Digitally signed by
Reporter of
Decisions
Reason: I attest to
Illinois Official Reports the accuracy and
integrity of this
document
Appellate Court Date: 2020.05.22
18:36:11 -05'00'
People v. McCavitt, 2019 IL App (3d) 170830
Appellate Court THE PEOPLE OF THE STATE OF ILLINOIS, Plaintiff-Appellee, v.
Caption JOHN T. McCAVITT, Defendant-Appellant.
District & No. Third District
No. 3-17-0830
Filed November 26, 2019
Decision Under Appeal from the Circuit Court of Peoria County, No. 14-CF-282; the
Review Hon. Albert L. Purham Jr., Judge, presiding.
Judgment Reversed and remanded.
Counsel on Joshua B. Kutnick and Taylor Spratt, both of Chicago, for appellant.
Appeal
Jerry Brady, State’s Attorney, of Peoria (Patrick Delfino, David J.
Robinson, and Justin A. Nicolosi, of State’s Attorneys Appellate
Prosecutor’s Office, of counsel), for the People.
Panel JUSTICE LYTTON delivered the judgment of the court, with
opinion.
Justice McDade concurred in the judgment and opinion.
Justice Wright dissented, with opinion.
OPINION
¶1 Defendant John T. McCavitt was charged with 17 counts of child pornography based on
images found on his personal computer. He filed a motion to suppress, arguing that the search
of his computer was unlawful. Following a hearing, the trial court denied defendant’s motion,
and the case proceeded to trial. The jury found him guilty of 15 counts of child pornography.
The trial court sentenced defendant on 11 counts to five years in prison, probation, and
mandatory supervised release. On appeal, defendant argues that (1) the trial court erred in
denying his motion to suppress, (2) he was denied effective assistance of counsel, (3) the trial
court erred in admitting certain evidence at trial, and (4) the prosecutor’s statements during
closing argument warrant reversal. We reverse, finding that the trial court erred in denying
defendant’s motion to suppress.
¶2 I. BACKGROUND
¶3 On July 17, 2013, the Illinois State Police obtained a search warrant to search the home of
defendant, a police officer employed by the Peoria Police Department. The warrant authorized
the seizure of “any electronic media cable [sic] of video/audio recording” and “any electronic
storage media capable of stor[ing] pictures, audio or video.” During the execution of the
warrant, officers seized defendant’s computer.
¶4 On July 24, 2013, the Illinois State Police sought and obtained a subsequent search warrant
authorizing law enforcement personnel to search defendant’s computer for “any and all digital
images” and “any evidence of” aggravated criminal sexual assault, unlawful restraint, and
unauthorized video recording/live video transmission. Detective Jeff Avery of the Peoria
County Sheriff’s Department, a forensic examiner, examined defendant’s computer. He
removed the hard drive from the computer and made an exact copy, or mirror image, of it using
EnCase software. A copy of the hard drive, called “EnCase evidence file,” was saved on
Avery’s computer.
¶5 Based on images police found on defendant’s computer, the State charged defendant with
aggravated criminal sexual assault (720 ILCS 5/11-1.30(a)(4) (West 2012)) and criminal
sexual assault (id. § 11-1.20(a)(1)) on August 6, 2013. That case proceeded to trial. On March
19, 2014, defendant was found not guilty of all charges. On that same day, defendant orally
requested the return of his personal property, including his computer. The court denied the
request, stating that defendant’s property would be returned to him when everything “cooled
down.”
¶6 On March 20, 2014, the Peoria Police Department initiated a formal investigation of
defendant. The next day, Peoria police detective James Feehan, a computer forensics examiner,
requested a copy of the EnCase file from Avery. Avery delivered the EnCase file to Feehan
the same day. On March 24, 2014, Feehan began a digital forensic analysis on the EnCase file
and saw two images of what he believed to be child pornography. On the same day, defendant
filed a written motion seeking to have his property returned to him. That motion was never
ruled on. On March 28, 2014, defendant was arrested and charged with unauthorized video
recording (720 ILCS 5/26-4(a) (West 2014)).
