United States v. Luke Wilson

FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, No. 18-50440 Plaintiff-Appellee, D.C. No. v. 3:15-cr-02838-GPC-1 LUKE NOEL WILSON, Defendant-Appellant. OPINION Appeal from the United States District Court for the Southern District of California Gonzalo P. Curiel, District Judge, Presiding Argued and Submitted November 15, 2019 Pasadena, California Filed September 21, 2021 Before: Marsha S. Berzon and Paul J. Watford, Circuit Judges, and Robert H. Whaley, * District Judge. Opinion by Judge Berzon * The Honorable Robert H. Whaley, United States District Judge for the Eastern District of Washington, sitting by designation. 2 UNITED STATES V. WILSON SUMMARY ** Criminal Law The panel vacated a conviction for possession and distribution of child pornography, reversed the district court’s denial of a motion to suppress, and remanded for further proceedings in a case in which the panel addressed whether the government’s warrantless search of the defendant’s email attachments was justified by the private search exception to the Fourth Amendment. As required by federal law, Google reported to the National Center for Missing and Exploited Children (NCMEC) that the defendant had uploaded four images of apparent child pornography to his email account as email attachments. No one at Google had opened or viewed the defendant’s email attachments; its report was based on an automated assessment that the images the defendant uploaded were the same as images other Google employees had earlier viewed and classified as child pornography. Someone at NCMEC then, also without opening or viewing them, sent the defendant’s email attachments to the San Diego Internet Crimes Against Children Task Force, where an officer ultimately viewed the email attachments without a warrant. The officer then applied for warrants to search both the defendant’s email account and his home, describing the attachments in detail in the application. ** This summary constitutes no part of the opinion of the court. It has been prepared by court staff for the convenience of the reader. UNITED STATES V. WILSON 3 The private search doctrine concerns circumstances in which a private party’s intrusions would have constituted a search had the government conducted it and the material discovered by the private party then comes into the government’s possession. Invoking the precept that when private parties provide evidence to the government on their own accord, it is not incumbent on the police to avert their eyes, the Supreme Court formalized the private search doctrine in Walter v. United States, 447 U.S. 649 (1980), which produced no majority decision, and United States v. Jacobson, 466 U.S. 109 (1984), which did. The panel held that the government did not meet its burden to prove that the officer’s warrantless search was justified by the private search exception to the Fourth Amendment’s warrant requirement. The panel wrote that both as to the information the government obtained and the additional privacy interests implicated, the government’s actions here exceed the limits of the private search exception as delineated in Walter and Jacobsen and their progeny. First, the government search exceeded the scope of the antecedent private search because it allowed the government to learn new, critical information that it used first to obtain a warrant and then to prosecute the defendant. Second, the government search also expanded the scope of the antecedent private search because the government agent viewed the defendant’s email attachments even though no Google employee—or other person—had done so, thereby exceeding any earlier privacy intrusion. Moreover, on the limited evidentiary record, the government has not established that what a Google employee previously viewed were exact duplicates of the defendant’s images. And, even if they were duplicates, such viewing of others’ digital communications would not have violated the defendant’s expectation of privacy in his images, as Fourth Amendment 4 UNITED STATES V. WILSON rights are personal. The panel concluded that the officer therefore violated the defendant’s Fourth Amendment right to be free from unreasonable searches when he examined the defendant’s email attachments without a warrant. COUNSEL Devin Burstein (argued), Warren & Burstein, San Diego, California, for Defendant-Appellant. Peter Ko (argued), Assistant United States Attorney; Helen H. Hong, Chief, Appellate Section, Criminal Division; Robert S. Brewer, Jr., United States Attorney; United States Attorney’s Office, San Diego, California; for Plaintiff- Appellee. Jennifer Lynch and Andrew Crocker, Electronic Frontier Foundation, San Francisco, California; Jennifer Stisa Granick, American Civil Liberties Union Foundation, San Francisco, California; Brett Max Kaufman and Nathan Freed Wessler, American Civil Liberties Union Foundation, New York, New York; for Amici Curiae Electronic Frontier Foundation and American Civil Liberties Union Foundation. Marc Rotenberg, Alan Butler, and Megan Iorio, Electronic Privacy Information Center, Washington, D.C., for Amicus Curiae Electronic Privacy Information Center (EPIC). Ryan T. Mrazik, Erin K. Earl, and Rachel A.S. Haney, Perkins Coie LLP, Seattle, Washington, for Amici Curiae Google LLC and Facebook, Inc. UNITED STATES V. WILSON 5 OPINION BERZON, Circuit Judge: We once again consider the application of the Fourth Amendment’s warrant requirement to new forms of communication technology. See, e.g., United States v. Cano, 934 F.3d 1002 (9th Cir. 2019); cf. Carpenter v. United States, 138 S. Ct. 2206 (2018). “When confronting [such] concerns wrought by digital technology, th[e] [Supreme] Court [and this court] ha[ve] been careful not to uncritically extend existing precedents.” Id. at 2222. Our question this time concerns the private search exception to the Fourth Amendment—specifically, the intersection between electronic communications providers’ control over material on their own servers and the Fourth Amendment’s restriction of warrantless searches and seizures, which limits only governmental action. See Burdeau v. McDowell, 256 U.S. 465 (1921); Walter v. United States, 447 U.S. 649 (1980); United States v. Jacobsen, 466 U.S. 109 (1984). The events giving rise to Luke Wilson’s conviction and this appeal were triggered when Google, as required by federal law, reported to the National Center for Missing and Exploited Children (NCMEC) that Wilson had uploaded four images of apparent child pornography to his email account as email attachments. No one at Google had opened or viewed Wilson’s email attachments; its report was based on an automated assessment that the images Wilson uploaded were the same as images other Google employees had earlier viewed and classified as child pornography. Someone at NCMEC then, also without opening or viewing them, sent Wilson’s email attachments to the San Diego Internet Crimes Against Children Task Force (ICAC), where an officer ultimately viewed the email attachments without a warrant. The officer then applied for warrants to search 6 UNITED STATES V. WILSON both Wilson’s email account and Wilson’s home, describing the attachments in detail in the application. Our question is whether the government’s warrantless search of Wilson’s email attachments was justified by the private search exception to the Fourth Amendment. See Walter, 447 U.S. at 655–56; Jacobsen, 466 U.S. at 113–14. For the reasons that follow, we hold that it was not. We therefore reverse the district court’s denial of Wilson’s motion to suppress and vacate Wilson’s conviction. I. Background A. Google’s Identification of Apparent Child Pornography Electronic communication service providers are not required “affirmatively [to] search, screen, or scan” for apparent violations on their platforms of federal child pornography laws. 18 U.S.C. §§ 2258A(f), 2258E. But “[i]n order to reduce . . . and . . . prevent the online sexual exploitation of children,” such providers, including Google, are directed, “as soon as reasonably possible after obtaining actual knowledge” of “any facts or circumstances from which there is an apparent violation of . . . child pornography [statutes],” to “mak[e] a report of such facts or circumstances” to NCMEC. 