United States v. Mark Ringland

United States Court of Appeals for the Eighth Circuit _________________________________ No. 19-2331 _________________________________ United States of America, Plaintiff - Appellee v. Mark Ringland, Defendant - Appellant __________ Appeal from the United States District Court for the District of Nebraska - Omaha __________ Submitted: May 12, 2020 Filed: July 16, 2020 __________ Before COLLOTON and BENTON, Circuit Judges, and WILLIAMS, District Judge.1 ___________ WILLIAMS, District Judge. Mark Ringland was convicted of receipt of child pornography, in violation of Title 18, United States Code, Section 2252(a)(2). At trial, the government introduced 1 The Honorable C.J. Williams, United States District Judge for the Northern District of Iowa, sitting by designation. evidence of child pornography found on Ringland’s electronic devices. Law enforcement officers seized and searched Ringland’s devices under authorized warrants based on information furnished by Google, Inc. (“Google”) and the National Center for Missing and Exploited Children (“NCMEC”). On appeal, Ringland asserts the district court2 erred in denying his motion to suppress this evidence because he contends Google, acting as a government agent, conducted unlawful warrantless searches of his email accounts. Alternatively, Ringland argues that NCMEC, acting as a government agent, also conducted unlawful warrantless searches of his email accounts by expanding Google’s original searches. Finally, Ringland argues the good faith exception to the exclusionary rule does not apply to save the unlawful searches. Because we find the searches lawful, we affirm. I. Google is an electronic communication service provider (“ESP”) offering a variety of services, including the email service gmail. To create a gmail account, users must agree to Google’s terms of service, which includes Google’s right to review content to ensure it complies with the law. Google monitors gmail accounts using automated systems employing a hash-comparison technology to detect unlawful content, such as child pornography. Federal law requires Google to report known child pornography violations to NCMEC through the CyberTipline Report system. See 18 U.S.C. § 2258A(a). On March 20, 2017, Google sent a CyberTipline Report to NCMEC containing 784 files of child pornography from Ringland’s email account 2 The Honorable Laurie Smith Camp, United States District Judge for the District of Nebraska, adopting the findings and recommendation of the Honorable Michael D. Nelson, United States Magistrate Judge for the District of Nebraska. -2- mringland69@gmail.com (“mringland69”). Google discovered some of these files through its hashing technology. The report noted that it contained “over 700 files,” with Google affirming it reviewed 231 of the files but providing no information on the other 553 files. NCMEC “reviewed the uploaded files and found” apparent child pornography. On March 21, 2017, Google sent a new report to NCMEC, after uploading 400 more files from Ringland’s gmail account, stating it had reviewed 258 of the files but giving no information on the other 142. Between April 6, 2017, and April 19, 2017, Google reported and uploaded to NCMEC 32 more files from Ringland’s gmail account, stating it had reviewed 13 of the files and giving no information on the other files. In sum, from March 20, 2017, to April 19, 2017, Google uploaded to NCMEC 1,216 files from the mringland69 gmail account. Of these files, Google viewed 502 and gave no information as to whether it viewed the rest. On April 17, 2017, and April 28, 2017, NCMEC forwarded all reports to the Nebraska State Police (“NSP”). Google continued to monitor Ringland’s gmail accounts. On June 20, 2017, Google discovered the gmail account mringland65@gmail.com (“mringland65”), which appeared to be linked to mringland69. Google scanned and uploaded two files from this second gmail account to NCMEC. Google gave no information as to its review. On June 21, 2017, NCMEC noted it had not reviewed the files and forwarded them to police officers in South Dakota. On June 27, 2017, NSP Investigator C.J. Alberico (“Investigator Alberico”) sought and received a warrant to search the email mringland69. In her application, Investigator Alberico noted that Google had reviewed only 502 of the 1,216 files found on the mringland69 account and that she had reviewed only the same 502 files. From searching this account, Investigator Alberico discovered that the email address mringland69 had sent child pornography images to the email address mringland65. -3- On July 13, 2017, Google uploaded two more files from a third email, markringland65@gmail.com (“markringland65”), with no information as to its review. On July 18, 2017, NCMEC linked the June 20 and July 13 reports and forwarded both to NSP. NCMEC noted it had not reviewed these files. On July 19, 2017, Google uploaded five more files from markringland65, but did not indicate its review. On July 21, 2017, NCMEC did not review the files but forwarded them to NSP. Between August 1, 2017, and August 4, 2017, Google uploaded 1,109 more files from markingland65 across nine reports. Google indicated it reviewed 773 of the files and gave no information on the other files. In one of the nine reports, NCMEC noted it had “viewed the uploaded files and found” apparent child pornography. On August 4, 2017, NCMEC forwarded these reports to NSP. On August 7, 2017, Investigator Alberico sought and received a warrant to search defendant’s other two gmail accounts, mringland65 and markringland65. As to mringland65, Investigator Alberico noted mringland69 had sent child pornography to that address. As to markringland65, Investigator Alberico relied on the nine reports from NCMEC as containing alleged contraband. Investigator Alberico noted Google had not reviewed all the files in the reports and she had not viewed them either. On August 31, 2017, Investigator Alberico sought and received a warrant to track defendant’s cell phone, which was identified in earlier reports.3 On September 1, 2017, Investigator Alberico sought and received federal search and arrest warrants. That same day, officers arrested Ringland, who made incriminating statements and allowed officers to retrieve an iPad from his van. On September 5, 2017, Ringland made further incriminating statements to Investigator Alberico during a transfer. 