United States Court of Appeals
for the Eighth Circuit
_________________________________
No. 19-2331
_________________________________
United States of America,
Plaintiff - Appellee
v.
Mark Ringland,
Defendant - Appellant
__________
Appeal from the United States District Court
for the District of Nebraska - Omaha
__________
Submitted: May 12, 2020
Filed: July 16, 2020
__________
Before COLLOTON and BENTON, Circuit Judges, and WILLIAMS, District
Judge.1
___________
WILLIAMS, District Judge.
Mark Ringland was convicted of receipt of child pornography, in violation of
Title 18, United States Code, Section 2252(a)(2). At trial, the government introduced
1
The Honorable C.J. Williams, United States District Judge for the Northern
District of Iowa, sitting by designation.
evidence of child pornography found on Ringland’s electronic devices. Law
enforcement officers seized and searched Ringland’s devices under authorized
warrants based on information furnished by Google, Inc. (“Google”) and the National
Center for Missing and Exploited Children (“NCMEC”). On appeal, Ringland asserts
the district court2 erred in denying his motion to suppress this evidence because he
contends Google, acting as a government agent, conducted unlawful warrantless
searches of his email accounts. Alternatively, Ringland argues that NCMEC, acting
as a government agent, also conducted unlawful warrantless searches of his email
accounts by expanding Google’s original searches. Finally, Ringland argues the good
faith exception to the exclusionary rule does not apply to save the unlawful searches.
Because we find the searches lawful, we affirm.
I.
Google is an electronic communication service provider (“ESP”) offering a
variety of services, including the email service gmail. To create a gmail account, users
must agree to Google’s terms of service, which includes Google’s right to review
content to ensure it complies with the law. Google monitors gmail accounts using
automated systems employing a hash-comparison technology to detect unlawful
content, such as child pornography. Federal law requires Google to report known child
pornography violations to NCMEC through the CyberTipline Report system. See 18
U.S.C. § 2258A(a).
On March 20, 2017, Google sent a CyberTipline Report to NCMEC containing
784 files of child pornography from Ringland’s email account
2
The Honorable Laurie Smith Camp, United States District Judge for the District
of Nebraska, adopting the findings and recommendation of the Honorable Michael D.
Nelson, United States Magistrate Judge for the District of Nebraska.
-2-
mringland69@gmail.com (“mringland69”). Google discovered some of these files
through its hashing technology. The report noted that it contained “over 700 files,”
with Google affirming it reviewed 231 of the files but providing no information on the
other 553 files. NCMEC “reviewed the uploaded files and found” apparent child
pornography. On March 21, 2017, Google sent a new report to NCMEC, after
uploading 400 more files from Ringland’s gmail account, stating it had reviewed 258
of the files but giving no information on the other 142. Between April 6, 2017, and
April 19, 2017, Google reported and uploaded to NCMEC 32 more files from
Ringland’s gmail account, stating it had reviewed 13 of the files and giving no
information on the other files. In sum, from March 20, 2017, to April 19, 2017,
Google uploaded to NCMEC 1,216 files from the mringland69 gmail account. Of
these files, Google viewed 502 and gave no information as to whether it viewed the
rest. On April 17, 2017, and April 28, 2017, NCMEC forwarded all reports to the
Nebraska State Police (“NSP”).
Google continued to monitor Ringland’s gmail accounts. On June 20, 2017,
Google discovered the gmail account mringland65@gmail.com (“mringland65”),
which appeared to be linked to mringland69. Google scanned and uploaded two files
from this second gmail account to NCMEC. Google gave no information as to its
review. On June 21, 2017, NCMEC noted it had not reviewed the files and forwarded
them to police officers in South Dakota.
On June 27, 2017, NSP Investigator C.J. Alberico (“Investigator Alberico”)
sought and received a warrant to search the email mringland69. In her application,
Investigator Alberico noted that Google had reviewed only 502 of the 1,216 files found
on the mringland69 account and that she had reviewed only the same 502 files. From
searching this account, Investigator Alberico discovered that the email address
mringland69 had sent child pornography images to the email address mringland65.
