United States v. Johnson

FILED United States Court of Appeals Tenth Circuit October 27, 2009 Elisabeth A. Shumaker PUBLISH Clerk of Court UNITED STATES COURT OF APPEALS TENTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff - Appellee, v. No. 08-4031 ERIC DUSTIN JOHNSON, Defendant - Appellant. Appeal from the United States District Court for the District of Utah (D.C. No. 2:07-CR-339-DAK-1) Bretta Pirie (Steven B. Killpack, Federal Public Defender, with her on brief), Salt Lake City, Utah, for Appellant. Diana Hagen, Assistant United States Attorney (Brett T. Tolman, United States Attorney, with her on brief), Salt Lake City, Utah, for Appellee. Before BRISCOE, EBEL and HARTZ, Circuit Judges. EBEL, Circuit Judge. This case presents the novel issue of whether an individual can have a “reasonable expectation of privacy” in a storage unit rented with a stolen identity. During a search of a storage unit that Defendant-Appellant Eric Johnson’s girlfriend had rented in someone else’s name, police discovered two firearms. Johnson eventually entered a conditional guilty plea to one count of being a felon in possession of firearms, in violation of 18 U.S.C. § 922(g)(1). He conditioned his plea on the right to challenge on appeal the district court’s decision not to suppress the evidence that was discovered during the search of the storage unit. The district court had ruled that the police’s warrantless search of the storage unit did not violate Johnson’s Fourth Amendment rights because Johnson had “forfeited” any privacy rights he might have had in the storage unit by directing his girlfriend to enter into the rental agreement using another person’s name and stolen identification. We agree. Therefore, exercising jurisdiction under 28 U.S.C. § 1291, we affirm. I. BACKGROUND A. Factual Background On March 23, 2007, at approximately 1:48 a.m., Sergeant Eric Anderson of the West Valley Police Department was on patrol in West Valley City, Utah, when he saw a vehicle driven by Defendant Eric Johnson make a fast turn that required the vehicle to turn into the wrong lane. Sergeant Anderson ran the vehicle’s license plate, which revealed that it was registered to Johnson and that Johnson had two outstanding felony warrants. After pulling Johnson’s vehicle over, Sergeant Anderson identified Johnson as the driver and Brittany Christensen, Johnson’s girlfriend, as the front-seat passenger. There were also 2 two individuals in the back seat of the vehicle, and the vehicle was cluttered with tools as well as at least two knives. Johnson’s girlfriend had an outstanding felony arrest warrant, and Sergeant Anderson called for back-up to carry out the arrests of Johnson and Christensen. Officer McCarthy arrived and assisted Sergeant Anderson in arresting Johnson and Christensen. During a search incident to arrest, Anderson located drug paraphernalia in the vehicle’s console and searched a black purse lying on the floor of the front passenger area. 1 Inside the purse, Anderson found a glass pipe, typically used to smoke methamphetamine. Anderson also found the following in the purse: some identification in the name of Christensen but other identification in the name of Shannon Haroldsen; a Sam’s Club card in the name of Shannon Haroldsen, but with Christensen’s photograph on it; as well as a rental agreement in Haroldsen’s name for a storage unit at Extra Space Storage in West Valley City, Utah, dated the previous day. 2 Christensen waived her Miranda 1 Johnson does not challenge the legality of the officer’s search of the purse. See generally Arizona v. Gant, 129 S. Ct. 1710, 1714 (2009) (addressing search incident to an arrest in the context of a traffic stop). 2 The rental agreement provided that the “Occupant,” identified earlier in the agreement as Shannon Haroldsen, “shall have access to the Space” and “shall safeguard any property stored,” and that “[i]t is Occupant’s sole responsibility as to those persons who are given access to Occupant’s Space.” (V Vol., Ex. 2 at 1, ¶¶ 1, 3.) The agreement also provided that in certain circumstances the facility or any governmental authority could access the storage unit: “Occupant grants Owner and Owner’s Agents or any governmental authority access to the Space: a) upon three (3) days prior written notice, b) upon default . . . by Occupant . . ., (continued...) 