Commonwealth v. Shaffer, J., Aplt. ( 2019 )


Menu:
  •                                 [J-107-2018] [MO: Baer, J.]
    IN THE SUPREME COURT OF PENNSYLVANIA
    WESTERN DISTRICT
    COMMONWEALTH OF PENNSYLVANIA,                :    No. 16 WAP 2018
    :
    Appellee                 :    Appeal from the Order of the Superior
    :    Court entered December 21, 2017 at
    :    No. 435 WDA 2017, affirming the
    v.                               :    Judgment of Sentence of the Court of
    :    Common Pleas of Butler County
    :    entered March 9, 2017, at No. CP-10-
    JON ERIC SHAFFER,                            :    CR-0000896-2016.
    :
    Appellant                :    ARGUED: December 6, 2018
    CONCURRING AND DISSENTING OPINION
    JUSTICE WECHT                                        DECIDED: JUNE 18, 2019
    I concur only in the result that today’s learned Majority reaches. The Majority
    chooses to invoke our discretionary authority to affirm an order upon any basis, and does
    so on the basis of the “private search” doctrine.1 I would address instead the question of
    abandonment of privacy, which is the issue upon which this Court granted allocatur. As
    applied to these facts, this abandonment issue happens to resolve here in the
    Commonwealth’s favor. Accordingly, I would affirm the judgment of sentence, and I join
    the Majority only insofar as it reaches the same result. As my path to that result diverges
    from the Majority’s, I respectfully dissent from the Majority’s rationale.
    As the Majority aptly summarizes the history of the case,2 I reiterate here only
    those facts and events necessary to this discussion. On May 27, 2016, Jon Shaffer filed
    a motion seeking suppression of the child pornography seized from his personal
    computer. As the Majority recounts, Shaffer argued that Officer Christopher Maloney
    1       Maj. Op. at 1-2 & n.1.
    2       
    Id. at 2-12.
    unconstitutionally searched Shaffer’s computer without a search warrant when he
    directed a CompuGig employee to open the files on Shaffer’s computer and then
    proceeded to view those files. Shaffer argued that neither exigent circumstances nor any
    other exception to the warrant requirement of our Constitutions3 justified the warrantless
    intrusion. Shaffer asserted that he had a legitimate expectation of privacy in the contents
    of his laptop computer, an expectation which, he maintained, he did not relinquish by
    providing the computer to CompuGig for repairs.
    The Commonwealth responded by arguing that Shaffer abandoned any
    expectation of privacy that he had in the computer. The Commonwealth relied primarily
    upon the Superior Court’s decision in Commonwealth v. Sodomsky, 
    939 A.2d 363
    (Pa.
    Super. 2007), a case that is both factually and legally similar to the instant dispute.
    On July 7, 2016, the trial court held a hearing on Shaffer’s suppression motion.
    Following testimony from CompuGig employee John Eidenmiller and Officer Maloney, the
    inquiry focused primarily upon the applicability of Sodomsky. The trial court found that
    the facts of this case were close enough to those in Sodomsky that the court was bound
    to apply its rationale. However, the trial court disagreed with the Commonwealth’s
    assertion that Shaffer abandoned his expectation of privacy the moment he delivered the
    computer to CompuGig. Instead, the trial court determined, it was not until Shaffer
    requested repairs that he abandoned any expectation that the contents of the computer
    would be kept private. At that point, Shaffer forfeited any right to challenge Officer
    Maloney’s actions. Consequently, the trial court denied Shaffer’s suppression motion,
    3      In his brief to this Court, Shaffer invokes both the Fourth Amendment to the United
    States Constitution and Article I, Section 8 of the Pennsylvania Constitution. See Brief
    for Shaffer at 8. Shaffer does not provide an analysis pursuant to Commonwealth v.
    Edmunds, 
    586 A.2d 887
    (Pa. 1991), in an effort to demonstrate that the Pennsylvania
    Constitution provides greater protections than its federal counterpart.
    [J-107-2018] [MO: Baer, J.] - 2
    and, later sitting as the fact-finder, convicted Shaffer of the charges stemming from the
    images obtained from the computer.
    Initially, what is most important is what did not occur during the suppression
    proceedings. At no point did the Commonwealth assert that Officer Maloney’s actions
    with respect to the computer were constitutional due to an earlier private search. The
    Commonwealth placed all of its eggs into the Sodomsky basket (which addressed only
    whether a person has an expectation of privacy in these circumstances), and did not
    invoke the private search doctrine. The trial court ruled upon expectation of privacy
    grounds; it did not find that the search was a private one.
    Shaffer had no reason to anticipate or rebut any argument that Officer Maloney’s
    warrantless inquiry into the files on his computer was permissible as an extension of
    CompuGig’s private search. More importantly, Shaffer had no opportunity to create a
    record to defend against such an argument. As the Majority explains, the applicability of
    the private search doctrine hinges principally upon whether the police officer exceeded
    the bounds of the private action already undertaken.4 Given no reason to believe that the
    Commonwealth would one day claim that the search at issue was a private search,
    Shaffer had no cause specifically to cross-examine either Officer Maloney or CompuGig’s
    Eidenmiller regarding the particular actions performed by each. In a case involving the
    private search question, such cross-examination would be undertaken in order to
    ascertain whether Officer Maloney did, in fact, exceed the parameters of Eidenmiller’s
    actions.
    The case continued in the same character before the Superior Court, where the
    focus of the parties and the appellate panel remained upon Shaffer’s expectation of
    4     See Maj. Op. at 20 (citing United States v. Jacobsen, 
    466 U.S. 109
    , 115, 117
    (1984)).