18 U.S.C. § 2258A(a). 1 NCMEC then forwards what is known as a CyberTip to the 1 “A provider that knowingly and willfully failed to make a report required . . . shall be fined.” 18 U.S.C. § 2258A(e). Further, in the case of “intentional, reckless, or other misconduct,” there may be “a civil claim or criminal charge against a provider . . . arising from the performance of the reporting or preservation responsibilities.” Id. at §§ 2258B(a), (b). UNITED STATES V. WILSON 7 appropriate law enforcement agency for possible investigation. Id. at §§ 2258A(a)(1)(B)(ii), (c). According to a two-page declaration from a senior manager at Google, the company “independently and voluntarily take[s] steps to monitor and safeguard [its] platform,” including using a “proprietary hashing technology” to identify apparent child pornography. 2 As described in the record—vaguely, and with the gaps noted—the process works as follows: First, a team of Google employees are “trained by counsel on the federal statutory definition of child pornography and how to recognize it.” Neither the training materials themselves nor a description of their contents appear in or are attached to the Google manager’s declaration. Second, these employees “visually confirm[]” an image “to be apparent child pornography.” According to an industry classification standard created by various electronic service providers, there are four industry categorizations: “A1” for a sex act involving a prepubescent minor; “A2” for a lascivious exhibition involving a prepubescent minor; “B1” for a sex act involving a pubescent minor; and “B2” for a lascivious exhibition involving a pubescent minor. Third, “[e]ach offending image” judged to be “apparent child pornography as defined in 18 USC § 2256” is given a hash value, which is “added to [the] repository of hashes.” 2 “A hash value is (usually) a short string of characters generated from a much larger string of data (say, an electronic image) using an algorithm.” United States v. Ackerman, 831 F.3d 1292, 1294 (10th Cir. 2016). 8 UNITED STATES V. WILSON As far as the record shows, Google “stores only the hash values” of images identified as apparent child pornography, not the actual images. The government does not represent otherwise. Finally, Google “[c]ompare[s] these hashes to hashes of content uploaded to [their] services.” The exact manner in which hash values are assigned to either the original photographs or the ones deemed to replicate them is not described in the Google manager’s declaration or anywhere else in the record. B. Government Search On June 4, 2015, Google, using its propriety technology, “became aware” that Wilson had attached to emails in his email account—which may or may not have been sent—four files that included apparent child pornography. United States v. Wilson, No. 3:15-cr-02838-GPC, 2017 WL 2733879, at *3 (S.D. Cal. June 26, 2017). In compliance with its reporting obligations, Google automatically generated and sent an electronic CyberTipline report to NCMEC. The CyberTipline report included Wilson’s four email attachments. According to the Google manager’s declaration, “a Google employee did not view the images . . . concurrently to submitting the report to NCMEC.” The CyberTipline report did specify that Google had classified each of Wilson’s four email attachments as “A1” under an industry classification standard for “content [which] contain[s] a depiction of a prepubescent minor engaged in a sexual act.” Google’s report included Wilson’s email address, secondary email address, and IP addresses. NCMEC supplemented Google’s report with geolocation information UNITED STATES V. WILSON 9 associated with Wilson’s IP addresses, but did “not open[] or view[] any uploaded files submitted with this report.” NCMEC then forwarded the CyberTip to the San Diego Internet Crimes Against Children Task Force (“ICAC”). Agent Thompson, a member of the San Diego ICAC, received the report. He followed San Diego ICAC procedure, which at the time called for inspecting the images without a warrant whether or not a Google employee had reviewed them. 3 After Agent Thompson looked at Wilson’s four email attachments, he applied for a search warrant of Wilson’s email account. His affidavit asserted that probable cause for the warrant was based on two facts: first, that “Google became aware of four (4) image files depicting suspected child pornography;” and second, that he had “reviewed the four (4) images reported by Google to NCMEC and determined they depict child pornography.” In support of his own child pornography assessment, he included in the warrant application detailed “descriptions of each of these images.” The affidavit did not include the fact that Google had originally classified the images as “A1” or provide any detail about how Google had either classified or later automatically identified Wilson’s images as apparent child pornography. On the basis of the application and affidavit submitted by Agent Thompson, a magistrate judge issued a search 3 Agent Thompson testified that San Diego ICAC, which includes both local, county, regional, and federal agencies, now obtains a search warrant before opening a CyberTip when the provider has not viewed the images. It is not clear from the record whether other ICAC task forces across the country have adopted the same policy. 10 UNITED STATES V. WILSON warrant for Wilson’s email account. When Agent Thompson executed the warrant, he discovered numerous email exchanges in which Wilson received and sent images and video files of alleged child pornography and in which Wilson offered to pay for the creation of child pornography. Agent Thompson then obtained a search warrant for Wilson’s residence. On executing the warrant, law enforcement officers found and seized several electronic devices that contained evidence of child pornography. One officer observed a backpack being tossed over Wilson’s balcony at the time officers were knocking on Wilson’s door and announcing their presence. Wilson’s checkbook and a thumb drive containing thousands of images of child pornography—including the four images reported by Google—were found in the backpack. C. Motion to Suppress Wilson filed a motion to suppress all evidence seized from his email account and residence, arguing that Agent Thompson’s review of his email attachments without a warrant was impermissible under the Fourth Amendment. Relying principally on Jacobsen, 466 U.S. 109, and United States v. Tosti, 733 F.3d 816 (9th Cir. 2013), the government maintained in response that Agent Thompson’s review of the four images did not exceed the scope of Google’s private search and so, under the private search doctrine as enunciated in Jacobsen and Tosti, was valid without a warrant. The district court agreed. The court denied Wilson’s motion to suppress on the ground that the government’s warrantless search did not exceed the scope of the antecedent private search and so did not require a warrant. The district court also concluded that “if [Agent] Thompson’s UNITED STATES V. WILSON 11 warrantless viewing of the four images constituted an illegal search, neither excising the tainted evidence from the affidavit nor the good faith exception would prevent operation of the exclusionary rule.” 4 Wilson, 2017 WL 2733879, at *12–13. After waiving his right to a jury trial, Wilson was convicted of possession and distribution of child pornography 5 and sentenced to 11 years of incarceration and 4 The government does not contest these contingent rulings. 