3 rights, and told Sergeant Anderson that she had obtained Haroldsen’s identification from someone in the car. Later, she contradicted herself by stating that she found the identification and rental agreement in the parking lot of a Wal-Mart store. Sergeant Anderson contacted Haroldsen after discovering that she had reported a burglary of her husband’s car several weeks earlier. Haroldsen informed Sergeant Anderson that her purse, containing her checkbook, driver’s license, credit and debit cards, and a Sam’s Club card, were stolen in the burglary, and that her credit cards and checks had since been used at several establishments. After being informed that the police had found her identification and the rental agreement in her name, she stated that she had not rented the unit and agreed to come to the police station in the morning to consent to a search of the storage unit. Sergeant Anderson then contacted Detective William McKnight, the on-call property detective, and informed him concerning the possible fraud case. Detective McKnight subsequently met with Haroldsen and asked her to sign a consent to search form for the storage unit referenced in the rental agreement. After signing the consent to search form, Haroldsen accompanied Detective McKnight to the storage unit facility. Detective McKnight explained to the manager of the storage facility, Sherry Kinsey, that the police wanted to search a 2 (...continued) c) in emergency circumstances, or d) as required by law.” (Id., ¶ 4.) 4 storage unit that had been rented in Haroldsen’s name but that Haroldsen had not actually rented the unit or agreed to have the unit rented in her name. The manager then provided Detective McKnight with copies of documents concerning the unit’s rental, including the rental agreement and a receipt for one month’s rent. Attached to the rental agreement, which bore Haroldsen’s name and address, was a photocopy of Haroldsen’s driver’s license. The receipt for the unit indicated that one month’s rent for the storage unit had been paid for in cash. The manager showed Detective McKnight the storage unit, which was secured by a heavy-duty lock. Because the lock could not be cut and Haroldsen had consented to the search, the manager of the facility gave Detective McKnight permission to open the unit by cutting the latch. After entering the storage unit, Detective McKnight discovered a Savage .22 caliber rifle and a Bronco 410 shotgun. Subsequently, Johnson was interviewed at the Salt Lake County jail. After being advised of his Miranda rights and signing a waiver form, Johnson told Detective Mike Christenson that “the storage unit was his.” (II Vol. 31, 32.) Johnson admitted that he had asked Brittany Christensen to rent the storage unit for him and that he knew the unit was not in Christensen’s name. Johnson also admitted that he possessed both of the firearms that were found in the storage unit and that he knew they were inside the unit. B. Procedural Background 5 On May 23, 2007, Johnson was indicted on one count of being a felon in possession of firearms, in violation of 18 U.S.C. § 922(g)(1), and one count of possessing those guns while being an illegal user of or addicted to a controlled substance, in violation of 18 U.S.C. § 922(g)(3). Johnson moved to suppress evidence that was discovered during the search of the storage unit, and the district court held a suppression hearing on September 12, 2007. After the district court denied Johnson’s motion to suppress in a Memorandum Decision and Order dated November 2, 2007, Johnson entered a conditional guilty plea to the first count of the indictment and was sentenced to thirty months’ imprisonment. On appeal, Johnson renews his Fourth Amendment objections to the search of the storage unit. II. DISCUSSION A. Standard of Review When reviewing a district court’s decision on suppression of evidence, we review the district court’s factual findings for clear error, viewing the evidence in the light most favorable to those findings. United States v. Garcia, 459 F.3d 1059, 1062 (10th Cir. 2006). The district court’s ultimate legal conclusion of whether a search was reasonable under the Fourth Amendment and other questions of law are reviewed de novo. United States v. Smith, 531 F.3d 1261, 1265 (10th Cir. 2008). Specifically relevant to this case, we review de novo a district court’s determination of whether a defendant has standing to challenge a 6 search. United States v. Eckhart, 569 F.3d 1263, 1274 (10th Cir. 2009). The burden of proof