation of privacy is one that society accepts as objectively reasonable. California v.
    Greenwood, 
    486 U.S. 35
    , 39 (1988). A threshold question in fourth amendment analysis is
    whether a defendant has a reasonable expectation of privacy in the things and places searched.
    See People v. Collins, 
    106 Ill. 2d 237
    , 265 (1985).
    ¶ 17       Individuals have a reasonable expectation of privacy in their personal computers and
    computer files. United States v. Heckenkamp, 
    482 F.3d 1142
    , 1147 (9th Cir. 2007); United
    States v. Broy, 
    209 F. Supp. 3d 1045
    , 1053-54 (C.D. Ill. 2016); People v. Blair, 
    321 Ill. App. 3d 373
    , 381 (2001) (Homer, J., specially concurring). However, an owner’s expectation of
    privacy is “significantly reduced” once an item has been lawfully seized and searched by
    police. United States v. Burnette, 
    698 F.2d 1038
    , 1049 (9th Cir. 1983). “The contents of an
    item previously searched are simply no longer private.” 
    Id.
     Once an item has been lawfully
    seized and searched, subsequent searches may be conducted without a warrant as long as the
    item remains in the continuous possession of the police. Id.; United States v. Pace, 
    898 F.2d 1218
    , 1243 (7th Cir. 1990).
    ¶ 18       The fourth amendment does not require that search warrants contain expiration dates.
    United States v. Gerber, 
    994 F.2d 1556
    , 1559 (11th Cir. 1993). Additionally, “it contains no
    requirements about when the search or seizure is to occur or the duration.” (Emphases in
    original.) 
    Id.
     The relevant test is the reasonableness of the search under all of the circumstances.
    Coolidge v. New Hampshire, 
    403 U.S. 443
    , 509 (1971) (Black, J., concurring and dissenting,
    joined by Burger and Blackmun, JJ.). Reasonableness must be decided on a case-by-case basis.
    
    Id. at 509-10
    .
    ¶ 19       “[U]nder current law there is no established upper limit as to when the government must
    review seized electronic data to determine whether the evidence seized falls within the scope
    of a warrant.” United States v. Metter, 
    860 F. Supp. 2d 205
    , 215 (E.D.N.Y. 2012). “[C]omputer
    searches are not, and cannot be subject to any rigid time limit because they may involve much
    more information than an ordinary document search, more preparation and a greater degree of
    care in their execution.” United States v. Triumph Capital Group, Inc., 
    211 F.R.D. 31
    , 66
    (D. Conn. 2002). Nevertheless, the fourth amendment requires the government to complete its
    review of electronic data “within a ‘reasonable’ period of time.” Metter, 860 F. Supp. 2d at
    215. A review of seized electronic data is reasonable even if it takes several years to complete
    as long as the search ends prior to trial and does not exceed the parameters of the original
    search warrant. See United States v. Johnston, 
    789 F.3d 934
    , 942-43 (9th Cir. 2015).
    ¶ 20       Because it is impractical to forensically examine a hard drive in a person’s home or office,
    copying electronic data by creating a mirror image of a computer hard drive for later analysis
    offsite had become a common practice that does not violate the fourth amendment. See United
    -4-
    States v. Veloz, 
    109 F. Supp. 3d 305
    , 313 (D. Mass. 2015); In re Search of Information
    Associated With the Facebook Account Identified by the Username Aaron.Alexis That Is Stored
    at Premises Controlled by Facebook, Inc., 
    21 F. Supp. 3d 1
    , 9 (D.D.C. 2013). Additionally,
    retention of a mirrored hard drive during the pendency of an investigation and trial does not
    violate the fourth amendment. See United States v. Ganias, 
    824 F.3d 199
    , 225 (2d Cir. 2016).
    ¶ 21       However, the government may not retain seized property indefinitely. United States v.