    [J-107-2018] [MO: Baer, J.] - 3
    privacy in the computer or his abandonment thereof. Once more, the Commonwealth did
    not raise the argument that the private search doctrine applied, and the Superior Court
    accordingly did not address that doctrine. The Superior Court held only that Shaffer had
    abandoned his expectation of privacy in the computer.
    We granted allocatur to address the following question:
    Does an individual give up his expectation of privacy in the closed private
    files stored on his computer, merely by taking his computer to a commercial
    establishment for service or repair, where the service or repair requested
    does not render the viewing of the citizen[’]s closed private files as
    foreseeable to either the customer or the computer technician?
    See Commonwealth v. Shaffer, 
    188 A.3d 1111
    (Pa. 2018) (per curiam). Our order did
    not mention the private search doctrine, nor can one reasonably argue that the doctrine
    was fairly encompassed within the stated question. Nor did we direct any briefing or
    argument on the private search doctrine.5
    The private search doctrine did not make any appearance in this case until it
    surfaced as the Commonwealth’s third line of argument in its brief to this Court.6 The
    Majority relies exclusively upon this tardy assertion to uphold Shaffer’s judgment of
    sentence. Under the “affirm-on-any-basis” jurisprudential device–which alternatively is
    known as the “right-for-any-reason” doctrine—the Majority undeniably has the
    5       As the Majority correctly notes, the failure of the Commonwealth at any point to
    raise the issue does not amount to waiver of its right to raise it before us now. See Maj.
    Op. at 23-24 (citing Rufo v. Bd. of License & Inspection Review, 
    192 A.3d 1113
    , 1123
    (Pa. 2018)). As the appellee at all stages, the Commonwealth had no burden to preserve
    any particular issue on pain of waiver. However, as I discuss below, the Commonwealth’s
    failure to do so undermines the notion that an issue raised for the first time before this
    Court is “of record” for purposes of our ability to affirm an order on any basis, and this
    failure places the other party at a significant disadvantage in his or her ability to argue
    successfully to this Court.
    6     See Brief for the Commonwealth at 17.
    [J-107-2018] [MO: Baer, J.] - 4
    discretionary authority to resolve the case in this manner. But there are compelling
    reasons not to do so.
    I.    The Right-For-Any-Reason Doctrine
    The “right-for-any-reason” doctrine “allows an appellate court to affirm the trial
    court’s decision on any basis that is supported by the record.” In re A.J.R.-H., 
    188 A.3d 1157
    , 1175-76 (Pa. 2018) (citing Ario v. Ingram Micro, Inc., 
    965 A.2d 1194
    , 1200 (Pa.
    2009)).
    The rationale behind the “right for any reason” doctrine is that appellate
    review is of “the judgment or order before the appellate court, rather than
    any particular reasoning or rationale employed by the lower tribunal.” 
    Ario, 965 A.2d at 1200
    (citing Hader v. Coplay Cement Mfg. Co., 
    189 A.2d 271
    ,
    274-75 (Pa. 1953)). As the United States Supreme Court has explained,
    “The reason for this rule is obvious. It would be wasteful to send a case
    back to a lower court to reinstate a decision which it had already made but
    which the appellate court concluded should properly be based on another
    ground within the power of the appellate court to formulate.” Sec. & Exch.
    Comm’n v. Chenery Corp., 
    318 U.S. 80
    , 88 (1943).
    
    Id. at 1176
    (citations modified).
    However jurisprudentially economical the use of the doctrine may be, an appellate
    court is not bound to utilize it any time it can scour the record and find another basis upon
    which to affirm. The doctrine is, and always has been, discretionary and prudential. See
    
    id. at 1176
    (“This Court has stated that an appellate court may apply the right for any
    reason doctrine . . . .”) (emphasis added); Commonwealth v. Wholaver, 
    177 A.3d 136
    ,
    145 (Pa. 2018) (“[I]t is well settled that this Court may affirm a valid judgment or order for
    any reason appearing as of record.”) (emphasis added); E. J. McAleer & Co. Inc. v.
    Iceland Prod., Inc., 
    381 A.2d 441
    , 443 n.4 (Pa. 1977) (“We may, of course, affirm the
    decision of the trial court if the result is correct on any ground without regard to the
    grounds which the trial court itself relied upon.”) (emphasis added).
    [J-107-2018] [MO: Baer, J.] - 5
    The principal restraint upon an appellate court’s discretionary prerogative to apply
    the right-for-any-reason doctrine arises when the record does not contain a sufficient
    factual basis to support the new grounds for affirmance. As we explained most recently
    in In re A.J.R.-H., an appellate court may apply the doctrine if “the established facts
    support a legal conclusion producing the same outcome. It may not be used to affirm a
    decision when the appellate court must weigh evidence and engage in fact finding or
    make credibility determinations to reach a legal conclusion.” In re 
    A.J.R.-H., 188 A.3d at 1176
    (citing Chenery 
    Corp., 318 U.S. at 88
    ; Bearoff v. Bearoff Bros., Inc., 
    327 A.2d 72
    ,
    76 (Pa. 1974)).
    Thus, at the forefront of any inquiry into the propriety of the application of the right-
    for-any-reason doctrine is the question of whether the newly asserted basis for affirmance
    is “of record,” i.e., whether the basis is supported by the existing factual record. In
    conducting this inquiry, we should not ignore how the record in this case was created. At
    no point before or during the evidentiary hearing on Shaffer’s motion did the
    Commonwealth raise the private search doctrine. Although the Commonwealth bears no
    issue-preservation duty as appellee, the arguments that it advanced in service of its initial
    burden at the suppression hearing played a significant role in the creation of the factual
    record.
