Com. v. Shaffer, J. , 177 A.3d 241 ( 2017 )


Menu:
  • J-A21036-17
    
    2017 Pa. Super. 404
    COMMONWEALTH OF PENNSYLVANIA                     IN THE SUPERIOR COURT
    OF
    PENNSYLVANIA
    Appellee
    v.
    JON ERIC SHAFFER
    Appellant                  No. 435 WDA 2017
    Appeal from the Judgment of Sentence Entered March 9, 2017
    In the Court of Common Pleas of Butler County
    Criminal Division at No: CP-10-CR-0000896-2016
    BEFORE: BENDER, P.J.E., OLSON, J., and STABILE, J.
    OPINION BY STABILE, J.:                        FILED DECEMBER 21, 2017
    Appellant, Jon Eric Shaffer, appeals from the March 9, 2017 judgment
    of sentence imposing an aggregate 6 to 12 months of incarceration followed
    by 156 months of probation for possession of child pornography (18 Pa.C.S.A.
    § 6312(d)) and criminal use of a communication facility (18 Pa.C.S.A.
    § 7512). We affirm.
    On November 25, 2015, a computer technician was attempting to save
    files from the failing hard drive in Appellant’s laptop computer when he
    discovered explicit photographic images of young girls.       The technician
    summoned the police, and the police arrested Appellant and charged him with
    the aforementioned offenses. Appellant filed a pretrial motion to suppress the
    evidence from the warrantless search and seizure of his laptop computer. The
    J-A21036-17
    trial court conducted a hearing on July 7, 2016, and denied the motion on
    October 3, 2016. On November 10, 2016, the trial court, sitting as finder of
    fact, found Appellant guilty of both charges. The trial court imposed sentence
    on March 9, 2016, and Appellant filed this timely appeal on March 14, 2017.
    The trial court summarized the pertinent facts:
    [Appellant] delivered his laptop computer to CompuGig for
    repair and completed an initial work order form that is dated
    November 25, 2015. On the form, in response to the question,
    ‘What problems are you experiencing?’, boxes next to
    ‘Spyware/virus’ and ‘Can’t get to Internet’ are marked. Additional
    information provided by [Appellant] at the time he delivered the
    laptop to CompuGig indicated that ‘Customer’s son downloaded
    some things and now there are a lot of pop-ups. Internet has
    stopped working.’ After running initial diagnostics, [computer
    technician Justin] Eidenmiller believed the computer had a failing
    hard drive.     A telephone call was made to [Appellant] by
    CompuGig’s administration. During that call [Appellant] indicated
    that he wished to replace the hard drive on the laptop. Mr.
    Eidenmiller was not privy to the phone call. Mr. Eidenmiller
    attempted to ‘take an image of the hard drive and put it on a new
    hard drive at the customer’s request.’ While the hard drive was
    able to be imaged, the procedure of transferring the image
    successfully was unable to be completed. Another call was
    apparently placed to [Appellant] regarding the matter. In an
    attempt to move data from the failing hard drive to a new drive,
    Mr. Eidenmiller manually opened various portions of the data
    contained in the failing hard drive. In doing so, Mr. Eidenmiller
    observed the evidence which [Appellant] is seeking to suppress.
    Mr. Eidenmiller fist [sic] attempted to copy the entire folder that
    contained the evidence at issue without opening it, but was unable
    to do so. He then opened the folder in order to copy the within
    files manually. At that point he observed the files at issue in the
    form of thumbnail images. Mr. Eidenmiller notified his boss of the
    discovery.
    The police were then called and Officer [Christopher]
    Maloney arrived, he spoke both to the owners of CompuGig and,
    after being handed the work order and escorted to the tech area
    by the owners, to Mr. Eidenmiller. Mr. Eidenmiller then went to
    -2-
    J-A21036-17
    where [Appellant’s] laptop computer was located on a bench
    inside the tech area. Mr. Eidenmiller showed Officer Maloney, at
    the officer’s request, the evidence [Appellant] is seeking to
    suppress.    Mr. Eidenmiller prepared a statement for Officer
    Maloney and Officer Maloney took possession of the computer and
    hard drive that had been delivered to CompuGig, as well as other
    equipment. At a later date, warrants to search the laptop and
    accompanying hardware were secured by Detective Matthew Irvin
    of the Cranberry Township Police Department.
    Trial Court Opinion, 10/3/16, at 2-3 (record citations and footnotes omitted).
    The only issue before us is whether the trial court properly suppressed
    evidence from the initial warrantless search and seizure of his laptop
    computer. Our standard of review is as follows:
    [An appellate court’s] standard of review in addressing a
    challenge to the denial of a suppression motion is limited to
    determining whether the suppression court’s factual findings are
    supported by the record and whether the legal conclusions drawn
    from those facts are correct.      Because the Commonwealth
    prevailed before the suppression court, we may consider only the
    evidence of the Commonwealth and so much of the evidence for
    the defense as remains uncontradicted when read in the context
    of the record as a whole. Where the suppression court’s factual
    findings are supported by the record, [the appellate court is]
    bound by [those] findings and may reverse only if the court’s legal
    conclusions are erroneous.       Where ... the appeal of the
    determination of the suppression court turns on allegations of
    legal error, the suppression court’s legal conclusions are not
    binding on an appellate court, whose duty it is to determine if the
    suppression court properly applied the law to the facts. Thus, the
    conclusions of law of the courts below are subject to plenary
    review.
    Commonwealth v. Smith, 
    164 A.3d 1255
    , 1257 (Pa. Super. 2017). Article
    1, Section 8 of the Pennsylvania Constitution precludes warrantless searches
    of private property. PA. CONST. art. I, § 8. “Absent the application of one of
    a few clearly delineated exceptions, a warrantless search or seizure is
    -3-
    J-A21036-17
    presumptively unreasonable.     Commonwealth v. Williams, 
    73 A.3d 609
    ,
    614 (Pa. Super. 2013) (quoting Commonwealth v. Whitlock, 
    69 A.3d 635
    ,
    637 (Pa. Super. 2013)), appeal denied, 
    87 A.3d 320
    (Pa. 2014).
    Both parties and the trial court rely heavily on Commonwealth v.
    Sodomsky, 
    939 A.2d 363
    (Pa. Super. 2007), another case in which a
    computer technician discovered child pornography on a customer’s computer.
    The Sodomsky Court concluded, under the circumstances there present, that
    the customer relinquished his privacy expectation in the contents of his hard
    drive.    The Commonwealth and the trial court find Sodomsky controlling,
    while Appellant argues that it is distinguishable and/or that it should be
    overturned.
    In Sodomsky, the defendant took his computer to a Circuit City and
    requested installation of an optical drive and DVD burner into his computer.
    