5 While this appeal was pending, the California Court of Appeal held that “the government’s warrantless search of Wilson’s four images was permissible under the private search doctrine.” People v. Wilson, 56 Cal. App. 5th 128, 147 (2020), as modified on denial of reh’g (Nov. 6, 2020), review denied (Jan. 20, 2021). We have not squarely addressed the preclusive effect of the denial of a suppression motion in an earlier state- court proceeding. Other circuits, however, have held that “the government may not collaterally estop a criminal defendant from relitigating an issue against the defendant in a different court in a prior proceeding.” United States v. Harnage, 976 F.2d 633, 636 (11th Cir. 1992); accord United States v. Pelullo, 14 F.3d 881, 896 (3d Cir. 1994); United States v. Gallardo-Mendez, 150 F.3d 1240, 1244 (10th Cir. 1998). Citing those cases, we came to the similar conclusion that, in criminal trials, the government “may not use collateral estoppel to establish, as a matter of law, an element of an offense or to conclusively rebut an affirmative defense on which the Government bears the burden of proof beyond a reasonable doubt.” United States v. Smith-Baltiher, 424 F.3d 913, 920 (9th Cir. 2005) (quoting United States v. Arnett, 353 F.3d 765, 766 (9th Cir. 2003) (en banc) (per curiam)). We need not definitively resolve the preclusion question as it relates to a motion to suppress, here, as the government has not asserted collateral estoppel, so the argument is waived. Harbeson v. Parke Davis, Inc., 746 F.2d 517, 520 (9th Cir. 1984) (“The United States was unaware that Mr. Wilson had raised the same issue in his state appeal until the letter filed in this case by [defense counsel] on October 16, 2020.”). 12 UNITED STATES V. WILSON 10 years of supervised release for each count, to run concurrently. 6 II. Discussion The government does not dispute for purposes of this case Wilson’s assertion that Agent Thompson’s review of his email attachments was a search within the meaning of the Fourth Amendment. We proceed on that assumption as well—that is, we assume that Wilson had a subjective expectation of privacy in his email attachments that society is prepared to recognize as reasonable, see Kyllo v. United States, 533 U.S. 27, 33 (2001) (citing Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan, J., concurring)); see also United States v. Miller, 982 F.3d 412, 427 (6th Cir. 2020) (taking the same approach); cf. United States v. Ackerman, 831 F.3d 1292, 1308 (10th Cir. 2016) (holding that when the government views email attachments it is a “search” for Fourth Amendment purposes under both an expectation-of- privacy and a trespass-to-chattels theory). 7 Our question, then, is whether Agent Thompson was permitted to look at Wilson’s email attachments under the private search 6 Wilson maintains that the district court did not obtain a valid waiver of his right to a jury trial, as required by Fed. R. Crim. P. 23(a). Because we vacate Wilson’s conviction and reverse the district court’s denial of Wilson’s motion to suppress, we do not reach this issue. 7 Because we hold that the government’s warrantless search violated Wilson’s privacy-based Fourth Amendment rights, we do not consider Wilson’s alternative argument that the government’s search violated his property-based Fourth Amendment rights. See Carpenter v. United States, 138 S. Ct. 2206, 2269 (2018) (Gorsuch, J. dissenting) (“[F]ew doubt that e-mail should be treated much like the traditional mail it has largely supplanted—as a bailment in which the owner retains a vital and protected legal interest.”). UNITED STATES V. WILSON 13 exception, such that the Fourth Amendment did not require him to procure a warrant. We review the district court’s denial of Wilson’s motion to suppress de novo and the district court’s underlying factual findings for clear error. See United States v. Camou, 773 F.3d 932, 937 (9th Cir. 2014); see also United States v. Mulder, 808 F.2d 1346, 1348 (9th Cir. 1987). A. Private Search Exception As the Fourth Amendment protects individuals from government actors, not private ones, see Burdeau v. McDowell, 256 U.S. 465 (1921), a private party may conduct a search that would be unconstitutional if conducted by the government. The private search doctrine concerns circumstances in which a private party’s intrusions would have constituted a search had the government conducted it and the material discovered by the private party then comes into the government’s possession. Invoking the precept that when private parties provide evidence to the government “on [their] own accord[,] … it [i]s not incumbent on the police to . . . avert their eyes,” Coolidge v. New Hampshire, 403 U.S. 443, 489 (1971), the Supreme Court formalized the private search doctrine in a pair of decisions about four decades ago: Walter v. United States, 447 U.S. 649 (1980), which produced no majority decision, and United States v. Jacobsen, 466 U.S. 109 (1984), which did. 1. Doctrinal Foundations Beginning from the initial articulation of the private search doctrine, the extent to which it excuses the government from compliance with the warrant requirement of the Fourth Amendment has been the subject of concern. The exception has, for example, been described as 14 UNITED STATES V. WILSON “unsettling” for its potential reach. 1 Wayne R. LaFave, Search and Seizure: A Treatise on the Fourth Amendment §1.8(b) (6th ed. 2020); see also Jacobsen, 466 U.S. at 129– 34 (White, J., concurring in part and concurring in judgment). On examination, however, the history of the exception confirms that it is, in truth, a narrow doctrine with limited applications. Beginning with Burdeau, the Supreme Court has distinguished between government agents and private parties for purposes of the Fourth Amendment. Burdeau considered whether the Fourth Amendment restricts the government’s ability to use papers incriminating an individual when those papers were volunteered to the government by a private party who had stolen them. Burdeau disregarded the private theft, noting that although “[t]he Fourth Amendment gives protection against unlawful searches and seizures, . . . its protection applies to governmental action.” 256 U.S. at 475. Coolidge, decided 50 years after Burdeau, addressed whether a private party who provides the government with another person’s contraband or evidentiary material can be considered an agent of the government for purposes of the Fourth Amendment. In that case, local police officers arrived at a suspect’s home, questioned his wife about his involvement in a murder, and obtained from his wife a rifle and articles of clothing belonging to the suspect. Coolidge, 403 U.S. at 446, 486. The opinion does not explain whether the suspect’s wife had proper possession of the items. The Court stated only that, had the suspect’s wife, “wholly on her own initiative, sought out her husband’s guns and clothing and then taken them to the police station to be used as evidence against him, there can be no doubt under [Burdeau] that the articles would later have been admissible in UNITED STATES V. WILSON 15 evidence.” Id. at 487. The relevant inquiry, according to the Court, was whether the suspect’s wife, “in light of all the circumstances of the case, must be regarded as having acted as an instrument or agent of the state when she produced her husband’s belongings.” Id. (internal quotation marks omitted). As the record showed that the suspect’s wife had shared the suspect’s guns and clothes with the local police “of her own accord,” Coolidge held that “it was not incumbent on the police to stop her or avert their eyes” when offered the critical evidence. Id. at 489. 2. Doctrinal Scope Following Burdeau and Coolidge, both Walter and Jacobsen considered a warrantless government search after a private party “freely made available” certain information for the government’s inspection. Jacobsen, 466 U.S. at 119– 20 (citing Coolidge, 403 U.S. at 487–90). Together, the cases determined that an antecedent private search excuses the government from obtaining a warrant to repeat the search but only when the government search does not exceed the scope of the private one. That is, “[t]he additional invasions of respondents’ privacy by the government agent must be tested by the degree to which they exceeded the scope of the private search.” Id. at 115. In Walter, a package of obscene films was mistakenly delivered to the wrong recipient. 