    Premises Known as 608 Taylor Avenue, Apartment 302, Pittsburgh, Pennsylvania, 
    584 F.2d 1297
    , 1302 (3d Cir. 1978). The fourth amendment may be violated when the State fails to
    quickly return information contained in a mirrored hard drive that is not within the scope of
    the warrant. See Veloz, 109 F. Supp. 3d at 313. “[W]hen items outside the scope of a valid
    warrant are seized, the normal remedy is suppression and return of those items ***.” United
    States v. Matias, 
    836 F.2d 744
    , 747 (2d Cir. 1988). It violates the fourth amendment for the
    State to seize and retain all data in a mirrored hard drive regardless of whether a warrant
    authorizes its seizure. See In re Search, 21 F. Supp. 3d at 10; People v. Thompson, 
    28 N.Y.S.3d 237
    , 258-59 (Sup. Ct. 2016). A New York court explained as follows:
    “When a warrant is issued which authorizes a search of paper records, the government
    is entitled to search the files and seize responsive material. They are not permitted to
    search the files, seize responsive material and then retain files they have never
    identified as relevant for multiple years, because, at some later time, they might want
    to search the files again. A search warrant which authorizes a search of voluminous
    digital records is no different. As Defendant’s counsel during an argument pointed out,
    overseizure is ‘a courtesy that was developed for law enforcement.’ It is not a license
    for the government to retain tens of thousands of a defendant’s non-relevant personal
    communications to review and study at their leisure for years on end.” Thompson, 28
    N.Y.S.3d at 258-59.
    ¶ 22       All property seized must be returned to its rightful owner once the criminal proceedings
    have terminated. Cooper v. City of Greenwood, 
    904 F.2d 302
    , 304 (5th Cir. 1990); United
    States v. Farrell, 
    606 F.2d 1341
    , 1343 (D.C. Cir. 1979); United States v. LaFatch, 
    565 F.2d 81
    , 83 (6th Cir. 1977). When no charges are pending against an individual, any of the
    individual’s property in the possession of the State should be immediately returned to him. See
    People v. Jaudon, 
    307 Ill. App. 3d 427
    , 447 (1999) (citing 725 ILCS 5/108-2 (West 1996));
    People v. Jackson, 
    26 Ill. App. 3d 845
    , 848-49 (1975). After criminal proceedings conclude,
    the government has no right to retain a defendant’s property. United States v. Rodriguez-
    Aguirre, 
    264 F.3d 1195
    , 1213 (10th Cir. 2001). “[I]t is fundamental to the integrity of the
    criminal justice process that property involved in the proceeding, against which no
    Government claim lies, be returned promptly to its rightful owner.” United States v. Wilson,
    
    540 F.2d 1100
    , 1103 (D.C. Cir. 1976).
    ¶ 23       In reviewing a trial court’s ruling on a motion to suppress, mixed questions of law and fact
    are presented. People v. Jones, 
    215 Ill. 2d 261
    , 267 (2005). Findings of fact made by the trial
    court will be upheld on review unless they are against the manifest weight of the evidence. 
    Id. at 268
    . However, a reviewing court remains free to undertake its own assessment of the facts
    in relation to the issues presented and may draw its own conclusions when deciding what relief
    should be granted. 
    Id.
     Thus, we review de novo the ultimate question of whether the evidence
    should have been suppressed. 
    Id.
    -5-
    ¶ 24       Here, there is no question that defendant had an expectation of privacy in his computer
    files before his computer was confiscated by police pursuant to the search warrant issued on
    July 17, 2013. See Heckenkamp, 
    482 F.3d at 1147
    ; Broy, 209 F. Supp. 3d at 1053-55; Blair,
    321 Ill. App. 3d at 381 (Homer, J., specially concurring). Defendant’s expectation of privacy
    significantly diminished once the police took possession of the computer, and that diminished
    expectation of privacy continued until his trial was complete. See Burnette, 
    698 F.2d at 1049
    ;
    Johnston, 789 F.3d at 942. However, once defendant’s trial was over, defendant could again
    expect that he had a right to privacy in the contents of his computer. See United States v.
    Hubbard, 
    650 F.2d 293
    , 303 (D.C. Cir. 1980) (“the party from whom materials are seized in
    the course of a criminal investigation retains a protectible [sic] property interest in the seized
    materials” because he is entitled to their return when the criminal proceedings conclude);
    Thompson, 28 N.Y.S.3d at 259 (State’s unreasonable retention of an individual’s files violates
    the individual’s reasonable expectation of privacy).
    ¶ 25       Feehan violated defendant’s right to privacy when he searched defendant’s EnCase file
    without a warrant in March 2014. While police lawfully created the EnCase file to forensically
    examine defendant’s hard drive, they were not entitled to retain the entire EnCase file
    indefinitely. See Premises Known as 608 Taylor Avenue, 
    584 F.2d at 1302
    . Rather, police were
    required to examine the contents of the mirrored hard drive and retain only those files that fit
    within the scope of the July 17, 2013, warrant. See Matias, 
    836 F.2d at 747
    ; Veloz, 109 F.