is on the defendant to demonstrate that he has a reasonable expectation of privacy in the place searched to establish his standing. United States v. Gordon, 168 F.3d 1222, 1226 (10th Cir. 1999). B. Analysis Johnson asserts that the district court erred in determining that he does not have standing to challenge the search of the storage unit because, according to the district court, he had neither a subjective expectation of privacy nor a reasonable expectation of privacy in the unit. Furthermore, Johnson disputes the government’s argument that, if Johnson were to establish standing, an exception to the warrant requirement would exist to justify the search based upon the consent of either Haroldsen or Kinsey, the manager of the storage facility. 1. The Right to Privacy Under the Fourth Amendment The Fourth Amendment protects the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.” U.S. Const. amend. IV. Because Fourth Amendment rights are personal, a defendant “may only claim the benefits of the exclusionary rule if [his] own Fourth Amendment rights have in fact been violated.” United States v. Jarvi, 537 F.3d 1256, 1259 (10th Cir. 2008) (quoting United States v. Salvucci, 7 448 U.S. 83, 85 (1980)). 3 “This inquiry requires a determination of whether the Fourth Amendment was designed to protect an interest of the defendant that was violated by the . . . search.” United States v. Erwin, 875 F.2d 268, 270 (10th Cir. 1989) (citing Rakas v. Illinois, 439 U.S. 128, 140 (1978)). Thus we turn to the classic two-part Fourth Amendment test: (1) “whether the defendant manifested a subjective expectation of privacy in the area searched” and (2) “whether society is prepared to recognize that expectation as objectively reasonable.” United States v. Allen, 235 F.3d 482, 489 (10th Cir. 2000) (internal quotation omitted); see also United States v. Valdez Hocker, 333 F.3d 1206, 1208-09 (10th Cir. 2003). Even assuming that Johnson established that he had a subjective expectation of privacy in the storage unit, we conclude that he did not show that his expectation of 3 The district court and the parties refer to this principle as Fourth Amendment “standing.” As we have previously noted this terminology is technically “a misnomer” because Fourth Amendment standing is not jurisdictional. Jarvi, 537 F.3d at 1259 n.2; Smith, 531 F.3d at 1266 n.2. Indeed, “[t]he Supreme Court has repeatedly insisted that we not use the term ‘standing’ as shorthand for a defendant’s capacity to challenge a search.” United States v. Higgins, 282 F.3d 1261, 1270 n.3 (10th Cir. 2002). Instead, the Supreme Court has counseled that the question of whether a defendant can show a violation of his own Fourth Amendment rights “is more properly placed within the purview of substantive Fourth Amendment law than within that of standing.” Rakas v. Illinois, 439 U.S. 128, 140 (1978); see also Minnesota v. Carter, 525 U.S. 83, 87 (1998) (“The Minnesota courts analyzed whether respondents had a legitimate expectation of privacy under the rubric of ‘standing’ doctrine, an analysis that this Court expressly rejected 20 years ago in Rakas.”). With that said, we note many of our cases have continued to use the “standing” terminology. See, e.g., United States v. Beckstead, 500 F.3d 1154, 1163 (10th Cir. 2007). And, regardless of terminology, the district court’s and the parties’ analysis involves the correct inquiry. 8 privacy was one that society would recognize as objectively reasonable. 2. No One Approach Can Accurately Distinguish Whether a Defendant Has a Reasonable Expectation of Privacy There is no talismanic test to determine whether an expectation of privacy is one that society is prepared to accept as reasonable. See O’Connor v. Ortega, 480 U.S. 709, 715 (1987) (plurality) (“We have no talisman that determines in all cases those privacy expectations that society is prepared to accept as reasonable.”). Instead, as LaFave’s definitive treatise notes, the Supreme Court has appeared to utilize four distinct but coexisting approaches to the “reasonable expectation of privacy” test, reflecting “four models of Fourth Amendment protection: a probabilistic model, a private facts model, a positive law model, and a policy model.” 