447 U.S. at 651. The recipient opened the external packaging and examined the boxes containing individual films. Id. at 651–52. Each box displayed “suggestive drawings” on one side and “explicit descriptions of the contents” of the film on the other. Id. at 652. After reading these descriptions, and “attempt[ing] without success to view portions of the film by holding it up to the light,” the recipient notified the FBI about the mistaken delivery. Id. The FBI then seized the boxes and 16 UNITED STATES V. WILSON screened one of the films without first obtaining a warrant. Id. Walter did not result in a majority opinion, but a majority of the justices concluded that there had been a violation of the Fourth Amendment, and a different majority of justices agreed on the standard to be applied. Justice Stevens, joined by Justice Stewart, announced the judgment of the Court. Their opinion concluded that the government search exceeded the scope of the antecedent actions by the private individuals in two respects. First, the government agents had screened the film for the purpose of learning information necessary to determine that a crime had been committed: It is perfectly obvious that the agents’ reason for viewing the films was to determine whether their owner was guilty of a federal offense. To be sure, the labels on the film boxes gave them probable cause to believe that the films were obscene and that their shipment in interstate commerce had offended the federal criminal code. . . . [But] a search of the contents of the films . . . was necessary in order to obtain the evidence which was to be used at trial. Id. at 654. Second, the government agents had gone beyond the physical bounds of the private search, because “the private party had not actually viewed the films.” Id. at 657. “The private search [thus] merely frustrated [the] expectation [of privacy] in part,” not in full. Id. at 659. “It UNITED STATES V. WILSON 17 did not simply strip the remaining unfrustrated portion of that expectation of all Fourth Amendment protection.” Id. 8 The four justices in dissent would have concluded that there was no Fourth Amendment violation. The dissenters disputed not the basic approach of Justice Stevens’ opinion but its application to the facts of the case. Specifically, the dissent stressed that “[t]he containers . . . clearly revealed the nature of their contents,” such that the private employees “so fully ascertained the nature of the films . . . [that] the FBI’s subsequent viewing of the movies . . . was not an additional search subject to the warrant requirement.” Id. at 663–64 (Blackmun, J., dissenting, joined by Burger, C.J., and Powell and Rehnquist, JJ.). Four years after Walter, the Supreme Court again applied the private search doctrine. Importantly, Jacobsen recognized “the agreement [in Walter] on the standard to be applied in evaluating the relationship between the two searches.” 466 U.S. at 117 n.12. Jacobsen concerned a government search of a Federal Express (“FedEx”) package that had been partially opened by FedEx employees. See 466 U.S. at 111. While examining a damaged package, the FedEx employees “opened the 8 Justice Marshall concurred only in the judgment. Justice White, joined by Justice Brennan, concurred, noting that “the packages already had been opened, and the Government saw no more than what was exposed to plain view.” Walter, 447 U.S. at 661 (White, J., concurring in part and concurring in judgment). Although Justice Stevens emphasized that the private parties had not screened the film, see id. at 657 & n.9, the concurring justices would have found a Fourth Amendment violation even if the private parties had done so, as “a private screening of the films would not have destroyed petitioners’ privacy interest in them.” Id. at 662. 18 UNITED STATES V. WILSON package,” “cut open the tube” within the package, and “found a series of four zip-lock plastic bags, the outermost enclosing the other three and the innermost containing about six and a half ounces of white powder.” Id. The employees “observed . . . white powder in the innermost plastic bag,” but did not open the (presumably transparent) bag. Id. Instead, they called the Drug Enforcement Administration (DEA), put the plastic bags back in the tube, and placed the tube back in the box. Id. When DEA agents arrived, they did two things: First, to visually inspect the contents of the plastic bags, DEA agents removed the tube from the box and the plastic bags from the tube. See id. Second, federal agents “opened each of the four bags and removed a trace of the white substance with a knife blade.” Id. at 111–12. They performed a field test to determine whether the powder in the plastic bags was cocaine. See id. Jacobsen considered whether the private search exception as adopted by a majority of justices in Walter applied to the facts at hand. In doing so, Jacobsen, like Justice Stevens’ opinion in Walter, looked at both the degree to which the government’s actions led to observing new information not uncovered by the private search and the extent to which the government’s investigation intruded on the package owner’s privacy interests to a greater degree than had the private party’s actions. As to the first parameter, the information gleaned by the government, Jacobsen permitted the government agent to “reexamine”—that is, examine in the same manner—the package previously examined by FedEx, the private party. The government “could utilize the [private] employees’ testimony concerning the contents of the package,” noted Jacobsen; “[p]rotecting the risk of misdescription . . . is not protected by the Fourth UNITED STATES V. WILSON 19 Amendment.” 466 U.S. at 119. As to the second parameter, the additional impairment of privacy interests, Jacobsen emphasized that the private search exception turns on parity with the impact of the private search: “[O]nce frustration of the original expectation of privacy occurs, the Fourth Amendment does not prohibit governmental use of the now- nonprivate information.” Id. at 117. Applying these precepts, Jacobsen concluded that the “removal of the plastic bags from the tube and the [government] agent’s visual inspection of their contents” did not exceed the scope of the private search as to the information obtained. Id. at 120. “[T]he agent[s] . . . learn[ed] nothing [from those actions] that had not previously been learned during the private search” and conveyed to the federal agents by the FedEx employees. Id. And as to the privacy interests, the governmental search to that point “infringed no legitimate expectation of privacy and hence was not a ‘search’ within the meaning of the Fourth Amendment,” id., as “[t]he package itself, which had previously been opened, remained unsealed, and the Federal Express employees had invited the agents to examine its contents,” such that “the package could no longer support any expectation of privacy,” id. at 121. Jacobsen then separately considered the chemical field test, conducted by the DEA agents, including the federal agents’ removal of the white powder from the plastic bag. Critically for our purposes, Jacobsen began this inquiry from the premise that because the field test “had not been conducted by the Federal Express agents,” it “therefore exceeded the scope of the private search.” Id. at 122 (emphasis added). The majority then determined that the government’s chemical field test of the substance in the properly seized plastic bags was nonetheless not a search 20 UNITED STATES V. WILSON within the meaning of the Fourth Amendment, because “governmental conduct that can reveal whether a substance is cocaine, and no other arguably ‘private’ fact, compromises no legitimate privacy interest.” Id. at 122–23. This conclusion, Jacobsen explained, was “dictated” by the Court’s earlier decision in United States v. Place, 462 U.S. 696 (1983), “in which the Court held that subjecting luggage to a ‘sniff test’ by a trained narcotics detection dog was not a ‘search’ within the meaning of the Fourth Amendment.” Jacobsen, 466 U.S. at 123. B. Application of the Private Search Exception to This Case The government bears the burden to prove Agent Thompson’s warrantless search was justified by the private search exception to the Fourth Amendment’s warrant requirement. Before considering the private search exception, Coolidge emphasized “the most basic constitutional rule” in the Fourth Amendment arena: warrantless searches are per se unreasonable, subject to few exceptions that are “jealously and carefully drawn.” 403 U.S. at 454–55. Accordingly, “[t]he burden is on those seeking the exemption.” Id. at 455 (quoting United States v. Jeffers, 342 U.S. 48, 51 (1951)). The government has not met its burden here. Both as to the information the government obtained and the additional privacy interests implicated, the government’s actions here exceed the limits of the private search exception as delineated in Walter and Jacobsen and their progeny. 