United States v. Christopher Rarick , 636 F. App'x 911 ( 2016 )


Menu:
  •                  NOT RECOMMENDED FOR FULL-TEXT PUBLICATION
    File Name: 16a0006n.06
    Case No. 14-4212
    FILED
    UNITED STATES COURT OF APPEALS                        Jan 07, 2016
    FOR THE SIXTH CIRCUIT                        DEBORAH S. HUNT, Clerk
    UNITED STATES OF AMERICA,                               )
    )
    ON APPEAL FROM THE
    Plaintiff-Appellee,                              )
    UNITED STATES DISTRICT
    )
    COURT FOR THE
    v.                                                      )
    NORTHERN DISTRICT OF
    )
    OHIO
    CHRISTOPHER D. RARICK,                                  )
    )
    OPINION
    Defendant-Appellant.                             )
    BEFORE: BATCHELDER, GIBBONS, and WHITE, Circuit Judges.
    JULIA SMITH GIBBONS, Circuit Judge. Christopher Rarick appeals the district
    court’s denial of his motion to suppress evidence of child pornography found on his smartphone,
    which was searched pursuant to a warrant after Rarick was arrested for obstructing official
    business and driving with a suspended license. Rarick challenges the particularity of the warrant
    and the manner in which it was executed. We affirm.
    I.
    On February 14, 2013, Christopher Rarick was stopped by Ashland City Police Officer
    Kim Mager outside a Cheap Tobacco store in Ashland, Ohio, after Officer Mager conducted a
    LEADS inquiry on the car Rarick was driving and determined the registered owner of the
    vehicle, Rarick, had a suspended license.      Accordingly, Officer Mager stopped Rarick to
    determine whether he was the registered owner and was thus driving with a suspended license.
    During the stop, Rarick became argumentative: he challenged the officer’s authority to ask his
    name or run his license plate, and he refused to produce his driver’s license, insurance
    No. 14-4212
    United States v. Rarick
    information, or vehicle registration. At some point, Rarick removed his smartphone from his
    pocket, held it up, approached the officer, and stated that he was recording her. The officer took
    the phone, placed it on the trunk of Rarick’s car, and ordered Rarick to remain in his car while
    she conducted her work. Rarick grabbed his phone from the trunk and retreated to the passenger
    seat of his car, whereupon the officer approached him to find out what he was doing. The officer
    saw that Rarick was manipulating his phone, and she ordered him to stop and to put his hands on
    the dashboard. Saying that he wanted to record what was happening, Rarick continued to
    manipulate his phone. Eventually he put the phone down and placed his hands on the dashboard.
    After backup arrived, Rarick was arrested and taken to jail, where he was cited for obstructing
    official business and driving with a suspended license. His cell phone—a black Samsung Nexus
    S 4G model SPH-D720—was seized as evidence.
    Rarick refused to consent to a search of his phone. Lieutenant Joel Icenhour then filed an
    affidavit for a search warrant. In the affidavit, Icenhour stated that he had good cause to believe
    that evidence relating to the offense of obstructing official business, a violation of Ohio Revised
    Code § 2921.31, was likely stored in a digital format on Rarick’s phone, which had been taken
    from Rarick at the time of his arrest. Icenhour’s affidavit stated that “[t]his belief is based on a
    traffic stop conducted by Officer Kimberly Mager.” Search Warrant Aff. 1, ECF No. 19-1. An
    Ohio state judge issued a warrant that authorized the search and seizure of, among other things,
    “[a]ll information within” Rarick’s phone, “including but not limited to machine-readable data,
    all previously erased data, and any personal communications”; “[a]ny and all electronic data
    contained in the device’s memory as well as on other internal, external or removable media to
    include but not necessarily limited to . . . images, voice memos, photographs, [and] videos”; and
    -2-
    No. 14-4212
    United States v. Rarick
    “[a]ll other fruits and instrumentalities of crime at the present time unknown.” Search Warrant
    1–2, ECF No. 19-2.