4 1 Wayne R. LaFave, Search and Seizure: A Treatise on the 4 Professor Orin Kerr describes these models as follows: The probabilistic model considers the likelihood that the subject’s information would become known to others or the police. The lower the likelihood, the more likely it is that a reasonable expectation of privacy exists. The private facts model asks whether the government's conduct reveals particularly private and personal information deserving of protection. This approach focuses on the information the government collects rather than how it is collected. The positive law model considers whether the government conduct interferes with property rights or other legal standards outside the Fourth Amendment. When courts apply the positive law model, an expectation of privacy becomes reasonable when it is backed by positive law such as trespass. The fourth and final model, the policy model, reflects the direct approach. Courts applying the policy model focus directly on whether the police practice should be regulated by the Fourth Amendment. (continued...) 9 Fourth Amendment § 2.1(b), at n.82.1 (4th ed. 2004 & Supp. 2008-09) (quoting Orin S. Kerr, Four Models of Fourth Amendment Protection, 60 Stan. L. Rev. 503, 503 (2007)). Thus, at times the Court has looked to positive law, such as property and contract law, to determine whether a defendant could establish a reasonable expectation of privacy. See Rakas, 439 U.S. at 143 n.12, 148 (“[l]egitimation of expectations of privacy by law must have a source outside of the Fourth Amendment, either by reference to concepts of real or personal property law or to understandings that are recognized and permitted by society”; passengers could not establish a reasonable expectation of privacy because they “asserted neither a property nor a possessory interest in the automobile [searched] nor an interest in the property seized”); see also United States v. DeLuca, 269 F.3d 1128, 1132 (10th Cir. 2001) (“[W]ithout a possessory or property interest in the vehicle searched, passengers lack standing to challenge vehicle searches.”) (internal quotation omitted); Kerr, supra, at 516-19. Other times the Court has considered whether government conduct interfered with social customs and norms and “the everyday expectations of privacy” that a reasonable person would expect to remain hidden. See Minnesota v. Olson, 495 U.S. 91, 98 (1990) (overnight social guest had reasonable expectation of privacy in host’s home; social customs 4 (...continued) Orin S. Kerr, Four Models of Fourth Amendment Protection, 60 Stan. L. Rev. 503, 506 (2007). 10 and norms made it reasonable to expect that guest could object to government’s presence at the home); see also United States v. Rhiger, 315 F.3d 1283, 1286-87 (10th Cir. 2003) (social guests have legitimate expectation of privacy in the host’s home); Kerr, supra, at 508-12. Ultimately, however, Professor Orin Kerr suggests that the first three models are primarily components to be considered in applying the ultimate fourth test. Kerr, supra, at 506. Indeed, seemingly since the advent of the reasonable expectation of privacy test in Katz 5 scholars have emphasized that the “‘ultimate question’” of whether a privacy expectation is reasonable “‘is a value judgment.’” 1 LaFave, supra, § 2.1(d), at 443 (quoting Amsterdam, Perspectives on the Fourth Amendment, 58 Minn. L. Rev. 349, 403 (1974)). “‘It is whether, if the particular form of surveillance practiced by the police is permitted to go unregulated by constitutional restraints, the amount of privacy and freedom remaining to citizens would be diminished to a compass inconsistent with the aims of a free and open society.’” Id. (quoting Amsterdam, supra, at 403); see also Sherry F. Colb, What Is a Search? Two Conceptual Flaws in Fourth Amendment Doctrine and Some Hints of a Remedy, 55 Stan. L. Rev. 119, 124 (2002) (arguing that the reasonable expectation of privacy test that determines which police activity is outside the scope of the Fourth Amendment forces the courts to engage in a normative inquiry reflecting social norms). 5 Katz v. United States, 389 U.S. 347 (1967). 