Citation Numbers: 1 Misc. 3d 638, 2003 N.Y. Misc. LEXIS 1224
Judges: Fisher
Filed Date: 9/30/2003
Status: Precedential
Modified Date: 10/19/2024
OPINION OF THE COURT
Defendant moves to reargue the suppression motions which were denied in the court’s decision and order dated July 9, 2003 (196 Misc 2d 716). The motion is made on a number of grounds, only some of which require discussion here. The following is the court’s decision and order denying the motion to reargue.
A. The directive to Mulrooney to keep the computer secure until the police arrive following the weekend was not unreasonable.
Defendant maintains that the police directive to Mulrooney on December 7th to secure defendant’s computer in Mulrooney’s shop until the police arrived on December 10th was an unlawful seizure of his property, and should lead to suppression under fruit of the poisonous tree grounds. The same argument was made in defendant’s original moving papers, and resolved against him in part D of the original decision. Defendant now posits that the seizure actually occurred on December 7th via the telephone directive, not on December 10th when the police took the computer to the station house pending issuance of the warrant the next day, and that therefore it was unreasonable in length.
While it is true that an official seizure occurred on the 7th (United States v Mayomi, 873 F2d 1049, 1053 [7th Cir 1989] [“after the government requested him to detain” the computer, Mulrooney “acted as an agent of the government”]), the original decision is adhered to. In this case, defendant entrusted his computer to Mulrooney for repairs. Defendant does not allege that the entrustment was for any particular length of time, nor does he allege that the repairs were done and that the computer was scheduled for return. Here, we are dealing with a brief four-day delay over the weekend without any expectation of
B. The official search did not exceed the scope of the private search even if the official search did not concern any of the image files opened by Mulrooney in his private search.
Defendant contends that there is no way to determine a relationship between the private search conducted by Mulrooney alone on December 7th, and the December 10th search conducted by the police with Mulrooney. With a clearer discussion of the mechanics involved than appeared in the original motion papers, defendant alleges that “[a]ny file accessed on December 10th, for example, could also have been accessed on December 7th.” (Freeman affirmation of Aug. 2, 2003 1i 27.) Defendant now contends, for the first time, that Mulrooney may have looked at none of the files accessed by the police on the 10th when he conducted his private search on the 7th. (Id. U 31.) Defendant reasons, again for the first time, that his discovery material is such that any file opened by the police and Mulrooney on the 10th would show a “last access” date of the 10th, and that there would be no way to determine whether Mulrooney looked at any of those files on December 7th. Defendant
This argument is without merit. My decision of July 9 did not turn upon this particular detail, although I acknowledge that I framed the facts in the terms originally presented to me by the defendant’s moving papers (which incorporated the search warrant application). Rather, the key point is that, when Mulrooney and the police on December 10th turned the computer on, they accessed in the first instance, or at least before examination of any image file, only two file folder directories, one denominated “xxx” and the other “MPG.” These computer file folders each appear on the screen, when first opened, as a directory of folder files, or a “table of contents,” containing the titles of individual computer image files.
Accordingly, it is clear beyond peradventure that the official search on December 10th did not, to that limited extent of accessing the directory or table of contents page, go beyond what Mulrooney did himself on December 7th. We also know, however, that Mulrooney in his private search on December 7th opened many of the files labeled as child pornography and verified that they indeed contained what the label promised. In other words, the private search of a sampling of the image files fully confirmed what the labels only provided probable cause to believe, i.e., that all of the files so labeled contained child pornography contraband. (United States v Bowman, 907 F2d 63, 65 [8th Cir 1990] [presence of contraband in the privately
Because of the labeling of the computer image files in each of the two “folder” directories, or table of contents pages in question, which were necessarily accessed by Mulrooney on the 7th before he could get into any of the individual image files, and because such labels were necessarily first encountered by the police and Mulrooney on December 10th before they could get into any of the individual image files, the December 10th search could not have exceeded in a functional sense the scope of the December 7th viewing by Mulrooney. Any viewing of the individual files by the police on December 10th was justified by application of the plain view doctrine, for the reasons stated in footnote 4 in my July 9th decision, and the reasons stated above. (People v Brown, 96 NY2d 80, 88-89 [2001] [“police should be able to seize incriminating evidence in plain view if they had a right to be where they were when they saw it” because “such a seizure involves no invasion beyond what the warrant (or some other exception to the warrant requirement) allows”].) Therefore, it makes no difference if indeed, as defendant now alleges, the police and Mulrooney accessed image files on the 10th that Mulrooney never opened on the 7th.
This is a different situation than that encountered in the context of simple obscenity, as opposed to child pornography. If
In the context of child pornography, however, a labeling which clearly says that an image file contains a sexual performance by a child, in the context of Mulrooney’s earlier private search verifying the same during a sampling of the files, needs no additional viewing to determine that it is, indeed, contraband. (United States v Carey, 172 F3d at 1274-1275; United States v Bowman, supra.) And these individual file labels, in plain view on the table of contents page of each file folder in question, is what Mulrooney said he saw, and what the police said they saw, when the “xxx” file folder was opened and the “MPG” file folder was opened. Defendant’s original moving papers presupposed these facts, if they did not explicitly set them forth as the operative factual scenario. Accordingly, defendant had no reasonable expectation of privacy in the “xxx” and “MPG” computer files which are the subject of the motion to suppress which was not thoroughly frustrated by the private search on December 7th, and no evidentiary hearing was needed.
Defendant makes another allegation in his motion for reargument which requires discussion. Taking issue with the court’s finding that the “viewing of files on both dates concerned images of child pornography only,” and not “other types of private information elsewhere on the computer’s hard drive,” defendant points to the fact that one of the files examined by the police and Mulrooney on the 10th, from the “xxx” file folder, had a title indicating that it was not child pornography, but rather only pornography. Defendant contends, therefore, that “there are not facts in the record that allow the court to conclude that only the ‘xxx’ and ‘MPG’ folders were accessed during the warrantless police search” on December 10th (emphasis in original).
Finally, defendant’s attempt to liken this situation to the prewarrant confirmatory searches condemned in Murray v United States (487 US 533, 540 [1988]) is without merit. As stated above, when the police with Mulrooney opened up the “xxx” and “MPG” file folder directories on December 10th, they necessarily first encountered a table of contents page replete with
Conclusion
The motion for reargument is granted, and upon reargument the original decision is adhered to.
. This is just the nature of a computer’s packaging of individual image files into a “folder.” The folder table of contents page is viewed first, enabling the user to click onto (or “open”) the individual image files. By all accounts, i.e., by accounts not challenged in defendant’s original moving papers or his current moving papers, the individual image files were explicitly labeled.
. In Carey, of course, these observations about the type and kind of files in question, containing child and other pornography, were relevant to show why a police officer’s computer search of such files in aid of a drug investigation violated the Fourth Amendment. They are equally relevant to demonstrate that, even before the search on December 10th reached the point of opening up individual image files, Mulrooney knew from his December 7th private search, imparted lawfully to the police, that each file “was properly labeled and its contents were clearly described in the label.” (United States v Carey, 112 F3d at 1275.) For this reason, and the additional reason that defendant concedes that probable cause to support issuance of a warrant was fully provided by Mulrooney’s private search on December 7th, there is a sufficient record to conclude that the search warrant would have been issued anyway. (People v Del Rio, 220 AD2d 122, 131 [2d Dept 1996].) However, in view of the disposition above, and the failure of the People to argue the independent source point, it is unnecessary and inappropriate to reach this issue.