PUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
No. 19-4755
UNITED STATES OF AMERICA,
Plaintiff - Appellee,
v.
FARUQ ROSE, a/k/a Faruq Uthman Rose,
Defendant - Appellant.
Appeal from the United States District Court for the Eastern District of North Carolina, at
Wilmington. James C. Dever III, District Judge. (7:17−cr−00069−D−1)
Argued: January 29, 2021 Decided: July 9, 2021
Before GREGORY, Chief Judge, KEENAN, and QUATTLEBAUM, Circuit Judges.
Affirmed by published opinion. Judge Keenan wrote the majority opinion, in which Judge
Quattlebaum joined. Chief Judge Gregory wrote a dissenting opinion.
ARGUED: William David Auman, AUMAN LAW OFFICES, Asheville, North Carolina,
for Appellant. Scott Andrew Lemmon, OFFICE OF THE UNITED STATES
ATTORNEY, Raleigh, North Carolina, for Appellee. ON BRIEF: Robert J. Higdon, Jr.,
United States Attorney, J. Bradford Knott, Assistant United States Attorney, OFFICE OF
THE UNITED STATES ATTORNEY, Raleigh, North Carolina, for Appellee.
BARBARA MILANO KEENAN, Circuit Judge:
This appeal involves searches of two packages at a FedEx processing facility that
were addressed to a deceased person. The defendant, Faruq Rose, the intended recipient
of those packages, asserts a Fourth Amendment right entitling him to suppression of
evidence of cocaine discovered during those searches.
Rose was convicted by a jury of (1) conspiracy to possess with intent to distribute
five kilograms or more of cocaine, in violation of 21 U.S.C. §§ 841(a)(1), (b)(1)(A), 846;
and (2) possession with intent to distribute 500 grams or more of cocaine, in violation of
21 U.S.C. § 841(a)(1), (b)(1)(B). The district court sentenced Rose to serve a 420-month
term of imprisonment and a five-year term of supervised release.
Before trial, Rose filed a motion to suppress evidence of the cocaine found in the
two searches conducted at the FedEx processing facility. Rose argued that although he was
neither the sender of, nor the named recipient on, the packages, he nonetheless had a
reasonable expectation of privacy in those packages because he was their intended
recipient. The district court denied Rose’s motion.
On appeal, Rose challenges the district court’s denial of his motion to suppress, as
well as the procedural and substantive reasonableness of his sentence. 1 Upon our review,
we conclude that the district court did not err in denying the suppression motion because,
at the time the searches were conducted, Rose did not have a reasonable expectation of
privacy in the packages. We also reject Rose’s arguments regarding the procedural and
1
Rose also contends that his counsel rendered ineffective assistance at his
suppression hearing, an issue that we address summarily later in this opinion.
2
substantive reasonableness of his sentence. Accordingly, we affirm the district court’s
judgment.
I.
Rose developed a scheme to receive packages containing illegal controlled
substances by having them delivered to a friend’s residence in North Carolina. Rose paid
his friend, Donald Ray West (West, or Donald West), to allow the packages, which were
addressed to West’s deceased brother, Ronald West, to be delivered to West’s house in
Wallace, North Carolina. Rose did not live at West’s residence. Under the delivery
arrangement with Donald West, and before delivery of the packages at issue here, Rose
successfully had obtained multiple packages addressed to Ronald West that had been
delivered to the residence. The record lacks any evidence that law enforcement was aware
of these prior deliveries at the time of the searches at issue.
After those completed deliveries, in October 2016, Drug Enforcement
Administration Task Force Officer Kevin Cornell and Guilford County Deputy Sheriff
Thomas Gordy were screening packages at the “FedEx Mid-Atlantic Hub” in Greensboro,
North Carolina (the FedEx facility), and noticed a suspicious package on the conveyor belt.
The package attracted Deputy Gordy’s attention because of the type of box, the heavy
taping used, and the sender’s location in Chandler, Arizona, which was a known “source
city” for narcotics.
The package was addressed to Ronald West and listed a phone number on the label.
After checking a law enforcement database, the officers verified that neither the phone
3
number nor the address was registered to a person named Ronald West. The officers alerted
the FedEx facility’s manager to the suspicious package, which the manager opened. The
package contained about two kilograms of cocaine.
Several minutes later, Officer Cornell spotted a second package with similar
characteristics, which also was addressed to Ronald West and had been shipped from
Chandler, Arizona. When the officers had a dog trained in narcotics detection approach
the package, the dog signaled an “alert.” Based on this alert, the officers obtained a search
warrant, opened the package, and found two more kilograms of cocaine.
Following these discoveries, law enforcement officers coordinated a controlled
delivery of both packages to West’s residence and conducted surveillance of the home.
After the packages were delivered, officers observed Rose and another man, LaVonne
Murray, arrive at West’s residence in a silver car and enter the home, before leaving shortly
thereafter. However, while at the house, neither Rose nor Murray touched the packages
that had been left on the front porch. When West later arrived at his residence, he entered
but also did not touch the packages on the porch. Later that day, Rose and Murray returned
to the residence, retrieved the packages, and departed in the silver car.
When officers tried to stop the vehicle, Rose, who was driving, attempted to evade
them. Ultimately, the silver car collided head-on with an unmarked police car in a parking
lot.
After the officers arrested Rose and informed him of his Miranda rights, he waived
his right to remain silent. Rose explained that the packages contained cocaine, and that he
4
was working with a drug organization to smuggle cocaine from California into North
Carolina.
Rose was indicted for (1) conspiracy to possess with intent to distribute five
kilograms or more of cocaine, in violation of 21 U.S.C. § 841(a)(1) and (b)(1)(A) and 21
U.S.C. § 846; and (2) possession with intent to distribute 500 grams or more of cocaine in
violation of 21 U.S.C. § 841(a)(1) and (b)(1)(B). He filed a motion to suppress the
evidence found during the searches of the packages at the FedEx facility.
Before the hearing on the motion to suppress, Rose’s counsel indicated that he
intended to call Donald West as a witness. However, after a recess, counsel informed the
court that he had changed his mind despite Rose’s objection to the change in plans. As the
hearing began, Rose’s counsel informed the court that Rose wanted to have different
counsel appointed, explaining that Rose viewed West as a necessary witness. The court
responded by explaining that Rose’s disagreement with counsel’s tactical choice did not
justify appointing new counsel, especially because present counsel was Rose’s fifth
attorney in the case.
When Rose’s counsel attempted to introduce an affidavit executed by West, the
court refused to admit it because West had not been called to testify as a witness. The court
ultimately denied Rose’s motion to suppress, concluding that Rose did not have an
objectively reasonable expectation of privacy in the two packages at the time they were
searched.