¶7 On April 1, 2014, Feehan sought and obtained a search warrant to search defendant’s
EnCase file for images of child pornography. After further examination, Feehan discovered
-2-
additional images of child pornography. On April 28, 2014, the State filed a 10-count
indictment against defendant, charging him with seven counts of aggravated child pornography
(720 ILCS 5/11-20.1B (West 2010)), a Class 2 felony, and three counts of child pornography
(720 ILCS 5/11-20.1 (West 2012)), a Class 3 felony, based on five images found in defendant’s
EnCase file.
¶8 Defendant filed a motion to suppress, arguing that Feehan had no authority to obtain and
examine the contents of the EnCase file in March 2014. A hearing was held on the motion. At
the hearing, Feehan testified that he was aware that defendant was acquitted of the sexual
assault charges on March 19, 2014, and that no other charges were pending. On March 21,
2014, Feehan requested defendant’s EnCase file from Avery based on the Peoria Police
Department’s internal investigation of defendant. Feehan knew that the EnCase file had been
seized in connection with the sexual assault charges filed against defendant. Feehan testified
that he “knew that there was [sic] other victims that could be identified during the formal
[investigation] that would turn criminal.” Feehan did not believe he needed a search warrant
or other court order to obtain the EnCase file “[b]ecause of case law that [he] was aware of”
since defendant’s computer was previously seized “[p]ursuant to a lawful search warrant.” The
trial court entered an order denying defendant’s motion to suppress.
¶9 On July 10, 2015, the State amended its indictment and charged defendant with seven
additional counts of child pornography (720 ILCS 5/11-20.1(a)(6) (West 2014)), a Class 2
felony, based on seven additional images found in defendant’s EnCase file. The case proceeded
to a jury trial in July 2016.
¶ 10 At trial, Feehan testified that he has been a police officer for 21 years and been employed
by the Peoria Police Department for 18 years. He has been a digital forensic examiner for 17
years and completed approximately 500 hours of digital forensics training. The State
introduced into evidence 12 images Feehan found in defendant’s EnCase file. Those images
formed the basis of the child pornography charges against defendant.
¶ 11 The jury found defendant guilty of 15 of the 17 counts of child pornography. Defendant
filed posttrial motions, which the trial court denied. The trial court accepted the jury’s verdict
as to 10 counts of Class 2 felony child pornography and one count of Class 3 felony child
pornography. The trial court sentenced defendant to five years in prison on one count, followed
by mandatory supervised release of three years to life. The court sentenced defendant to
probation of 48 months on the remaining 10 counts, to be served consecutively to defendant’s
prison sentence.
¶ 12 II. ANALYSIS
¶ 13 Defendant first argues that the trial court erred in denying his motion to suppress. He
contends that Feehan’s search of his EnCase file eight months after the initial warrant was
issued and following his acquittal of sexual assault charges violated his fourth amendment
rights. The State responds that defendant had no expectation of privacy in his EnCase file,
which had been confiscated pursuant to a valid warrant. The State alternatively contends that
even if a fourth amendment violation occurred, the evidence should not be suppressed because
Feehan acted in good faith.
-3-
¶ 14 A. Fourth Amendment
¶ 15 The fourth amendment to the United States Constitution protects the “right of the people
to be secure in their persons, houses, papers, and effects, against unreasonable searches and
seizures.” U.S. Const., amend. IV. Similarly, article I, section 6, of the Illinois Constitution
states that “people shall have the right to be secure in their persons, houses, papers and other
possessions against unreasonable searches [and] seizures.” Ill. Const. 1970, art. I, § 6. Illinois
courts have interpreted the search and seizure provisions of the Illinois Constitution in “limited
lockstep” with the fourth amendment. People v. Caballes, 221 Ill. 2d 282, 313-14 (2006).
¶ 16 Fourth amendment protections apply where (1) the person subject to a search or seizure
had a subjective expectation of privacy in the thing seized or place searched and (2) that
expectation of privacy is one that society accepts as objectively reasonable. California v.
Greenwood, 486 U.S. 35, 39 (1988). A threshold question in fourth amendment analysis is
whether a defendant has a reasonable expectation of privacy in the things and places searched.