    At the heart of any private search doctrine analysis is the question of whether the
    police officer’s subsequent actions exceeded those of the private citizen who conducted
    the first search.7 Had Shaffer been put on notice, actual or constructive, that he would
    have to rebut a private search argument, then or in the future, his counsel could have
    conducted the hearing differently, as any reasonably competent lawyer would. To defend
    against any private search claim, Shaffer’s counsel no doubt would have cross-examined
    7      See 
    Jacobsen, 466 U.S. at 115
    , 117; see also Maj. Op. at 20.
    [J-107-2018] [MO: Baer, J.] - 6
    Eidenmiller in detail regarding the steps that the latter took until he eventually discovered
    the pornographic files.      Counsel then would have inquired as extensively into
    Eidenmiller’s actions when Officer Maloney directed him to locate and display the files for
    the second time. Finally, counsel would have engaged in a similarly detailed examination
    of Officer Maloney. Only then would Shaffer have a factual record sufficient to oppose a
    claim of a private search and to argue that any discrepancies between the two searches
    (assuming that there were discrepancies and that the second search exceeded the first)
    rendered the private search doctrine inapplicable. At the very minimum, Shaffer should
    have had the opportunity to create a sufficient record.
    I do not maintain that notice always is a necessary precondition to application of
    the right-for-any-reason doctrine. Rather, under circumstances such as those presented
    here, the manner in which the record is created is both an important factor in an appellate
    court’s consideration of whether to apply the right-for-any-reason doctrine, and a
    significant factor in the crucial inquiry of whether the newly asserted basis for affirmance
    is “of record.”
    The sole inquiry from the outset of this case up to and through our grant of allocatur
    was whether Shaffer had an expectation of privacy in the laptop computer that he dropped
    off for repairs at CompuGig. That inquiry differs significantly from one assessing the
    private search doctrine. As a general matter, there are two essential elements that must
    be present before any search can be challenged constitutionally. The area searched
    must be an area in which the person challenging the search has a reasonable expectation
    of privacy, see Commonwealth v. Hawkins, 
    718 A.2d 265
    , 267 (Pa. 1998), and the search
    must be performed by a state actor. Commonwealth v. Price, 
    672 A.2d 280
    , 283 (Pa.
    1996). The former element concerns whether the challenger has a privacy right in the
    area that was searched. The latter addresses the issue of who conducts the search.
    [J-107-2018] [MO: Baer, J.] - 7
    These two elements entail different substantive analyses and examinations, both as to
    law and as to fact.      The factual record created to establish one element cannot
    automatically be substituted as a sufficient factual record for the other. We cannot graft
    an evidentiary record focused entirely upon Shaffer’s expectation of privacy onto the
    Commonwealth’s new invocation of the private search doctrine. These are apples and
    oranges.
    To find a sufficient record basis for application of the private search doctrine, the
    Majority highlights a brief exchange between the Commonwealth’s attorney and Officer
    Maloney, as well as two limited interactions between Shaffer’s counsel and Officer
    Maloney.8 These excerpts cannot suffice as an evidentiary record that would enable a
    proper analysis of the private search doctrine under the facts and circumstances of this
    case.    The Commonwealth was not attempting to establish that Officer Maloney’s
    examination of the computer did not exceed Eidenmiller’s initial actions.              More
    importantly, a brief two question/and two answer exchange between Shaffer’s counsel
    and Officer Maloney that touched inadvertently upon matters that sometime later might
    be deemed pertinent to the private search doctrine is a far cry from the examination that
    would be necessary to build a record adequate to evaluate the private actor versus state
    actor dilemma.
    A review of one aspect of those exchanges will illustrate my point. When Officer
    Maloney was on the stand, Shaffer’s counsel asked him whether Eidenmiller, at the
    officer’s request, opened the file containing the pornographic images. Officer Maloney
    responded, “Yes, sir, he showed me the exact route taken to find the images.”9 The
    Majority construes this statement as conclusive evidence that Eidenmiller did, in fact, take
    8       See Maj. Op. at 24-25.
    9       N.T., 7/7/2016, at 30.
    [J-107-2018] [MO: Baer, J.] - 8
    the same exact path in front of Officer Maloney, and, therefore, that Officer Maloney did
    not (and could not) exceed the scope of the private search. The problem is that Shaffer’s
    counsel did not test that statement through cross-examination. He simply let it go. The
    reason for the free pass is not difficult to discern. Shaffer’s counsel had no reason to
    know that the parallelism between the two searches would be an issue in the case, or
    that years later that one answer would form the factual basis to deny his client relief on a
    newly asserted, and entirely different, legal basis. Instead, counsel let Officer Maloney
    testify effectively to a legal conclusion without exploring the factual basis for that
    conclusion, through no fault of his own. No one would anticipate that a case would take
    on such a different character at the last stage of state appellate proceedings. That
    counsel, by happenstance or coincidence, stumbled upon one or two questions relevant
    to the new issue upon which this Court now chooses to focus does not mean that the
    record suffices for purposes of our discretionary application of the right-for-any-reason
    doctrine.
    Moreover, the problem is not only that the issue is not “of record.” The problem
    also is that it is inequitable to employ our discretionary authority to apply the right-for-any-
    reason doctrine here, inasmuch as the issue was thrust upon Shaffer only at this very late
    stage in the proceedings. When the Commonwealth raised the private search doctrine
    for the first time as its third argument in its brief to this Court, Shaffer was forced to
    respond to a new legal theory for the first time in his reply brief to this Court. Reply briefs,
    by rule, must be limited to 7000 words, and may not exceed fifteen pages.10 But the page
    limit is not the greatest obstacle that Shaffer must overcome. It is not what puts him at a
    significant disadvantage, not what hinders his ability to defend against the
    Commonwealth’s newly asserted theory. It is the state of the record in this case that
    10     See Pa.R.A.P. 2135(a)(1).
    [J-107-2018] [MO: Baer, J.] - 9
    precludes Shaffer effectively from defending against the new claim. The record before
    this Court is one tailored (“teed up,” as we say) specifically to the question of whether
    Shaffer retained an expectation of privacy in his laptop computer when he turned it over
    for repairs. It is not a record containing any meaningful evidentiary development of the
    facts necessary for evaluation of the private search doctrine in the context of this case.
