United States v. Caymen ( 2005 )


Menu:
  •                   FOR PUBLICATION
    UNITED STATES COURT OF APPEALS
    FOR THE NINTH CIRCUIT
    UNITED STATES OF AMERICA,              
    Plaintiff-Appellee,         No. 03-30365
    v.
           D.C. No.
    CR-03-00002-RRB
    NICOLAI CAYMEN, aka Andre
    Patrick Payne,                                OPINION
    Defendant-Appellant.
    
    Appeal from the United States District Court
    for the District of Alaska
    Ralph R. Beistline, District Judge, Presiding
    Argued and Submitted
    July 6, 2004—Anchorage, Alaska
    Filed April 21, 2005
    Before: Cynthia Holcomb Hall, Andrew J. Kleinfeld, and
    Kim McLane Wardlaw, Circuit Judges.
    Opinion by Judge Kleinfeld
    4595
    UNITED STATES v. CAYMEN                 4597
    COUNSEL
    Mary C. Geddes, Assistant Federal Defender, Anchorage,
    Alaska, for the appellant.
    Steven E. Skrocki, Assistant U.S. Attorney, Anchorage,
    Alaska, for the appellee.
    OPINION
    KLEINFELD, Circuit Judge:
    We consider a motion to suppress evidence found on the
    hard drive of a computer that had been obtained by fraud.
    Facts
    We take the facts from the hearing on the motion to sup-
    press and the district court’s decision on the motion.
    Caymen worked as a desk clerk at a hotel in Ketchikan, one
    of Alaska’s larger cities, but as cities go, a small one, with a
    population of about 7,500 people. A local business supply
    store called the police after a woman complained that the
    4598               UNITED STATES v. CAYMEN
    store had charged her credit card $1,654 for a computer that
    she had not purchased. The store discovered that Caymen had
    placed a telephone order for the computer using a credit card,
    and when Caymen picked it up the shop clerk had not asked
    him for any identification. Because the local business supply
    stores share information about customers who defraud them,
    the store clerk was able to tell the police that Caymen had
    tried to buy a computer from one of their competitors, also
    with credit card trickery. At the second store, Caymen had
    first tried to use a credit card that was rejected, then he used
    a different card that worked, but he later cancelled the order,
    saying that he had already obtained the computer he needed.
    The police got a search warrant for the house where Cay-
    men rented a room to look for the laptop and evidence of
    credit card fraud. The police discovered the laptop in Cay-
    men’s room. It was connected to a desktop tower, which did
    not have its own monitor (evidently he used the laptop as its
    monitor), and both computers were connected to a high-speed
    DSL internet connection. The police officer could see where
    a rental sticker had been torn off the back of the tower. It
    turned out that Caymen had rented the desktop tower from a
    store, but never made any payments and never returned it. The
    police then got a second warrant to seize the desktop tower.
    Caymen was present during the search. He claimed that he
    had no idea what the police were talking about when they said
    that the laptop had been purchased with someone else’s credit
    card. Caymen insisted that he had bought it with his own
    credit card. During the search, the police found documents
    showing that Caymen had changed his name from Andrew
    Patrick Payne. When the police ran the old name through the
    law enforcement database, they found that Caymen had out-
    standing warrants in two other states (which Caymen denied
    having), and that he had prior convictions for the possession
    of child pornography and unlawful acts with minors. In Cay-
    men’s wallet, the police found two receipts for the purchase
    and subsequent cancellation of the computer that Caymen had
    UNITED STATES v. CAYMEN                  4599
    ordered from the second store. Printed on those receipts was
    yet another credit card number that did not belong to Caymen.
    Again, Caymen claimed not to know how this could have
    happened. The police also found some receipts containing the
    names and credit card information of guests who had stayed
    at the hotel where Caymen worked.
    After seizing the laptop, the police called the business sup-
    ply store where Caymen had gotten it to ask if they could look
    at it before returning it. The store’s owner not only consented
    to the police request, but he specifically requested that the
    police search the laptop’s hard drive because he didn’t “want
    to have anything [on the computer] that shouldn’t be there.”
    The police looked on the laptop’s hard drive for evidence of
    credit card fraud, but instead found images of boys, who were
    around ten or twelve-years-old, exhibiting their genitals for
    the camera. The police immediately stopped their search of
    the hard drive so that they could obtain a third search warrant,
    because they now had probable cause to believe that Caymen
    possessed child pornography. Using the third warrant, the