See People v. Collins, 106 Ill. 2d 237, 265 (1985).
¶ 17 Individuals have a reasonable expectation of privacy in their personal computers and
computer files. United States v. Heckenkamp, 482 F.3d 1142, 1147 (9th Cir. 2007); United
States v. Broy, 209 F. Supp. 3d 1045, 1053-54 (C.D. Ill. 2016); People v. Blair, 321 Ill. App.
3d 373, 381 (2001) (Homer, J., specially concurring). However, an owner’s expectation of
privacy is “significantly reduced” once an item has been lawfully seized and searched by
police. United States v. Burnette, 698 F.2d 1038, 1049 (9th Cir. 1983). “The contents of an
item previously searched are simply no longer private.” Id. Once an item has been lawfully
seized and searched, subsequent searches may be conducted without a warrant as long as the
item remains in the continuous possession of the police. Id.; United States v. Pace, 898 F.2d
1218, 1243 (7th Cir. 1990).
¶ 18 The fourth amendment does not require that search warrants contain expiration dates.
United States v. Gerber, 994 F.2d 1556, 1559 (11th Cir. 1993). Additionally, “it contains no
requirements about when the search or seizure is to occur or the duration.” (Emphases in
original.) Id. The relevant test is the reasonableness of the search under all of the circumstances.
Coolidge v. New Hampshire, 403 U.S. 443, 509 (1971) (Black, J., concurring and dissenting,
joined by Burger and Blackmun, JJ.). Reasonableness must be decided on a case-by-case basis.
Id. at 509-10.
¶ 19 “[U]nder current law there is no established upper limit as to when the government must
review seized electronic data to determine whether the evidence seized falls within the scope
of a warrant.” United States v. Metter, 860 F. Supp. 2d 205, 215 (E.D.N.Y. 2012). “[C]omputer
searches are not, and cannot be subject to any rigid time limit because they may involve much
more information than an ordinary document search, more preparation and a greater degree of
care in their execution.” United States v. Triumph Capital Group, Inc., 211 F.R.D. 31, 66
(D. Conn. 2002). Nevertheless, the fourth amendment requires the government to complete its
review of electronic data “within a ‘reasonable’ period of time.” Metter, 860 F. Supp. 2d at
215. A review of seized electronic data is reasonable even if it takes several years to complete
as long as the search ends prior to trial and does not exceed the parameters of the original
search warrant. See United States v. Johnston, 789 F.3d 934, 942-43 (9th Cir. 2015).
¶ 20 Because it is impractical to forensically examine a hard drive in a person’s home or office,
copying electronic data by creating a mirror image of a computer hard drive for later analysis
offsite had become a common practice that does not violate the fourth amendment. See United
-4-
States v. Veloz, 109 F. Supp. 3d 305, 313 (D. Mass. 2015); In re Search of Information
Associated With the Facebook Account Identified by the Username Aaron.Alexis That Is Stored
at Premises Controlled by Facebook, Inc., 21 F. Supp. 3d 1, 9 (D.D.C. 2013). Additionally,
retention of a mirrored hard drive during the pendency of an investigation and trial does not
violate the fourth amendment. See United States v. Ganias, 824 F.3d 199, 225 (2d Cir. 2016).
¶ 21 However, the government may not retain seized property indefinitely. United States v.
Premises Known as 608 Taylor Avenue, Apartment 302, Pittsburgh, Pennsylvania, 584 F.2d
1297, 1302 (3d Cir. 1978). The fourth amendment may be violated when the State fails to
quickly return information contained in a mirrored hard drive that is not within the scope of
the warrant. See Veloz, 109 F. Supp. 3d at 313. “[W]hen items outside the scope of a valid
warrant are seized, the normal remedy is suppression and return of those items ***.” United
States v. Matias, 836 F.2d 744, 747 (2d Cir. 1988). It violates the fourth amendment for the
State to seize and retain all data in a mirrored hard drive regardless of whether a warrant
authorizes its seizure. See In re Search, 21 F. Supp. 3d at 10; People v. Thompson, 28 N.Y.S.3d
237, 258-59 (Sup. Ct. 2016). A New York court explained as follows:
“When a warrant is issued which authorizes a search of paper records, the government
is entitled to search the files and seize responsive material. They are not permitted to
search the files, seize responsive material and then retain files they have never
identified as relevant for multiple years, because, at some later time, they might want
to search the files again. A search warrant which authorizes a search of voluminous
digital records is no different. As Defendant’s counsel during an argument pointed out,
overseizure is ‘a courtesy that was developed for law enforcement.’ It is not a license
for the government to retain tens of thousands of a defendant’s non-relevant personal
communications to review and study at their leisure for years on end.” Thompson, 28
N.Y.S.3d at 258-59.