    Id. at 364.
    The store informed the defendant that it would run tests to confirm
    the DVD burner was working, but did not describe that testing process in
    detail. 
    Id. In order
    to test the newly installed DVD burner, the technician ran
    a “general search for a video” to be burned to a disc. 
    Id. at 365.
    The search
    returned a number of files, some of which “appeared to be pornographic in
    nature due to their titles which included masculine first names, ages of either
    thirteen or fourteen, and sexual acts.” 
    Id. at 365-66.
    The technician clicked
    on “‘the first one’ that appeared questionable, and the video contained the
    lower torso of an unclothed male, and when a hand approached the male’s
    -4-
    J-A21036-17
    penis, [the technician] immediately stopped the video.”      
    Id. at 366.
       The
    technician summoned police, as he had been told to do by a state police officer
    under such circumstances. 
    Id. Police responded,
    viewed the video clip the
    technician had seen, and seized the computer.        
    Id. Subsequently, they
    obtained a warrant and discovered child pornography. 
    Id. The trial
    court granted the defendant’s motion to suppress. Central to
    the dispute was whether and to what extent the defendant abandoned his
    privacy interest in the computer while it was at Circuit City for the requested
    work.     The trial court reasoned that the defendant did not expect his
    computer’s contents to be published to anyone other than Circuit City
    employees. 
    Id. at 367.
    In canvassing the law of abandonment, the Sodomsky Court noted,
    “[t]he issue is not abandonment in the strict property-right sense, but whether
    the person prejudiced by the search had voluntarily discarded, left behind, or
    otherwise relinquished his interest in the property in question so that he could
    no longer retain a reasonable expectation of privacy with regard to it at the
    time of the search.” 
    Id. at 366-67
    (quoting Commonwealth v. Shoatz, 
    366 A.2d 1216
    , 1220 (Pa. 1976)). Furthermore, “the Fourth Amendment protects
    people, not places. What a person knowingly exposes to the public, even in
    his own home or office, is not a subject of Fourth Amendment protection. But
    what he seeks to preserve as private, even in an area accessible to the public,
    -5-
    J-A21036-17
    may be constitutionally protected.”      
    Id. at 367
    (quoting Katz v. United
    States, 
    389 U.S. 347
    , 351-52 (1967)).
    In light of these principles, the Sodomsky Court determined that the
    proper inquiry was whether the defendant’s “expectation of privacy in the
    videos on the computer that he relinquished to Circuit City employees for
    repairs was reasonable or whether he knowingly exposed the computer’s video
    files to the public such that he voluntarily abandoned his privacy interest in
    them.” 
    Id. In other
    words, did the defendant “give access or knowingly risk
    access to his video files.”   
    Id. at 368.
      This Court disagreed with the trial
    court’s analysis because “if [the defendant] exposed the video contents of his
    computer to Circuit City employees, he abandoned his privacy interest in those
    computer contents because those employees were members of the public.”
    