    Supp. 3d at 313; In re Search, 21 F. Supp. 3d at 10; Thompson, 28 N.Y.S.3d at 258-59. While
    police could retain the relevant files throughout defendant’s trial, once defendant’s trial ended,
    police were not entitled to retain any portion of the EnCase file, much less the entire file. See
    Jaudon, 307 Ill. App. 3d at 447; Jackson, 26 Ill. App. 3d at 848-49; Rodriguez-Aguirre, 
    264 F.3d at 1213
    .
    ¶ 26       Because police had no authority to retain possession of the EnCase file after defendant’s
    criminal trial ended, Feehan’s warrantless search of the EnCase file violated defendant’s fourth
    amendment rights.
    ¶ 27                                    B. Good-Faith Exception
    ¶ 28       “The fourth amendment is silent about suppressing evidence obtained in violation of its
    command.” People v. Martin, 
    2017 IL App (1st) 143255
    , ¶ 38 (citing Davis v. United States,
    
    564 U.S. 229
    , 236 (2011)). The exclusionary rule “was created by the Supreme Court to
    ‘compel respect for the constitutional guaranty.’ ” 
    Id.
     (quoting Davis, 
    564 U.S. at 236
    ).
    Application of the exclusionary rule is not automatic following a fourth amendment violation.
    People v. LeFlore, 
    2015 IL 116799
    , ¶ 22. Rather, the exclusionary rule should be applied only
    when it can achieve its purpose, which is to deter future fourth amendment violations. 
    Id.
    ¶ 29       When the circumstances show that the police acted with an objectively reasonable good-
    faith belief that their conduct was lawful, there is no illicit conduct to deter. Id. ¶ 24. In
    determining whether the good-faith exception applies, a court must ask “whether a reasonably
    well trained officer would have known that the search was illegal” in light of “all of the
    circumstances.” United States v. Leon, 
    468 U.S. 897
    , 922 n.23 (1984). Once a defendant proves
    a violation of the fourth amendment, the State has the burden to prove the good-faith exception
    applies. People v. Morgan, 
    388 Ill. App. 3d 252
    , 264 (2009). Whether the good-faith exception
    to the exclusionary rule applies presents a legal question that is reviewed de novo. People v.
    Manzo, 
    2018 IL 122761
    , ¶ 67.
    -6-
    ¶ 30       Section 114-12(b)(2)(i) of the Code of Criminal Procedure of 1963 (725 ILCS 5/114-
    12(b)(2)(i) (West 2016)) provides that a peace officer acts in “ ‘[g]ood faith’ ” when he obtains
    evidence “pursuant to a search or an arrest warrant obtained from a neutral and detached judge,
    which warrant is free from obvious defects other than non-deliberate errors in preparation and
    contains no material misrepresentations by any agent of the State, and the officer reasonably
    believed the warrant to be valid.” The State concedes that the July 17, 2013, warrant “did not
    authorize Feehan’s search, as that warrant had already been executed and, after investigation
    and criminal proceedings, defendant was acquitted.” However, the State argues that Feehan
    reasonably believed that he could rely on the eight-month-old warrant to justify his search of
    defendant’s EnCase file. We disagree.
    ¶ 31       At defendant’s trial, Feehan testified that he has been a police officer for more than 20
    years and a forensic examiner for 17 years. When he requested defendant’s EnCase file, he
    knew that defendant had been acquitted of the sexual assault charges against him and that no
    new charges had been filed. He also knew that defendant’s EnCase file was created when
    defendant’s computer was seized eight months earlier pursuant to the warrant issued in
    defendant’s sexual assault case. Because the warrant issued in July 2013 had been executed
    and the charges stemming from the files found pursuant to that warrant were no longer pending,
    Feehan should have known that police had no right to retain, much less search, the EnCase file.
    See Jaudon, 307 Ill. App. 3d at 447; Jackson, 26 Ill. App. 3d at 848-49; Rodriguez-Aguirre,
    
    264 F.3d at 1213
    . We find that no reasonably trained officer would conclude that he could
    perform a warrantless search of a mirrored hard drive that he had no right to possess following
    the termination of the criminal case against defendant. Had Feehan obtained a search warrant
    prior to searching the EnCase file, the good-faith exception would likely apply. See Ganias,
    824 F.2d at 225. Because Feehan failed to do so, the good-faith exception does not apply.
    ¶ 32       With no basis for avoiding the exclusionary rule, we find that the evidence in this case
    should have been suppressed. Thus, we reverse defendant’s conviction and remand for further
    proceedings.
