FILED
AUGUST 23, 2018
In the Office of the Clerk of Court
WA State Court of Appeals, Division III
IN THE COURT OF APPEALS OF THE STATE OF WASHINGTON
DIVISION THREE
STATE OF WASHINGTON, )
) No. 35099-1-III
Respondent, )
)
v. )
)
JAY KARL FRIEDRICH, ) PUBLISHED OPINION
)
Appellant. )
SIDDOWAY, J. — Anyone engaged in “providing an electronic communication
service or a remote computing service” to the public in interstate commerce is required to
report any known child pornography violation to an electronic tip line, where it is made
available to law enforcement. See 18 U.S.C. § 2258A. Jay Friedrich was convicted of
five counts of dealing with or possessing depictions of a minor engaged in sexually
explicit conduct after Microsoft filed such a report, which was investigated by the Walla
Walla County sheriff.
Mr. Friedrich appeals denial of his motion to suppress the critical evidence against
him. He argues that the information reported by Microsoft and the warrant affidavit’s
generalizations about collectors of child pornography did not provide probable cause for
No. 35099-1-III
State v. Friedrich
a search of his residence and that the affidavit failed to satisfy the particularity required
by the Fourth Amendment to the United States Constitution.
The totality of information provided by the affidavit, including commonsense
inferences about where and how long child pornography is likely to be retained, provided
probable cause to issue the warrant. For that reason, and because any issue of
overbreadth is avoided by the severability doctrine, we affirm.
FACTS AND PROCEDURAL BACKGROUND
On March 30, 2016, Microsoft reported to the National Center for Missing and
Exploited Children (NCMEC)1 that it became aware that a user of Skype,2 user name
“jkf6418,” uploaded a media file believed to contain a depiction of a minor engaging in
sexually explicit conduct. Clerk’s Papers (CP) at 23. Microsoft’s report indicated that a
search of Skype for the username “jkf6418” yielded three results, all belonging to a “Jay
Friedrich.” Id. The one result identifying “Jay Friedrich[’s]” city of residence identified
it as Walla Walla, Washington. The NCMEC report indicated that a search of the
1
NCMEC is a national resource center and clearinghouse that maintains an
electronic tip line, the “CyberTipline,” through which federally-required reports are
transmitted to the appropriate international, federal, and local law enforcement agencies
for investigation. 42 U.S.C. §§ 5771, 5773(b). Providers who fail to comply with the
reporting obligation face substantial penalties. See 18 U.S.C. § 2258A; United States v.
Ackerman, 831 F.3d 1292, 1296-97 (10th Cir. 2016).
2
Skype is a telecommunications application for video chats, voice calls, or instant
messaging. See About Skype, SKYPE, https://www.skype.com/en/about [https://perma.cc
/LL58-566K].
2
No. 35099-1-III
State v. Friedrich
username “jkf6418” on Spokeo, a people search website that aggregates data from other
services, also yielded three results. One, a dating profile on an online dating site,
described “jkf6418” as a 51-year-old bisexual single male from Walla Walla and as 6’1”
and of average build.
After it was determined that the Internet Protocol (IP) address most likely came
from Walla Walla, the information was passed along to the Walla Walla County Sheriff’s
Department and investigation of the report was referred to Detective Eric Knudson on
April 12. Detective Knudson viewed the media file, a picture of what appeared to be an
approximately 9- to 11-year-old girl engaged in “sexually explicit . . . conduct” as
defined by RCW 9.68A.011(4). CP at 24.
On April 13, Detective Knudson obtained a search warrant to locate the subscriber
information for the IP address, which was registered to Charter Communications.
Charter Communications responded to the warrant on April 21, identifying the service
subscriber as Jay Jensen. Detective Knudson learned from a search of police records that
in 2012 Jay Jensen reported finding child pornography on his roommate’s computer. The
report listed Mr. Jensen’s roommate as Jay Friedrich. Mr. Friedrich was not charged as a
result of that report, as the investigation produced insufficient evidence for prosecution.
Detective Knudson nonetheless reviewed the pictures obtained in the investigation and
determined that they were of teenage and preteen girls. Detective Knudson’s research
also revealed that Mr. Friedrich is a registered sex offender.
3
No. 35099-1-III
State v. Friedrich
Detective Knudson learned from police records that Mr. Friedrich lived in Walla
Walla and was described as 52 years of age, 6’1” in height, and as weighing 155 pounds.