3 From August 4, 2017, to August 31, 2017, Google uploaded 566 more files from markringland65 to NCMEC, but none of this information went into any warrant application. -4- Ringland moved to suppress evidence recovered from his mringland69, mringland65, and markringland65 gmail accounts. A United States Magistrate Judge held an evidentiary hearing and issued a Findings and Recommendation (“F&R”). The magistrate judge found that Google was not acting as a government agent. The judge also found that NCMEC did not view more files than Google. The judge further found that Investigator Alberico did not view more files than Google. Alternatively, the magistrate judge reasoned, the officers who executed the search relied in good faith on the signed warrants such that the good faith exception to the exclusionary rule applied under United States v. Leon, 468 U.S. 897 (1984). Ringland objected to the magistrate judge’s F&R. The district court judge overruled Ringland’s objections to the magistrate judge’s F&R. The district court judge found the magistrate judge’s factual findings to be correct, and further found the magistrate judge did not omit any material facts. The district court judge agreed that Google did not act as a government agent and that Investigator Alberico did not view any more files than Google. The district court judge concluded it did not matter whether NCMEC viewed more files because Investigator Alberico only viewed those already viewed by Google. Finally, the district court judge agreed alternatively that the warrants were within the Leon good faith exception. II. When reviewing the denial of a motion to suppress, we review the district court’s factual findings for clear error and its legal conclusions de novo. United States v. Clay, 646 F.3d 1124, 1127 (8th Cir. 2011). “A warrantless search is presumptively unreasonable absent some exception to the warrant requirement[.]” United States v. Hernandez Leon, 379 F.3d 1024, 1027 (8th Cir. 2004). “The ordinary sanction for police violation of Fourth Amendment limitations has long been suppression of the evidentiary fruits of the transgression.” -5- United States v. Fiorito, 640 F.3d 338, 345 (8th Cir. 2011). The Supreme Court has also long held, however, that Fourth Amendment protection extends only to actions undertaken by government officials or those acting at the direction of some official. See, e.g., Skinner v. Ry. Labor Execs.’ Ass’n, 489 U.S. 602, 613-14 (1989); Coolidge v. New Hampshire, 403 U.S. 443, 487 (1971); Burdeau v. McDowell, 256 U.S. 465, 475 (1921). Thus, “the Fourth Amendment does not apply to a search or seizure, even an arbitrary one, effected by a private party on his own initiative” but it does “protect[ ] against such intrusions if the private party acted as an instrument or agent of the Government.” Skinner, 489 U.S. at 614. “Whether a private party should be deemed an agent or instrument of the government for Fourth Amendment purposes necessarily turns on the degree of the government’s participation in the private party’s activities, a question that can only be resolved in light of all the circumstances.” United States v. Wiest, 596 F.3d 906, 910 (8th Cir. 2010) (quoting Skinner, 489 U.S. at 614). In this context, we have focused on three relevant factors: “[1] whether the government had knowledge of and acquiesced in the intrusive conduct; [2] whether the citizen intended to assist law enforcement or instead acted to further his own purposes; and [3] whether the citizen acted at the government’s request.” Id. “A defendant bears the burden of proving by a preponderance of the evidence that a private party acted as a government agent.” United States v. Highbull, 894 F.3d 988, 992 (8th Cir. 2018). Further, “[w]hen a statute or regulation compels a private party to conduct a search, the private party acts as an agent of the government.” United States v. Stevenson, 727 F.3d 826, 829 (8th Cir. 2013) (citation omitted). “Even when a search is not required by law, however, if a statute or regulation so strongly encourages a private party to conduct a search that the search is not ‘primarily the result of private initiative,’ then the Fourth Amendment applies.” Id. If a private party conducted an initial search independent of any agency relationship with the government, then law enforcement officers may, in turn, perform -6- the same search as the private party without violating the Fourth Amendment as long as the search does not “exceed[ ] the scope of the private search.” United States v. Miller, 152 F.3d 813, 815 (8th Cir. 1998). This is because the private search already frustrated the person’s legitimate expectation of privacy; thus, “an ensuing police intrusion that stays within the limits of the private search is not a search for Fourth Amendment purposes.” Id. III. Here, the district court did not err when it found Google’s search of Ringland’s email accounts constituted a private search. Ringland argues Google acted as a government agent because it was coerced into reporting child pornography by statutory penalties imposed for failing to report such content. It is true that Title 18, United States Code, Section 2258A(a) requires an ESP to report to NCMEC any apparent violation of child pornography laws it discovers. Despite the reporting requirement, however, Section 2258A does not require ESPs to seek out and discover violations. 18 U.S.C. 2258A(f). In United States v. Stevenson, the defendant sought to suppress child pornography discovered on his email by America Online (“AOL”) through hashing. 