-
Opinion issued May 21, 2019 In The Court of Appeals For The First District of Texas ———————————— NOs. 01-18-00300-CR 01-18-00301-CR 01-18-00302-CR and 01-18-00303-CR ——————————— TROY LEVI BURWELL, Appellant V. THE STATE OF TEXAS, Appellee On Appeal from the 248th District Court Harris County, Texas Trial Court Case Nos. 1557904, 1557905, 1557906, 1557907 OPINION A jury convicted appellant, Troy Levi Burwell, of four counts of possession of child pornography and assessed his punishment at imprisonment for two years in two of the offenses and probation for ten years in the other two offenses.1 In his sole issue on appeal, appellant argues that the trial court improperly denied his motion to suppress evidence obtained from Adobe Systems Incorporated, the entity with which appellant had electronically stored some photographs. We affirm. Background Appellant was charged with four counts of possession of child pornography after images containing child pornography were recovered from his Adobe Photoshop photo-storage account. An employee of Adobe Systems Inc. had reported the images to the National Center for Missing and Exploited Children (NCMEC), which in turn sent the tip to the Houston Police Department (HPD). HPD obtained a search warrant and conducted a further investigation, leading to appellant’s arrest and prosecution. In his motion to suppress, appellant argued that Adobe acted as an agent of NCMEC, which he asserted was a governmental entity. He “specifically invoked the protections of the Fourth, Fifth and Fourteenth Amendments to the United States 1 See TEX. PENAL CODE ANN. § 43.26(a). In trial court cause numbers 1557904 and 1557905, resulting in appellate cause numbers 01-18-00300-CR and 01-18-00301- CR, respectively, the jury assessed appellant’s punishment at ten years’ probation. In trial court cause numbers 1557906 and 1557907, resulting in appellate cause numbers 01-18-00302-CR and 01-18-00303-CR, respectively, the jury assessed appellant’s punishment at two years’ confinement. 2 Constitution; Article I, Sections 9 and 19 of the Texas Constitution, and Articles 38.22 [and] 38.23 of the Texas Code of Criminal Procedure.” At the suppression hearing, HPD Officer M. Wilson testified that he was assigned to HPD’s Internet Crimes Against Children Task Force. Officer Wilson stated that he received two “Cyber Tips” from NCMEC, which he described as tips generated by an internet service provider which were then reported through NCMEC. He stated that when NCMEC receives a Cyber Tip, it then “delegate[s] [the tip] to local law enforcement for further investigation.”2 Officer Wilson identified Adobe Systems Incorporated as the internet service provider that created the tips and notified NCMEC. He stated that Adobe is a for-profit company and that it is not a law enforcement agency. Officer Wilson testified that the tips usually consist of “subscriber information” such as “a user name, an IP address, an email address, [and] possibly a phone number.” 2 The parties alluded in the hearing to various laws that govern the reporting of child pornography. Federal statutes authorize NCMEC to act as “the official national clearinghouse for information about missing and exploited children,” including by operating “the CyberTipline as a means of combating Internet child sexual exploitation.” See United States v. Ackerman,
831 F.3d 1292, 1296 (10th Cir. 2016) (citing 42 U.S.C. § 5773(b)). Regarding the CyberTipline, NCMEC “is statutorily obliged to maintain an electronic tipline for [internet service providers] to use to report possible Internet child sexual exploitation violations to the government,” and NCMEC must “forward every single report it receives to federal law enforcement agencies and it may make its reports available to state and local law enforcement as well.”