-3-
On July 13, 2017, Google uploaded two more files from a third email,
markringland65@gmail.com (“markringland65”), with no information as to its review.
On July 18, 2017, NCMEC linked the June 20 and July 13 reports and forwarded both
to NSP. NCMEC noted it had not reviewed these files. On July 19, 2017, Google
uploaded five more files from markringland65, but did not indicate its review. On July
21, 2017, NCMEC did not review the files but forwarded them to NSP.
Between August 1, 2017, and August 4, 2017, Google uploaded 1,109 more files
from markingland65 across nine reports. Google indicated it reviewed 773 of the files
and gave no information on the other files. In one of the nine reports, NCMEC noted
it had “viewed the uploaded files and found” apparent child pornography. On August
4, 2017, NCMEC forwarded these reports to NSP.
On August 7, 2017, Investigator Alberico sought and received a warrant to
search defendant’s other two gmail accounts, mringland65 and markringland65. As
to mringland65, Investigator Alberico noted mringland69 had sent child pornography
to that address. As to markringland65, Investigator Alberico relied on the nine reports
from NCMEC as containing alleged contraband. Investigator Alberico noted Google
had not reviewed all the files in the reports and she had not viewed them either.
On August 31, 2017, Investigator Alberico sought and received a warrant to
track defendant’s cell phone, which was identified in earlier reports.3 On September
1, 2017, Investigator Alberico sought and received federal search and arrest warrants.
That same day, officers arrested Ringland, who made incriminating statements and
allowed officers to retrieve an iPad from his van. On September 5, 2017, Ringland
made further incriminating statements to Investigator Alberico during a transfer.
3
From August 4, 2017, to August 31, 2017, Google uploaded 566 more files
from markringland65 to NCMEC, but none of this information went into any warrant
application.
-4-
Ringland moved to suppress evidence recovered from his mringland69,
mringland65, and markringland65 gmail accounts. A United States Magistrate Judge
held an evidentiary hearing and issued a Findings and Recommendation (“F&R”). The
magistrate judge found that Google was not acting as a government agent. The judge
also found that NCMEC did not view more files than Google. The judge further found
that Investigator Alberico did not view more files than Google. Alternatively, the
magistrate judge reasoned, the officers who executed the search relied in good faith on
the signed warrants such that the good faith exception to the exclusionary rule applied
under United States v. Leon, 468 U.S. 897 (1984). Ringland objected to the magistrate
judge’s F&R.
The district court judge overruled Ringland’s objections to the magistrate
judge’s F&R. The district court judge found the magistrate judge’s factual findings
to be correct, and further found the magistrate judge did not omit any material facts.
The district court judge agreed that Google did not act as a government agent and that
Investigator Alberico did not view any more files than Google. The district court judge
concluded it did not matter whether NCMEC viewed more files because Investigator
Alberico only viewed those already viewed by Google. Finally, the district court judge
agreed alternatively that the warrants were within the Leon good faith exception.
II.
When reviewing the denial of a motion to suppress, we review the district
court’s factual findings for clear error and its legal conclusions de novo. United States
v. Clay, 646 F.3d 1124, 1127 (8th Cir. 2011).
“A warrantless search is presumptively unreasonable absent some exception to
the warrant requirement[.]” United States v. Hernandez Leon, 379 F.3d 1024, 1027
(8th Cir. 2004). “The ordinary sanction for police violation of Fourth Amendment
limitations has long been suppression of the evidentiary fruits of the transgression.”
-5-
United States v. Fiorito, 640 F.3d 338, 345 (8th Cir. 2011). The Supreme Court has
also long held, however, that Fourth Amendment protection extends only to actions
undertaken by government officials or those acting at the direction of some official.