    Id. Applying these
    principles, the Sodomsky Court noted that the
    defendant requested installation of a new DVD drive and was informed that
    the DVD drive would be tested once installed. 
    Id. He did
    not inquire about
    the testing process or restrict Circuit City’s access to his files for purposes of
    running that test. 
    Id. Further, Circuit
    City employees discovered the illicit
    material while they were testing the DVD drive in a “commercially-accepted
    manner.” 
    Id. The employees
    were free to choose any video file from the list
    of videos to run the test. 
    Id. at 369.
    In addition, the Sodomsky Court noted
    that the defendant’s actions—bringing his computer to Circuit City, requesting
    -6-
    J-A21036-17
    repairs, and failing to remove or rename the illicit files beforehand—were
    volitional. 
    Id. at 369.
    The Sodomsky Court distinguished Commonwealth v. DeJohn, 
    403 A.2d 1283
    (Pa. 1979), cert. denied, 
    444 U.S. 1032
    (1980), wherein our
    Supreme Court held that banks cannot disclose their customers’ financial
    records without a search warrant. The DeJohn Court reasoned:
    [T]he disclosure by individuals or business firms of their
    financial affairs to a bank is not entirely volitional, since it is
    impossible to participate in the economic life of contemporary
    society without maintaining a bank account. In the course of such
    dealings, a depositor reveals many aspects of his personal affairs,
    opinions, habits and associations. Indeed, the totality of bank
    records provides a virtual current biography. […] To permit a
    police officer access to these records merely upon his request,
    without any judicial control as to relevancy or other traditional
    requirements of legal process, and to allow the evidence to be
    used in any subsequent criminal prosecution against a defendant,
    opens the door to a vast and unlimited range of very real abuses
    of police power.
    
    Id. at 1289–90.
    Similarly, the Sodomsky Court distinguished Commonwealth v.
    Davis, 
    743 A.2d 946
    (Pa. Super. 1999), in which this Court held that tenants
    retain a privacy interest in rented property despite a landlord’s right of access.
    Thus, police subjected the tenant to an unreasonable search and seizure
    despite the landlord’s consent to enter the property. 
    Id. at 951-52.
    Ultimately, the Sodomsky Court concluded that the defendant did not
    retain a privacy interest in his video files under the circumstances of that case.
    