Id. (citing 18U.S.C. § 2258A(c)). 3 Officer Wilson testified that, in the present case, the tips provided appellant’s Adobe user name, email address, and two different IP addresses and that the tips included four “images of interest” that had been flagged as potentially containing child pornography. Officer Wilson further stated that, in the two tips he received relevant to this case, Adobe indicated that it had reviewed the contents of the files it sent to NCMEC. Officer Wilson testified that he did not have any direct communication with Adobe, but he was aware that Adobe had user agreements with its customers and that entities like Adobe are subject to federal laws requiring that they report suspected child pornography or abuse to NCMEC. Officer Wilson was not aware of any demand or request by law enforcement made to Adobe that led to the search of appellant’s account, and he stated that, to the best of his knowledge, Adobe searched appellant’s account “based solely on [its] own interests.” Officer Wilson testified that he did not know how Adobe came to discover the reported files in appellant’s account—all he knew was that the files were not found as a result of running a “hash algorithm”3 but that they “were actually viewed” by someone. He 3 “A hash value is an algorithmic calculation that yields an alphanumeric value for a file,” essentially consisting of “a string of characters obtained by processing the contents of a given computer file and assigning a sequence of numbers and letters that correspond to the file’s contents.” United States v. Reddick,
900 F.3d 636, 637 (5th Cir. 2018), petition for cert. filed, No. 18-6734 (U.S. Nov. 14, 2018) (internal quotations omitted). A “hash value comparison allows law enforcement to identify child pornography with almost absolute certainty, since hash values are specific to the makeup of a particular image’s data,” and, thus, “[h]ash values have been used to fight child pornography distribution, by comparing the hash values of suspect files against a list of the hash values of known child pornography images currently 4 also testified that, prior to obtaining a search warrant, he did not look at or search anything beyond what Adobe had looked at and provided to NCMEC, and, to the best of his knowledge, neither did NCMEC. Officer Wilson also testified regarding his subsequent investigation in the case. Using the IP addresses provided in the tips, he was able to determine the internet service providers to those IP addresses, and he “submitted administrative subpoenas to both [internet service providers] and requested subscriber information.” This led him to appellant. Officer Wilson obtained a search warrant to examine the entire content of appellant’s Adobe account and residence, and officers discovered images of child pornography associated with appellant’s account, including some of the same images that were the basis of the Cyber Tips. Finally, appellant offered copies of the CyberTipline reports and a copy of Adobe’s General Terms of Use. The Terms of Use provided, in relevant part, that users grant Adobe “a non- exclusive, worldwide, royalty-free, sub-licensable, and transferrable license to use, reproduce, publicly display, distribute, [or] modify” content uploaded to Adobe’s in circulation.”
Id. at 637,639 (internal quotations omitted); see also
Ackerman, 831 F.3d at 1294(equating hash value with “a sort of digital fingerprint”). Although hash values are not the only method available to discover child pornography, Fourth Amendment issues involved in their use in this context has been addressed in recent cases. See, e.g.,
Reddick, 900 F.3d at 637–39;
Ackerman, 831 F.3d at 1294–95. We note, however, that the files in this case were not identified using a hash algorithm. 5 systems “for the purpose of operating or improving the Services.” Regarding “Our Access,” Adobe’s Terms of Use provided: We will only access, view, or listen to your content in limited ways. For example, in order to perform the Services, we may need to access, view, or listen to your content to (a) respond to support requests; (b) detect, prevent or otherwise address fraud, security, unlawful, or technical issues; and (c) enforce these terms. Our automated systems may analyze your content using techniques such as machine learning. This analysis might occur as the content is sent, received, or when it is stored. From this analysis, we are able to improve the Services. . . . The Terms of Use further prohibited users from using Adobe’s services to “upload or share any content that is unlawful, harmful, threatening, abusive, tortious, defamatory, libelous, vulgar, lewd, profane, invasive of another’s privacy, or hateful” or to otherwise “violate applicable law.” The Terms of Use also contained a section regarding “Investigations” that provided: 11.1 Screening We do not review all content uploaded to the Services, but we may use available technologies or processes to screen for certain types of illegal content (for example, child pornography) or other abusive content or behavior. . . . 11.2 Disclosure We may access or disclose information about you, or your use of the Services, (a) when it is required by law (such as when we receive a valid subpoena or search warrant); (b) to respond to your requests for customer service support; or (c) when we, in our discretion, think it is necessary to protect the rights, property, or personal safety of us, our users, or the public. The trial court denied appellant’s motion to suppress. Among other findings of fact, the trial court found that Adobe was not a government entity or an agent of 6 the government; the government did not request or authorize Adobe’s search of appellant’s account; the government did not exercise control over Adobe’s search “in that the search by Adobe does not primarily help the Government but rather, serves its own interest.” The trial court further clarified its finding that Adobe was not a government agent by stating, “The Court specifically finds that there is no statutory authorization of Adobe, no funding by the Government of Adobe, no licensure for the purpose of conducting these reviews of the content . . . by the service provider.” The jury subsequently convicted appellant of four counts of possession of child pornography, and this appeal followed. Motion to Suppress In his sole issue on appeal, appellant argues that the trial court erred in denying his motion to suppress because Adobe’s search of his account violated his rights under the Fourth Amendment. A. Standard of Review We review a trial court’s ruling on a motion to suppress under a bifurcated standard of review. Turrubiate v. State,
399 S.W.3d 147, 150 (Tex. Crim. App. 2013). We review the trial court’s factual findings for an abuse of discretion, and we review the trial court’s application of the law to the facts de novo.