Before trial, Rose claimed that his counsel was ineffective at the suppression hearing
in his approach to challenging the search and in his examination of the government’s
5
witnesses. When Rose requested that new counsel be appointed, the court noted Rose’s
prior difficulties with his several attorneys and asked whether present counsel wished to
remain in the case. After counsel responded that Rose refused to listen to him, the court
granted Rose’s request for a new attorney. However, Rose’s difficulties continued with
another attorney who represented Rose at trial.
After the district court conducted a jury trial, the jury convicted Rose on both
charges. The United States Probation Office prepared a presentence report (PSR), in which
the probation officer computed a total offense level of 42 and a criminal history category
of VI, resulting in a United States Sentencing Guidelines (U.S.S.G.) range of 360 months
to life imprisonment. Relevant to this appeal, Rose’s offense level included a two-level
enhancement under U.S.S.G. § 3B1.1(c) for being a leader or organizer of the offenses.
The district court overruled Rose’s objection to the enhancement, explaining that Rose
managed or supervised Donald West by coordinating the deliveries of the controlled
substances to Donald West’s address, planning logistics, and recruiting West to participate
in the scheme.
The court reviewed the factors listed in 18 U.S.C. § 3553(a) in determining Rose’s
sentence. The court noted that: (1) Rose had been convicted of serious offenses; (2) he had
an extensive criminal history that included violent offenses; (3) he had a limited
employment history; and (4) he had attempted to obstruct justice by his conduct at the
suppression hearing and at the trial. As examples of Rose’s obstructionist conduct, the
probation officer detailed in the PSR Rose’s actions convincing Donald West to sign a false
affidavit and encouraging him to provide false testimony at trial. In imposing the sentence
6
of 420 months’ imprisonment and a five-year term of supervised release, the court noted
that if it had “in any way miscalculated the advisory guideline range,” it would “impose
the same sentence as an alternative variant sentence.” Rose appeals from the district court’s
judgment.
II.
A.
We first consider Rose’s assertion that the district court erred in denying his motion
to suppress. His argument is based on the simple, but incorrect, premise that because he
was the intended recipient of the two packages addressed to Ronald West, he had a
reasonable expectation of privacy in those packages.
We review a district court’s denial of a motion to suppress by considering
“conclusions of law de novo and underlying factual findings for clear error.” United States
v. Fall, 955 F.3d 363, 369-70 (4th Cir. 2020) (citation omitted). The Fourth Amendment
protects individuals from unreasonable searches and seizures. U.S. Const. amend. IV. In
determining whether a defendant has a valid basis for challenging a search, we must decide
whether he had an individualized expectation of privacy that was “objectively reasonable.”
United States v. Castellanos, 716 F.3d 828, 832 & n.3 (4th Cir. 2013). Absent an
objectively reasonable expectation of privacy in the items searched, an individual cannot
claim protection under the Fourth Amendment. United States v. Bullard, 645 F.3d 237,
242 (4th Cir. 2011); see also Rakas v. Illinois, 439 U.S. 128, 143 (1978). The defendant
bears the burden of showing a reasonable expectation of privacy in the property searched.
7
United States v. Gray, 491 F.3d 138, 144 (4th Cir. 2007) (citing Rawlings v. Kentucky, 448
U.S. 98, 104 (1980)).
In deciding whether a defendant has a reasonable expectation of privacy in property
not in his possession at the time of the search, “we consider such factors as ‘whether that
person claims an ownership or possessory interest in the property, and whether he has
established a right or taken precautions to exclude others from the property.’” 2
Castellanos, 716 F.3d at 834 (quoting United States v. Rusher, 966 F.2d 868, 875 (4th Cir.
1992)). In other words, to establish a reasonable expectation of privacy, a defendant must
identify evidence objectively establishing his ownership, possession, or control of the
property at issue. Id.; see also United States v. Stokes, 829 F.3d 47, 53 (1st Cir. 2016)
(noting the factors relevant to determining reasonable expectation of privacy include
“ownership, possession and/or control; historical use of the property searched or the thing
seized; ability to regulate access; the totality of the surrounding circumstances; the
existence or nonexistence of a subjective anticipation of privacy; and the objective
reasonableness of such an expectancy under the facts of a given case” (citation omitted)).
When considering these factors, we focus on the defendant’s established connection to the
property at the time the search was conducted. See United States v. Ferebee, 957 F.3d 406,
416 (4th Cir. 2020) (recognizing that reasonable expectation of privacy is determined as of
2
As the Supreme Court has explained, “[e]xpectations of privacy protected by the
Fourth Amendment . . . need not be based on a common-law interest in real or personal
property. . . . Still, property concepts are instructive in determining the presence or absence
of the privacy interests protected by that Amendment.” Byrd v. United States, 138 S. Ct.
1518, 1526 (2018) (citation and quotations omitted).
8
the time of the search); see also United States v. Jacobsen, 466 U.S. 109, 115 (1984) (“The
reasonableness of an official invasion of the citizen’s privacy must be appraised on the
basis of the facts as they existed at the time that the invasion occurred.”).
Sealed envelopes and packages generally enjoy a high degree of privacy and, thus,
courts have long recognized that the Constitution protects against unreasonable searches
and seizures of sealed mail. United States v. Givens, 733 F.2d 339, 341 (4th Cir. 1984)
(per curiam) (citing Ex parte Jackson, 96 U.S. 727, 733 (1878)). Both senders and
recipients of letters and other sealed packages ordinarily have a legitimate expectation of
privacy in those items even after they have been placed in the mail. United States v. Van
Leeuwen, 397 U.S. 249, 251 (1970) (citing Jackson, 96 U.S. at 733); see also Stokes, 829
F.3d at 52.
When a sealed package is addressed to a party other than the intended recipient,
however, that recipient does not have a legitimate expectation of privacy in the package
absent other indicia of ownership, possession, or control existing at the time of the search.
See Givens, 733 F.2d at 342; see also Stokes, 829 F.3d at 52 (noting that courts are
“reluctant to find that a defendant holds a reasonable expectation of privacy in mail where
he is listed as neither the sender nor the recipient, at least absent some showing by the
defendant of a connection”); United States v. Smith, 39 F.3d 1143, 1145 (11th Cir. 1994)
(concluding that the defendant did not have a protected privacy interest in the contents of
an envelope when he was not the sender or addressee); United States v. Daniel, 982 F.2d
146, 149 (5th Cir. 1993) (per curiam) (explaining that the defendant did not have a
legitimate expectation of privacy in a box of narcotics that was not addressed to him);
9
United States v. Koenig, 856 F.2d 843, 846 (7th Cir. 1988) (concluding that one of the
defendants had no privacy right in a package when he was neither the sender nor the
addressee of the package).