¶ 22 All property seized must be returned to its rightful owner once the criminal proceedings
have terminated. Cooper v. City of Greenwood, 904 F.2d 302, 304 (5th Cir. 1990); United
States v. Farrell, 606 F.2d 1341, 1343 (D.C. Cir. 1979); United States v. LaFatch, 565 F.2d
81, 83 (6th Cir. 1977). When no charges are pending against an individual, any of the
individual’s property in the possession of the State should be immediately returned to him. See
People v. Jaudon, 307 Ill. App. 3d 427, 447 (1999) (citing 725 ILCS 5/108-2 (West 1996));
People v. Jackson, 26 Ill. App. 3d 845, 848-49 (1975). After criminal proceedings conclude,
the government has no right to retain a defendant’s property. United States v. Rodriguez-
Aguirre, 264 F.3d 1195, 1213 (10th Cir. 2001). “[I]t is fundamental to the integrity of the
criminal justice process that property involved in the proceeding, against which no
Government claim lies, be returned promptly to its rightful owner.” United States v. Wilson,
540 F.2d 1100, 1103 (D.C. Cir. 1976).
¶ 23 In reviewing a trial court’s ruling on a motion to suppress, mixed questions of law and fact
are presented. People v. Jones, 215 Ill. 2d 261, 267 (2005). Findings of fact made by the trial
court will be upheld on review unless they are against the manifest weight of the evidence. Id.
at 268. However, a reviewing court remains free to undertake its own assessment of the facts
in relation to the issues presented and may draw its own conclusions when deciding what relief
should be granted. Id. Thus, we review de novo the ultimate question of whether the evidence
should have been suppressed. Id.
-5-
¶ 24 Here, there is no question that defendant had an expectation of privacy in his computer
files before his computer was confiscated by police pursuant to the search warrant issued on
July 17, 2013. See Heckenkamp, 482 F.3d at 1147; Broy, 209 F. Supp. 3d at 1053-55; Blair,
321 Ill. App. 3d at 381 (Homer, J., specially concurring). Defendant’s expectation of privacy
significantly diminished once the police took possession of the computer, and that diminished
expectation of privacy continued until his trial was complete. See Burnette, 698 F.2d at 1049;
Johnston, 789 F.3d at 942. However, once defendant’s trial was over, defendant could again
expect that he had a right to privacy in the contents of his computer. See United States v.
Hubbard, 650 F.2d 293, 303 (D.C. Cir. 1980) (“the party from whom materials are seized in
the course of a criminal investigation retains a protectible [sic] property interest in the seized
materials” because he is entitled to their return when the criminal proceedings conclude);
Thompson, 28 N.Y.S.3d at 259 (State’s unreasonable retention of an individual’s files violates
the individual’s reasonable expectation of privacy).
¶ 25 Feehan violated defendant’s right to privacy when he searched defendant’s EnCase file
without a warrant in March 2014. While police lawfully created the EnCase file to forensically
examine defendant’s hard drive, they were not entitled to retain the entire EnCase file
indefinitely. See Premises Known as 608 Taylor Avenue, 584 F.2d at 1302. Rather, police were
required to examine the contents of the mirrored hard drive and retain only those files that fit
within the scope of the July 17, 2013, warrant. See Matias, 836 F.2d at 747; Veloz, 109 F.