His birthdate was recorded as 04/18/1964, which, along with his initials, jkf, correlated to
the “jkf6418” account (04/18/1964).
A month after NCMEC received the report from Microsoft, on April 27, Detective
Knudson applied for a warrant to search Mr. Friedrich’s residence. In his 24-page
supporting affidavit, Detective Knudson provided his background and training, the
foregoing information, and information on the typical operational practices of electronic
and internet service providers (collectively “ISPs”). He testified that pursuant to terms of
their user agreements, ISPs “typically monitor their services utilized by subscribers[ t]o
prevent their communication networks from serving as conduits for illicit activity” and
“routinely and systematically attempt to identify suspected child pornography that may
be sent through [the ISP’s] facilities.” CP at 17. He testified that when an image or
video file is believed by an ISP to be child pornography as defined by 18 U.S.C. § 2256,
a “hash value” of the file can be generated by operation of a mathematical algorithm that
is unique to the file—“in essence, the unique fingerprint of that file.” CP at 17. A
database of hash values for files suspected to be child pornography enables ISPs to
automatically detect when files that have been identified as illicit pass through their
system. He testified that reports to NCMEC by ISPs are often made solely on the basis of
detection of a file’s hash value.
4
No. 35099-1-III
State v. Friedrich
In addition to describing these practices (although in more detail), Detective
Knudson’s affidavit stated that under federal law, an ISP “has a duty to report to NCMEC
any apparent child pornography it discovers ‘as soon as reasonably possible.’” CP at 18
(quoting 18 U.S.C. § 2258A(a)(1)).
The items that Detective Knudson sought to search for and seize were identified
in two single-spaced pages of an attachment to his affidavit. They consisted of two
categories: “Records, Documents, and Visual Depictions,” and “Digital Evidence.”
CP at 32-33.
The requested search warrant was issued by District Court Judge Kristian Hedine
on April 27. The last, freestanding provision of its digital evidence section authorized the
seizure of records and things evidencing the use of nine IP addresses that were unrelated
to Microsoft’s report to NCMEC. They were not identified or explained by Detective
Knudson’s affidavit or its attachments.
In executing the search warrant the next day, law enforcement seized a Hewlett
Packard laptop, a Toshiba laptop, a Micron tower computer, flash drives, compact disks,
and floppy disks—all found in Mr. Friedrich’s bedroom. They seized a Samsung
smartphone from Mr. Friedrich’s person. During an interview with officers, Mr.
Friedrich admitted that the electronics seized were his and that they would contain
images of underage girls. The Hewlett Packard computer and the Samsung smartphone
proved to contain depictions of minors engaged in sexually explicit conduct, including
5
No. 35099-1-III
State v. Friedrich
the image Microsoft reported. The Toshiba laptop and Micron tower computer also
contained such depictions.
The State eventually charged Mr. Friedrich with one count of second degree
dealing in depictions of a minor engaged in sexually explicit conduct, three counts of first
degree possession of depictions of a minor engaged in sexually explicit conduct, and one
count of second degree possession of depictions of a minor engaged in sexually explicit
conduct, all in violation of RCW 9.68A.050 and .070. For simplicity’s sake hereafter,
and unless indicated otherwise, our references to “child pornography” are to depictions of
minors whose possession or dealings with which violate provisions of chapter 9.68A
RCW or federal law.
Mr. Friedrich moved the court to suppress all of the State’s evidence, arguing that
Detective Knudson’s affidavit supporting his application did not meet the particularity
requirement of the Fourth Amendment. The superior court, the Hon. John Lohrmann,
denied the motion without a hearing. The parties then proceeded to a stipulated facts
trial, with Mr. Friedrich preserving his right to appeal the trial court’s suppression
decision. Mr. Friedrich was convicted on all remaining counts. He appeals.
ANALYSIS
Mr. Friedrich’s assignments of error present two challenges to the trial court’s
suppression decision. He contends first, that the warrant application failed to provide
facts supporting a determination that what was at least month-old evidence of criminal
6
No. 35099-1-III
State v. Friedrich
activity could still be found at his residence. His second contention is that the search
warrant failed to satisfy the particularity requirement of the Fourth Amendment.