    Shaffer is forced—in a reply brief—to try to make the record that we have suffice for the
    record that we need. He is forced to cram the proverbial square peg into a round hole.
    The right-for-any-reason doctrine is premised primarily upon the desirability of
    conserving judicial and prosecutorial resources. Laudable as that goal may be, we still
    must be judicious in our exercise of discretion, and we should not wield that tool when it
    would impose upon one litigant an inequitable handicap. We should apply the doctrine
    only when the newly invoked basis for relief truly is of record, and where the applicability
    of that new basis is sufficiently clear, such that further proceedings on remand would be
    a waste of time and resources. That is not the case here.
    There is another reason that I would not apply the right-for-any-reason doctrine in
    this case. As I discuss in greater detail in Part III below, Shaffer’s judgment of sentence
    should be affirmed on the merits of the question upon which we actually granted allocatur.
    In other words, there is no reason to find an alternative basis to affirm when the case, as
    is, necessitates affirmance on the precise question presented.
    II.       The Private Search Doctrine
    Before proceeding to the merits of the abandonment of privacy question presented
    by this case, I will assume for the moment that it would be an equitable exercise of our
    discretion to apply the right-for-any-reason doctrine; I do so in order to note my
    disagreement with the Majority’s application of the private search doctrine.
    [J-107-2018] [MO: Baer, J.] - 10
    The seminal case regarding the private search doctrine is the Supreme Court of
    the United States’ decision in Jacobsen. In that case, a supervisor at an airport location
    of Federal Express noticed that a forklift had damaged a package. 
    Jacobsen, 466 U.S. at 111
    . Together with the office manager, the supervisor opened the damaged package
    in order to inventory its contents pursuant to a written insurance protocol. Inside the
    package was a tube assembled from duct tape. The Federal Express employees cut
    open the tube and found baggies containing what they believed to be cocaine.
    Immediately, they called the DEA and returned the baggies to the tube. A DEA agent
    arrived, removed the baggies from the tube, and examined the substance, which tested
    positive for cocaine. 
    Id. at 111-12.
    Other DEA agents arrived on the scene and, ultimately,
    obtained a search warrant based in large part upon the search performed by the first
    agent. 
    Id. at 112.
    As the Majority recounts, the Supreme Court considered the DEA agent’s initial
    search as a private search because “the federal agents did not infringe any
    constitutionally protected privacy interest that had not already been frustrated as the
    result of private conduct.” 
    Id. at 126.
    Because the initial invasion of privacy occurred at
    the hands of a private individual, and was not performed by a government agent, the
    subsequent search by the DEA agent was not unreasonable.
    This doctrine poses readily identifiable risks to an individual’s right of privacy, and
    entails a considerable potential for abuse. The private search doctrine essentially places
    the state actor behind private eyes, allowing a law enforcement officer to go wherever a
    private person before him has gone. To cabin the potential hazard to privacy rights, the
    Supreme Court limited the subsequent governmental action to the bounds of the actions
    of the private individual. Any additional actions “must be tested by the degree to which
    [J-107-2018] [MO: Baer, J.] - 11
    they exceeded the scope of the private search.” 
    Id. at 115
    (citing Walter v. United States,
    
    447 U.S. 649
    (1980)).
    More significant to the case sub judice, and as another limitation on the private
    search doctrine, the Supreme Court explained that the DEA’s subsequent opening of the
    package did not exceed the parameters of the initial, private search because “there was
    a virtual certainty that nothing else of significance was in the package and that a manual
    inspection of the tube and its contents would not tell [the DEA agent] anything more than
    he already had been told.”       
    Id. at 119.
      It is this statement that distinguishes the
    circumstances in Jacobsen from Officer Maloney’s actions in this case.
    In Jacobsen, the DEA agent opened a package that contained a tube. In the tube
    were plastic bags containing cocaine. There was nothing else to find or discover. The
    DEA’s re-examination of the package posed no additional threat to Jacobsen’s privacy.
    It was “a virtual certainty” that the second search would reveal nothing but what the
    Federal Express employees had found and reported.
    The same cannot be said for a personal computer. Regardless of the path taken
    by CompuGig’s Eidenmiller to locate the suspicious files as directed by Officer Maloney,
    there existed a very real potential for exposure of information not yet discovered by the
    private search. In 2019, one’s personal computer contains a wealth of information, both
    private and public. Even the screen saver, wallpaper, and names of files on the home
    screen of a computer can expose private information about the individual who owns the
    computer. Unlike a duct tape tube that has only one area where items can be stored, a
    personal computer offers virtually limitless areas for exploration. An inadvertent click on
    a file or tab could uncover to a state actor private information that was not part of the
    information collected initially by the private actor. Eidenmiller’s navigation of a personal
    computer at the direction of a police officer does not entail the same “virtual certainty,” or
    [J-107-2018] [MO: Baer, J.] - 12
    near guarantee, that no other private information could fall into the hands of the law
    enforcement agent in the same way that the tube in Jacobsen did. The tube in Jacobsen
    was a limited vessel, eliminating the possibility that the DEA agent would be able to
    exceed the bounds of the private search. Indeed, if the tube could be said to have an
    opposite, that opposite would be a personal computer.