Nonetheless, “[i]ndividuals may assert a reasonable expectation of privacy in
packages addressed to them under fictitious names.” Castellanos, 716 F.3d at 834
(alteration in original) (quoting United States v. Villarreal, 963 F.2d 770, 774 (5th Cir.
1992)). In that alleged circumstance, to demonstrate a reasonable expectation of privacy,
the defendant must provide evidence that the fictitious name is an established alias. Id.
Our decision in Givens applied these principles and is controlling in the present case.
733 F.2d 339. In Givens, the defendants, Debbie and Gary Givens, challenged the search
of a package containing cocaine that was not addressed to them, but was addressed to
another individual, Debbie Starks. 3 Id. at 340. Law enforcement officers earlier had
learned that a shipment of drugs would be arriving at an airport in West Virginia and
observed that a package addressed to Debbie Starks fit the description of the anticipated
shipment. Id. Based on this information, the officers searched the package and found
cocaine inside. Id. Before the search, but after law enforcement received the tip, the
defendants attempted to retrieve the package from the airport but were told that the delivery
had been delayed. Id. When Debbie Givens later took possession of the package, she was
arrested. Id.
The package was addressed to “Midwest Corporation, Union Building, Charleston,
3
West Virginia; Att: Debbie Starkes [sic].” Givens, 733 F.2d at 340.
10
We held that the defendants did not have a reasonable expectation of privacy to
challenge the search. Id. at 342. Even though they were the intended recipients of the
package containing cocaine, we noted that the package was not addressed to them or to any
established alter egos. Id. at 341. Critically, we explained that at the time the search was
conducted, the defendants did not have the ability to control access to the package or to
exclude others from taking possession of it. Id. at 342. Therefore, the defendants failed to
present facts showing objective indicia of ownership, possession, or control of the package,
foreclosing their ability to challenge the search. See id. at 341-42.
Like the defendants in Givens, Rose did not have a reasonable expectation of
privacy in the packages addressed to Ronald West because, at the time of the searches,
there were no objective indicia that Rose owned, possessed, or exercised control over the
packages. See Jacobsen, 466 U.S. at 115; Stokes, 829 F.3d at 53. Nothing about the
packages, including the sender’s name, the named recipient, the address, or the phone
number listed on the packages signaled in an objective sense that Rose had a protected
interest in the packages. The packages were addressed to a deceased individual at a
residence lacking any established connection to Rose. Moreover, at the time of the
searches, Rose had not taken possession of the packages.
We disagree with Rose’s contention that the Supreme Court’s decision in Byrd v.
United States, 138 S. Ct. 1518 (2018), requires a different result here. In Byrd, the Supreme
Court concluded that a defendant had a reasonable expectation of privacy in a rented
vehicle even when he was not listed as an authorized driver of the vehicle because, at the
time of the search, he had lawful possession and control of the rental car. Id. at 1524, 1531.
11
The present facts and circumstances, however, are materially different from those
in Byrd. Rose did not have possession of the packages at the time of the searches, and
nothing in the record demonstrates that he would have been able to gain possession of the
packages at the FedEx facility. See United States v. Pitts, 322 F.3d 449, 456-57 (7th Cir.
2003) (holding that a defendant lacking the proper identification did not have a protected
interest in a mailed package bearing a false return address and a fictitious name). 4 Because
the two packages bore another person’s name and lacked objective indicia connecting Rose
to the packages as the intended recipient, he would not have been able to exercise at the
FedEx facility any ownership rights or control over the packages. See Stokes, 829 F.3d at
53.
Contrary to Rose’s arguments, his subjective interest as the intended recipient of the
packages is insufficient on its own to warrant protection under the Fourth Amendment.
Instead, a party’s subjective interest in a package must be accompanied by reasonable,
objective indicia of a possessory interest. This possessory interest does not require
ownership; instead, there can be other evidence establishing possession and control. See
Castellanos, 716 F.3d at 834. Thus, we find no merit in Rose’s attempt to divert from this
4
In Pitts, the Seventh Circuit explained that the defendant did not have a reasonable
expectation of privacy in a parcel after he shipped that parcel without any legitimate means
of retrieving it; he used a false return address and did not have identification matching the
false name included on the mailing label. 322 F.3d at 456-57. While the court concluded
that Pitts did not have a reasonable expectation of privacy in the package because the
property was abandoned, id., the reasoning in Pitts nonetheless supports our conclusion
that because Rose lacked any legitimate means of retrieving the package from the FedEx
facility, and did not have a right of possession or control over the package, he did not have
a reasonable expectation of privacy in the package.
12
required analysis by relying on his subjective intent to receive the packages. See United
States v. Pierce, 959 F.2d 1297, 1303 (5th Cir. 1992) (concluding that even if the defendant
claimed he was the intended recipient of a package that was not sent by or addressed to
him, and was received by another person, that fact would not be enough to demonstrate a
reasonable expectation of privacy). Absent any ability to exercise ownership, possession,
or control of the packages at the time of the searches, Rose had no greater privacy interest
in the packages than an airport bystander. Accordingly, on the facts before us, we reject
Rose’s effort to establish a privacy interest based solely on his intent of future possession.
Our conclusion likewise is not altered by the fact that Rose previously had collected
from West’s home multiple packages addressed to Ronald West using the same delivery
scheme. Rose’s limited use of this deceased, third party’s name does not establish that
Rose used “Ronald West” as an alias or was commonly known by that name. 5 Castellanos,
716 F.3d at 834 (“In the absence of evidence that Castenada was Castellanos’ alter ego or
a fictious name, the case is more closely aligned” with Givens, 733 F.2d at 341). The
record contains no evidence that anyone recognized Rose by the name Ronald West, nor
did any evidence show that Rose used the name Ronald West regularly under different
circumstances. We therefore conclude that the district court did not err in denying the
5
We agree with the dissent that the use of a false name on a package, standing alone,
may not undermine a reasonable expectation of privacy. However, more is needed to
establish a reasonable expectation of privacy in a package not bearing the defendant’s name
than the defendant’s subjective intent to receive the package. See Givens, 733 F.2d at 342;
Stokes, 829 F.3d at 52.
13
motion to suppress because Rose failed to establish an expectation of privacy in the two
packages at issue. 6
B.
We next consider Rose’s challenge to the procedural reasonableness of his sentence.