11 3. Johnson Did Not Have a Reasonable Expectation of Privacy in a Storage Unit that his Girlfriend Rented with a Stolen Identity People generally have a reasonable expectation of privacy in a storage unit, because storage units are secure areas that “command a high degree of privacy.” United States v. Salinas-Cano, 959 F.2d 861, 864 (10th Cir. 1992) (“Common experience of life . . . [s]urely teaches all of us that the law’s enclosed spaces . . . are frequently the objects of [our] highest privacy expectations.” (quotation omitted)). And an individual can have a recognized privacy expectation in a storage space even when he or she is not the lessee of the unit. See, e.g., United States v. Johns, 851 F.2d 1131, 1135-36 (9th Cir. 1988) (owner of objects in storage unit on which he paid part of rent had a reasonable expectation of privacy in the unit, even though his name did not appear on the lease); United States v. Chaves, 169 F.3d 687, 690-91 (11th Cir. 1999) (defendant had standing to challenge search of warehouse he did not rent, where defendant possessed the only key to the warehouse and stored personal and business papers there); 6 LaFave, supra, § 11.3(f), at 221 (citing cases). However, the record indicates that Johnson’s rental of the storage unit at issue here was not orthodox. Specifically, Johnson directed Christensen to enter into the rental agreement using Haroldsen’s stolen identity. 6 For several reasons, 6 The district court found, in denying Johnson’s suppression motion, that “[t]he evidence indicates that Defendant directed Christensen to enter into the (continued...) 12 this fraud convinces us that the reasonableness of any privacy expectations Johnson might have had were undermined by his and Christensen’s decision to use Haroldsen’s identity fraudulently to obtain the unit. The fraudulent use of Haroldsen’s identity posed significant risks to her: “identity theft exacts a heavy financial and emotional toll from its victims, and it severely burdens our economy.” The President’s Identity Theft Task Force: Combating Identity Theft, A Strategic Plan, at viii (April 2007), available at http:// www.idtheft.gov/reports/StrategicPlan.pdf. Recognizing the harm identity theft can cause, Congress and all fifty states, including Utah, criminalize identity fraud. See, e.g., 18 U.S.C. § 1028 (Supp. 2009); Utah Code Ann. § 76-6-1102(2)(a) (2008). 7 See generally Nat’l Conference of State Legislatures, 6 (...continued) rental agreement using Haroldsen’s driver[’s] license.” (Dist. ct. order at 5.) On appeal, Johnson appears to challenge this finding on the basis of his statement to the probation officer, who prepared the presentence report, “that he was not aware Ms. Christensen had not used her own name to rent the storage unit ‘until the federal case arose.’” (Aplt. br. at 5.) Johnson, however, did not testify to this fact at the suppression hearing. Moreover, Johnson admitted after his arrest that he knew Christensen did not use her own name to rent the unit, and he specifically supplemented the record before the district court with the fact that Detective McKnight would testify that during an interview with Ms. Christensen, she stated “she had been asked by the defendant and [another individual] to forge Ms. Haroldson’s [sic] signature, so [they] could rent the storage unit.” (I Vol., Dkt. #21 at 1.) Therefore, the district court’s finding was not clearly erroneous. 7 Utah’s “Identity Fraud Act” provides, in pertinent part, that: A person is guilty of identity fraud when that person: (continued...) 13 Identity Theft Statutes & Criminal Penalties, available at http://www.ncsl.org/programs/lis/privacy/idt-statutes.htm (collecting state statutes as of November 12, 2007). While some courts have found an expectation of privacy when an individual uses an alias or a pseudonym, see, e.g., United States v. Villarreal, 963 F.2d 770, 774 (5th Cir. 1992) (“[I]ndividuals may assert a reasonable expectation of privacy in packages addressed to them under fictitious names.”), such a situation is distinguishable because it is not necessarily illegal to use a pseudonym to receive 7 (...continued) (i) obtains personal identifying information of another person whether that person is alive or deceased; and (ii) knowingly or intentionally uses, or attempts to use, that information with fraudulent intent, including to obtain, or attempt to obtain, credit, goods, services, employment, any other thing of value, or medical information. Utah Code Ann. § 76-6-1102(2)(a) (emphasis added); see also State v. Chukes, 71 P.3d 624, 628 (Utah Ct. App. 2003) (“Identity fraud requires unauthorized use of the identifying personal identifying information with a view of benefitting oneself or misleading another into a course of action. Identity fraud does not require that the defendant in fact obtained something of value.” (internal citation and quotation omitted; emphasis added)). We find unavailing Johnson’s assertion that the use of Haroldsen’s identity was not criminal because he and Christensen intended to “assume[] all the obligations” of the rental agreement. The use of Haroldsen’s identification occurred in Utah, and plain language of the applicable Utah criminal code, quoted above, clearly applies to the use of Haroldsen’s name, address, and driver’s license in obtaining the storage unit. See Utah Code Ann. § 76-6-1102(1) (“‘personal identifying information’ may include: (a) name; . . . (c) address; . . .; (e) drivers license number . . . .”). 