    Because nothing in the record as established in this case convincingly
    demonstrates a “virtual certainty” that Officer Maloney’s second, warrantless search
    would not exceed the scope of the initial private search and would not reveal information
    other than what Eidenmiller already had discovered, I would find the private search
    doctrine to be inapplicable in this case in the event that the doctrine was properly before
    us.
    That does not mean that I would reverse the lower courts. For the reasons that
    follow, I would hold that Shaffer ultimately, though not initially, abandoned his expectation
    of privacy in the computer.
    III.   Shaffer’s Expectation of Privacy in the Personal Computer
    We granted allocatur in this case to consider whether the owner of a personal
    computer abandons his or her expectation of privacy in closed files on that computer the
    moment he or she drops it off with a computer repair service. This question necessarily
    implicates the third-party doctrine. When we accepted this appeal, we provided ourselves
    with an opportunity to reconsider that doctrine in the context of our modern high-tech
    world, a world in which the interaction between technology and one’s personal information
    has changed significantly from the past.
    In Katz v. United States, 
    389 U.S. 347
    (1967), the United States Supreme Court
    stated for the first time that the Fourth Amendment to the United States Constitution
    “protects people, not places.” 
    Id. at 351.
    Katz expanded the protections of the Fourth
    [J-107-2018] [MO: Baer, J.] - 13
    Amendment to include those places where one enjoys a reasonable expectation of
    privacy. This landmark decision marked the beginning of our current understanding that
    a person, place, area, or thing is protected by the Fourth Amendment if the person
    asserting the protection seeks to preserve the area or place infringed upon as private,
    and if the expectation of privacy is one that society would deem reasonable.           See
    Commonwealth v. Shabezz, 
    166 A.3d 278
    , 288 (Pa. 2017).
    The third-party doctrine addresses the question of whether a person’s expectation
    of privacy applies when the object as to which the expectation is asserted is placed in the
    hands of a third person. Had this case been brought even a decade ago, its resolution
    as a matter of federal constitutional law would have been relatively straightforward. In
    United States v. Miller, 
    425 U.S. 435
    (1976), and Smith v. Maryland, 
    442 U.S. 735
    (1979),
    the Supreme Court of the United States firmly established the third-party doctrine,
    effectively holding that a person retained no expectation of privacy in materials given over
    to the possession of a third party. In Miller, the Court held that Miller’s bank records
    actually were business records of the bank in which Miller could “assert neither ownership
    nor possession.” 
    Miller, 425 U.S. at 440
    . Further, the records, in possession of a third
    party, could not be deemed exclusively private to Miller as they were “exposed to [bank]
    employees in the ordinary course of business.” 
    Id. at 442.
    Miller had “take[n] the risk, in
    revealing his affairs to another, that the information [would] be conveyed by that person
    to the [g]overnment.” 
    Id. at 443.
    In Smith, the Supreme Court addressed Smith’s claim that he held a reasonable
    expectation of privacy in a pen register that recorded the outgoing numbers dialed from
    his landline telephone. The Court rejected Smith’s claim, opining that it “doubt[ed] that
    people in general entertain any actual expectation of privacy in the numbers they dial.”
    
    Smith, 442 U.S. at 742
    . The Court noted that, at the time, telephone companies used
    [J-107-2018] [MO: Baer, J.] - 14
    dialed numbers for a variety of legitimate business purposes. When a person makes a
    call, the Smith Court reasoned, he or she voluntarily conveyed the dialed number to the
    phone company, which received the information in the regular course of business. Thus,
    as in Miller, Smith had assumed the risk that, by dialing a number, he subjected himself
    to the possibility that the telephone company would turn his dialing information over to the
    government. The Court explained that “a person has no legitimate expectation of privacy
    in information he voluntarily turns over to third parties.” 
    Id. at 743-44.
    Under a reading of only Miller and Smith, it would appear that Shaffer could claim
    no legitimate expectation of privacy in his computer once he turned it over to CompuGig.
    By doing so, he would be deemed by those precedents voluntarily to have exposed the
    computer’s contents to CompuGig’s employees, who received the information in the
    regular course of their business. The argument would follow that Shaffer assumed the
    risk that a person working at CompuGig could turn any information found on the computer
    over to the police.
    However, the jurisprudential landscape has evolved since the 1970’s. A fair review
    of the United States Supreme Court’s recent cases, beginning with United States v.
    Jones, 
    565 U.S. 400
    (2012), reveals that the Miller/Smith view of the third-party doctrine
    now is somewhat antiquated, inasmuch as modern technology has caused the High Court
    to think differently about third-party interactions. In 2012, the Court in Jones confronted
    the question of whether affixing a GPS device to a person’s vehicle and tracking his or
    her movements—without a search warrant—constitutes a search or seizure under the
    Fourth Amendment. 
    Id. at 402.
    In deciding that doing so was indeed a search, the Court
    (in an opinion authored by Justice Scalia) emphasized the intrusiveness that the
    government’s actions entailed: “The Government physically occupied private property for
    the purpose of obtaining information.” 
    Id. at 404.
    The Court had “no doubt” that this was
    [J-107-2018] [MO: Baer, J.] - 15
    a search for purposes of the Fourth Amendment. 
    Id. The installation
    of the GPS device
    effectively was a trespass that, for twenty-eight days, permitted the government to know
    and evaluate all of Jones’ vehicular movements.