Id. We givealmost total deference to the trial court’s determination of historical facts, especially those 7 based on an evaluation of witness credibility or demeanor. Gonzales v. State,
369 S.W.3d 851, 854 (Tex. Crim. App. 2012). We review the trial court’s fact findings to determine whether the evidence, when viewed in the light most favorable to the trial court’s ruling, supports the findings under review. Wiede v. State,
214 S.W.3d 17, 24 (Tex. Crim. App. 2007). We will sustain the trial court’s ruling if it is reasonably supported by the record and is correct on any theory of law applicable to the case. Valtierra v. State,
310 S.W.3d 442, 447–48 (Tex. Crim. App. 2010). B. Analysis The Fourth Amendment guarantees “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures[.]” State v. Rodriguez,
521 S.W.3d 1, 8 (Tex. Crim. App. 2017) (quoting U.S. CONST. amend. IV); see also TEX. CONST. art. I, § 9 (“The people shall be secure in their persons, houses, papers and possessions, from all unreasonable seizures or searches. . . .”). Fourth Amendment protections generally do not extend to the conduct of private persons who are not acting as government agents or with the knowledge and participation of a government official. United States v. Jacobsen,
466 U.S. 109, 113 (1984);
Rodriguez, 521 S.W.3d at 10; Dawson v. State,
106 S.W.3d 388, 391 (Tex. App.—Houston [1st Dist.] 2003, no pet.) (“Even a wrongful search or seizure by a private citizen does not deprive the government of the right to use evidence obtained from the wrongful search.”) (citing Walter v. United States, 8
447 U.S. 649, 656 (1980)). Nevertheless, “[t]he government may not encourage conduct by private persons that the government itself cannot do, and if the government does encourage a search, or the private citizen searches solely for the purpose of aiding in law enforcement, the search is illegal.”
Dawson, 106 S.W.3d at 392. Here, the initial search of appellant’s account was done by Adobe—a for- profit company not generally associated with law enforcement. Adobe then made a report that was forwarded through NCMEC to HPD. Officer Wilson with HPD then used information from the tips received from Adobe through NCMEC to obtain a warrant and conduct a further search of appellant’s files and property. Appellant argues that Adobe acted as an agent of NCMEC in conducting the search and inspection of the files stored with Adobe’s service, and he asserts that NCMEC is a governmental entity, citing a case from the Tenth Circuit, United States v. Ackerman,
831 F.3d 1292(10th Cir. 2016). Regardless of whether NCMEC was acting as a governmental agency in this case, we conclude that there is no evidence that Adobe acted as an agent of either NCMEC, the HPD, or any other governmental entity. “Whether a private party should be deemed an agent or instrument of the Government for Fourth Amendment purposes necessarily turns on the degree of the Government’s participation in the private party’s activities. . . .” Skinner v. Railway 9 Labor Executives’ Ass’n,
489 U.S. 602, 614 (1989); see also
Ackerman, 831 F.3d at 1301(holding that agency relationship “is usually said to result from the manifestation of consent by one person to another that the other shall act on his behalf and subject to his control, and consent by the other so to act” and further recognizing “more stylized agency tests for Fourth Amendment cases” in some jurisdictions, which generally focus on government’s knowledge of or control over search and aims of private party in conducting search) (internal quotations and citations omitted). Thus, to determine whether a person is acting as an “instrument” or agent of the government, we ask (1) whether the government knew of, and acquiesced in, the intrusive conduct, and (2) whether the party performing the search intended to assist law enforcement efforts or, instead, to further his own ends.
Dawson, 106 S.W.3d at 392(citing Stoker v. State,
788 S.W.2d 1, 11 (Tex. Crim. App. 1989)). We must consider both elements. See
id. “We conductour analysis of this question on a case-by-case basis in light of all the circumstances.”
Id. (citing UnitedStates v. Hall,
142 F.3d 988, 993 (7th Cir. 1998)); see also
Skinner, 489 U.S. at 614(holding that determination of extent that private party acted as government agent “can only be resolved in light of all the circumstances”) (internal quotations omitted). “The defendant bears the burden of 10 proving that a private party acted as an agent of the government.”