I. THE DISTRICT COURT COULD REASONABLY CONCLUDE THAT THE EVIDENCE OF
CRIMINAL ACTIVITY WAS NOT STALE
Mr. Friedrich does not question that the warrant affidavit provided probable cause
that he engaged in criminal activity at some time. But he cites two aspects of Detective
Knudson’s affidavit that he argues undermine probable cause that evidence of the
criminal activity existed at Mr. Friedrich’s residence at the time the detective applied for
the search warrant. The first is the fact that the March 30, 2016 date of Microsoft’s
report to the CyberTipline was the date Microsoft “became aware that a user uploaded a
media file,” not the date of the upload itself. CP at 23 (emphasis added). The second is
that four weeks had passed between Microsoft’s report and the application for the
warrant, and the detective’s contention that the evidence would still be at the residence
depended on unreliable generalizations about the habits of child pornography collectors.
The Fourth Amendment to the United States Constitution and article I, section 7 of
the Washington Constitution require that the issuance of a search warrant be based on a
determination of probable cause. Probable cause is established when an affidavit
supporting a search warrant provides sufficient facts for a reasonable person to conclude
there is a probability the defendant is involved in the criminal activity and that evidence
7
No. 35099-1-III
State v. Friedrich
of the crime is at a certain location. State v. Vickers, 148 Wn.2d 91, 108, 59 P.3d 58
(2002).
Whether a warrant affidavit’s information constitutes probable cause is a question
of law that we review de novo. State v. Neth, 165 Wn.2d 177, 182, 196 P.3d 658 (2008).
Nonetheless, in determining that question of law, “[g]reat deference is accorded the
issuing magistrate’s determination of probable cause.” State v. Cord, 103 Wn.2d 361,
366, 693 P.2d 81 (1985). If the propriety of issuing the warrant is debatable, the
deference due the magistrate’s decision will tip the balance in favor of upholding the
warrant. State v. Jackson, 102 Wn.2d 432, 446, 688 P.2d 136 (1984). In light of the
deference owed the magistrate’s decision, the question on review is whether the
magistrate could draw the connection, not whether he should do so.
In reviewing a magistrate’s determination of probable cause, we—like the
magistrate—should not view the affidavit “in a hypertechnical manner.” State v. Riley,
34 Wn. App. 529, 531, 663 P.2d 145 (1983). “[A] magistrate is entitled to draw
reasonable inferences from the facts and circumstances set forth in the supporting
affidavit,” with the result that “[r]easonableness is the key and common sense must be the
ultimate yardstick.” Id. “Doubts concerning the existence of probable cause are
generally resolved in favor of issuing the search warrant.” Vickers, 148 Wn.2d at 108-09.
8
No. 35099-1-III
State v. Friedrich
Timeliness of Microsoft’s detection and report
A passage of time between an observation of criminal activity and the presentation
of a search warrant affidavit may be so prolonged that it is no longer probable that a
search will reveal criminal activity or evidence; i.e., the information may be stale. State
v. Lyons, 174 Wn.2d 354, 360-61, 275 P.3d 314 (2012). But “the information is not stale
for purposes of probable cause if the facts and circumstances in the affidavit support a
commonsense determination that there is continuing and contemporaneous possession of
the property intended to be seized.” State v. Maddox, 152 Wn.2d 499, 506, 98 P.3d 1199
(2004).
Detective Knudson’s affidavit stated that Microsoft’s report indicated that it
“became aware” of Mr. Friedrich’s upload on March 30. CP at 23. It also informed the
magistrate that ISPs such as Microsoft typically monitor their services to prevent their
communication networks from serving as conduits for illicit activity, including to
systematically attempt to identify suspected child pornography. He described the
generation of hash values for pornographic files that enable ISPs to automatically detect
the passage of some pornographic files through their system. Detective Knudson also
cited federal law under which an ISP “has a duty to report to NCMEC any apparent child
pornography it discovers ‘as soon as reasonably possible.’” CP at 18 (quoting 18 U.S.C.
§ 2258A(a)(1)). Mr. Friedrich concedes that “[p]resumably, Microsoft complied with
this requirement.” Br. of Appellant at 15 n.11.
9
No. 35099-1-III
State v. Friedrich
Industry practices exist, can often be determined by outsiders to the industry, and
the practices described by Detective Knudson’s affidavit are matters of which a detective
with training in investigating child pornography cases could be expected to be aware.
The district court judge was entitled to rely on the detective’s knowledge of industry
practice. That information and the federal reporting requirement support the magistrate’s
commonsense conclusion that Microsoft’s detection and reporting would be prompt.