    Icenhour then executed the search warrant by connecting Rarick’s phone to a computer
    that was running Susteen Secure View 3 forensic cell phone data recovery software.1 Icenhour
    downloaded the phone’s data onto his computer. After the data had been downloaded, Icenhour
    testified, “a little box show[ed] up” on his computer screen, saying “Do you want to view the
    report?” Hr’g Tr. 28:24–25, Oct. 15, 2013, ECF. No. 54. Icenhour clicked “View the report,”
    and his computer displayed the downloaded data, which included technical information about the
    phone itself, call logs, contacts, pictures, audio files, video files, and other data. Hr’g Tr. 28:25–
    29:8. The report displayed thumbnail images of the pictures and video files; for the video files,
    the thumbnail image was the first frame of the video. Icenhour acknowledged that it was
    possible to get an idea of the contents of the pictures and video files by looking at the
    thumbnails. Icenhour looked for video and audio files because Rarick had told the arresting
    officer that he was recording her. As Icenhour scrolled down into the section containing video
    files, he scrolled past the pictures, and he could see from the thumbnails that the pictures
    contained child pornography. Icenhour then scrolled further down, where he spotted a video
    with a thumbnail that he thought looked like a beige wall. He testified that he opened the video
    because he thought that the thumbnail might depict the wall of the Cheap Tobacco store where
    the stop occurred. It did not—it too contained child pornography.
    At this point, Icenhour shut off the video and went to tell his chief of police what he had
    found. After consulting with the prosecutor’s office, they applied for and received a second
    1
    The first time Icenhour attempted to execute the warrant, he was thwarted because he did not have the
    phone’s passcode. Icenhour subsequently obtained the passcode from Rarick’s father, apparently with Rarick’s
    consent. If Icenhour had been unable to obtain the passcode, he would have sent the phone to the Ohio Bureau of
    Criminal Investigation to be unlocked.
    -3-
    No. 14-4212
    United States v. Rarick
    warrant, this time asserting probable cause to search for evidence of child pornography and
    several related offenses under Ohio law.        Executing the second warrant, Icenhour found
    numerous pictures and videos containing child pornography, many of which appeared to have
    been taken with Rarick’s phone. The police then arrested Rarick and applied for and received a
    third search warrant for his vehicle and residence.
    A federal grand jury indicted Rarick on two counts of exploiting children in violation of
    18 U.S.C. § 2251(a) and one count of possession of child pornography in violation of 18 U.S.C.
    § 2252A(a)(5)(B). Arguing, inter alia, that the first search warrant was unconstitutionally broad
    and had been executed in an unreasonable manner, Rarick moved to suppress all of the evidence
    found on his smartphone and the fruits obtained from the search. The district court denied his
    motion. Rarick then pled guilty but preserved his right to appeal the district court’s denial of his
    motion to suppress. The court ordered Rarick incarcerated for concurrent sentences of 188
    months on each of the two exploiting-children counts and a concurrent sentence of 120 months
    on the child-pornography count.
    After entry of judgment by the district court, Rarick timely appealed. He argues that the
    first search warrant failed the Fourth Amendment’s particularity requirement and that the manner
    of the search was unreasonable and unconstitutional.
    II.
    Where the issue on appeal is a district court’s denial of a motion to suppress evidence, we
    review the district court’s findings of fact for clear error and its legal conclusions de novo.
    United States v. Quinney, 
    583 F.3d 891
    , 893 (6th Cir. 2009). A district court’s determination of
    the particularity of a search warrant is reviewed de novo. United States v. Richards, 
    659 F.3d 527
    , 536 (6th Cir. 2011) (citing United States v. Greene, 
    250 F.3d 471
    , 477 (6th Cir. 2001)). We
    consider the evidence in the light most likely to support the district court’s denial of the motion
    -4-
    No. 14-4212
    United States v. Rarick
    to suppress. United States v. Pritchett, 
    749 F.3d 417
    , 435 (6th Cir. 2014) (quoting United States
    v. Adams, 
    583 F.3d 457
    , 463 (6th Cir. 2009)).