    police looked at the hard drives and storage media from both
    the laptop and tower computers for evidence of possession of
    child pornography. They found plenty — the hard drives were
    filled with sexually explicit images of children.
    Caymen was indicted for possession of child pornography
    and fraudulent use of a credit device. He moved to suppress
    the evidence of the sexual photographs of children on the lap-
    top. Caymen’s theory was that the police had no constitutional
    justification for their first look on the laptop’s hard drive, and
    that all the subsequently found child pornography was “fruit
    of the poisonous tree.” Caymen’s motion was denied. He
    pleaded guilty to possession of child pornography, but
    reserved for appeal the question of whether his motion to sup-
    press was properly denied. The fraudulent use of a credit
    device charge was dismissed (it was apparently pursued by
    the state in state court, but our record does not include any
    4600                  UNITED STATES v. CAYMEN
    state disposition). Caymen now appeals the district court’s
    denial of his motion to suppress.
    Analysis
    We review the denial of Caymen’s motion to suppress de
    novo, and the underlying factual findings for clear error.1
    The parties argue the case exclusively in terms of whether
    Caymen has standing to assert a Fourth Amendment violation
    stemming from the initial police search of the laptop. We
    need not decide whether other grounds might have justified
    the examination of the laptop hard drive, or whether consent
    or a warrant (beyond the warrants the police already had) was
    needed for the first examination of the hard drive, because no
    such issues are raised in Caymen’s motion to suppress, the
    district court’s denial of that motion, or the appellate briefs.
    Caymen attacks the initial police examination of the lap-
    top’s hard drive as a warrantless search. The police had nei-
    ther Caymen’s consent nor a warrant to look on the hard
    drive, and since the laptop was in police possession (and had
    been for weeks), the police could easily have sought and
    obtained a warrant. Caymen argues that the consent to search
    the laptop given by the business supply store was irrelevant
    because the computer belonged to Caymen and not to the
    store. Caymen had plainly not authorized the shop owner to
    consent to examination of the hard drive of his computer, so
    the line of third party consent cases2 has no bearing on this
    case. The laptop was in police possession pursuant to the first
    search warrant when the police looked at it, so this case does
    1
    United States v. Jones, 
    286 F.3d 1146
    , 1150 (9th Cir. 2002).
    2
    See United States v. Matlock, 
    415 U.S. 164
    (1974); United States v.
    Davis, 
    332 F.3d 1163
    (9th Cir. 2003); United States v. Fultz, 
    146 F.3d 1102
    (9th Cir. 1998); United States v. Welch, 
    4 F.3d 761
    (9th Cir. 1993).
    UNITED STATES v. CAYMEN                         4601
    not raise the questions at issue in cases where a guest is still
    using a room that he obtained by fraudulent use of a credit card.3
    Caymen argues that because he “neither conceded nor was
    convicted of wrongdoing in relationship to the transaction”
    involving the laptop, we have to proceed on the assumption
    that the laptop was his, as he claimed when the police con-
    ducted the search. Thus, Caymen would have us decide the
    case under the assumption that the laptop belonged to Cay-
    men, that he had legitimately purchased and used it for sev-
    eral months, and that the police examination was illegal
    because it was done without Caymen’s consent and without
    a warrant. Caymen’s proposed mode of analysis is incorrect,
    however, because of the clearly established law on a defen-
    dant’s burden to establish a Fourth Amendment violation.
    [1] The Supreme Court held in United States v. Rakas4 that
    “the proponent of a motion to suppress has the burden of
    establishing that his own Fourth Amendment rights were vio-
    lated by the challenged search or seizure.”5 In United States
    v. Freitas,6 we held that “[w]here a defendant fails to meet
    this burden in the suppression hearing, he cannot prevail on
    appeal even though the Government also did not establish the
    contrary, unless, of course, the record on appeal indepen-
    dently demonstrates the requisite standing.”7 This is in accord
    with the general view that “the burden of proof is on the
    defendant” to demonstrate that he has a reasonable expecta-
    tion of privacy.8
    3
    See United States v. Cunag, 
    386 F.3d 888
    (9th Cir. 2004); United
    States v. Bautista, 
    362 F.3d 584
    (2004).
    4
    United States v. Rakas, 
    439 U.S. 128
    (1978).
    5
    
    Id. at 131
    n.1; see United States v. Nuesca, 
    945 F.2d 254
    , 258 (9th Cir.
    1991).
    6
    United States v. Freitas, 
    716 F.2d 1216
    (9th Cir. 1983).
    7
    