Supp. 3d at 313; In re Search, 21 F. Supp. 3d at 10; Thompson, 28 N.Y.S.3d at 258-59. While
police could retain the relevant files throughout defendant’s trial, once defendant’s trial ended,
police were not entitled to retain any portion of the EnCase file, much less the entire file. See
Jaudon, 307 Ill. App. 3d at 447; Jackson, 26 Ill. App. 3d at 848-49; Rodriguez-Aguirre, 264
F.3d at 1213.
¶ 26 Because police had no authority to retain possession of the EnCase file after defendant’s
criminal trial ended, Feehan’s warrantless search of the EnCase file violated defendant’s fourth
amendment rights.
¶ 27 B. Good-Faith Exception
¶ 28 “The fourth amendment is silent about suppressing evidence obtained in violation of its
command.” People v. Martin, 2017 IL App (1st) 143255, ¶ 38 (citing Davis v. United States,
564 U.S. 229, 236 (2011)). The exclusionary rule “was created by the Supreme Court to
‘compel respect for the constitutional guaranty.’ ” Id. (quoting Davis, 564 U.S. at 236).
Application of the exclusionary rule is not automatic following a fourth amendment violation.
People v. LeFlore, 2015 IL 116799, ¶ 22. Rather, the exclusionary rule should be applied only
when it can achieve its purpose, which is to deter future fourth amendment violations. Id.
¶ 29 When the circumstances show that the police acted with an objectively reasonable good-
faith belief that their conduct was lawful, there is no illicit conduct to deter. Id. ¶ 24. In
determining whether the good-faith exception applies, a court must ask “whether a reasonably
well trained officer would have known that the search was illegal” in light of “all of the
circumstances.” United States v. Leon, 468 U.S. 897, 922 n.23 (1984). Once a defendant proves
a violation of the fourth amendment, the State has the burden to prove the good-faith exception
applies. People v. Morgan, 388 Ill. App. 3d 252, 264 (2009). Whether the good-faith exception
to the exclusionary rule applies presents a legal question that is reviewed de novo. People v.
Manzo, 2018 IL 122761, ¶ 67.
-6-
¶ 30 Section 114-12(b)(2)(i) of the Code of Criminal Procedure of 1963 (725 ILCS 5/114-
12(b)(2)(i) (West 2016)) provides that a peace officer acts in “ ‘[g]ood faith’ ” when he obtains
evidence “pursuant to a search or an arrest warrant obtained from a neutral and detached judge,
which warrant is free from obvious defects other than non-deliberate errors in preparation and
contains no material misrepresentations by any agent of the State, and the officer reasonably
believed the warrant to be valid.” The State concedes that the July 17, 2013, warrant “did not
authorize Feehan’s search, as that warrant had already been executed and, after investigation
and criminal proceedings, defendant was acquitted.” However, the State argues that Feehan
reasonably believed that he could rely on the eight-month-old warrant to justify his search of
defendant’s EnCase file. We disagree.
¶ 31 At defendant’s trial, Feehan testified that he has been a police officer for more than 20
years and a forensic examiner for 17 years. When he requested defendant’s EnCase file, he
knew that defendant had been acquitted of the sexual assault charges against him and that no
new charges had been filed. He also knew that defendant’s EnCase file was created when
defendant’s computer was seized eight months earlier pursuant to the warrant issued in
defendant’s sexual assault case. Because the warrant issued in July 2013 had been executed
and the charges stemming from the files found pursuant to that warrant were no longer pending,
Feehan should have known that police had no right to retain, much less search, the EnCase file.
See Jaudon, 307 Ill. App. 3d at 447; Jackson, 26 Ill. App. 3d at 848-49; Rodriguez-Aguirre,
264 F.3d at 1213. We find that no reasonably trained officer would conclude that he could
perform a warrantless search of a mirrored hard drive that he had no right to possess following
the termination of the criminal case against defendant. Had Feehan obtained a search warrant
prior to searching the EnCase file, the good-faith exception would likely apply. See Ganias,
824 F.2d at 225. Because Feehan failed to do so, the good-faith exception does not apply.
¶ 32 With no basis for avoiding the exclusionary rule, we find that the evidence in this case
should have been suppressed. Thus, we reverse defendant’s conviction and remand for further
proceedings.