    III.
    A.
    The Fourth Amendment generally requires police to obtain a warrant before searching the
    digital information stored on a cell phone, even when a cell phone is seized incident to arrest.
    Riley v. California, 
    134 S. Ct. 2473
    , 2493 (2014). The new rule established in Riley applies to
    cases still pending on direct review, such as Rarick’s. See Griffith v. Kentucky, 
    479 U.S. 314
    ,
    328 (1987). The Fourth Amendment further requires that “no Warrants shall issue, but upon
    probable cause, supported by Oath or affirmation, and particularly describing the place to be
    searched, and the persons or things to be seized.” U.S. Const. amend. IV. The particularity
    requirement stems from the Founders’ concern with “curb[ing] the abuses of general warrants,
    devices which provided British officers with broad discretion to search the homes of citizens of
    the Colonies for evidence of vaguely specified crimes.” Ellison v. Balinski, 
    625 F.3d 953
    , 958
    (6th Cir. 2010). The particularity requirement encompasses two issues: “whether the warrant
    supplies enough information to guide and control the agent’s judgment in selecting what to take;
    and . . . whether the category as specified is too broad in the sense that it includes items that
    should not be seized.” 
    Richards, 659 F.3d at 537
    (quoting United States v. Upham, 
    168 F.3d 532
    , 535 (1st Cir. 1999)).
    Rarick does not dispute the existence of probable cause supporting the first search
    warrant to the extent that the warrant authorized obtaining evidence of his interaction with the
    police officer outside the Cheap Tobacco store, for which he was charged with obstructing
    official business. Rather, he argues that the first search warrant was overly broad because it
    neither specified the particular electronic evidence sought from the phone nor the particular
    -5-
    No. 14-4212
    United States v. Rarick
    crime to which the evidence was connected. Although it is true that the text of the warrant did
    not contain that information, “[t]he particularity requirement may be satisfied through the
    express incorporation or cross-referencing of a supporting affidavit that describes the items to be
    seized, even though the search warrant contains no such description.” 
    Richards, 659 F.3d at 537
    (citing Baranski v. Fifteen Unknown Agents of the Bureau of Alcohol, Tobacco and Firearms,
    
    452 F.3d 433
    , 439–40 (6th Cir. 2006) (en banc)). Here, the warrant referred to the supporting
    affidavit that had been filed by Icenhour. The first sentence of the warrant was “WHEREAS
    there has been filed with me an affidavit.” Search Warrant 1. The warrant then stated, referring
    to the following paragraphs that named the types of data to be searched, “[t]hese are, therefore,
    to command you” to search Rarick’s cell phone. Search Warrant 1. This language constitutes a
    sufficient cross-reference of the affidavit. See Groh v. Ramirez, 
    540 U.S. 551
    , 557–58 (2004).
    The question, then, is whether the information contained in the affidavit, to which the
    warrant referred, was enough to satisfy the particularity requirement.          “[T]he degree of
    specificity required is flexible and will vary depending on the crime involved and the types of
    items sought.” 
    Greene, 250 F.3d at 477
    (quoting United States v. Ables, 
    167 F.3d 1021
    , 1033
    (6th Cir. 1999)). The description of the things to be seized should, however, be “as specific as
    the circumstances and the nature of the activity under investigation permit.” 
    Richards, 659 F.3d at 537
    (quoting Guest v. Leis, 
    255 F.3d 325
    , 336 (6th Cir. 2001)). In the context of searches of
    electronic devices, while recognizing the inherent risk that criminals can easily “hide, mislabel,
    or manipulate files to conceal criminal activity,” we must also take care not to give the
    Government free rein to essentially do away with the particularity requirement by allowing it to
    examine every file on the device. 
    Richards, 659 F.3d at 538
    (quoting United States v. Stabile,
    
    633 F.3d 219
    , 237 (3d Cir. 2011)).