See, e.g., Skinner v. Ry. Labor Execs.’ Ass’n, 489 U.S. 602, 613-14 (1989); Coolidge
v. New Hampshire, 403 U.S. 443, 487 (1971); Burdeau v. McDowell, 256 U.S. 465,
475 (1921). Thus, “the Fourth Amendment does not apply to a search or seizure, even
an arbitrary one, effected by a private party on his own initiative” but it does “protect[
] against such intrusions if the private party acted as an instrument or agent of the
Government.” Skinner, 489 U.S. at 614.
“Whether a private party should be deemed an agent or instrument of the
government for Fourth Amendment purposes necessarily turns on the degree of the
government’s participation in the private party’s activities, a question that can only be
resolved in light of all the circumstances.” United States v. Wiest, 596 F.3d 906, 910
(8th Cir. 2010) (quoting Skinner, 489 U.S. at 614). In this context, we have focused
on three relevant factors: “[1] whether the government had knowledge of and
acquiesced in the intrusive conduct; [2] whether the citizen intended to assist law
enforcement or instead acted to further his own purposes; and [3] whether the citizen
acted at the government’s request.” Id. “A defendant bears the burden of proving by
a preponderance of the evidence that a private party acted as a government agent.”
United States v. Highbull, 894 F.3d 988, 992 (8th Cir. 2018). Further, “[w]hen a
statute or regulation compels a private party to conduct a search, the private party acts
as an agent of the government.” United States v. Stevenson, 727 F.3d 826, 829 (8th
Cir. 2013) (citation omitted). “Even when a search is not required by law, however,
if a statute or regulation so strongly encourages a private party to conduct a search that
the search is not ‘primarily the result of private initiative,’ then the Fourth Amendment
applies.” Id.
If a private party conducted an initial search independent of any agency
relationship with the government, then law enforcement officers may, in turn, perform
-6-
the same search as the private party without violating the Fourth Amendment as long
as the search does not “exceed[ ] the scope of the private search.” United States v.
Miller, 152 F.3d 813, 815 (8th Cir. 1998). This is because the private search already
frustrated the person’s legitimate expectation of privacy; thus, “an ensuing police
intrusion that stays within the limits of the private search is not a search for Fourth
Amendment purposes.” Id.
III.
Here, the district court did not err when it found Google’s search of Ringland’s
email accounts constituted a private search. Ringland argues Google acted as a
government agent because it was coerced into reporting child pornography by statutory
penalties imposed for failing to report such content. It is true that Title 18, United
States Code, Section 2258A(a) requires an ESP to report to NCMEC any apparent
violation of child pornography laws it discovers. Despite the reporting requirement,
however, Section 2258A does not require ESPs to seek out and discover violations.
18 U.S.C. 2258A(f).
In United States v. Stevenson, the defendant sought to suppress child
pornography discovered on his email by America Online (“AOL”) through hashing.
727 F.3d at 828-29. AOL’s hash-detection program automatically forwarded a report
to NCMEC which was then relayed to law enforcement officers. There, we rejected
the defendant’s argument that Sections 2258A and 2258B amounted to state action like
the railroad regulations in Skinner v. Railway Labor Executives’ Association. Id., at
829-30. We held these sections did not authorize the scanning of emails, clear legal
barriers for preemptively scanning emails, prohibit ESPs from contracting away their
rights to scan emails, or delineate consequences for users should they refuse to submit
to scanning. Id., at 830. We concluded that “[a] reporting requirement, standing
alone, does not transform an [ESP] into a government agent whenever it chooses to
scan files sent on its network for child pornography.” Id.; see also United States v.