    Sodomsky, 939 A.2d at 369
    . “If a person is aware of, or freely grants to a
    -7-
    J-A21036-17
    third party, potential access to his computer contents, he has knowingly
    exposed the contents of his computer to the public and lost any reasonable
    expectation of privacy in those contents.” 
    Id. Appellant first
    argues that that Sodomsky should be overruled.
    Appellant’s Brief at 11-15. That action must come, if at all, from an en banc
    panel of this Court or from our Supreme Court.       See Commonwealth v.
    Taggert, 
    997 A.2d 1189
    , 1201 n.16 (Pa. Super. 2010) (noting that one three-
    judge Superior Court panel cannot overrule another).
    Appellant next argues that Sodomsky is distinguishable. In essence,
    Appellant argues that he did not give or knowingly risk access to the illicit
    photographs in his hard drive because the possibility of their discovery was
    extremely remote, given his initial reasons for leaving his computer with
    CompuGig. As noted above, Appellant stated that he could not access the
    Internet and that he believed his laptop was infected by spyware or a virus.
    He did not anticipate that his hard drive was failing. Nonetheless, the record
    indicates that CompuGig contacted Appellant after Eidenmiller discovered the
    failing hard drive, and Appellant requested that the hard drive be replaced.
    Given his consent to the hard drive replacement, Appellant’s original
    description of the problem is irrelevant to our analysis.
    Appellant also argues that he did not anticipate—and was never told—
    that CompuGig might need to access individual files in order to salvage data.
    He notes that CompuGig first tried to take an image of the entire hard drive
    -8-
    J-A21036-17
    and, when that failed, tried to copy individual folders and, when that failed,
    opened folders to copy individual files. The illicit photographs happened to be
    in a folder that would not copy. Appellant argues that this chain of events
    was unforeseeable, and that he therefore did not legally abandon his privacy
    interest in the illicit photos within the meaning of Sodomsky.
    We    believe   Appellant     reads     Sodomsky too    narrowly.   There,
    unbeknownst to the defendant, the technician intended to run a test using a
    video file from the defendant’s hard drive. See 
    Sodomsky, 939 A.2d at 364
    .
    The defendant did not ask how that would be done, nor did he restrict the
    means of doing so. See 
    id. Thus, the
    defendant was uninformed and unaware
    of the possibility that the technician would search video files on the
    defendant’s computer. Similarly, in this case, Appellant was unaware and did
    not inquire into the details of the procedure he authorized. The record reflects
    that, on November 30, 2015, five days after Appellant dropped his computer
    off for service, CompuGig called Appellant and informed him his hard drive
    was failing.     N.T. Hearing, 7/7/16, at Exhibit A.          Appellant authorized
    CompuGig to replace the hard and install an image of the failing drive. 
    Id. Four days
    later, on December 4, 2015, a CompuGig administrator called
    Appellant to “explain that we must do an OS rebuild with data.” Id.1 Appellant
    ____________________________________________
    1  Appellant insists he received only one phone call from CompuGig after his
    initial visit. Appellant’s Brief at 17. Appellant ignores the applicable standard
    of review, pursuant to which we “consider only the evidence of the
    -9-
    J-A21036-17
    was informed that CompuGig intended to install a new hard drive and transfer
    data from the old one. 
    Id. at 20.
    We find this case slightly distinguishable from Sodomsky in several
    respects, but in those respects it favors the trial court’s order. The Sodomsky
    defendant was unaware that the technician would need to access any of his
    files. Here, in contrast, Appellant was informed that CompuGig needed to
    copy and transfer all his files.           In Sodomsky, the technician noticed
    incriminating titles attached to the illicit video files, and he confirmed his
    suspicions by opening and beginning to play one of the files. Instantly, the
    illicit images appeared as thumbnail files when Eidenmiller opened a folder on
    Appellant’s hard drive, and they immediately appeared2 to Eidenmiller to be
    sexually explicit depictions of underage children.      He conducted no further
    investigation. We cannot reasonably distinguish Sodomsky on grounds that
    ____________________________________________
    Commonwealth and so much of the evidence for the defense as remains
    uncontradicted when read in the context of the record as a whole.” 
    Smith, 164 A.3d at 1257
    . The record contradicts Appellant’s assertion that he
    received only one phone call.
    2  The Sodomsky Court expressed no opinion on whether the defendant
    abandoned his privacy interest in other files, such as e-mail or financial
    records. 
    Sodomsky, 939 A.2d at 369
    . Similarly, we do not address whether
    and to what extent a person retains a privacy interest in e-mails, financial
    records, or other files whose incriminating nature might not be immediately
    obvious to a technician who accesses them in the ordinary course of
    performing a requested service.
    - 10 -
    J-A21036-17
    Eidenmiller’s methods were unnecessarily intrusive or unforeseeable, as
    compared to those employed in Sodomsky.
    In other respects, the two cases are similar.          Appellant, like the
    Sodomsky defendant, did not inquire about or restrict the means of
    completing the requested service. The Sodomsky Court noted the Circuit
    City technicians were “testing the DVD drive’s operability in a commercially
    accepted manner rather than conducting a search for illicit items.”
    
    Sodomsky, 939 A.2d at 368
    .             Likewise, in this case, Eidenmiller was not
    searching for illicit photographs. He discovered the photographs during a file-
    by-file transfer after broader, less intrusive means of transferring the data
    failed.   Nothing in the record suggests that Eidenmiller failed to use a
    commercially accepted manner of performing the work Appellant requested.
    In short, we find Sodomsky controlling.             As noted above, the
    Sodomsky Court concluded that abandonment occurs when a person “freely
    grants to a third party, potential access to his computer contents, he has
    knowingly exposed the contents of his computer to the public and has lost any
    reasonable expectation of privacy in those contents.”         
    Id. at 370.
      If the
    Sodomsky defendant granted potential access to his illicit files under the
    circumstances there present, Appellant clearly did so in the instant case.3
    ____________________________________________
    3 Appellant seeks to avoid this result by relying on United States v. Jones,
    
    565 U.S. 400
    (2012), in which the Supreme Court ruled that, for Fourth
    Amendment purposes, police engage in a search when they place a GPS unit
    - 11 -
    J-A21036-17
    For all of the foregoing reasons, we discern no error in the order denying
    Appellant’s motion to suppress evidence. We therefore affirm the judgment
    of sentence.
    Judgment of sentence affirmed.
    Judgment Entered.
    Joseph D. Seletyn, Esq.
    Prothonotary
    Date: 12/21/2017
    ____________________________________________
    in a person’s vehicle. Relying on Jones, Appellant claims police “physically
    occupied” and “trespassed upon” Appellant’s computer when they retrieved
    the illicit files without a warrant. Appellant’s Brief at 21. We find Jones
    inapposite, and Appellant’s reliance on it is not responsive to the trial court’s
    finding that he abandoned his privacy interest in the illicit files.
    - 12 -
    

Document Info

Docket Number: 435 WDA 2017

Citation Numbers: 177 A.3d 241

Filed Date: 12/21/2017

Precedential Status: Precedential

Modified Date: 1/12/2023