9 Wilson opines that the private search exception to the Fourth 9 Amendment should be overruled, and seeks to preserve that question for any Supreme Court review of this case. As a court of appeals, we of UNITED STATES V. WILSON 21 First, the government search exceeded the scope of the antecedent private search because it allowed the government to learn new, critical information that it used first to obtain a warrant and then to prosecute Wilson. Second, the government search also expanded the scope of the antecedent private search because the government agent viewed Wilson’s email attachments even though no Google employee—or other person—had done so, thereby course cannot overrule Supreme Court cases. United States v. Weiland, 420 F.3d 1062, 1079 n.16 (9th Cir. 2005) (“[W]e are bound to follow a controlling Supreme Court precedent until it is explicitly overruled by that Court.”); accord Nunez-Reyes v. Holder, 646 F.3d 684, 692 (9th Cir. 2011). We do note that the private search doctrine rests directly on the same precepts concerning the equivalence of private intrusions by private parties and the government that underlie the so-called third-party doctrine. See e.g., Smith v. Maryland, 442 U.S. 735, 744 (1979) (holding that by “voluntarily” conveying to his telephone company the phone numbers he dialed, the defendant forsook his reasonable expectation of privacy in that information); United States v. Miller, 425 U.S. 435, 442 (1976) (holding the defendant lacked a reasonable expectation of privacy in “information [he had] voluntarily conveyed to [his] bank[]” like financial statements and deposit slips). In Jacobsen, the Supreme Court reasoned that the private search exception follows from the premise, underlying the third-party doctrine, that “when an individual reveals private information to another, he assumes the risk that his confidant will reveal that information to the authorities.” 466 U.S. at 117. In recent years, however, the Court has refused to “mechanically apply[] the third- party doctrine,” stressing that “the fact of ‘diminished privacy interests does not mean that the Fourth Amendment falls out of the picture entirely.’” Carpenter, 138 S. Ct. at 2219 (quoting Riley, 573 U.S. at 392); see United States v. Jones, 565 U.S. 400, 417 (2012) (Sotomayor, J., concurring) (explaining that the third-party doctrine “is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks”); Susan Freiwald & Stephen Wm. Smith, The Carpenter Chronicle: A Near-Perfect Surveillance, 132 Harv. L. Rev. 205, 224 (2018) (noting that Carpenter “significantly narrowed the [third-party] doctrine’s scope”). 22 UNITED STATES V. WILSON exceeding any earlier privacy intrusion. Moreover, on the limited evidentiary record, the government has not established that what a Google employee previously viewed were exact duplicates of Wilson’s images. And, even if they were duplicates, such viewing of others’ digital communications would not have violated Wilson’s expectation of privacy in his images, as Fourth Amendment rights are personal. 1. Additional Information The district court analogized Agent Thompson’s review of Wilson’s email attachments to the government search in Jacobsen, concluding that Agent Thompson’s search allowed him to “learn nothing new,” because Google had already classified the images as child pornography. Wilson, 2017 WL 2733879, at *10–11. The government similarly argues on appeal that its official search did not impermissibly expand the scope of the private search because it “just confirmed what Google employees already knew and could say.” Both the district court’s conclusion and the governments’ argument misstate the record. The record indicates that Google does not keep a repository of child pornography images, so no Google employee could have shown the government the images it believed to match Wilson’s. Nor does the record identify the individual who viewed those images in the repository, so no identified Google employee “knew and could say” what those images showed. Instead, Google keeps a repository of unique hash values corresponding to illicit images, and tags each image with one of four generic labels. All Google communicated to NCMEC in its CyberTip was that the four images Wilson uploaded to his email account matched images previously identified by some Google employee at some time in the past as child pornography and classified as UNITED STATES V. WILSON 23 depicting a sex act involving a prepubescent minor (the “A1” classification). 10 Based only on the barebones CyberTip, Agent Thompson testified, he opened and reviewed each of Wilson’s images to determine “whether or not it is a case that . . . can be investigated” for violations of federal law. A detailed description of the images was then included in the applications for search warrants. The gulf between what Agent Thompson knew about Wilson’s images from the CyberTip and what he subsequently learned is apparent from those descriptions. In contrast to Google’s label of the images just as “A1,” which the government did not mention in the warrant application, the government learned the following: 1. 140005125216.jpg – This image depicts a young nude girl, approximately five (5) to nine (9) years of age, who is lying on her stomach with her face in the nude genital region of an older female who is seated with her legs spread. A second young girl, approximately five (5) to nine (9) years of age, is also visible in this image and she is partially nude with her vagina exposed. Google identified this image was uploaded on June 4, 2015, at 16:11:04 UTC. 2. 140005183260.jpg – This image depicts a young nude girl, approximately five (5) to nine (9) years of age, who is lying on top of 10 Perhaps a Google employee could also have testified to details about the company’s proprietary technology. But no such information appears in the record, and the CyberTip did not convey any more information than what is now included in the record. 24 UNITED STATES V. WILSON an older nude female, approximately eighteen years of age. Within this image the girl’s genital regions are pressed against one another and the older girl appears to be touching the face of the younger child with her tongue. Google identified this image was uploaded on June 4, 2015, at 16:11:21 UTC. 3. 140005129034.jpg – This image depicts a partially nude young girl, approximately five (5) to nine (9) years of age, who is lying on her back with her legs spread and her vagina exposed. An older female is positioned in front of this girl’s exposed vagina in this image and the younger girl has her left hand on the vaginal/buttocks area of a second nude girl of similar age. Google identified this image was uploaded on June 4, 2015, at 16:11:06 UTC. 4. 1400052000787.jpg – This image depicts a wider angle view of the previously referenced images possessing file names 140005125216.jpg and 140005129034.jpg as reported by Google. Wilson, 2017 WL 2733879, at *4–5. Given the large gap between the information in the CyberTip and the information the government obtained and used to support the warrant application and to prosecute Wilson, the government search in Walter offers a much more apt comparison to the circumstances here than does the government search in Jacobsen. Google’s categorization of Wilson’s email attachments as “A1” functioned as a label for UNITED STATES V. WILSON 25 the images in the same way that the boxes describing the films in Walter suggested that the images on the films were obscene. The “A1” labels, in fact, provided less information about the images’ contents than did the boxes in Walter, which had “explicit descriptions of the contents” of the film. 447 U.S. at 652. The “A1” labels, in contrast, specified only the general age of the child and the general nature of the acts shown. Viewing Wilson’s email attachments—like viewing the movie in Walter—substantively expanded the information available to law enforcement far beyond what the label alone conveyed, and was used to provide probable cause to search further and to prosecute. The government learned at least two things above and beyond the information conveyed by the CyberTip by viewing Wilson’s images: First, Agent Thompson learned exactly what the image showed. Second, Agent Thompson learned the image was in fact child pornography. Until he viewed the images, they were at most “suspected” child pornography. Just as it “was clearly necessary for the FBI to screen the films [in Walter], which the private party had not done, in order to obtain the evidence needed to accomplish its law enforcement objectives,” Walter, 447 U.S. at 659 n.14 (plurality), so here, to prosecute Wilson it was necessary for Agent Thompson to view the images no Google employee had opened. Id. Until Agent Thompson viewed Wilson’s images, no one involved in enforcing the child pornography ban had seen them. Only by viewing the images did the government confirm, and convey to the fact finder in Wilson’s criminal case, that they depicted child pornography under the applicable federal standard. Importantly, the district court found—and we agree— that if Agent Thompson’s affidavit in support of a warrant 26 UNITED STATES V. WILSON had been “excise[d]” of “the tainted evidence,” “the affidavit would not support issuance of the search warrant for Defendant’s email account.” Wilson, 2017 WL 2733879, at *12. 