14 mail unless fraud or a stolen identification is involved. Here, however, stolen identification was clearly involved. And because of the potential harm to innocent third parties, there is a fundamental difference between merely using an alias to receive a package and using another’s identity. Indeed, courts have similarly found that a defendant does not have a reasonable expectation of privacy in the contents of property that he had fraudulently purchased using another’s financial information. See United States v. Caymen, 404 F.3d 1196, 1200-01 (9th Cir. 2005); United States v. Wai-Keung, 845 F. Supp. 1548, 1563 (S.D. Fla. 1994) (“Society should not recognize an expectation of privacy in a hotel room obtained fraudulently [through use of an unauthorized or counterfeit credit card], and we do not believe that such an expectation is legitimate or reasonable.”), aff’d, 115 F.3d 874 (11th Cir. 1997). The Ninth Circuit, for instance, recognizing that “[t]he Fourth Amendment does not protect a defendant from a warrantless search of property that he stole,” considered the purchase of property with another’s credit card analogous to stealing property, and thus determined that the defendant likewise had no expectation of privacy in the computer he purchased with a stolen credit card. Caymen, 404 F.3d at 1200-01. Likewise, the storage unit at issue here was obtained by fraud, and “[w]hatever expectation of privacy [Mr. Johnson] might assert is not a legitimate expectation that society is prepared to honor.” Id. at 1201. 15 Johnson attempts to distinguish Caymen on the ground that there was no evidence that a fraudulent means of payment was used here to rent the storage unit and therefore his privacy expectations in that unit are legitimate. While it may be true that Johnson and Christensen did not use a fraudulent means to pay the initial administrative fee and first month’s rent for the storage unit, it is inaccurate to suggest that Haroldsen, the victim of this identity theft, was not at risk of at least a claim for rent being made against her if Johnson did not make the subsequent rental payments or if Johnson damaged the unit. Johnson further argues that unlike the obtainment of property by fraud, where a defendant would not be able to exclude the seller from the property, the unit was rented under a valid contract because the use of the stolen identity was not material to the vendor. For this reason, too, Johnson contends he had a legitimate property right in the storage unit and a corresponding reasonable expectation of privacy in the unit. 8 Any interest Johnson, through Christensen, had in the storage unit, however, was certainly not as strong as if Johnson and Christensen had used their own identities to rent the unit. While under Utah law “‘a contract induced by fraud [or] false representations . . . , is not void” at its inception, it is, 8 We note that the government contends that Johnson did not have a legitimate property right in the storage unit because Johnson was not the occupant listed on the rental agreement and because Haroldsen, the occupant listed on the rental agreement, never gave him permission to use the unit. 16 nevertheless “‘voidable.’” Continental Ins. Co. v. Kingston, 114 P.3d 1158, 1161 n.6 (Utah Ct. App. 2005) (quoting Frailey v. McGarry, 211 P.2d 840, 845 (Utah 1949) (other quotations omitted)). That is true whether a “party’s manifestation of assent is induced by either a fraudulent or a material misrepresentation by the other party upon which the recipient is justified in relying.” Peterson v. Coca-Cola USA, 48 P.3d 941, 946 (Utah 2002) (quotation omitted; emphasis added). Here, Christensen’s misrepresentation made to the storage company that she was Haroldsen was certainly fraudulent. And, notwithstanding Johnson’s argument to the contrary, it was also material to the rental