    -6-
    No. 14-4212
    United States v. Rarick
    Rarick objects, among other things, to the warrant’s expansive language authorizing the
    search of “any and all electronic data” and “any and all communications,” and the warrant’s
    failure to specify the date of the creation of the video at issue. As he sees it, this language swept
    far more broadly than “the circumstances and the nature of the activity under investigation
    permit[ted].” See 
    Richards, 659 F.3d at 537
    (quoting 
    Leis, 255 F.3d at 336
    ).
    In Richards, we held that the search warrant for evidence regarding a child pornography
    website was not overbroad where it authorized a search beyond the file directory on the server
    where the evidence was 
    contained. 659 F.3d at 541
    . There, the broad search of the entire server
    was necessary because the agents did not know how, where, or in what quantity the evidence
    would be stored on the server. 
    Id. The warrant
    in Richards was specific as to what the agents
    were searching for and limited the items to be seized to the content of the pornographic website,
    and business records, email correspondence, and other files related to the website. 
    Id. at 535.
    Here, certain portions of the warrant were not limited to files specific to what the government
    was searching for—a video or image taken by Rarick on the date and around the time of his
    arrest. For instance, the warrant authorized Icenhour to examine “all GPS data such as but not
    limited to locations, waypoints, favorite locations, points of interest and routes of travel.” Search
    Warrant 1. However, the remedy in this circuit is not suppression of all of the items seized under
    the warrant, but rather severance of the infirm portions “from the remainder which passes
    constitutional muster.” United States v. Abboud, 
    438 F.3d 554
    , 576 (6th Cir. 2006) (quoting
    United States v. Blakeney, 
    942 F.2d 1001
    , 1027 (6th Cir. 1991)); United States v. Cook, 
    657 F.2d 730
    , 735 (5th Cir. 1981)) (“[I]t would be harsh medicine indeed if a warrant which was issued on
    probable cause and which did particularly describe certain items were to be invalidated in toto
    merely because the affiant and the magistrate erred in seeking and permitting a search for other
    -7-
    No. 14-4212
    United States v. Rarick
    items as well.”       (citation omitted)).2        Certain portions of the warrant, such as the portion
    authorizing seizure of “images” and “videos,” were specifically targeted to what the officers had
    probable cause to search, and, therefore, satisfy the particularity requirement.                         See Search
    Warrant 1. No evidence offered against Rarick was seized pursuant to the overbroad portions of
    the warrant. Rather, as will be discussed in further detail below, Icenhour executed the warrant
    as though the infirm portions had been excised, seizing only “images” and “videos” that
    appeared to be related to the incident at the Cheap Tobacco store. Thus, the district court did not
    err in denying Rarick’s motion to suppress.
    B.
    Rarick further argues that the manner of the search was unconstitutional because
    Icenhour did not begin his search by focusing on the places where the evidence was most likely
    to be. Traditionally, “it is generally left to the discretion of the executing officers to determine
    the details of how best to proceed with the performance of a search authorized by warrant—
    subject of course to the general Fourth Amendment protection ‘against unreasonable searches
    and seizures.’” Dalia v. United States, 
    441 U.S. 238
    , 257 (1979) (footnote omitted). In the
    context of searches of electronic devices, this court and other courts have recognized that the
    methodology of a search matters in determining whether it is constitutionally reasonable.
    See, e.g., 
    Richards, 659 F.3d at 538
    –39; 
    Stabile, 633 F.3d at 237
    –40; United States v. Burgess,
    
    576 F.3d 1078
    , 1094–95 (10th Cir. 2009). While it is true that “[a]s the description of . . . places
    and things becomes more general . . . the search method must be tailored to meet allowed ends,”
    eventually, “there may be no practical substitute” for actually examining most or even all
    potential repositories, particularly when the search is for image files. 
    Richards, 659 F.3d at 539
    2
    The dissent urges us to reverse for want of probable cause. However, Rarick has never argued, either in
    the district court or here, that there was no probable cause to arrest for or search for evidence of a violation of Ohio
    Revised Code § 2921.31.