11 The district court’s findings about the inadequacy of the warrant application without the important information Agent Thompson obtained by viewing Wilson’s images demonstrate that the government learned new, critical information by viewing Wilson’s images, information “not previously . . . learned during the private search,” Jacobsen, 466 U.S. at 120. Because the government saw more from its search than the private party had seen, it exceeded the scope of the private search. 2. Additional Intrusion on Wilson’s Privacy Interest The government also maintains that directly viewing Wilson’s images for the first time was not a further invasion of Wilson’s privacy, beyond any privacy invasion by Google. The government’s expectation of privacy analysis fails for much the same reason as did its argument that it learned nothing new by viewing the images. The government’s central submission in this regard is that Wilson’s expectation of privacy in his images was fully frustrated when Google’s computer technology scanned them, such that any further government search of the images We also agree with the district court that the government might 11 have been able to demonstrate probable cause sufficient to obtain a warrant without the descriptions of Wilson’s images, by presenting, for example, more “information about Google’s screening process for child pornography,” Wilson, 2017 WL 2733879, at *12. UNITED STATES V. WILSON 27 should be exempt from the Fourth Amendment’s warrant requirement. 12 We cannot agree. Although Google’s proprietary technology labelled Wilson’s email attachments as “A1,” “the content of the [images] . . . was [no more] apparent” to Google than the image content was to the private party in Walter, as no Google employee had opened and viewed the attachments, and Google does not appear to retain any record of the original images used to generate hash matches. See Tosti, 733 F.3d at 823. Agent Thompson did not obtain a specific description of the content of Wilson’s attachments from Google, so he was not simply confirming what he had been told. Until he viewed the images, he had no image at hand at all; the entire composition was hidden. Only the image itself could reveal, for example, the number of minors depicted, their identity, the number of adults depicted alongside the minors, the setting, and the actual sexual acts depicted. Reading a label affixed to an image is a different experience entirely from looking at the image itself. To read even a detailed description, which this A1 classification was not, is still not to see. Wilson’s privacy interest was in the actual image—which could have included features in addition to child pornography—not just in its classification as child pornography. The government’s argument to the contrary mischaracterizes the record, by representing that Google’s scan “equates to a full-color, high-definition view” of Wilson’s images. It does not. The critical fact is that no Google employee viewed Wilson’s files before Agent 12 The government stated at oral argument that it is not relying on the contraband nature of child pornography as a justification for the search. 28 UNITED STATES V. WILSON Thompson did. When the government views anything other than the specific materials that a private party saw during the course of a private search, the government search exceeds the scope of the private search. That is the clear holding of Jacobsen. In that case, “[t]he field test . . . had not been conducted by the Federal Express agents and therefore exceeded the scope of the private search.” 466 U.S. at 122 (emphasis added); see supra Part II.B.1. 3. Personal Nature of the Fourth Amendment The government attempts to save its warrantless search by shifting the analysis from the private search of Wilson’s files, flagged by Google and classified as A1 by its proprietary technology, to the private search of other individuals’ files, which some Google employee previously viewed and classified as child pornography in Google’s database of hash values. The government argues that Agent Thompson’s search did not exceed the bounds of the private search because a Google employee had previously viewed different child pornography files, and Google’s computers flagged Wilson’s email attachments as containing the same images as those files, using an unspecified hash value comparison system. This line of argument cannot save the validity of the government’s search. Even if Wilson’s email attachments were precise duplicates of different files a Google employee had earlier reviewed and categorized as child pornography, both Walter and Jacobsen—and general Fourth Amendment principles—instruct that we must specifically focus on the extent of Google’s private search of Wilson’s effects, not of other individuals’ belongings, to assess whether “the additional invasions of [Wilson’s] privacy by the government agent . . . exceeded the scope of the private search.” Jacobsen, 466 U.S. at 115. UNITED STATES V. WILSON 29 To see why, consider whether Walter would have come out differently had the misdirected package come into the hands of someone who had previously viewed another copy of the same film and, recognizing the box, told the police that the film in it was, in her view, legally obscene. Under Walter, the government in the hypothesized circumstance would still need a warrant to view the film in the box. Viewing the copy of the film actually in the box, which the mistaken recipient of the box had not done, would still entail an additional governmental intrusion on both the physical integrity of the film and the owner’s privacy interest in its content. Fourth Amendment rights are personal rights. Rakas v. Illinois, 439 U.S. 128 (1978), is illustrative: Rakas held that a passenger could not challenge a police search as violative of the Fourth Amendment because he owned neither the vehicle that was searched nor the rifle found. Although the owners of each item had an expectation of privacy, the defendant did not. See id. at 134. So Wilson did not have an expectation of privacy in other individuals’ files, even if their files were identical to his files. The corollary of this principle must also be true: Wilson did have an expectation of privacy in his files, even if others had identical files. If, for example, police officers search someone else’s house and find documents evidencing wrongdoing along with notes indicating that I have identical documents in my house, they cannot, without a warrant or some distinct exception to the warrant requirement, seize my copies. I would retain a personal expectation of privacy in them, and in my connection to them, even if law enforcement had a strong basis for anticipating what my copies would contain. A violation of a third party’s privacy has no bearing 30 UNITED STATES V. WILSON on my reasonable expectation of privacy in my own documents. The government does not argue otherwise. In short, whether Google had previously reviewed, at some earlier time, other individuals’ files is not pertinent to whether a private search eroded Wilson’s expectation of privacy. Under the private search doctrine, the Fourth Amendment remains implicated “if the authorities use information with respect to which the expectation of privacy has not already been frustrated.” Jacobsen, 466 U.S. at 117 (emphasis added). C. Relevant Appellate Caselaw (i) Our application of Jacobsen and Walter is consistent with Ninth Circuit case law. The district court misapplied United States v. Tosti, 733 F.3d 816 (9th Cir. 2013), in reaching the contrary conclusion. In Tosti, a private party entrusted with the defendant’s computer found thumbnails of images believed to be child pornography and alerted law enforcement officers. 