    Justice Scalia’s majority opinion drew two concurrences relevant here. First,
    Justice Alito, joined by Justices Ginsburg, Breyer, and Kagan, rejected Justice Scalia’s
    trespass-oriented approach to the case.          These four Justices would have simply
    concluded that attachment of the GPS device to Jones’ car was a search because it
    violated Jones’ reasonable expectation of privacy through “the long-term monitoring of
    the movements of the vehicle he drove.” 
    Id. at 419.
    Justice Alito opined that “the use of
    longer term GPS monitoring in investigations of most offenses impinges on expectations
    of privacy. For such offenses, society's expectation has been that law enforcement
    agents and others would not—and indeed, in the main, simply could not—secretly monitor
    and catalogue every single movement of an individual's car for a very long period.” 
    Id. at 430.
    Justice Sotomayor authored a concurring opinion in which she questioned whether
    the “Executive, in the absence of any oversight from a coordinate branch, [should have]
    a tool so amenable to misuse, especially in light of the Fourth Amendment’s goal to curb
    arbitrary exercises of police power . . . .” 
    Id. at 416.
    More importantly for present
    purposes, Justice Sotomayor opined that “it may be necessary to reconsider the premise
    that an individual has no reasonable expectation of privacy in information voluntarily
    disclosed to third parties.” 
    Id. at 417.
    Specifically with regard to the “digital age,” Justice
    Sotomayor found the third-party doctrine to be “ill suited” because people now “reveal a
    great deal about themselves to third parties in the course of carrying out mundane tasks.”
    
    Id. “People disclose
    the phone numbers that they dial or text to their cellular providers;
    the URLs that they visit and the e-mail addresses with which they correspond to their
    [J-107-2018] [MO: Baer, J.] - 16
    Internet service providers; and the books, groceries, and medications they purchase to
    online retailers.” 
    Id. In Justice
    Sotomayor’s view, a strict application of the third-party
    doctrine no longer is feasible. This is an idea that would pick up steam a few years later
    in Carpenter v. United States, 
    138 S. Ct. 2206
    (2018).
    In Carpenter, the Supreme Court granted certiorari to determine “how to apply the
    Fourth Amendment to a new phenomenon: the ability to chronicle a person’s past
    movements through the record of his cell phone signals.” 
    Id. at 2216.
    At issue were
    records obtained from communications between a person’s cellular telephone and a
    cellular tower.   Through these records, police could track a person’s movement or
    determine whether that person had been in a particular area during a certain time period.
    In a majority opinion authored by Chief Justice Roberts, the Court declined to
    extend Miller’s and Smith’s strict third-party doctrine to preclude an expectation of privacy
    in the cellular tower records. The Court held first that, although Miller and Smith apply to
    phone numbers and bank records, the doctrine cannot apply automatically to the cellular
    tower records at issue. The core inquiry still must be whether society would deem
    reasonable an expectation of privacy in the area or items that were searched or seized.
    At the time that Miller and Smith were decided, few would have imagined a society so
    technologically advanced, or one in which citizens were so attached to electronic devices.
    Quoting Riley v. California, 
    573 U.S. 373
    (2014) (holding that police must get a warrant
    before searching a cellular telephone seized incident to an arrest), the Court repeated its
    view that cell phones have become a “feature of human anatomy,” which “tracks nearly
    exactly the movements of its owner.” 
    Carpenter, 138 S. Ct. at 2218
    . Modern people
    “compulsively carry cell phones with them all the time. A cell phone faithfully follows its
    owner beyond public thoroughfares and into private residences, doctor’s offices, political
    headquarters, and other potentially revealing locales.” 
    Id. [J-107-2018] [MO:
    Baer, J.] - 17
    The Court also found it important that cellular towers do not merely log phone
    numbers. The towers in actuality compile a comprehensive and detailed record of a
    person’s movements. These towers had generated “seismic shifts in digital technology
    that made possible the tracking of not only Carpenter’s location but also everyone else’s,
    not for a short period but for years and years.” 
    Id. at 2219.
    The unique nature of the
    compilation of data by these towers necessarily overcomes the strict parameters of the
    third-party doctrine. “[A]n individual maintains a legitimate expectation of privacy in the
    record of his physical movements as captured through [cellular tower records.]” 
    Id. at 2217.
    Thus, the reach of the earlier third-party doctrine cases has been substantially
    limited in this context.
    That the records technically are compiled for commercial purposes cannot negate
    a person’s expectation of privacy.       In Carpenter, the government seized records
    encompassing one hundred and twenty-seven days of activity, “an all-encompassing
    record of the holder’s whereabouts.” 
    Id. As was
    the case with the GPS tracker in Jones,
    the “time stamped data provides an intimate window into a person’s life, revealing not
    only his particular movements, but through them his ‘familial, political, professional,
    religious, and sexual associations.’” 
    Id. (quoting Jones
    , 565 U.S. at 415 (Sotomayor, J.,
    concurring)). Like the cell phones themselves, the records “hold for many Americans the
    privacies of life.” 
    Id. (citation and
    quotation marks omitted).
    Rejecting a rote application of the third-party doctrine, as advocated by the
    Government and the dissenting Justices, the Carpenter Court explained that the doctrine
    is rooted in a “reduced” expectation of privacy; it does not mean that a person has no
    expectation of privacy at all. “[T]he fact of ‘diminished privacy interests does not mean
    that the Fourth Amendment falls out of the picture entirely.’” 
    Id. at 2219
    (quoting 
    Riley, 573 U.S. at 392
    ). Neither Miller nor Smith relied solely upon the fact that the relevant
    [J-107-2018] [MO: Baer, J.] - 18
    materials were in the hands of another. Instead, the Court considered “the nature of the
    particular documents sought” to determine whether there was “a legitimate expectation
    of privacy concerning their contents.” 