According to Rose, the district court erred in applying the two-level leadership
enhancement under U.S.S.G. § 3B1.1(c). In considering whether a district court properly
calculated a defendant’s Guidelines range, including the court’s application of any
sentencing enhancements, we review the court’s legal conclusions de novo and its factual
findings for clear error. United States v. Pena, 952 F.3d 503, 512 (4th Cir. 2020). We also
have explained that we will not vacate a sentence “based on an alleged Guidelines error if
we can determine from the record that the error is harmless.” United States v. Doctor, 958
F.3d 226, 238 (4th Cir. 2020).
We observe that Rose’s Guidelines range would not have changed absent the
leadership enhancement. Without that enhancement, his total offense level would have
been reduced from 42 to 40. A total offense level of 40, combined with his criminal history
category of VI, would have subjected Rose to the same Guidelines range of 360 months to
life imprisonment considered by the district court in this case. See U.S.S.G. ch. 5, pt. A
6
As noted above, Rose also contends that his counsel was ineffective for failing to
call Donald West as a witness at the suppression hearing and for not allowing Rose to
testify at that hearing. Claims of ineffective assistance of counsel will only be considered
on direct appeal when the record conclusively shows that counsel was ineffective. United
States v. Benton, 523 F.3d 424, 435 (4th Cir. 2008). Only in the most unusual case will the
record satisfy this requirement. Here, because the record does not establish conclusively
that counsel rendered ineffective assistance, we decline to consider Rose’s claim.
14
(sentencing table). Accordingly, we hold that, even if the court erred in applying the
leadership enhancement, that error was harmless and Rose’s sentence was procedurally
reasonable. See United States v. Kobito, 994 F.3d 696, 704 (4th Cir. 2021); United States
v. Donadeo, 910 F.3d 886, 904 n.7 (6th Cir. 2018) (“Any error would also have been
harmless as either way [the defendant] is subject to the same guideline range” (internal
quotation and citation omitted)).
C.
Next, we address Rose’s argument that his sentence is not substantively reasonable.
Rose contends that the district court’s comments at sentencing reflect that the court did not
act impartially in determining his sentence. Rose takes issue with the district court’s
statements that: (1) Rose will “reap the consequences of choosing to attempt to obstruct
justice,” an apparent reference to Rose’s attempt to convince Donald West to present false
testimony and Rose’s instruction that West submit a false affidavit; and (2) Rose was
“belliger[ent]” and repeatedly tried to delay proceedings by interrupting court hearings and
by firing multiple attorneys. Rose submits that these comments demonstrated the court’s
bias, which affected the length of his sentence. We disagree with Rose’s argument.
We generally review a sentence under a “deferential abuse-of-discretion standard.”
United States v. McDonald, 850 F.3d 640, 643 (4th Cir. 2017) (quoting Gall v. United
States, 552 U.S. 38, 41 (2007)). In considering whether a sentence is substantively
reasonable, we review “the totality of the circumstances to see whether the sentencing court
abused its discretion in concluding that the sentence it chose satisfied the standards set forth
in § 3553(a).” United States v. Gomez-Jimenez, 750 F.3d 370, 383 (4th Cir. 2014) (quoting
15
United States v. Mendoza-Mendoza, 597 F.3d 212, 216 (4th Cir. 2010)). We presume that
a sentence is reasonable if it is within a properly calculated Guidelines range. United States
v. Vinson, 852 F.3d 333, 357 (4th Cir. 2017).
We hold that the district court’s comments concerning Rose’s actions and behavior
do not establish that the court was biased and, thus, we conclude that the court’s comments
did not impact the reasonableness of Rose’s sentence. See Liteky v. United States, 510 U.S.
540, 555-56 (1994) (explaining that expressions of impatience, dissatisfaction, annoyance,
and even anger do not usually constitute bias). Rather than showing bias, the court’s
comments regarding Rose’s repeated interruptions and attempts to obstruct justice were
justified based on the present record. Moreover, none of the court’s comments manifested
an “inability to render fair judgment.” Id. at 551.
Our review of the record also shows that the district court took care in addressing
the sentencing factors under 18 U.S.C. § 3553(a). The court expressly considered the
seriousness of Rose’s offenses, his lengthy criminal history that included violent offenses,
and his limited employment history, before concluding that a term of 420 months’
imprisonment and five years of supervised release was appropriate. And, as we already
have noted, Rose received a sentence within his Guidelines range. Therefore, we hold that
Rose has not rebutted the presumption that his sentence is substantively reasonable. See
Vinson, 852 F.3d at 357.
III.
For these reasons, we affirm the district court’s judgment.
16
AFFIRMED
17
GREGORY, Chief Judge, dissenting:
In United States v. Castellanos, 716 F.3d 828 (4th Cir. 2013), we addressed a
so-called “Fourth Amendment standing” issue like the one this case presents, concerning
the use of an alias in connection with an illicit shipment. The dissent cautioned that the
majority misapplied the expectation of privacy inquiry. “We are all familiar with the old
legal saw: ‘When the facts are against you, hammer the law. When the law is against you,
hammer the facts. When both are against you, hammer the table and yell like hell.’” Id. at
836–37 (Davis, J., dissenting) (quoting In re Fischer, 131 B.R. 137, 138 (E.D. Mo. 1990)).
“The facts and the law cannot be ignored in this appeal. Nor can the pounding they take
from the majority denude them of the power they possess.” Id. (Davis, J., dissenting).
This case is distinct, and so it presents us with an opportunity to clarify the doctrine.
Unfortunately, the law and the facts take another hammering instead. But here, too, that
pounding cannot strip them of their power. Law enforcement officers opened a package
that was mailed to the Defendant, Faruq Rose, under a false name. Rose had a legitimate
expectation of privacy in the mailing, despite his use of an alias, and the officers violated
his Fourth Amendment rights by searching it without a warrant. Because the Majority’s
contrary conclusions misconstrue the law and misapply the facts, I respectfully dissent.
I.
A Fourth Amendment challenge may be raised only by those whose rights were
violated by the search itself, not those who are merely affected by the introduction of
unlawfully discovered evidence. United States v. Gray, 491 F.3d 138, 144 (4th Cir. 2007).
18
The person claiming Fourth Amendment protection must show they had a legitimate
expectation of privacy in the invaded place or thing. Id. To be “legitimate,” the privacy
expectation must be objectively reasonable, often meaning it “flow[s] from a ‘source
outside of the Fourth Amendment, either by reference to concepts of real or personal
property law or to understandings that are recognized and permitted by society.’” Id.
(quoting Minnesota v. Carter, 525 U.S. 83, 89 (1998)). The defendant must prove their
privacy interest by a preponderance of the evidence. Castellanos, 716 F.3d at 833.