733 F.3d at 818–19. The private party showed the thumbnails to law enforcement, and the agents “could tell from viewing the thumbnails that the images contained child pornography.” Id. at 822. Tosti held that law enforcement’s enlarging of the thumbnails did not expand on the antecedent private search. For one, based on the standard articulated in Jacobsen, “the police learned nothing new through their actions.” Tosti, 733 F.3d at 822. Further, “scrolling through the images [the private party] had already viewed was not a search because any private interest in those images had been extinguished.” Id. UNITED STATES V. WILSON 31 Neither is true in this case. Here, what was conveyed to Agent Thompson was that a not-yet-viewed image uploaded by Wilson matched a different image that an unidentified Google employee had previously viewed and classified as child pornography. So until Agent Thompson actually viewed the images, he knew only that Google’s propriety technology had identified a match between Wilson’s images and other images that Google had classified as child pornography. He “learned . . . [a]new through [his] actions,” for the first time, what the images actually showed. See supra pp. 23–24. And, as no one at Google had previously viewed Wilson’s attachments, “any privacy interest in those images had [not] been extinguished.” Tosti, 733 F.3d at 822. Google’s algorithm “frustrated [Wilson’s] [privacy] expectation in part,” but it “did not . . . strip the remaining unfrustrated portion of that expectation of all Fourth Amendment protection.” Walter 447 U.S. at 659 (plurality); see also Jacobsen, 466 U.S. at 116 n.11. For these reasons, Tosti is fully consistent with our conclusion that Agent Thompson’s search exceeded the scope of the private search and so required a warrant. (ii) In so holding, we contribute to a growing tension in the circuits about the application of the private search doctrine to the detection of child pornography. In United States v. Ackerman, 831 F.3d 1292, 1294 (10th Cir. 2016), AOL automatically identified one of the defendant’s four email attachments as apparent child pornography, based on a hash value match. AOL then sent the text of the defendant’s email and all four attachments to NCMEC, where an analyst “opened the email, viewed each of the attached images, and confirmed that all four [images] (not just the one AOL’s automated filed identified) appeared to be child pornography.” Id. Ackerman emphasized that 32 UNITED STATES V. WILSON “AOL never opened the email itself. Only NCMEC did that.” Id. at 1305–06. Then-Judge Gorsuch, after holding that NCMEC is either a governmental entity or a government agent, see id. at 1308, concluded that “in at least this way [the government] exceeded rather than repeated AOL’s private search,” id. at 1305–06. Ackerman did suggest that, had the government viewed only the attachment AOL identified as a hash value match and not other attachments and the text of the defendant’s email, that distinction might “bring the government closer to a successful invocation of the private search doctrine.” Id. at 1308 (emphasis added). But Ackerman also noted that in that circumstance—which appears to be what happened here—the government’s action may still be a new search, as the government, “might . . . have risked exposing new and protected information, maybe because the hash value match could have proven mistaken . . . or because the AOL employee who identified the original image as child pornography was mistaken in his assessment.” Id. at 1306. Although Ackerman did not decide the precise issue before us, and expressly disavowed “prejudg[ing]” it, id. at 1308– 09, its underlying analysis is entirely consistent with ours, and its suggestions about why there could be a search in our circumstances echo some of the reasons we have given for so concluding. Other private search cases concerning the discovery of child pornography, outside the context of automated hash value matching, have also ruled consistently with our understanding of the limited scope of the private search exception. For example, in United States v. Lichtenberger, 786 F.3d 478 (6th Cir. 2015), the defendant’s girlfriend had discovered child pornography on his computer. She later showed his computer to the police and opened some UNITED STATES V. WILSON 33 computer files that were determined to contain child pornography. But the defendant’s girlfriend was “not at all sure whether she opened the same files with [the police] as she had opened earlier that day.” Id. at 490. As a result, the Sixth Circuit concluded that the government search exceeded the scope of the private search. This reasoning supports our result here. The record does not identify the Google analyst who could have stated that the images Agent Thompson viewed were identical to images the analyst previously viewed, nor does it explain Google’s algorithm in any detail. Given these gaps, there is no way to be “at all sure” that the images Agent Thompson viewed were the same images a Google analyst had earlier viewed, so the government search exceeded the scope of Google’s search. Further, in United States v. Sparks, 806 F.3d 1323 (11th Cir. 2015), overruled on other grounds by United States v. Ross, 963 F.3d 1056 (11th Cir. 2020), a store employee and her fiancé discovered child pornography on a lost cell phone and showed the phone to the police. The police officer ultimately viewed two videos on the cell phone, one of which the private parties “had not watched.” Id. at 1332. Because the government search exposed new information, not seen by the private party, the Eleventh Circuit concluded that the government search exceeded the scope of the private search. 13 13 Both the Fifth Circuit and the Seventh Circuit have held that an individual’s privacy interest in a digital container, such as an email account, cell phone, or laptop, is entirely frustrated whenever any part of the container is searched. See United States v. Runyan, 275 F.3d 449, 465 (5th Cir. 2001); Rann v. Atchison, 689 F.3d 832 (7th Cir. 2012). But this approach is squarely contrary to the Ninth Circuit’s approach to digital devices, has been undermined by more recent Supreme Court cases about 34 UNITED STATES V. WILSON Conversely, the Fifth and Sixth Circuits recently decided the issue before us and came to a conclusion contrary to the one we reach, although the reasoning of the two opinions diverged. The circumstances in both cases were similar to those here. See United States v. Reddick, 900 F.3d 636 (5th Cir. 2018); United States v. Miller, 982 F.3d 412, 427 (6th Cir. 2020). In both cases, after an electronic service provider flagged certain email attachments as apparent child pornography, the attachments were forwarded to a local law enforcement agency, whose officers viewed the images for the first time without a warrant. The Fifth Circuit held the private search exception justified the government’s warrantless search because the government agent’s “visual review of the suspect images . . . the scope of digital information, and is inconsistent with Jacobsen. For starters, Tosti did not regard the viewing of some files as sufficient for purposes of the private search doctrine to show that the government only invaded a defendant’s privacy interests to the same extent as the private party. See 733 F.3d at 822. More generally, and dispositively, the Ninth Circuit has not treated digital devices as unitary, such that a permissible search of one file or attachment justifies a search of a larger swatch of digital material. See United