    Id. at 2219
    (citation and quotation marks omitted).
    In dissent, Justice Thomas expressed reservations as to the continued viability of
    the third-party doctrine, as Justice Sotomayor had done in her concurring opinion in
    Jones. In Justice Thomas’ view, the Court approached the case incorrectly, inasmuch as
    the Court should not have contemplated at all whether a search occurred, but instead
    should have considered whose property was searched. Justice Thomas noted that the
    Fourth Amendment protects people from unreasonable searches of “their” places,
    property, and effects. 
    Id. at 2235
    (Thomas, J., dissenting). Thus, “each person has the
    right to be secure against unreasonable searches . . . in his own person, house, papers,
    and effects.”   
    Id. (quoting Minnesota
    v. Carter, 
    525 U.S. 83
    , 92 (1998) (Scalia, J.,
    concurring) (emphasis in original)). In Carpenter, the cellular tower records did not belong
    to Carpenter. Thus, according to Justice Thomas, he had no viable Fourth Amendment
    claim. Notably, this approach would eliminate the third-party doctrine altogether. As long
    as a person owned the property, he or she could claim a Fourth Amendment violation
    regardless of who was in possession at the time that the search occurred.
    It is noteworthy that both Justices Thomas and Sotomayor have opined that the
    long standing third-party doctrine is no longer sustainable, albeit for different reasons.
    Nonetheless, what is important presently is that Carpenter itself provides the roadmap to
    resolving the expectation of privacy issue before us today.          Foremost, Carpenter
    expressly rejected the notion that a person loses all expectation of privacy in an object
    immediately upon it landing in the hands of a third party. The Court emphasized that,
    while one may have a diminished expectation of privacy in that object, he or she does not
    invariably forfeit his or her expectation of privacy entirely. Examining Miller and Smith,
    [J-107-2018] [MO: Baer, J.] - 19
    the Court noted that what matters most was not that the materials at issue were in the
    hands of another, but rather “the nature of the particular documents sought” in
    ascertaining whether there existed a reasonable expectation of privacy in the contents
    searched or seized. 
    Carpenter, 138 S. Ct. at 2219
    .
    In the modern digital age, personal computers and similar devices are quite like
    the cellular telephones at issue in Riley and the tracking of movements in Jones and
    Carpenter. Americans use these computing devices to aid in almost every aspect of their
    daily lives. We use them to get an education, to discuss politics and current events, to
    find a romantic partner, and to pay our bills. We store personal digital photographs on
    them, and engage in personal correspondence.              We use computers for work,
    entertainment, and religion. We chronicle our lives with them. We shop with them. We
    pay our taxes with them. The personal computer, although not always carried everywhere
    we go like cell phones, has become equally important to the functioning of our daily lives.
    A search of a computer can provide the government with a complete snap-shot of a
    person’s private life, revealing information related to every aspect of our lives, including
    those things we seek to keep most private. “An Internet search and browsing history, for
    example, can be found on an Internet-enabled [personal computer] and could reveal an
    individual's private interests or concerns—perhaps a search for certain symptoms of
    disease, coupled with frequent visits to WebMD.” 
    Riley, 573 U.S. at 395-96
    .
    Personal computers, like modern cellular telephones, “are not just another
    technological convenience. With all they contain and all they may reveal, they hold for
    many Americans the privacies of life.” 
    Id. at 403
    (citation and quotation marks omitted).
    For these reasons, personal computers align with cellular phones, GPS devices, and
    long-term records of a person’s movements, such that the third-party doctrine does not
    automatically extinguish any and all expectation of privacy that a person has in his or her
    [J-107-2018] [MO: Baer, J.] - 20
    computer when it is in the hands of another.11 The protection of the Fourth Amendment
    simply “does not fall out of the picture entirely.” See Carpenter, supra.12
    Nonetheless, that Shaffer maintained some expectation of privacy even though he
    submitted the computer to CompuGig does not mean that Shaffer retained that
    expectation forever. It is axiomatic that a person who has an expectation of privacy also
    can abandon that expectation. Commonwealth v. Dowds, 
    761 A.2d 1125
    , 1131 (Pa.
    2000). Abandonment is a question of intent, and “may be inferred from words spoken,
    acts done, and other objective facts.” 
    Id. (citing Commonwealth
    v. Shoatz, 
    366 A.2d 1216
    ,
    1220 (Pa. 1976)).
    Presently, Shaffer’s words and actions demonstrate clearly that he abandoned his
    expectation of privacy in the computer.13 In November 2015, Shaffer’s laptop stopped
    11     The Majority chooses to resolve this case on the basis of the private search
    doctrine, concluding that “an individual’s expectation of privacy at the moment he
    relinquishes his computer to a commercial establishment for repair is irrelevant to our
    constitutional analysis because the computer technicians examining the contents of the
    computer are private actors, not subject to the restrictions of the Fourth Amendment.”
    Maj. Op. at 32. I disagree. If the expectation of privacy was irrelevant, then the Supreme
    Court of the United States’ analyses in Smith (bank records) and Miller (pen register)
    would be irrelevant. In those cases, the Supreme Court held that the defendants could
    not challenge a subsequent search or seizure of the relevant materials because, once
    those materials were exposed to a third party, the defendants no longer retained an
    expectation of privacy in them. The Court did not predicate its holding that the seizures
    were constitutional on the rationale that the subsequent search did not exceed what was
    exposed to the third-parties. Moreover, if a person does not hold an expectation of privacy
    in an item being searched, then it does not matter whether the person performing the
    search is a private or state actor.