    ¶ 33                                     III. CONCLUSION
    ¶ 34      The judgment of the circuit court of Peoria County is reversed and the cause is remanded.
    ¶ 35      Reversed and remanded.
    ¶ 36       JUSTICE WRIGHT, dissenting:
    ¶ 37       The majority holds defendant’s computer tower and the information harvested from the
    computer tower’s hard drive should have been returned to defendant immediately once the
    criminal proceedings terminated with defendant’s acquittal in Peoria County case No. 13-CF-
    741 on March 19, 2014. Based on the unique procedural facts of this case, I respectfully
    disagree and would affirm defendant’s conviction in Peoria County case No. 14-CF-282.
    ¶ 38                             A. Peoria County Case No. 13-CF-741
    ¶ 39       As the majority states, the trial judge, Judge Lyons, denied defendant’s oral motion for the
    return of confiscated property in a previous criminal prosecution in Peoria County case No. 13-
    -7-
    CF-741 on March 19, 2014, the date of the acquittal. 1 After Judge Lyons denied the oral
    request for the return of confiscated property, defendant filed a written motion for the return
    of the confiscated property in Peoria County case No. 13-CF-741. As the majority notes in its
    decision, the written motion was never ruled upon by the trial court. To me, until the written
    motion to return confiscated property is disposed of or withdrawn in Peoria County case
    No. 13-CF-741, that case has not been concluded.
    ¶ 40       Assuming for the sake of argument that the majority is correct and the acquittal concluded
    the criminal proceedings in Peoria County case No. 13-CF-741, the trial judge’s denial of
    defendant’s oral motion now stands as law of the case and represents an unappealable court
    order. Respectfully, I submit that our court lacks jurisdiction to review any ruling in Peoria
    County case No. 13-CF-741 absent a notice of appeal in that case.
    ¶ 41                              B. Peoria County Case No. 14-CF-282
    ¶ 42       Turning to the instant appeal in Peoria County case No. 14-CF-282, I emphasize that Judge
    Brown’s findings of fact have not been challenged by defendant for purposes of Peoria County
    case No. 14-CF-282. It is uncontested that the copy of defendant’s hard drive contained in the
    EnCase file remained in the continuous possession of law enforcement at the time Feehan
    viewed the images at issue. The trial court also determined that Feehan examined a copy of the
    hard drive contained in an existing police file on March 24, 2014.
    ¶ 43       The court further noted that the 2013 seizure of information had “been approved for search
    and seizure by a neutral magistrate when the warrant was issued in 2013.” Importantly, the
    court made an express finding that Feehan’s examination of a copy of this EnCase file on
    March 24, 2014, was “within the scope of the [2013] original warrant.” This finding has not
    been challenged. Once Feehan made this discovery of images while conducting an internal
    investigation of the alleged misconduct of an officer, it is undisputed that Feehan stopped his
    investigation and obtained another search warrant to proceed with the investigation in 2014.
    For purposes of this appeal, defendant does not challenge the validity of either the 2013 or the
    2014 search warrant.
    ¶ 44       After careful review of this record, I conclude that Judge Brown’s findings of fact are not
    contrary to the evidence. I wholeheartedly agree with Judge Brown’s analysis based on the
    court’s well-documented findings of fact. For the sake of clarity, I agree that Feehan was
    merely reviewing information that had already been lawfully seized by another detective and
    made a part of that police officer’s working file. Based on this record, I also agree with Judge
    Brown’s conclusion that defendant’s reasonable expectation of privacy was not violated for
    fourth amendment purposes because those expectations were diminished once defendant
    lawfully lost possession of the computer tower pursuant to the 2013 search warrant.
    ¶ 45       I would be remiss if I did not recognize the exemplary efforts put forth by Judge Brown in
    this matter. Judge Brown meticulously documented his findings of fact and carefully recited
    each step of his analysis in a comprehensive, written, court order. This order made the record
    submitted for our review easily digestible. In fact, I could not have restated the applicable law
    supporting the trial judge’s decision any better than the trial judge did in this case.
    Consequently, I would affirm the trial judge’s ruling.
    1
    According to Judge Brown’s written order in Peoria County case No. 14-CF-282, the property,
    namely the computer tower, was in the possession of the circuit clerk.
    -8-