There is a long-standing recognition that “[l]etters and other sealed packages are in
the general class of effects in which the public at large has a legitimate expectation of
privacy.” United States v. Jacobsen, 466 U.S. 109, 114 (1984) (citing United States v. Van
Leeuwen, 397 U.S. 249, 251 (1970); Ex parte Jackson, 96 U.S. 727, 733 (1878)); see also
United States v. Givens, 733 F.2d 339, 341 (4th Cir. 1984) (per curiam) (“Sealed packages
are, of course, entitled to Fourth Amendment protection against warrantless searches and
seizures, just as any other private area.”). The expectation covers senders and recipients
alike. See Givens, 733 F.2d at 341.
In this case, as the Majority describes, police officers at a FedEx facility searched
two suspicious packages destined for Rose, the first without a warrant. The evidence at
the suppression hearing established the following facts. Rose was a middleman in a drug
distribution conspiracy, responsible for receiving drugs from a supplier, driving them to a
buyer in North Carolina, and then driving the proceeds from their sale to his higher-up in
Pennsylvania. [See J.A. 272–75, 295]. Rose offered to pay Donald West—his long-time
acquaintance, as Rose had been close friends with West’s deceased brother, Ronald West—
19
for permission to use West’s home address to receive packages, and West accepted. [J.A.
139–40]. As part of their deal, Rose required that West not touch the packages when they
were delivered. [J.A. 140]. Rose arranged for the supplier to mail packages to Donald
West’s address, addressed to “Ronald West.” [Id.]. Packages were delivered to West’s
house under this arrangement at least three times before the delivery that was intercepted
by the police. [Id.] Each time, packages were delivered to West’s front porch, West did
not touch them, Rose retrieved them, and Rose paid West per package, either $25, $50, or
a personal amount of drugs. [Id.]
When police intercepted the packages at issue here, Rose immediately gave a full
confession after failing to evade arrest. See [J.A. 270–79; see also] J.A. 271 (“He was
adamant about talking, he wanted to talk, he wanted to talk, very adamant about wanting
to cooperate.”). While still in the police car, Rose claimed ownership of the packages.
[Id.] He explained that they were sent for him to receive at West’s address, and belonged
to him, not West. [Id.] A separate set of officers interviewed West, who also said that the
packages belonged to Rose, and that West granted Rose permission to receive them at the
address. [J.A. 210–11, 226].
In the face of this evidence, the district court concluded Rose had no legitimate
privacy expectation in the searched package because it bore “no link” to Rose while in
transit. J.A. 145. The Majority agrees, pronouncing: “When a sealed package is addressed
to a party other than the intended recipient, . . . that recipient does not have a legitimate
expectation of privacy in the package absent other indicia of ownership, possession, or
control existing as of the time of the search.” Maj. Op. at 8–9. And Rose could not claim
20
to “be” the phony name listed on the package because “the defendant must provide
evidence that the fictitious name is an established alias.” Maj. Op. at 10, 12. Finally, the
Majority regarded much of the evidence as irrelevant to “the time of the search.” See Maj.
Op. at 11–12. This reasoning rides roughshod over the law and the facts. It improperly
demands formal property interests, misapplies our precedents regarding aliases, and warps
the evidentiary standard that governs Fourth Amendment standing.
A.
First, the Majority errs in concluding that Rose had no privacy expectation in the
package because it bore no “objective indicia” of his “ownership, possession, or control.”
To support this conclusion, the Majority and district court rely heavily on the idea that Rose
“would not have been able to retrieve the package[]” from FedEx, who held the package at
the time of the search, “because he would not have been able to produce any evidence or
identification to show that he was Ronald West” and “would have had no way to assert an
ownership or possessory interest in the packages.” J.A. 145; see also Maj. Op. at 11–12
(“[N]othing in the record demonstrates that he would have been able to gain possession of
the packages at the FedEx facility.”).
But Rose does not have to prove anything to FedEx to prove he had an expectation
of privacy in the package FedEx was handling. The Supreme Court has long made clear
that “a person need not always have a recognized common-law property interest in the
place searched to be able to claim a reasonable expectation of privacy in it.” Byrd v. United
States, 138 S. Ct. 1518, 1526 (2018); Rakas v. Illinois, 439 U.S. 128, 144 & n.12 (1978).
Rather, “property concepts” are “instructive” to identifying objectively reasonable
21
expectations of privacy. Byrd, 138 S. Ct. at 1526. They analogously “guide” the inquiry,
serving as a proxy for widely held privacy norms. See id.
For example, in the context of a home search, the Fourth Amendment “does not
shield only those who have title to the searched premises,” Mancusi v. DeForte, 392 U.S.
364, 367 (1968) (emphasis added); instead, its protection may reach boarders, McDonald
v. United States, 335 U.S. 451 (1948), tenants, Chapman v. United States, 365 U.S. 610
(1961), co-owners or roommates, Georgia v. Randolph, 547 U.S. 103 (2006), and even
houseguests, Minnesota v. Olson, 495 U.S. 91 (1990). Byrd provides another example:
there, the Supreme Court held that the unauthorized driver of a rental car had a reasonable
privacy expectation in the vehicle. 138 S. Ct. at 1527. Though the driver lacked any formal
property interest, she could still exercise property-like rights over the car; for instance, she
could “exclude third parties from it, such as a carjacker.” Id. at 1528–29.
Rose did not own the package in the eyes of FedEx, but he did have at least informal
ownership, control, and possession rights in the eyes of everyone else involved. The sender
intended Rose to receive the package. Rose chose its destination, arranging to use West’s
porch. Rose took possession of the package, just as he had for the packages previously
delivered under the same arrangement. Rose also forbade West from touching the
packages, and West complied. Thus, property “concepts” indicate that Rose had at least
informal, property-like interests in the searched object, establishing his legitimate privacy
expectation. See id. at 1527–29 (“[One] will in all likelihood have a legitimate expectation
of privacy by virtue of the right to exclude.”) (internal quotations omitted); see also
Castellanos, 716 F.3d at 834 (considering “whether th[e] person claims an ownership or
22
possessory interest in the property, and whether he has established a right or taken
precautions to exclude others from the property”) (emphases added). By relying on his
ability to prove ownership to the third party holding the searched object, the Majority
effectively mandates formal property rights, which “it is by now well established” are not
necessary. See Byrd, 138 S. Ct. at 1527.
Furthermore, Rose had a reasonable privacy expectation entirely aside from
property concepts. Rose’s evidence established that he was the “recipient” of the packages
as pieces of mail, and a privacy interest attaches with that status. Indeed, the sender and
recipient’s privacy interests in mailings continue “even after they have been placed in the
mail,” Maj. Op. at 9. Yet the Majority reasoned that Rose did not establish this status
because the packages lacked “indicia of” Rose’s “ownership, possession, or control” at the
time of the search. This rule improperly blends two alternative grounds which could give
rise to a reasonable privacy expectation, muddling the doctrine. See Gray, 491 F.3d at 144
(considering “either . . . concepts of real or personal property law or . . . understandings
that are recognized and permitted by society”) (emphases added).