Likelihood that evidence of criminal activity would be located at Mr. Friedrich’s
residence
To establish the likelihood that evidence of criminal activity would still be located
at Mr. Friedrich’s residence, Detective Knudson’s affidavit relied in part on the fact that
digitized information will remain on a computer not only until deleted, but even
thereafter, which Mr. Friedrich does not dispute.
Detective Knudson’s affidavit also included generalizations about what collectors
of child pornography generally do, which, according to the deputy, includes “prefer[ing]
not to be without their child pornography for any prolonged time period,” often
maintaining photographs or videos “in computer files or external digital storage devices,”
and maintaining pornographic materials “in the privacy and security of their home or in
some other secure location, such as a private office.” CP at 14-15. Mr. Friedrich
challenges these generalizations as support for a determination of probable cause, citing
State v. Thein, 138 Wn.2d 133, 977 P.2d 582 (1999).
10
No. 35099-1-III
State v. Friedrich
In Thein, our Supreme Court held that an officer’s asserted understanding of the
common habits of drug dealers was insufficient to establish probable cause to search the
defendant’s residence. The warrant affidavit in Thein presented specific facts providing
probable cause that the defendant was a drug dealer, but only generalizations in support
of the officer’s belief that evidence of his criminal activity could be found at his
residence. The court concluded that the generalized statements “in [Thein’s] case were,
standing alone, insufficient to establish probable cause to search [his] residence.” Id. at
148. Although allowing that “common sense and experience inform the inferences
reasonably to be drawn from the facts,” the Court determined that the type of “broad
generalizations” presented by the warrant affidavit for Thein’s residence “do not alone
establish probable cause.” Id. at 148-49.
The Court added a cautionary note, “emphasiz[ing] that the existence of probable
cause is to be evaluated on a case-by-case basis” and in each case, “‘the facts stated, the
inferences to be drawn, and the specificity required must fall within the ambit of
reasonableness.’” Id. at 149 (quoting State v. Helmka, 86 Wn.2d 91, 93, 542 P.2d 115
(1975)). More recently, our Supreme Court observed in Maddox that “[i]n evaluating
whether the facts underlying a search warrant are stale, the court looks at the totality of
circumstances,” including “the nature and scope of the suspected criminal activity.” 152
Wn.2d at 506.
Detective Knudson’s generalizations about what possessors of child pornography
11
No. 35099-1-III
State v. Friedrich
“generally do” warrant critical examination for the reasons given in Thein. But unlike the
generalizations about drug dealers in Thein, Detective Knudson’s generalizations about
possessors of child pornography fall within the ambit of reasonableness, and similar
generalizations have survived critical examination in a number of courts. In a relatively
early case involving a warrant to search for digital evidence of child pornography at a
user’s residence, the federal appellate court for the Tenth Circuit Court of Appeals
endorsed a view that possessors of child pornography are likely to hoard materials and
maintain them for significant periods of time, explaining that the view
“is supported by common sense and the cases. Since the materials are
illegal to distribute and possess, initial collection is difficult. Having
succeeded in obtaining images, collectors are unlikely to destroy them.
Because of their illegality and the imprimatur of severe social stigma such
images carry, collectors will want to secret them in secure places, like a
private residence.”
United States v. Riccardi, 405 F.3d 852, 861 (10th Cir. 2005) (quoting United States v.
Lamb, 945 F. Supp. 441, 460 (N.D.N.Y. 1996)).
The Tenth Circuit abided by that view five years later, despite an intervening
increase in internet access to child pornography that made it easier to anonymously
collect and possess it. In United States v. Burkhart, the court explained:
[C]hild pornography is still illegal to distribute and possess, and still
carries severe social stigma, whether the possessor receives it by regular
mail, email, or over the Internet. The illegality and social stigma may
also complicate resale or disposal. Moreover, acquiring pornography is
rarely free. Given the nature of the evidence to be seized, the Internet
context may mitigate against staleness: information that a person received
12
No. 35099-1-III
State v. Friedrich
electronic images of child pornography is less likely than information about
drugs, for example, to go stale because the electronic images are not subject
to spoilage or consumption.