727 F.3d at 828-29. AOL’s hash-detection program automatically forwarded a report to NCMEC which was then relayed to law enforcement officers. There, we rejected the defendant’s argument that Sections 2258A and 2258B amounted to state action like the railroad regulations in Skinner v. Railway Labor Executives’ Association. Id., at 829-30. We held these sections did not authorize the scanning of emails, clear legal barriers for preemptively scanning emails, prohibit ESPs from contracting away their rights to scan emails, or delineate consequences for users should they refuse to submit to scanning. Id., at 830. We concluded that “[a] reporting requirement, standing alone, does not transform an [ESP] into a government agent whenever it chooses to scan files sent on its network for child pornography.” Id.; see also United States v. -7- Cameron, 699 F.3d 621, 637-38 (1st Cir. 2012) (same); United States v. Richardson, 607 F.3d 357, 366-67 (4th Cir. 2010) (same). Here, Google did not act as a government agent because it scanned its users’ emails volitionally and out of its own private business interests. Google did not become a government agent merely because it had a mutual interest in eradicating child pornography from its platform. See Cameron, 699 F.3d at 637 (“We will not find that a private party has acted as an agent of the government ‘simply because the government has a stake in the outcome of a search.’”). The government did not know of Google’s initial searches of Ringland’s gmail accounts, the government did not request the searches, and Google acted out of its own obvious interests in removing child sex abuse from its platform. See United States v. Smith, 383 F.3d 700, 705 (8th Cir. 2004). Again, Google was not required to perform any such affirmative searches. As we held in Stevenson, the reporting requirement for child pornography alone does not transform Google into a government agent. See 727 F.3d at 830. Moreover, the statutory scheme does not so strongly encourage affirmative searches such that it is coercive. In fact, the penalties for failing to report child pornography may even discourage searches in favor of willful ignorance. Thus, Google was not a state actor here and its searches do not implicate the Fourth Amendment. Ringland asserts this case is distinguishable from Stevenson because Google continued to scan his email and uncover his identifying information after its initial report to NCMEC, thus showing the government was aware of and acquiesced to Google’s searches and Google acted to assist NSP. Ringland also asserts Google’s size and far-reaching access to its users’ personal data threatens the Fourth Amendment like in Carpenter v. United States, 138 S. Ct. 2206, 2212 (2018), wherein law enforcement officers obtained and executed court orders on Sprint and MetroPCS to disclose the cell-site location data of several robbery suspects. Ringland argues the same “seismic shifts in digital technology” allowing for long-term and specific location tracking apply here and warrant suppression of the evidence. -8- Ringland’s attempts to distinguish Stevenson are unpersuasive. It is inconsequential that Google continued to scan his email accounts or uncover identifying information after sending its initial report. These continued searches were, again, unrequested by the government and comport with Google’s private interests. Further, there is no evidence the government had any notice Google would conduct these searches prior to receiving the search results. That Google continued to monitor Ringland’s emails and comply with reporting requirements does not anymore indicate its intent to help the government than its first report did. Nor is there any evidence that the government directed Google to continue its review of Ringland’s accounts. The unity of interest between Google and the government does not imply some acquiescence or agreement between them to conduct searches in an informal, clandestine manner. Simply put, Google’s continued actions in its own interest and the government’s continued receipt of the reports does not give rise to some form of agency. See Stevenson, 727 at 831 (holding an ESP’s “voluntary efforts to achieve a goal that it shares with law enforcement” does not make it a government agent). This case is also distinguishable from Carpenter. There, the Supreme Court reversed the Sixth Circuit Court of Appeals, which held the defendant lacked a reasonable expectation of privacy in cell-site location data from his phone because the defendant shared that information with his wireless carriers. 138 S. Ct. at 2213. Here, we find the search appropriate under the private search doctrine, not the third-party doctrine exception. See United States v. Jacobsen, 466 U.S. 109 (1984). Cf. Carpenter, 138 S. Ct. at 2217 (not extending third-party doctrine exception to cell phone location records). Because Investigator Alberico searched only the same files that Google searched, the government did not expand the search beyond Google’s private party search. See Jacobsen, 466 U.S. at 115-18 (“The additional invasions of respondents’ privacy by the government agent must be tested by the degree to which they exceeded the scope of the private search.”); c.f. United States v. Ackerman, 831 F.3d 1292, 1305-07 (10th -9- Cir. 2016) (concluding that NCMEC qualified as a governmental entity that searched defendant’s e-mail in a way that exceeded an earlier private search). Ringland insists that NCMEC’s search, however, went beyond the scope of the search Google conducted. Even if true, Investigator Alberico’s search warrant applications did not contain information from NCMEC’s searches. Thus, we need not decide whether NCMEC is a government agency or whether it expanded its search beyond Google’s search. IV. Accordingly, we affirm the judgment of the district court. ______________________________ -10-