When we look for “indicia of ownership, possession, or control,” we are applying
property concepts to identify a property-like interest in the searched place or thing, which
almost always means a legitimate privacy expectation follows. See Byrd, 138 S. Ct. at
1527–29. That inquiry is unrelated to the privacy expectation that senders and recipients
of mail are entitled to, which is simply an “understanding[] that [is] recognized and
permitted by society.” See Gray, 491 F.3d at 144; see also Jacobsen, 466 U.S. at 114
(proclaiming, broadly and generally, that “the public at large has a legitimate expectation
23
of privacy” in the mail). The two often go hand-in-hand, surely, but rejecting Rose’s status
as the recipient due to insufficient evidence of property rights improperly makes a
property-based interest a necessary condition. There was plenty of evidence here
indicating the package was mailed to Rose, despite its address label.
The Majority’s authorities contradict its conclusion. The Majority cites United
States v. Pitts, 322 F.3d 449, 456–57 (7th Cir. 2003) for its conclusion that the inability to
take possession of the packages from FedEx undermined Rose’s privacy interest. Maj. Op.
at 11–12. And Pitts did refer to the fact that the defendant needed “proper identification
. . . to retrieve the package” he sent by express mail, and because he used an alias, he would
not have been unable to do so. 322 F.3d at 456–57. However, Pitts decided—“[b]ecause
[he] could not retrieve the package and [his co-defendant] refused to accept it”—that the
defendant therefore lacked Fourth Amendment standing on abandonment grounds. See id.
Pitts then specifically held that the use of an alias did not undermine the defendant’s
privacy expectation. See id. at 457–59 (concluding that “[the defendants] had a right to
use false names in sending and receiving mail,” and “the expectation of privacy for a person
using an alias . . . is one that society is prepared to recognize as reasonable”).
Abandonment is not at issue here, as Rose never refused acceptance of his packages; he
took possession of them and claimed ownership. The Majority misapplies Pitts’
abandonment reasoning to require property-based evidence for the mail-based privacy
expectation.
Similarly, the Majority strips United States v. Givens of its context. There, the
defendants purchased cocaine through the mail, using “an intermediary” to receive the
24
shipment and then deliver them the drugs. 733 F.2d at 340. Givens held that the defendants
had no privacy interest in the mailing as the intended downstream recipients of its contents.
Id. at 340–42 (rejecting “the proposition that when A sends a package to B, the contents of
which are ultimately intended for C, that C is entitled to claim a privacy interest in the
contents of the package”). The Majority cites Givens as supporting its rule: “Critically,
. . . the defendants did not have the ability to control access to the package or to exclude
others from taking possession of it. Therefore, the defendants failed to present facts
showing objective indicia of ownership, possession, or control . . ., foreclosing their ability
to challenge the search.” See Maj. Op. at 10–11 (internal citations omitted) (citing Givens,
733 F.3d at 341–42).
But the property discussion in Givens flowed from the Court’s initial conclusion
that the defendants had no mail-based interest. The package was mailed to an “actual third
part[y]” and that intermediary was its true “recipient.” See Givens, 733 F.3d at 341–42.
Only then did the Court also conclude, for the same reason, that the defendants had no
property-type interests in the package. See id. (assuming that “defendants had some
possessory interest in the cocaine,” that interest “did not broaden to encompass the mailing
envelope”) (emphases added). The defendants’ attempt to claim property interests in
someone else’s package was like claiming “privacy in the trunk of another’s car.” Id. By
shipping their drugs to an intermediary, they “relinquished control over the area in which
the drugs they claim an interest in were secreted.” Id.
The difference in this case is obvious. There is no third-party intermediary here.
Castellanos, 716 F.3d at 848 (Davis, J., dissenting) (“The distinction between the use of a
25
third party as an addressee, and the use of an alias disguising the true identity of the
addressee, cannot be overstated.”). Rose was the intended recipient of the mailing, not just
its contents. “An individual who is not the sender cannot assert an expectation of privacy
in a mailing addressed to an actual third party because the privacy right, and thus any
Fourth Amendment challenge, belongs to that third party.” Id. (Davis, J., dissenting)
However, when “the individual asserting the expectation of privacy is in fact the addressee
but has disguised his true identity by using an alias, he retains an expectation of privacy in
the object, and the right to bring a Fourth Amendment challenge to the search or seizure of
that object.” Id. (Davis, J., dissenting); see also United States v. Johnson, 584 F.3d 995,
1002 (10th Cir. 2009) (“[T]here is a fundamental difference between merely using an alias
to receive a package and using another’s identity.”).
The Majority glosses over this dispositive difference, applying Givens as
“controlling in the present case.” See Maj. Op. at 10–12. The Majority emphasizes that
the Givens defendants’ inability to “show[] objective indicia of ownership” and “exclude
others from taking possession” counted against their privacy expectations. Id. Yet the
Majority ignores that they lacked those abilities specifically because the mailing at issue
was sent to someone else. Here, the evidence is unequivocal that the package was sent to
Rose. Rose never “relinquished control” of the mailing to an intermediary; he controlled
its delivery and excluded others from taking possession. Rose is not like a person claiming
privacy in someone else’s trunk—he claims privacy in his own package. Whether applying
the privacy expectation in mail, like Givens did first, or looking to property concepts, like
Givens did second, Rose had a legitimate expectation of privacy.
26
B.
Furthermore, the Majority’s approach is incompatible with our recognition that a
false name alone does not undermine the privacy expectation in mail. Castellanos, 716
F.3d at 834. Presumably, almost all alias-users would be unable to claim a package directly
from the mail carrier. Like the district court, the Majority adopts another rule to resolve
this contradiction: “[T]he defendant must provide evidence that the fictitious name is an
established alias.” Maj. Op. at 10, 13 (“Rose’s limited use of this deceased, third party’s
name does not establish that Rose used ‘Ronald West’ as an alias or was commonly known
by that name.”); id. (“The record contains no evidence that anyone recognized Rose by the
name Ronald West, nor did any evidence show that Rose used the name Ronald West
regularly under different circumstances.”); see also J.A. J.A. 146 (reasoning that Rose had
no “publicly-established connection” to the alias). There is no legal basis for this
requirement. We should not be the first to adopt it here.