    12     My perspective also is congruent with Pennsylvania’s Article I, Section 8 third-party
    doctrine. See Commonwealth v. DeJohn, 
    403 A.2d 1283
    (Pa. 1979) (holding that,
    contrary to Miller and Smith, under the Pennsylvania Constitution, a person retains a
    reasonable expectation of privacy in bank records even though a bank employee would
    have free access to view the contents contained therein).
    13      The Majority characterizes the application of an abandonment theory to the facts
    of this case as “profound,” and observes that such a theory is less protective (in some
    instances) of privacy rights than is the private search doctrine. Maj. Op. at 32. To be sure,
    [J-107-2018] [MO: Baer, J.] - 21
    operating correctly. He believed that his son had downloaded some files on the computer
    that had affected its functionality. On November 25, 2015, Shaffer took the laptop to
    CompuGig for service. On the intake form, Shaffer indicated that the computer had been
    affected by “Spyware/virus” and that it could not “get the Internet.” He also indicated that,
    after his son had downloaded something, the laptop’s performance was riddled by “pop
    ups.”
    Shaffer provided CompuGig with his password, to allow CompuGig access to the
    computer, and he requested restorative services.            Eidenmiller performed a basic
    diagnostic test, which revealed that the hard drive was failing. An administrator from
    CompuGig called Shaffer and told him of the results of this initial test. The administrator
    also informed Shaffer that the repairs would cost more than the initial estimate of $160.
    Shaffer told the administrator that, based upon the diagnostics, he wanted to replace the
    failing hard drive despite the increased cost. Shaffer then authorized further repairs.
    Shaffer made no efforts to limit CompuGig’s access to any file or folder on the laptop.
    any time that the state obtains and exercises carte blanche authority to invade a person’s
    effects, a profound act occurs, regardless of whether that search occurs because the
    person has given up any right to challenge the search or because the state actor is merely
    following the actions of a private citizen. It is true as well that the private search doctrine
    affords an extra layer of constitutional protection beyond that allowed by the traditional
    third-party doctrine, inasmuch as the latter necessarily entails an absolute abandonment
    of any and all privacy interests in the property or item provided to the third party, i.e., the
    person “checks his privacy interest at the door.” 
    Id. at 32.
    I depart from the Majority
    because, as explained hereinabove, I would not apply the traditional third-party doctrine.
    The Supreme Court of the United States’ case law has evolved to the degree that a
    person no longer categorically checks his privacy interest at the door, at least when the
    item now in the hands of a third party is a personal computer. Having retained some
    privacy in that personal computer, the owner may, by limiting access to certain areas of
    the device, retain some of his or her privacy interest in it. Put differently, with regard to
    her personal computer and similar devices, a person does not automatically grant access
    to all of the files stored anywhere on the computer simply by turning it over for service.
    Of course, as with Shaffer here, the facts of the case may demonstrate that the person
    intended to grant unfettered access to the entire computer.
    [J-107-2018] [MO: Baer, J.] - 22
    Eidenmiller was not a party to that call, but he continued to work on the laptop.
    Acting on what he believed was Shaffer’s request, Eidenmiller attempted to take an image
    of the hard drive and to place that image into a new hard drive. Although he successfully
    imaged the old hard drive, he was unable to insert that image onto a new hard drive. A
    CompuGig employee once more contacted Shaffer and told him of the failed attempt.
    Eidenmiller then determined that the only other way to save the files on the
    defective hard drive was to manually copy the files and transfer them to the new hard
    drive one-by-one. CompuGig again contacted Shaffer and informed him that this was the
    last viable option to save the files. Shaffer consented to the work.
    On these facts, Shaffer undeniably abandoned whatever expectation of privacy
    that he retained in the computer. Thus, by the time that Officer Maloney observed the
    pornographic photographs, Shaffer was unable to claim an expectation of privacy in the
    electronic folders in which they were stored. Having no such expectation, Shaffer is not
    entitled to suppression of those images.
    *      *      *
    Determination of whether a person has an expectation of privacy in an area
    searched is no easy task. It requires consideration of a number of factors, some of which
    are not always readily apparent. Police officers in the field make these decisions every
    day across Pennsylvania. Occasionally, and no doubt frustratingly, an appellate court will
    hold that an officer’s estimation of a person’s expectation of privacy was erroneous,
    leading to the suppression of evidence and, possibly, the dismissal of charges.
    The risk of such an outcome often can be ameliorated by following the letter of our
    Constitutions and obtaining a search warrant when probable cause exists. It is true that
    an officer is not required to get a warrant to search an area in which the suspect has no
    expectation of privacy. However, simply because an officer is not required to get a
    [J-107-2018] [MO: Baer, J.] - 23
    warrant does not mean that he or she cannot (or should not) do so. To obtain a warrant
    is to provide the subsequent search with an added layer of protection from challenge,
    inasmuch as the search was authorized by a neutral and detached magistrate. Pre-
    approval of the search by a judicial officer eliminates the officer’s need to make the much
    riskier decision of determining on the spot whether the subject has an expectation of
    privacy.
    In some instances, it will be patent and obvious that the suspect has no expectation
    of privacy in the area that the officer seeks to search. However, this is not that case.
    CompuGig had sole possession of Shaffer’s computer. An identified witness informed
    the police that he observed what he believed to be child pornography on the computer.
    Clearly, probable cause existed to obtain a warrant to search the computer. Instead of
    searching the computer immediately, the better (and more constitutionally adherent)
    practice is to secure the computer and proceed to get a warrant, thereby avoiding the risk
    of erroneously calculating whether Shaffer had an expectation of privacy.
    *     *      *
    For the reasons discussed, I concur in the result reached by the Majority. I dissent
    as to the Majority’s legal analysis.
    [J-107-2018] [MO: Baer, J.] - 24