602 F.3d 1202, 1207 (10th Cir. 2010) (citing United States v. Frechette, 583 F.3d 374,
378 (6th Cir. 2009)). Burkhart points out that at the time of its filing, it was one of five
federal circuit courts that had endorsed the observation that possessors of child
pornography are likely to hoard it. Id.3 This court also found that “boilerplate”
inferences in a warrant affidavit provided probable cause that evidence of child
pornography could be found at a suspect’s residence months after detecting his use. State
v. Garbaccio, 151 Wn. App. 716, 729, 214 P.3d 168 (2009), relying on United States v.
Lacy, 119 F.3d 742, 746 (9th Cir. 1997).
Probable cause requires more than suspicion or conjecture, but it does not require
certainty. State v. Chenoweth, 160 Wn.2d 454, 476, 158 P.3d 595 (2007). Because
common sense and experience supports the generalizations presented by Detective
Knudson, the district court could reasonably find a fair probability that possessors of
child pornography are likely to retain the material for a considerable period of time in a
secure location, such as the possessor’s home.
3
In addition to the Sixth Circuit decision in Frechette, Burkhart cited United
States v. McArthur, 573 F.3d 608, 613-14 (8th Cir. 2009); United States v. Falso, 544
F.3d 110, 132 (2d Cir. 2008); and United States v. Watzman, 486 F.3d 1004, 1008 (7th
Cir. 2007).
13
No. 35099-1-III
State v. Friedrich
II. THE SEARCH WARRANT SATISFIED THE CONSTITUTIONAL PARTICULARITY
REQUIREMENT IN MOST RESPECTS, AND THE ITEMS SEIZED FALL WITHIN ITS
LEGITIMATE SCOPE
Mr. Friedrich’s remaining argument is that the search warrant was vague,
overbroad, and sought materials presumptively protected by the First Amendment to the
United States Constitution.
Among the requirements of the Fourth Amendment is that no warrant shall issue
without “particularly describing the place to be searched, and the persons or things to be
seized.” U.S. CONST. AMEND. IV (emphasis added); State v. Riley, 121 Wn.2d 22,
28 n.1, 846 P.2d 1365 (1993). “The purposes of the search warrant particularity
requirement are the prevention of general searches, prevention of the seizure of objects
on the mistaken assumption that they fall within the issuing magistrate’s authorization,
and prevention of the issuance of warrants on loose, vague, or doubtful bases of fact.”
State v. Perrone, 119 Wn.2d 538, 545, 834 P.2d 611 (1992) (citing, among other
authority, Marron v. United States, 275 U.S. 192, 48 S. Ct. 74, 72 L. Ed. 231 (1927)).
The first two purposes are related. The first prevents the sort of general,
exploratory rummaging in a person’s belongings of the sort “‘abhorred by the
colonists.’” Id. (quoting Coolidge v. New Hampshire, 403 U.S. 443, 467, 91 S. Ct. 2022,
29 L. Ed. 2d 564 (1971)). The second ensures that what is to be seized is determined by a
neutral magistrate, eliminating the danger of unlimited discretion in the executing officer.
Id. at 546. As to these related purposes, “a description is valid if it is as specific as the
14
No. 35099-1-III
State v. Friedrich
circumstances and the nature of the activity under investigation permits.” Perrone, 119
Wn.2d at 547.
A greater degree of particularity is required when a search warrant authorizes a
search for items protected by the First Amendment. Id. at 547. Describing the history of
this heightened requirement in 1965, the U.S. Supreme Court stated that “[T]he most
scrupulous exactitude” applies “when the ‘things [to be seized]’ are books, and the basis
for their seizure is the ideas which they contain.” Stanford v. Texas, 379 U.S. 476, 485,
85 S. Ct. 506, 13 L. Ed. 2d 431 (cited by Perrone, 119 Wn.2d at 547-48).
The third purpose of the particularity requirement ties it to the requirement of
probable cause. Imprecision in the description of the items to be seized that can be traced
to “loose, vague, or doubtful bases of fact” increases the likelihood that probable cause
has not been established. Perrone, 119 Wn.2d at 548. As to all three purposes,
“[w]hether a search warrant contains a sufficiently particularized description is reviewed
de novo.” Id. at 549.
The first infirmity alleged by Mr. Friedrich for his particularity challenge is the
search warrant’s use of the unqualified term “child pornography” in one instance, in
describing items to be seized. Use of the unqualified term proved fatal to the search
warrant at issue in Perrone, in which the warrant affidavit repeatedly used the term to
describe items to be seized, and our Supreme Court held that the term was “not
sufficiently particular to satisfy the Fourth Amendment.” 119 Wn.2d at 553. The court
15
No. 35099-1-III
State v. Friedrich
reasoned that authorizing law enforcement to seize anything it thinks constitutes “child
pornography” allows for too much discretion and is not “scrupulous exactitude.” Id.