¶ 33 III. CONCLUSION
¶ 34 The judgment of the circuit court of Peoria County is reversed and the cause is remanded.
¶ 35 Reversed and remanded.
¶ 36 JUSTICE WRIGHT, dissenting:
¶ 37 The majority holds defendant’s computer tower and the information harvested from the
computer tower’s hard drive should have been returned to defendant immediately once the
criminal proceedings terminated with defendant’s acquittal in Peoria County case No. 13-CF-
741 on March 19, 2014. Based on the unique procedural facts of this case, I respectfully
disagree and would affirm defendant’s conviction in Peoria County case No. 14-CF-282.
¶ 38 A. Peoria County Case No. 13-CF-741
¶ 39 As the majority states, the trial judge, Judge Lyons, denied defendant’s oral motion for the
return of confiscated property in a previous criminal prosecution in Peoria County case No. 13-
-7-
CF-741 on March 19, 2014, the date of the acquittal. 1 After Judge Lyons denied the oral
request for the return of confiscated property, defendant filed a written motion for the return
of the confiscated property in Peoria County case No. 13-CF-741. As the majority notes in its
decision, the written motion was never ruled upon by the trial court. To me, until the written
motion to return confiscated property is disposed of or withdrawn in Peoria County case
No. 13-CF-741, that case has not been concluded.
¶ 40 Assuming for the sake of argument that the majority is correct and the acquittal concluded
the criminal proceedings in Peoria County case No. 13-CF-741, the trial judge’s denial of
defendant’s oral motion now stands as law of the case and represents an unappealable court
order. Respectfully, I submit that our court lacks jurisdiction to review any ruling in Peoria
County case No. 13-CF-741 absent a notice of appeal in that case.
¶ 41 B. Peoria County Case No. 14-CF-282
¶ 42 Turning to the instant appeal in Peoria County case No. 14-CF-282, I emphasize that Judge
Brown’s findings of fact have not been challenged by defendant for purposes of Peoria County
case No. 14-CF-282. It is uncontested that the copy of defendant’s hard drive contained in the
EnCase file remained in the continuous possession of law enforcement at the time Feehan
viewed the images at issue. The trial court also determined that Feehan examined a copy of the
hard drive contained in an existing police file on March 24, 2014.
¶ 43 The court further noted that the 2013 seizure of information had “been approved for search
and seizure by a neutral magistrate when the warrant was issued in 2013.” Importantly, the
court made an express finding that Feehan’s examination of a copy of this EnCase file on
March 24, 2014, was “within the scope of the [2013] original warrant.” This finding has not
been challenged. Once Feehan made this discovery of images while conducting an internal
investigation of the alleged misconduct of an officer, it is undisputed that Feehan stopped his
investigation and obtained another search warrant to proceed with the investigation in 2014.
For purposes of this appeal, defendant does not challenge the validity of either the 2013 or the
2014 search warrant.
¶ 44 After careful review of this record, I conclude that Judge Brown’s findings of fact are not
contrary to the evidence. I wholeheartedly agree with Judge Brown’s analysis based on the
court’s well-documented findings of fact. For the sake of clarity, I agree that Feehan was
merely reviewing information that had already been lawfully seized by another detective and
made a part of that police officer’s working file. Based on this record, I also agree with Judge
Brown’s conclusion that defendant’s reasonable expectation of privacy was not violated for
fourth amendment purposes because those expectations were diminished once defendant
lawfully lost possession of the computer tower pursuant to the 2013 search warrant.
¶ 45 I would be remiss if I did not recognize the exemplary efforts put forth by Judge Brown in
this matter. Judge Brown meticulously documented his findings of fact and carefully recited
each step of his analysis in a comprehensive, written, court order. This order made the record
submitted for our review easily digestible. In fact, I could not have restated the applicable law
supporting the trial judge’s decision any better than the trial judge did in this case.
Consequently, I would affirm the trial judge’s ruling.
1
According to Judge Brown’s written order in Peoria County case No. 14-CF-282, the property,
namely the computer tower, was in the possession of the circuit clerk.
-8-