    Id. at 1220
    n.2.
    8
    See Wayne R. LaFave, Search and Seizure: A Treatise on the Fourth
    Amendment § 11.3(e), at 218 (4th ed. 2004); see also United States v. Mil-
    ler, 
    84 F.3d 1244
    , 1249-50 (10th Cir. 1996); United States v. Betancur, 
    24 F.3d 73
    , 76-77 (10th Cir. 1994).
    4602                 UNITED STATES v. CAYMEN
    This is not to say that the defendant has to establish some
    sort of property interest. The “capacity to claim the protection
    of the Fourth Amendment depends not upon a property right
    in the invaded place,”9 but rather “whether the individual by
    his conduct has exhibited an actual (subjective) expectation of
    privacy,”10 and further, “whether the individual’s subjective
    expectation of privacy is one that society is prepared to accept
    as reasonable.”11 Thus we do not consider whether title to the
    laptop passed from the store to Caymen.
    [2] Although Caymen bases his claim on the fact that he
    “neither conceded nor was convicted of wrongdoing” in con-
    nection with the laptop, the record nonetheless shows that he
    has never carried his burden of proof to establish an “accept-
    able” expectation of privacy in the laptop. The police officer
    testified at the evidentiary hearing on the motion to suppress.
    Caymen did not. Caymen did not submit an affidavit or other
    evidence supporting his claim that he had honestly purchased
    and owned the laptop. While Caymen did make such a claim
    to the police during their search of his room, that claim was,
    of course, unsworn. While at the evidentiary hearing on the
    motion to suppress the district court never orally recited any-
    thing to the effect of “I find that Caymen obtained the laptop
    by fraud,” the district court’s written decision says so clearly
    enough. The written order denying the motion to suppress
    says “[d]ue to the laptop being purchased by the fraudulent
    use of a credit card, Caymen did not have a reasonable expec-
    tation of privacy in the laptop and cannot challenge the legiti-
    macy of the search.” The district court repeats its finding of
    fact that the laptop “was fraudulently purchased” several
    times in several ways, and says the case is like “a person
    going into a computer store, stealing a computer, claiming
    9
    
    Rakas, 439 U.S. at 143
    ; see also Rawlings v. Kentucky, 
    448 U.S. 98
    ,
    105 (1980); United States v. Nadler, 
    698 F.2d 995
    , 999 (9th Cir. 1983).
    10
    Smith v. Maryland, 
    442 U.S. 735
    , 740 (1979) (citations and internal
    quotations omitted).
    11
    
    Id. UNITED STATES
    v. CAYMEN                         4603
    that he paid for it, and using it as if it was his own. The laptop
    was not legitimately or lawfully his.” All the evidence sup-
    ported this finding. The district court’s finding was not clearly
    erroneous.
    [3] The Fourth Amendment does not protect a defendant
    from a warrantless search of property that he stole, because
    regardless of whether he expects to maintain privacy in the
    contents of the stolen property, such an expectation is not one
    that “society is prepared to accept as reasonable.”12 A legiti-
    mate expectation of privacy means more than a subjective
    expectation of not being discovered.13 We held in United
    States v. Wong14 that a person lacks a reasonable expectation
    of privacy in the contents of a laptop computer he stole.15
    Similarly, several of our sister circuits have held that a person
    who steals a car does not have a reasonable expectation of pri-
    vacy that entitles him to suppress what is found in a search of
    the stolen car.16 Whatever possessory interest a thief may
    have, that interest is subordinate to the rights of the owner,17
    and in this case, the business supply store, from which Cay-
    men fraudulently obtained the computer, not only consented
    to the police examination of the laptop’s hard drive, but also
    specifically requested that the police examine it before return-
    ing it, to protect the store from accidentally coming into pos-
    12
    
    Id. 13 See
    Rakas, 439 U.S. at 143 
    n.12 (“A burglar plying his trade in a sum-
    mer cabin during the off season may have a thoroughly justified subjective
    expectation of privacy, but it is not one which the law recognizes as ‘legit-
    imate.’ ”).
    14
    United States v. Wong, 
    334 F.3d 831
    (9th Cir. 2003).
    15
    