The Majority cites Castellanos for its rule. Maj. Op. at 10. Castellanos states,
“Individuals may assert a reasonable expectation of privacy in packages addressed to them
under fictitious names.” 716 F.3d at 834 (quoting United States v. Villarreal, 963 F.2d
770, 774 (5th Cir. 1992)). Applying that premise, it found:
Castellanos adduced no evidence at the suppression hearing demonstrating
that the name ‘Wilmer Castenada’ was simply an alias. Instead, Castellanos’
position was that he and Castenada were two separate individuals engaged in
a sale transaction . . . . In the absence of evidence that Castenada was
Castellanos’ alter ego or a fictitious name, this case is more closely aligned
with [Givens], a case in which we held that a defendant lacked a legitimate
expectation of privacy in a package that was addressed to a third party.
27
Id. Nothing about this analysis supports a requirement that the defendant be “commonly
known” by the alias, or that the alias is “established” or used “regularly.” Rather, the
defendant put forward “no evidence” that he was, in fact, the person behind the name. See
id. Indeed, his position was that the name referred to an actual other person, not him. See
id. As an evidentiary matter, the defendant had not shown that he was the “recipient” of a
mailing addressed to him under an “alter ego or a fictitious name.” See id. (emphases
added). That conclusion does not relate to public recognition of the name; it requires
evidence connecting the defendant to the name at all. See id.
For its part, the district court supported its requirement of a “publicly established”
alias by citing Villarreal, the case Castellanos quoted. J.A. 146. There, the court held that
two defendants had a legitimate expectation of privacy as the “intended recipients” of two
drums concealing a shipment of marijuana. Villarreal, 963 F.2d at 772–73. The
defendants used “a fictitious name [] to ship the drums so that no one could be connected
to the marijuana in case anything went wrong.” Id. Two facts related to the alias: One of
the defendants “was in possession of the receipt for the drums that bore the [alias] name”;
and, when that defendant hired a driver to help pick up the drums, he introduced himself
by the alias. See id. The defendants had never used the false name before and used it only
in their attempt to obtain the shipment. Nothing about these two facts makes the alias
“publicly established”; arguably, the defendant used the alias less than Rose used the name
“Ronald West.”
Indeed, the Fifth Circuit expressly found it was “not clear whether [the alias] was
the alter ego of [the defendants].” Id. However, the court still concluded: “In any event,
28
[the defendants] were both the immediate recipients of the drums, and they conspired
together to get them from [the carrier],” so, “[u]nder these circumstances, and given the
ambiguity associated with the fictitious name, we find that both [defendants] had a
legitimate expectation of privacy in the drums.” Id. at 774–75. Because the defendants
were the “recipients,” the court resolved uncertainty regarding the alias in favor of a privacy
interest. See id. Ultimately, Villareal and Castellanos both show that the crux of this
inquiry is whether the evidence shows the defendant was the actual, intended “recipient.”
Our relevant cases comport with this understanding. In United States v. Hurley,
when officers discovered methamphetamine in a package addressed to a fictitious name,
we stated that “the sender and the designated recipient of a package” have a reasonable
privacy expectation. 182 F. App’x 142, 143–45 (4th Cir. 2006) (per curiam) (emphasis
added). Hurley held the defendant failed to establish that he was the recipient because: he
had never used the false name on the shipping label before; he used the false name on a
call to FedEx, but declined to pick it up because he lacked corresponding I.D.; he included
a friend’s phone number on the shipping label, not his own; and he did not live at the listed
address and did not know who did. Id. at 144–45. Prior usage and the inability to prove a
connection to the alias were relevant, but not dispositive. See id. Instead, as an evidentiary
matter, the defendant failed to establish that he was the “designated recipient.” See id.
(“Hurley has standing to contest the validity of the search only if he can demonstrate that
he was the designated recipient of the package. This he cannot do.”).
Finally, in Givens, addressed above, the defendants were the intended recipients of
the contents of a package, but not of the package itself. The Court commented on the role
29
of fake names: “[I]t is no doubt true that, had this package been addressed to the
defendants, they would have had a legitimate expectation of privacy in its contents”;
however, “the package [was] addressed neither to them nor to some entity, real or fictitious,
which is their alter ego, but to actual third parties.” 733 F.2d at 341 & n.2 (emphases
added). Thus, we acknowledged that the privacy interest would attach if the defendants
could prove they were the intended recipients of the mailing itself, merely using a fictitious
name. See id.
None of these cases required proof of an “established connection” to the alias. All
of them, however, support the conclusion that Rose showed he was the “recipient” behind
the fake name. The Castellanos defendant denied property interests, had no connection to
the address, and maintained from arrest through trial that the alias was another person. Id.
By contrast, Rose took possession of the packages, claimed his ownership, and claimed to
use the name “Ronald West.” Likewise, while the Hurley defendant had not used the false
name before, 182 F. App’x at 144, Rose had used this one at least three times. Like in this
case, the phone number on the package did not belong to the defendant, but unlike in this
case, it did belong to the defendant’s friend, creating competing evidence about who the
“recipient” of the package really was. See id. at 145. Here, while the address label was
ambiguous, the rest of the evidence points only to Rose. Most significantly, the Hurley
defendant did not know the people living at the listed address and had no permission to
receive packages there, whereas Rose had permission and the resident knew the packages
were arriving for Rose. See id. Rose established the package was addressed to him under
some fictitious name, not to “actual third parties.” Givens, 733 F.2d at 341 & n.2.
30
Beyond this absence of legal authority, the Majority’s rule has perverse effects. By
protecting only formal pseudonyms—aliases so “established” that the user is “recognized”
by it or uses it “regularly”—the rule undermines Fourth Amendment protection as to
virtually every purpose for which a person might use an alias on their mail. See Pitts, 322
F.3d at 458 (“This is a common and unremarkable practice.”). Those purposes are
reasonable and encompassed within societally recognized privacy expectations. See id.
(“There is nothing inherently wrong with a desire to remain anonymous when sending or
receiving a package, and thus the expectation of privacy for a person using an alias in
sending or receiving mail is one that society is prepared to recognize as reasonable.”).
Imagine the celebrity avoiding paparazzi; the federal judge facing heightened
security risks; the internet-user ordering from strangers; the shopper of sensitive products
avoiding prying eyes. In each instance, the alias-user reasonably intends to send or receive
their mail without revealing identifying information. To accomplish this, all would use
informal aliases that specifically do not bear a public connection to their real identity. The
same is true of receiving mail at an address aside from one’s own residence. Imagine the
family member concealing their reception of a package from those they live with—even
for a banal reason, like planning a surprise gift—or the city-dweller facing the prevalent
problem of “porch theft.” If they ship a package to their next-door neighbor’s house instead
of their own, with permission, they can reasonably expect that it still belongs to them. If
police searched the package, the actual recipient should have standing to challenge the
search, not the friend who lent their stoop. Ironically, under the Majority’s rule, the
31
alias-user’s efforts to protect their identity may end up relinquishing their privacy interests
in their mail altogether.