States v. Cotterman, 709 F.3d 952 (9th Cir. 2013) (en banc); United States v. Cano, 934 F.3d 1002, 1007 (9th Cir. 2019). Further, Runyan and Rann are in tension with recent Supreme Court cases, which express concern that given the “immense storage capacity” of modern technology, the Fourth Amendment will be undermined unless government searches of digital material are meaningfully confined in accord with established Fourth Amendment doctrine. Riley v. California, 573 U.S. 373, 393 (2014); see also Carpenter v. United States, 138 S. Ct. 2206, 2214 (2018). Finally, if, in Jacobsen, law enforcement officers had opened and searched not only the specific containers investigated by the FedEx employees but others included in the same box, the private search doctrine would not have applied to the still-sealed containers. There is no basis for ruling otherwise with regard to unopened digital files. Runyan and Rann were in our view wrongly decided. UNITED STATES V. WILSON 35 was akin to the government agents’ decision to conduct chemical tests on the white powder in Jacobsen,” insofar as “opening the file merely confirmed that the flagged file was indeed child pornography, as suspected.” Reddick, 900 F.3d at 639. We cannot accept this analysis for several reasons. First, and most important, Reddick conflates Jacobsen’s first holding regarding the private search exception to the Fourth Amendment with its second holding regarding whether the field test constituted a search under the Fourth Amendment. The private search exception excuses a warrantless government search that would otherwise violate the Fourth Amendment; the field test determination in Jacobsen, based on Fourth Amendment law outside the private search context, was that a warrantless government field drug test simply does not trigger the Fourth Amendment’s protections. 466 U.S. at 123–24. In other words, the warrantless chemical test in Jacobsen was not excused via the private search exception but for an entirely different reason—that confirming through a field test that an already exposed and seized contraband substance was a drug is not a search for Fourth Amendment purposes. Id. at 122. Moreover, in Jacobsen, the white powder was fully visible to the government officers when they repeated the steps taken by the FedEx employees to inspect the package. Not so here, as no human had viewed Wilson’s images before. The part of Jacobsen that does elucidate the private search doctrine cannot govern here. Notably, we have held that the chemical field test exception to the Fourth Amendment’s warrant requirement does not apply to a more complete chemical analysis of a drug. In United States v. Mulder, 808 F.2d 1346 (9th Cir. 1987), a hotel security officer removed items left behind in 36 UNITED STATES V. WILSON a hotel room after a guest’s scheduled departure, including plastic bags full of tablets, and provided them to federal agents. Id. at 1347. The tablets “were tested at the Western Regional Laboratory through the use of mass spectrometry, infrared spectroscopy and gas chromatography.” Id. at 1348. Mulder distinguished between the chemical field test in Jacobsen and a laboratory test: “[T]he chemical testing in this case was not a field test which could merely disclose whether or not the substance was a particular substance, but was a series of tests designed to reveal the molecular structure of a substance and indicate precisely what it is. Because of the greater sophistication of these tests, they could have revealed an arguably private fact,” and thus compromised the defendant’s legitimate privacy interest. Id. at 1348–49. To the extent opening an email attachment to view its contents is analogous to drug testing at all, it is akin to a laboratory test with the potential to reveal new private information, as in Mulder, not a binary field test that yields either a positive or negative result. Just as a laboratory test of a suspected drug reveals its precise molecular structure and so potentially exposes additional private information like other illicit contaminants or the source of the substance, so viewing an image of suspected child pornography reveals innumerable granular private details—for example, the faces of the people depicted, the setting, and, perhaps, other speech or conduct also in the frame. Viewing the images here allowed the government to do more than just confirm the images’ classification as child pornography, implicating privacy interests beyond a binary classification. Contrary to Reddick, the government’s “visual review of the suspect images” was not analogous to “the government agents’ decision to conduct chemical tests on the white powder in Jacobsen.” 900 F.3d at 639 (emphasis added). UNITED STATES V. WILSON 37 The Sixth Circuit recognized the error in Reddick concerning the reach of the private search holding in Jacobsen and “opt[ed] not to rely” on it. Miller, 982 F.3d at 429. As Miller points out, the government agent’s “inspection (unlike the [field] test) qualifies as the invasion of a ‘legitimate privacy interest’ unless Google’s actions had already frustrated the privacy interest in the files.” Id. Miller instead resolved the Fourth Amendment question it faced by focusing exclusively on the assumed reliability of Google’s proprietary technology. “At bottom,” Miller explained, “this case turns on the question whether Google’s hash-value matching is sufficiently reliable.” Id. at 429–30. Because the defendant in Miller “never challenged the reliability of hashing,” id. at 430 (internal brackets and quotation omitted) (Miller thought the burden was on the defendant, see id. at 430), Miller deferred to the district court’s finding “that the technology was ‘highly reliable.’” Id. Wilson, by contrast, did challenge the “accuracy and reliability” of Google’s hashing technology in the district court. And, contrary to Miller’s assertion, the government bears the burden to prove its warrantless search was permissible, see supra p. 20—a burden it failed to carry. Our analysis, however, relies only contingently on the adequacy of the record with regard to the hash match technology. In our view, the critical factors in the private search analysis, both unacknowledged in Miller, include the personal nature of Fourth Amendment rights and the breadth of essential information Agent Thompson obtained by opening the attachment, information—and a privacy invasion—well beyond what Google communicated to NCMEC. See supra Parts II.B.1, II.B.2. The reliability of Google’s proprietary technology, in our estimation, is 38 UNITED STATES V. WILSON pertinent to whether probable cause could be shown to obtain a warrant, not to whether the private search doctrine precludes the need for the warrant. And, as the district court noted, and we have noted as well, the warrant application here contained inadequate information about Google’s proprietary technology to establish probable cause without reliance on the descriptions of the actual images. See supra p. 25. III. Conclusion “When confronting new concerns wrought by digital technology, this Court has been careful not to uncritically extend existing precedents.” Carpenter, 138 S. Ct. at 2222. The government reports there were 18.4 million CyberTips in 2018, making it all the more important that we take care that the automated scanning of email, and the automated reporting of suspected illegal content, not undermine individuals’ Fourth Amendment protections. Having examined this case with the requisite care, we hold, for the reasons explained, that Agent Thompson violated Wilson’s Fourth Amendment right to be free from unreasonable searches when he examined Wilson’s email attachments without a warrant. Wilson’s conviction is vacated, the district court’s denial of Wilson’s motion to UNITED STATES V. WILSON 39 suppress is reversed, and this case is remanded for further proceedings. 14 14 As noted, the district court concluded that if Agent Thompson’s warrantless actions constituted an illegal search, no exception “would prevent operation of the exclusionary rule.” Wilson, 2017 WL 2733879, at *13. The government did not raise before us any argument to the contrary, and thus waived any challenge. See United States v. Gamboa- Cardenas, 508 F.3d 491, 502 (9th Cir. 2007).