Dawson, 106 S.W.3d at 392(citing United States v. Feffer,
831 F.2d 734, 737 (7th Cir.1987)). Regarding whether the government knew of, and acquiesced in, Adobe’s intrusive conduct, there is no evidence that either NCMEC or anyone at HPD knew of or acquiesced in Adobe’s search of appellant’s files. In fact, Officer Wilson’s testimony established that he did not learn of Adobe’s search until after it had occurred. Officer Wilson affirmatively testified that he did not ask or otherwise encourage Adobe to perform the search and, to the best of his knowledge, neither did anyone at NCMEC. As to whether Adobe performed the search intending to assist law enforcement efforts or, instead, to further its own ends, we again observe that there is no evidence that Adobe intended to assist law enforcement efforts. Appellant argues, however, that because no one from Adobe testified at the suppression hearing, we cannot tell whether the search was entirely for its own business purposes. He further argues that because Adobe was required by law to report child pornography to authorities through NCMEC, the government essentially compelled Adobe’s search. The search of appellant’s computer was provided for by Adobe’s Terms of Use, which indicated that Adobe would perform routine searches of user content. The Terms of Use stated that Adobe would use the content generally for its own 11 purposes, that it would access or use content to enforce the Terms of Use themselves, and that it would “use available technologies or processes to screen for certain types of illegal content (for example, child pornography)” and would disclose information as required by law. Officer Wilson also testified that, to the best of his knowledge, Adobe acted in accordance with its own interests and not at the direction of or in cooperation with a government entity. Thus, considering both elements necessary to determining whether Adobe acted as an “instrument” or agent of the government, we conclude that nothing in the record indicates that a governmental entity knew of and acquiesced in Adobe’s search of the user content that turned up the images of child pornography in appellant’s account. Nor does anything in the record indicate that Adobe acted out of anything other than its own business interests in complying with the law and maintaining the integrity of its services as set out in its Terms of Use. See
id. Appellant failedto carry his burden of establishing that Adobe acted as an agent of the government. See
id. Appellant assertsthat Ackerman is persuasive in this case. We disagree, as that case is materially distinguishable on the facts. In Ackerman, AOL used a hash algorithm to conduct routine screening of user emails, which resulted in AOL flagging an email and related attachments sent by Ackerman as potentially containing child
pornography. 831 F.3d at 1294. AOL, without actually viewing 12 the files itself, forwarded a report to NCMEC through the CyberTipline that included Ackerman’s email and the four attached images. An NCMEC analyst then opened the email and images, viewed each image, and “confirmed that all four [images] (not just the one AOL’s automated filter identified) appeared to be child pornography.”
Id. The analysisalso identified Ackerman as the likely owner of the account, and then alerted local law enforcement.
Id. Relevant here,Ackerman argued on appeal that NCMEC was a governmental entity due to the law enforcement powers delegated to it by federal statute and, as such, its warrantless search of the actual contents of the email and attachments violated his Fourth Amendment rights and implicated the “private search” doctrine in that NCMEC’s investigation exceeded the scope of AOL’s private search.
Id. at 1294–95.The Tenth Circuit in Ackerman concluded that NCMEC was a governmental entity as it related to its involvement with Ackerman, and it further held that even if it was not a governmental entity, it could be considered an agent of law enforcement.
Id. at 1299–1301.The Ackerman court further held that the scope of NCMEC’s search did in fact exceed the scope of AOL’s private search.
Id. at 1304–1308.Appellant’s case here is based on significantly different facts and legal arguments from those in Ackerman. Here, the only warrantless search of the contents of appellant’s account was done by Adobe, which actually viewed the contents of 13 appellant’s files and forwarded a report containing those files to NCMEC though the CyberTipline, as compared to NCMEC’s warrantless search in Ackerman. There is no evidence in this case that NCMEC did anything more than forward the Cyber Tips to the HPD. And Officer Wilson’s uncontradicted testimony indicated that he viewed only the files that had already been viewed and flagged by Adobe prior to obtaining a search warrant, and appellant does not argue that HPD’s search exceeded the scope of the private search conducted by Adobe. But see
Ackerman, 831 F.3d at 1304–1308 (addressing Ackerman’s complaint that NCMEC, acting as or on behalf of governmental entity, conducted warrantless search that exceeded scope of AOL’s private search). Rather, appellant’s complaint here is that Adobe—not NCMEC—was acting as an agent of law enforcement. By contrast, the court in Ackerman was not asked to address and did not opine on whether the internet service provider AOL was a private party, but nevertheless referred to AOL’s routine use of a hash algorithm as a “private” search. See
id. Appellant alsoseems to argue that because Adobe did not use a hash algorithm to screen the content of his account, as happened in Ackerman, but instead had an individual screen his files, Adobe somehow violated his Fourth Amendment rights; however, nothing in Ackerman indicates that a private entity’s review of internet content might nevertheless raise Fourth Amendment concerns if 14 it is done by an individual rather than by automated algorithm. See
id. Accordingly, appellant’sreliance on Ackerman is misplaced. The more closely analogous case to this one is United States v. Reddick,
900 F.3d 636(5th Cir. 2018), petition for cert. filed, No. 18-6734 (U.S. Nov. 14, 2018). In that case, the Fifth Circuit Court of Appeals concluded that an investigator’s warrantless examination of files already identified by algorithm as matching known child pornography files did not materially exceed the original automated search by a private entity and so was not unconstitutional.