(internal quotation marks omitted). The court suggested that a warrant affiant could
avoid the particularity problem by using statutory definitions found in RCW 9.68A.011.4
Id. at 553-54. More recently, the Court reiterated that if a search warrant limiting items
to be seized “used the language of RCW 9.68A.011 to describe materials sought, the
warrant would likely be sufficiently particular,” but that merely identifying the crime
under investigation as a violation of RCW 9.68A.070 did not satisfy the particularity
requirement. State v. Besola, 184 Wn.2d 605, 614, 359 P.3d 799 (2015).
The search warrant in this case consistently qualified the “Records, Documents,
and Visual Depictions” to be searched for and seized as ones containing, or pertaining or
relating to, “visual depictions of minors engaged in sexually explicit conduct, as defined
in RCW 9.68A.011 and Title 18, United States Code, Section 2256.” CP at 32. All items
to be searched and seized were also qualified by introductory language that they be
“records, documents, and items that constitute evidence, contraband, fruits, and/or
instrumentalities of violations of RCW 9.68A.050, dealing in depictions of minor [sic]
engaged in sexually explicit conduct.” CP at 35. The unqualified term “child
4
Chapter 9.68A RCW covers sexual exploitation of children, and section
9.68A.011 is its definitions provision.
16
No. 35099-1-III
State v. Friedrich
pornography” appears only once, in authorizing seizure of materials “that show the actual
user(s) of the computers or digital devices during any time period in which the device
was used to upload, download, store, receive, possess or view child pornography.”
CP at 37. Given the introductory language and the consistent use of statutory definitions
elsewhere, Mr. Friedrich’s attack is hypertechnical. The search warrant in this case does
not present the infirmity presented by the search warrant in Perrone.
Additional and related infirmities alleged by Mr. Friedrich are the breadth of the
media to be seized, which includes, e.g., books, magazines, photographs, motion picture
films and videos; and the warrant’s extension to every digital device found in the
residence that is “capable of storing and/or processing data in digital form,” as well as
“related communications devices,” examples of which are provided. CP at 36. He
argues that the breadth of both categories authorizes the seizure of items unrelated to the
suspected crime, which was a single instance of uploading a digital image. Finally, he
points to the fact that the search warrant authorized seizure of records and things
evidencing the use of nine IP addresses having no apparent relation to Detective
Knudson’s evidence.
The State responds that the particularity requirement tolerates ambiguity when the
description is as complete as can be reasonably expected, and that the complaint about
the breadth of devices whose seizure was authorized fails to consider that “[t]he only way
police will know whether digital evidence contains child pornography is by seizing the
17
No. 35099-1-III
State v. Friedrich
device and then submitting it to . . . expert examination. This cannot be ascertained at the
time of seizure.” Br. of Resp’t at 19-20.
The State does not defend the provision of the search warrant dealing with the nine
unexplained IP addresses, lending credence to Mr. Friedrich’s surmise that it was
carryover language from an earlier search warrant. We set aside that provision for now,
and address it in our concluding discussion of the severability doctrine.
As to the breadth of the types of media to be seized, “courts evaluating alleged
particularity violations have distinguished between property that is inherently innocuous
and property that is inherently illegal.” State v. Chambers, 88 Wn. App. 640, 644, 945
P.2d 1172 (1997) (internal quotation marks omitted). “A lesser degree of precision may
satisfy the particularity requirement when a warrant authorizes the search for contraband
or inherently illicit property.” Id. Child pornography is not protected by the First
Amendment. New York v. Ferber, 458 U.S. 747, 102 S. Ct. 3348, 73 L. Ed. 2d 1113
(1982). The search warrant authorized a search for and seizure of only media containing
statutorily-defined child pornography. It was not overbroad as to media whose content
could be assessed during the search.