I recognize that, here, Rose used both a false name and someone else’s address for
a distinct purpose: to evade responsibility for drug trafficking. But we do not allow
“criminals [to] forfeit the privacy interests of all persons by using a confidential domain
for nefarious ends,” nor do we allow “[t]he illegal contents of the package [to] serve as an
after-the-fact justification for a search.” Pitts, 322 F.3d at 458–59. “Privacy expectations
do not hinge on the nature of the defendant’s activities—innocent or criminal.” United
States v. Fields, 113 F.3d 313, 321 (2d Cir. 1997). Often, we only have occasion to identify
privacy norms “precisely because the defendants were engaged in illegal activity.” Id.
Disregarding Rose’s reasonable privacy expectation because of his unlawful intentions
undermines the privacy of many law-abiding citizens.
C.
Finally, the Majority reaches its conclusions by disregarding the most probative
evidence as irrelevant to “the time of the searches.” See Maj. Op. at 11–12 (“Absent any
ability to exercise ownership, possession, or control of the packages at the time of the
searches, Rose had no greater privacy interest in the packages than an airport bystander.”)
(emphasis added); Maj. Op. at 3 (“The record lacks any evidence that law enforcement was
aware of the[] prior deliveries at the time of the searches at issue.”); J.A. 147 (“Rose cites
statements that he made to law enforcement after law enforcement apprehended him, [but]
. . . [t]he relevant inquiry is whether Rose had any claimed ownership or possessory interest
. . . at the time of the search.”). By this view, the fact that Rose could not have claimed the
32
package from the FedEx facility is effectively dispositive because that is when the search
took place. “Nothing about the packages . . . signaled in an objective sense that Rose had
a protected interest in the packages” at that time. Maj. Op. at 11.
This reasoning is simply contrary to Fourth Amendment standing doctrine. “Fourth
Amendment reasonableness is of course adjudged at the time of the search or seizure.”
United States v. Montieth, 662 F.3d 660, 668 (4th Cir. 2011). But, as to standing, this
principle only means that we consider whether the defendant’s privacy interest existed at
the relevant time. It certainly does not mean that, at the search, the evidence of those
interests must have been apparent to the searchers. See 6 Wayne R. LaFave, Search &
Seizure: A Treatise on the Fourth Amendment § 11.3 (6th ed. 2020) (“In determining
Fourth Amendment standing, as opposed to reasonableness [of a search], we do not
consider what the police officer knew at the time . . . .”). As a matter of hornbook law,
“[i]t is instead the omniscient perspective—what a judge considering a motion to suppress
knows, ex post reality—that drives standing doctrine.” Id. (internal quotations omitted).
“[The] state of mind of the searcher regarding the possession or ownership of the
item searched is irrelevant to the issue of standing.” United States v. Han, 74 F.3d 537,
535 (4th Cir. 1996) (quoting United States v. Canada, 527 F.2d 1374, 1378 (9th Cir.
1975)). Thus, “the question is not (as is so often the case regarding other Fourth
Amendment doctrine) how the police should have reasonably perceived the situation at the
time of the search or seizure.” LaFave, supra, § 11.3 (“The police officer’s perspective
does not matter at all for these purposes.”). That means, here, it is irrelevant that nothing
at the FedEx facility “signaled” Rose’s interests in the package. And it is irrelevant that
33
the police could not have known of all the other evidence supporting this conclusion. What
matters is that we know these facts now, and they are probative of Rose’s interests at the
relevant time. Similarly, it is immaterial that this probative evidence came to light only
after the search: Rose taking possession and claiming ownership of the packages is not a
mark of when his privacy interests began; it indicates he had those interests all along.
If all alias-users had to have the “ability to exercise ownership, possession, or
control of the package[]” at the very moment of the search, they could never challenge a
mid-transit search. The legitimate expectation of privacy is not so fickle as to dissipate
just because the searched object is temporarily outside the defendant’s reach and the
searchers are unaware who the owner or recipient is. See, e.g., Castellanos, 716 F.3d at
833–34 (considering evidence, in general, of the defendant’s property-type interests in the
car, despite the false name on the shipment, to determine whether he “ha[d] a reasonable
expectation of privacy in property that is held by another”).
Applying this objective analysis, considering all facts now known about the
searched package, it is undeniable that Rose was its recipient. The alias would only be a
barrier to that conclusion absent evidence establishing who the alias identified. Here, that
evidence is plentiful. And that status existed at the time of the search. Cf. Maj. Op. at 9
(explaining that privacy expectation in mailing persists “even after [it] ha[s] been placed
in the mail”). The resulting privacy interest did not depend on its visibility. Therefore,
Rose’s reasonable expectation of privacy was violated when the package was searched
without a warrant, even if no one there at the time knew it.
34
II.
The officers at the FedEx facility had a drug-sniffing dog waiting outside in the
parking lot. After they opened one of Rose’s packages without a warrant, they followed
proper procedure as to a second: they set up a “lineup” of packages, the dog identified the
suspected package, they took the package away unopened, and they successfully obtained
a warrant before searching it. Their unexplained failure to follow this process initially is
exactly the kind of misconduct the Fourth Amendment enforcement framework deters. See
Elkins v. United States, 364 U.S. 206, 217 (1960) (“[The exclusionary rule’s] purpose is to
deter—to compel respect for the constitutional guaranty in the only effectively available
way—by removing the incentive to disregard it.”).
Rose held the violated privacy interests that give rise to the right to set this deterrent
mechanism into action. However, the Majority regards Rose’s attempts to obscure his
identity on the outside of his packages as undermining those interests, despite all the
evidence we have making clear Rose was, indeed, their recipient. As a result, no one holds
the privacy interest necessary for raising a potential constitutional violation, depriving all
of us of the Fourth Amendment’s protections. See id. (“The rule is calculated to prevent,
not to repair.”); United States v. Calandra, 414 U.S. 338, 347 (1974) (“[T]he rule is . . .
designed to safeguard Fourth Amendment rights generally through its deterrent effect,
rather than a personal constitutional right of the party aggrieved.”).
“At bottom, as a matter of law, Appellant did not relinquish, and society is not
prepared to extinguish, the objective reasonableness of his undisputed subjective
expectation of privacy simply because he used an alias.” See Castellanos, 716 F.3d at 837
35
(Davis, J., dissenting). The Majority’s approach defies the available evidence and muddles
the standing doctrine. For the foregoing reasons, I would hold that Rose had the necessary
privacy expectation in the searched object to move to suppress the discovered evidence,
vacating the judgment and remanding to the district court.
36