    -8-
    No. 14-4212
    United States v. Rarick
    (quoting 
    Burgess, 576 F.3d at 1094
    ). Due to “the practical difficulties inherent in implementing
    universal search methodologies,” most federal courts, including this circuit, have taken the
    approach of determining the reasonableness of the search on a case-by-case basis. 
    Id. at 538.
    For instance, in Burgess, the agent searching the defendant’s computer used the “preview
    feature” to examine reduced size photos in search of “trophy photos” evidencing drug use.
    
    Burgess, 576 F.3d at 1084
    . The Tenth Circuit held that this search methodology was reasonable
    because the agent’s search was properly targeted to search for “trophy photos,” he immediately
    stopped his search when he found evidence of a second crime, which was outside the scope of
    the warrant, and it was likely, given the risk of deceptive labelling of file names, that he would
    have eventually found the evidence of that second crime using an alternative search method. 
    Id. at 1094–95.
    In the end, there was “no practical substitute” for this methodology. See 
    id. at 1094.
    While Rarick would have us declare that, to be reasonable, the search here should have at
    least been commenced by using a date filter before expanding the search, we will not get
    involved in the minutiae of determining specifically what methodologies should be taken, but
    will rather examine whether the search executed under the facts of this case was reasonable.
    Searching by date may have been one reasonable search methodology, but it was not the only
    reasonable one. The facts of this case lead us to conclude that the search conducted by Icenhour
    was executed in a reasonable manner. Though, under certain portions of the warrant, Icenhour
    was given leave to search virtually the entire contents of Rarick’s phone, the record establishes
    that he did not do so. Rather, he targeted his search to where he reasonably believed the
    recording was most likely to be found—among the audio and video files. Icenhour testified that
    he scrolled through the thumbnails of the files on Rarick’s phone. Though he observed the child
    pornography photos during this search, he continued to scroll through the files until he found an
    -9-
    No. 14-4212
    United States v. Rarick
    image of a beige wall that he thought could be the start of the video recorded outside of the
    Cheap Tobacco store. Rather than continue to search after discovering that this beige wall was a
    part of a video containing more pornography, he turned off the video and proceeded to get a
    second warrant. Although the recording could have been found by first searching for data
    recorded on February 14, 2013, the date of Rarick’s arrest, Icenhour’s approach of searching by
    scrolling through all of the thumbnails, rather than just those on the date of Rarick’s arrest, and
    taking care not to closely examine more than the target of the search warrant was not
    unreasonable.
    IV.
    For the reasons explained above, we affirm the district court’s denial of Rarick’s motion
    to suppress.
    - 10 -
    No. 14-4212
    United States v. Rarick
    ALICE M. BATCHELDER, Circuit Judge, concurring in part and dissenting in
    part. Had we considered this case as it was framed for us on appeal, it would have led not only
    to the conclusion that the warrant was overbroad, but also that it lacked probable cause and that
    no amount of trimming could save it. I therefore respectfully concur in part and dissent in part.
    I.
    It is true that severing the “infirm portions” of a warrant is an acceptable legal remedy
    when dealing with an overbroad warrant.         But the government never made this argument.
    Instead, it contended that, even if the warrant were overbroad, suppression would be
    inappropriate because Icenhour’s search fell within the good faith exception set forth in United
    States v. Leon, 
    468 U.S. 897
    (1984). Our next step should have been to consider whether the
    Leon exception applies here. See Richards, 
    659 F.3d 527
    , 542 (6th Cir. 2001). A glance at Leon
    reveals that the good-faith exception does not apply when an officer relies “on a warrant based
    on an affidavit ‘so lacking in indicia of probable cause as to render official belief in its existence
    entirely unreasonable.’” 
    Leon, 468 U.S. at 923
    (quoting Brown v. Illinois, 
    422 U.S. 590
    , 611
    (1975) (Powell, J., concurring in part)).