The breadth of digital devices to be seized presents a different issue because, as
the State points out, whether they contained child pornography could not be assessed
while executing the warrant at the residence. If a magistrate reasonably finds it probable
that an individual has engaged in criminal dealings with child pornography, and digital
18
No. 35099-1-III
State v. Friedrich
evidence of those dealings is likely to be found in devices located in his or her home, the
most reasonable approach would appear to be to authorize seizure of all reasonably
suspect devices, but with a particularized protocol for searching the devices following the
seizure. See, e.g., United States v. Comprehensive Drug Testing, Inc., 621 F.3d 1162,
1177 (9th Cir. 2010) (per curiam) (en banc) (recognizing “the reality that over-seizing is
an inherent part of the electronic search process”), abrogated in part on other grounds by
Hamer v. Neigh. Hous. Serv. Of Chi., U.S. , 138 S. Ct. 13, 16-17, 199 L. Ed. 2d
249 (2017); id. at 1178-80 (Kozinski, C.J., concurring) (providing guidance on what
magistrates should consider in issuing a warrant to examine an electronic storage medium
to search for certain incriminating files).
The severability doctrine spares us the task of drawing lines about over-seizing
electronic information in this case, because the evidence that was seized and used to
convict Mr. Friedrich was seized pursuant to provisions of the warrant that were
particularized and supported by probable cause.5 Under the severability doctrine, which
“has been applied [even] where First Amendment considerations exist,” “‘infirmity of
part of a warrant requires the suppression of evidence seized pursuant to that part of the
warrant’ but does not require suppression of anything seized pursuant to valid parts of the
warrant.” Perrone, 119 Wn.2d at 556 (quoting United States v. Fitzgerald, 724 F.2d 633,
5
The evidence relied on by the State was found on the Hewlett Packard computer,
the Samsung smartphone, the Toshiba computer, and the Micron computer.
19
No. 35099-1-III
State v. Friedrich
warrant." Perrone, 119 Wn.2d at 556 (quoting United States v. Fitzgerald, 724 F.2d 633,
637 (8th Cir. 1983)). Although the doctrine does not apply to unconstitutional general
warrants or where the valid portion of the warrant is "a relatively insignificant part of an
otherwise invalid search," id. at 556-57 (internal quotation marks omitted), neither of
those exceptions to the doctrine apply here.
The warrant was not too vague and did not authorize the seizure of items protected
by the First Amendment. Its extension to nine unrelated IP addresses and any other
debatable overbreadth did not taint its valid and severable authorization to seize the three
computers and one smartphone relied on as evidence against Mr. Friedrich.
Mr. Friedrich asks us to exercise our discretion to waive costs on appeal if the
State substantially prevails, which it has. We decline to exercise our discretion to waive
costs, but this does not prejudice Mr. Friedrich's right to oppose an award of costs under
RAP 14.2.
Affirmed.
d}~0~.~-
Siddoway, J.
WE CONCUR:
l ~ ... .,~ ... c.1..- gtM. \1
Lawrence-Berrey, CJ.
20
No. 35099-1-111
FEARING, J. (concurring)-The majority writes, on page 8 of its opinion:
Whether a warrant affidavit's information constitutes probable cause
is a question of law that we review de novo. State v. Neth, 165 Wn.2d 177,
182, 196 P.3d 658 (2008). Nonetheless, in determining that question of
law, "[g]reat deference is accorded the issuing magistrate's det~rmination
of probable cause." State v. Cord, 103 Wn.2d 361, 366, 693 P.2d 81
( 1985). If the propriety of issuing the warrant is debatable, the deference
due the magistrate's decision will tip the balance in favor of upholding the
warrant. State v. Jackson, 102 Wn.2d 432, 446, 688 P.2d 136 (1984). In
light of the deference owed the magistrate's decision, the question on
review is whether the magistrate could draw the connection, not whether he
should do so.
I question the consistency of the first sentence in this excerpt from the remaining
sentences. A de novo review may conflict with granting the magistrate deference, let
alone great deference. Perhaps the appeals court should grant deference only to the
extent the magistrate needed to determine the reliability of information submitted in
support of the application for a search warrant and not to the extent of deciding whether
that information supported probable cause. I also question whether a reviewing court
should grant the magistrate deference when the magistrate issues the search warrant
without any input from the defendant.
No. 35099-1-111
State v. Friedrich (concurrence)
In another case, a court may need to resolve the discrepancy between the principle
of de novo review and the rule of granting the magistrate deference. The majority and I
need not undertake any resolution of this incongruity in this appeal, because under either
standard of review, we may affirm the issuance of the warrant to search Jay Friedrich's
residence.
Fe~\([,
2