Id. at 639–40.The court pointed out that “[p]rivate businesses and police investigators rely regularly on ‘hash values’ to fight the online distribution of child pornography” and that “[h]ash values have thus become a powerful tool for combating the online distribution of unlawful aberrant content.”
Id. at 637.In that case, the question was “whether and when the use of hash values by law enforcement is consistent with the Fourth Amendment.”
Id. The courtheld that where a private company determined that the hash values of files uploaded by the defendant corresponded to the hash values of known child pornography images, and then passed those images on to law enforcement, the private search doctrine applied.
Id. The courtconstrued that doctrine to hold that “the Fourth Amendment is not implicated where the government does not conduct the search itself, but only receives and utilizes information uncovered by a search conducted by a private party.”
Id. It furtherheld 15 that “the government’s subsequent law enforcement actions in reviewing the images did not effect an intrusion on [the defendant’s] privacy that he did not already experience as a result of the private search.”
Id. Here, althoughthe files identified by the Adobe employee were reviewed by both Adobe and NCMEC as images, neither Adobe nor NCMEC reviewed any file beyond those identified by Adobe, entirely unlike Ackerman. NCMEC simply turned the images over to law enforcement, which obtained a search warrant and conducted a search of appellant’s Adobe account. Thus, here, as in Reddick, the government’s subsequent law enforcement actions did not effect an intrusion on appellant’s privacy that he had not already experienced as a result of the private search. This case is also analogous to numerous other cases in which a private citizen found contraband or other evidence of a crime and turned it over to appropriate authorities. In Rodriguez, the Texas Court of Criminal Appeals provided a general overview of the private-party-search doctrine and highlighted numerous cases in which it had been
applied. 521 S.W.3d at 10–11. The court observed that the “private-party-search doctrine is often applied in bailee cases in which the private person (e.g., the mechanic, the computer repairman, the airline baggage handler etc.) had legal possession of the item when he conducted the search” or in instances in which “the property is simply seized by a private person—legally or not—and turned over to the police without the police having entered a protected area.”
Id. at 1116 (citing United States v. Seldon,
479 F.3d 340, 341 (4th Cir. 2007) (service technicians—who had legal possession of van that had been brought in for repair— found false compartment and turned over evidence); Rogers v. State,
113 S.W.3d 452, 454–55 (Tex. App.—San Antonio 2003, no pet.) (computer technician finds files containing child pornography on computer voluntarily relinquished to computer repair store); Cobb v. State,
85 S.W.3d 258, 270–71 (Tex. Crim. App. 2002) (holding that Fourth Amendment was not implicated when private citizen took knives from his son’s apartment); Stone v. State,
574 S.W.2d 85, 87 (Tex. Crim. App. [Panel Op.] 1978) (Stone’s babysitter gathered photographs depicting sexual assault from Stone’s residence and gave them to housing manager, who in turn gave them to police)). And, here, also unlike Ackerman, appellant used Adobe’s services pursuant to its Terms of Use, and these put him on notice that Adobe reviews files stored on its website for indicia of crimes, specifically including child pornography. Thus, Adobe had lawful access to appellant’s stored content at the time it conducted its search. See
id. There isno evidence that the search was done with the government’s knowledge or to assist with law enforcement efforts. See id.;
Stoker, 788 S.W.2d at 11;
Dawson, 106 S.W.3d at 392. There is no evidence that it violated the Fourth Amendment. Rather, considered in light of this Fourth Amendment jurisprudence, the record demonstrates that Adobe acted as a private entity in conducting its search 17 of appellant’s account and that its search did not implicate appellant’s Fourth Amendment rights. We overrule appellant’s sole issue. Conclusion We affirm the judgment of the trial court. Evelyn V. Keyes Justice Panel consists of Justices Keyes, Higley, and Landau. Publish. TEX. R. APP. P. 47.2(b). 18
Document Info
Docket Number: 01-18-00300-CR
Citation Numbers: 576 S.W.3d 826
Filed Date: 5/21/2019
Precedential Status: Precedential
Modified Date: 5/22/2019