agreement. Utah law recognizes that “[t]he identity of the parties to a contract is, as a general rule, a material part of the contract.” Miller v. Celebration Mining Co., 29 P.3d 1231, 1235 (Utah 2001). “This is especially true where,” as here, “a contract contemplates an ongoing relationship rather than a single transaction.” Id. Further, the specific rental agreement at issue here required disclosure of the identity of the renter, and the storage unit operator required proof of identity, as evidenced by the photocopy of Christensen/Haroldsen’s driver’s license attached to the rental agreement. It can be presumed, then, that the owner of this storage unit would not have rented the unit without proof of the renter’s identity. The storage unit owner may have required proof of the renter’s identity in order to deter illegal conduct involving the unit, to provide accountability if the 17 contents being stored should turn out to be hazardous, or perhaps just to provide an assured method of contact with the renter should that be needed. In this regard, the terms of the contract provided that the storage unit’s owner will give the renter various notices to be sent to the renter’s last known address. (V Vol., Ex. 2 at 2, ¶¶ 17, 19.) Moreover, accurate identification of the renter might have been material to the storage unit owner in light of the fact that the owner was agreeing to establish an ongoing relationship involving the rental of real property to the renter in exchange for the renter’s continued payment of a monthly rental fee. Whatever the exact reason, it is clear from the terms of the rental agreement that the owner of this storage unit deemed the true identity of the renter to be a material condition of the rental of the storage unit. Thus, under Utah law, the rental agreement into which Christensen, at Johnson’s behest, fraudulently entered using Haroldsen’s stolen identity was a contract voidable at the storage unit owner’s option. At all times, then, Christensen’s contractual right to the storage unit was in jeopardy of rescission. Moreover, because Christensen, at Johnson’s direction, used a real person’s identification rather than an invented alias, there was greater risk that the real victim would turn up and demand access to premises secured under his or her name. At all times, then, Johnson’s privacy interest in this storage unit was also in jeopardy of the real Ms. Haroldsen showing up, identifying herself and demanding access to her storage unit. Although the probability of this happening 18 at random was undoubtedly remote, the probability increases substantially if, as here, the police become alerted to Johnson’s illegal activity and seek to use his fraudulent passing off his girlfriend as Ms. Haroldsen against him to gain access to the unit. Ultimately, what matters is not whether Johnson might have some legitimate property interest in the storage unit but whether Johnson’s interest is one that the Fourth Amendment is intended to protect. Arguments such as those Johnson advances here do not distract us from the fact that a fraud was perpetrated, and the victim was a third-party, Haroldsen. We will not be a party to this fraud by legitimizing Johnson’s interest in the storage unit. Therefore, whatever subjective privacy expectations Johnson had in the storage unit were not expectations that “society is prepared to recognize . . . as objectively reasonable,” Allen, 235 F.3d at 489 (quotation omitted). Johnson, thus, did not have any Fourth Amendment rights in the unit and could not expect that the police were required to obtain a warrant or establish an exception to that requirement in order to search the unit. 9 In light of this conclusion, we need not consider the government’s alternative argument that an exception to the warrant requirement 9 By this opinion we do not intend to create a blanket rule that society would not recognize as objectively reasonable any privacy expectation in any property obtained through the use of another’s identity. We recognize that this area of the law is highly fact specific and that courts have distinguished between searches of residential premises, searches of business premises, searches of vehicles, and searches of other places and effects. See 6 LaFave, supra, § 11.3 at 128-29. 19 applied to the search. III. CONCLUSION For the foregoing reasons, we affirm the district court’s denial of Johnson’s motion to suppress. 20