    Id. at 835,
    839.
    16
    See United States v. Tropiano, 
    50 F.3d 157
    , 161 (2d Cir. 1995);
    United States v. Wellons, 
    32 F.3d 117
    (4th Cir. 1994); 
    Betancur, 24 F.3d at 76-77
    ; United States v. Lanford, 
    838 F.2d 1351
    , 1353 (5th Cir. 1988);
    United States v. Hensel, 
    672 F.2d 578
    , 579 (6th Cir. 1982); United States
    v. Hargrove, 
    647 F.2d 411
    , 413 (4th Cir. 1981).
    17
    See Terry v. Enomoto, 
    723 F.2d 697
    , 699 (9th Cir. 1984).
    4604                   UNITED STATES v. CAYMEN
    session of material the store did not want — like child
    pornography.
    [4] We see no ground on which to distinguish property
    obtained by fraud from property that was stolen by robbery or
    trespass, and counsel have offered no authorities suggesting a
    distinction. “An essential element of individual property is the
    legal right to exclude others from enjoying it,”18 and it cannot
    be said that a thief has the right to exclude the true owner
    from the contents of property obtained by fraud. Obtaining the
    computer by fraud did not entitle Caymen to exclude the store
    from the hard drive. The common law long recognized lar-
    ceny by trick or false token where the thief induced the right-
    ful owner to deliver the property by trickery.19 A fake credit
    card is but a plastic and electronic false token.
    [5] Of course, what matters is not the details of the com-
    mon law of larceny. What matters is a reasonable expectation
    of privacy that society is prepared to accept as reasonable,20
    and one who takes property by theft or fraud cannot reason-
    ably expect to retain possession and exclude others from it
    once he is caught. Whatever expectation of privacy he might
    assert is not a legitimate expectation that society is prepared
    to honor. Because, as the district court found, Caymen
    obtained the laptop computer by fraud, he had no legitimate
    expectation of privacy in the contents of the hard drive.
    18
    Int’l News Serv. v. Associated Press, 
    248 U.S. 215
    , 250 (1918) (Bran-
    deis, J., dissenting).
    19
    See, e.g., King v. Pear, 1 Leach 212, 168 Eng. Rep. 208 (Cr. Cas. Res.
    1779) (discussed in Bell v. United States, 
    462 U.S. 356
    , 359 (1983)); Wil-
    liam L. Clark, Jr. & William L. Marshall, A Treatise on the Law of Crimes
    § 12.29, at 946 (7th ed. 1967); Joshua Dressler, Understanding Criminal
    Law § 32.04[5], at 552-53 (2001); Wayne R. LaFave & Austin W. Scott,
    Jr., Handbook on Criminal Law § 85, at 627 (1972); Rollin M. Perkins &
    Ronald N. Boyce, Criminal Law 305 (3d ed. 1982).
    20
    See 
    Smith, 442 U.S. at 740
    .
    UNITED STATES v. CAYMEN   4605
    AFFIRMED.
    

Document Info

Docket Number: 03-30365

Filed Date: 4/20/2005

Precedential Status: Precedential

Modified Date: 10/13/2015

Authorities (22)

United States v. Brian L. Miller, United States of America ... , 84 F.3d 1244 ( 1996 )

United States v. Oscar Betancur , 24 F.3d 73 ( 1994 )

United States v. Sherman L. Wellons, Jr. , 32 F.3d 117 ( 1994 )

United States v. Lloyd Byron Lanford, A/K/A David Allen ... , 838 F.2d 1351 ( 1988 )

United States v. Daniel Michael Tropiano , 50 F.3d 157 ( 1995 )

united-states-v-wayne-mcnair-hargrove-united-states-of-america-v-william , 647 F.2d 411 ( 1981 )

United States v. Peter Cunag, AKA Peter James Martinez , 386 F.3d 888 ( 2004 )

United States v. Terry Lee Hensel , 672 F.2d 578 ( 1982 )

United States v. Raymond Medeiros Freitas, United States of ... , 716 F.2d 1216 ( 1983 )

United States v. Roni Nadler, Dorian Nadler , 698 F.2d 995 ( 1983 )

United States v. Kevin Joseph Bautista , 362 F.3d 584 ( 2004 )

United States v. Zula Jones , 286 F.3d 1146 ( 2002 )

United States v. Damen Anthony Davis , 332 F.3d 1163 ( 2003 )

United States v. Raymond Wong , 334 F.3d 831 ( 2003 )

United States v. Matlock , 94 S. Ct. 988 ( 1974 )

United States v. Sharon Legail Welch , 4 F.3d 761 ( 1993 )

United States v. Daryl Nuesca, United States of America v. ... , 945 F.2d 254 ( 1991 )

UNITED STATES of America, Plaintiff-Appellee, v. Virgil R. ... , 146 F.3d 1102 ( 1998 )

Harold Terry v. J.J. Enomoto , 723 F.2d 697 ( 1984 )

Smith v. Maryland , 99 S. Ct. 2577 ( 1979 )

View All Authorities »