    The majority was able to avoid discussing good faith, and thus the latent probable cause
    issue, only by doing the very thing it finds objectionable in this dissent: raising an argument that
    was not before us. And it seems to me more appropriate to consider an argument that was raised,
    albeit without much elaboration, than one that was not raised at all.
    II.
    A review of the record reveals that probable cause was sorely lacking in this case.
    Officer Icenhour’s affidavit notes that the offense at issue is obstructing official business in
    violation of Ohio Revised Code § 2921.31. “[A] police officer is expected to tolerate a certain
    - 11 -
    No. 14-4212
    United States v. Rarick
    level of uncooperativeness, especially in a free society in which the citizenry is not obliged to be
    either blindly or silently obeisant to law enforcement,” and the obstruction must therefore be
    more than “mere argument.” State v. Stayton, 
    709 N.E.2d 1224
    , 1227 (Ohio Ct. App. 1998).
    Thus, with the exception of fighting words, “a citizen’s verbal assault on a police officer does
    not, standing alone, constitute criminal conduct.” Id.1 Further, “refusal to cooperate with police
    and provide identification upon request does not constitute obstructing official business.” State
    v. Prestel, No. 20822, 
    2005 WL 2403941
    , at *2 (Ohio Ct. App. Sept. 30, 2005); see also
    Cleveland Heights v. Lewis, 
    933 N.E.2d 1146
    , 1151 (Ohio Ct. App. 2010).
    Recording the police is of course an “affirmative act,” but it is fully legal in Ohio. See
    Ohio Rev. Code § 2933.52(B)(4). And there is no indication that Rarick’s recording hampered
    Officer Mager in any way. Allowing the police to arrest someone for obstructing official
    business simply because that person was legally recording them goes against the plain language
    of §2933.52(B)(4) and raises serious First Amendment concerns. See Am. Civil Liberties Union
    of Illinois v. Alvarez, 
    679 F.3d 583
    , 607 (7th Cir. 2012).
    In any event, the state would still have had to show that Rarick acted “with an intent to
    obstruct the officers,” and that he “succeeded in actually hampering or impeding them.” State v.
    Crowell, 
    938 N.E.2d 1115
    , 1117–18 (Ohio Ct. App. 2010) (internal quotation marks omitted).
    But nothing in the record before us suggests that Rarick in any way interfered with the
    performance of Officer Mager’s duties or that the video evidence would have shown as much.32
    1
    Rarick’s statement “I have killed people” was perhaps threatening, but it did not constitute fighting words. See
    Greene v. Barber, 
    310 F.3d 889
    , 896 (6th Cir. 2002) (citing Houston v. Hill, 
    482 U.S. 451
    , 462 (1986)).
    2
    3
    That Rarick recorded the interaction appears, if anything, to have helped speed along the arrest,
    as “Christopher’s demeanor changed once he got the phone in record mode” and he was
    “subsequently arrested.”
    - 12 -
    No. 14-4212
    United States v. Rarick
    When a warrant lacks probable cause, the applicability of “the [good faith] exception
    turns on whether a reasonable officer would know that the affidavit failed to establish probable
    cause.” United States v. Helton, 
    314 F.3d 812
    , 824 (6th Cir. 2003). Under Leon, we presume
    that “officers . . . have a reasonable knowledge of what the law prohibits.” 
    Leon, 468 U.S. at 919
    n.20. “This burden is even greater when the officer executing the warrant prepares the affidavit
    in support of the warrant, drafts the warrant, and applies for the warrant.” United States v.
    Watson, 
    498 F.3d 429
    , 433 (6th Cir. 2007). Ohio’s obstruction law applies to the workaday
    interactions of police officers with the public, and its meaning is well settled. Officer Icenhour
    should have known that this warrant lacked probable cause.
    III.
    Having reached this conclusion (a conclusion that the majority does not disagree with
    except on procedural grounds), it is manifest that no amount of trimming can save the warrant.
    The evidence should have been suppressed. From the majority’s holding to the contrary I
    respectfully dissent.
    - 13 -