-7-
Cameron, 699 F.3d 621, 637-38 (1st Cir. 2012) (same); United States v. Richardson,
607 F.3d 357, 366-67 (4th Cir. 2010) (same).
Here, Google did not act as a government agent because it scanned its users’
emails volitionally and out of its own private business interests. Google did not
become a government agent merely because it had a mutual interest in eradicating child
pornography from its platform. See Cameron, 699 F.3d at 637 (“We will not find that
a private party has acted as an agent of the government ‘simply because the
government has a stake in the outcome of a search.’”). The government did not know
of Google’s initial searches of Ringland’s gmail accounts, the government did not
request the searches, and Google acted out of its own obvious interests in removing
child sex abuse from its platform. See United States v. Smith, 383 F.3d 700, 705 (8th
Cir. 2004). Again, Google was not required to perform any such affirmative searches.
As we held in Stevenson, the reporting requirement for child pornography alone does
not transform Google into a government agent. See 727 F.3d at 830. Moreover, the
statutory scheme does not so strongly encourage affirmative searches such that it is
coercive. In fact, the penalties for failing to report child pornography may even
discourage searches in favor of willful ignorance. Thus, Google was not a state actor
here and its searches do not implicate the Fourth Amendment.
Ringland asserts this case is distinguishable from Stevenson because Google
continued to scan his email and uncover his identifying information after its initial
report to NCMEC, thus showing the government was aware of and acquiesced to
Google’s searches and Google acted to assist NSP. Ringland also asserts Google’s size
and far-reaching access to its users’ personal data threatens the Fourth Amendment like
in Carpenter v. United States, 138 S. Ct. 2206, 2212 (2018), wherein law enforcement
officers obtained and executed court orders on Sprint and MetroPCS to disclose the
cell-site location data of several robbery suspects. Ringland argues the same “seismic
shifts in digital technology” allowing for long-term and specific location tracking apply
here and warrant suppression of the evidence.
-8-
Ringland’s attempts to distinguish Stevenson are unpersuasive. It is
inconsequential that Google continued to scan his email accounts or uncover
identifying information after sending its initial report. These continued searches were,
again, unrequested by the government and comport with Google’s private interests.
Further, there is no evidence the government had any notice Google would conduct
these searches prior to receiving the search results. That Google continued to monitor
Ringland’s emails and comply with reporting requirements does not anymore indicate
its intent to help the government than its first report did. Nor is there any evidence that
the government directed Google to continue its review of Ringland’s accounts. The
unity of interest between Google and the government does not imply some
acquiescence or agreement between them to conduct searches in an informal,
clandestine manner. Simply put, Google’s continued actions in its own interest and the
government’s continued receipt of the reports does not give rise to some form of
agency. See Stevenson, 727 at 831 (holding an ESP’s “voluntary efforts to achieve a
goal that it shares with law enforcement” does not make it a government agent).
This case is also distinguishable from Carpenter. There, the Supreme Court
reversed the Sixth Circuit Court of Appeals, which held the defendant lacked a
reasonable expectation of privacy in cell-site location data from his phone because the
defendant shared that information with his wireless carriers. 138 S. Ct. at 2213. Here,
we find the search appropriate under the private search doctrine, not the third-party
doctrine exception. See United States v. Jacobsen, 466 U.S. 109 (1984). Cf.
Carpenter, 138 S. Ct. at 2217 (not extending third-party doctrine exception to cell
phone location records).
Because Investigator Alberico searched only the same files that Google searched,
the government did not expand the search beyond Google’s private party search. See
Jacobsen, 466 U.S. at 115-18 (“The additional invasions of respondents’ privacy by
the government agent must be tested by the degree to which they exceeded the scope
of the private search.”); c.f. United States v. Ackerman, 831 F.3d 1292, 1305-07 (10th
-9-
Cir. 2016) (concluding that NCMEC qualified as a governmental entity that searched
defendant’s e-mail in a way that exceeded an earlier private search). Ringland insists
that NCMEC’s search, however, went beyond the scope of the search Google
conducted. Even if true, Investigator Alberico’s search warrant applications did not
contain information from NCMEC’s searches. Thus, we need not decide whether
NCMEC is a government agency or whether it expanded its search beyond Google’s
search.
IV.
Accordingly, we affirm the judgment of the district court.
______________________________
-10-