State v. Rose

Annotate this Case
Download PDF
FILED: July 2, 2014 IN THE COURT OF APPEALS OF THE STATE OF OREGON STATE OF OREGON, Plaintiff-Respondent, v. WAYNE ELLIOTT ROSE, Defendant-Appellant. Polk County Circuit Court 10P3394 A147635 Fred E. Avera, Judge. Submitted on July 30, 2013. Peter Gartlan, Chief Defender, and Anne Fujita Munsey, Senior Deputy Public Defender, Office of Public Defense Services, filed the brief for appellant. Ellen F. Rosenblum, Attorney General, Anna M. Joyce, Solicitor General, and Doug M. Petrina, Senior Assistant Attorney General, filed the brief for respondent. Before Armstrong, Presiding Judge, and Nakamoto, Judge, and Egan, Judge. NAKAMOTO, J. Affirmed. 1 NAKAMOTO, J. 2 In this criminal case, defendant appeals a judgment convicting him of using 3 a child in a display of sexually explicit conduct, ORS 163.670.1 Defendant had an e-mail 4 account with Yahoo!, Inc. (Yahoo), a California-based company. Pursuant to a search 5 warrant issued by an Oregon circuit court, Yahoo disclosed defendant's e-mails to the 6 police, including two e-mails containing photographs of the victim's breasts. Defendant 7 assigns error to the trial court's denial of his motion to suppress, contending that the 8 warrant was invalid because (1) the circuit court did not have authority under ORS 9 136.583 to issue a search warrant to be executed outside of Oregon and (2) even if it did, 10 the warrant was insufficiently particular.2 We conclude that, under ORS 136.583, the 11 circuit court had the authority to issue the out-of-state warrant and that the warrant was 12 sufficiently particular. Accordingly, we affirm. 13 14 We first summarize the facts at trial that formed the basis for defendant's conviction. The victim, a 16-year-old girl, conversed with defendant, her friend's 1 ORS 163.670 was amended by Oregon Laws 2011, chapter 515, section 2. The 2009 version of ORS 163.670 was in effect at the time defendant committed the crime, therefore, all references to ORS 163.670 in this opinion are to the 2009 version. 2 Defendant also challenges the denial of his motion for judgment of acquittal. Under ORS 163.670(1), a person commits the crime of using a child in a display of sexually explicit content "if the person employs, authorizes, permits, * * * or induces a child to participate or engage in sexually explicit conduct for any person to observe or to record in a photograph * * * or other visual recording." In turn, ORS 163.665(3)(f), amended by Or Laws 2011, ch 515, § 1, defines "sexually explicit conduct" as any "lewd exhibition of sexual or other intimate parts." We affirm the trial court's denial of defendant's motion for judgment of acquittal without further discussion based on State v. Evans, 178 Or App 439, 37 P3d 227 (2001), rev den, 334 Or 76 (2002) (construing the term "lewd exhibition"). 1 1 stepfather, through Facebook, MySpace, instant messaging, e-mails, and telephone calls. 2 In June 2010, the victim offered to send defendant a photograph of her breasts. 3 Defendant e-mailed the victim a photograph of his bare chest in June. Several hours 4 later, the victim e-mailed defendant a photograph of her bare chest and then shortly 5 afterward, because she was not satisfied with the first one, e-mailed a second photograph 6 of her bare chest. The victim had taken the photographs of herself at home. 7 The remaining facts in this case, taken from the suppression hearing, State 8 v. Ehly, 317 Or 66, 75, 854 P2d 421 (1993) (explaining that we are bound by the trial 9 court's findings of fact if they are supported by evidence in the record; we review for 10 legal error), are undisputed and mainly procedural. Detective Pitt of the Polk County 11 Sheriff's Office had probable cause to believe that the victim had sent photographs of her 12 breasts to defendant through e-mail. Pitt applied for a search warrant seeking the e-mail 13 records of defendant's and the victim's e-mail accounts through Yahoo, intending to find 14 the photographs. Pitt stated in his supporting affidavit that he spoke to the victim on July 15 22, 2010, and that she told him that she and defendant had known each other for several 16 years and that they had been communicating over the last few months via telephone, e- 17 mails, and instant-messaging chats online. The victim also told Pitt that during her 18 conversations with defendant they had discussed sexually explicit details. 19 The circuit court issued the search warrant. The warrant stated that there 20 was probable cause to believe that evidence of the crime of using a child in display of 21 sexually explicit conduct and encouraging child sexual abuse was presently located in 2 1 "[a]ny computer database controlled or owned by Yahoo Inc. which is accessed by the 2 Legal Compliance Team located at 701 First Avenue, Sunnyvale, California 94089." 3 Although Pitt was focusing his investigation on a period in 2010, the warrant authorized 4 the officers to search and seize the following items, including all of defendant's e-mails: 5 6 7 8 9 10 11 12 "Any and all records regarding the identification of a user with the Yahoo! ID [defendant's user name] or Yahoo! Email account [defendant's e-mail address]@yahoo.com, to include name and address; Yahoo! Email address; alternate mail address; IP address and date and time of registration; account status; and log-in IP addresses associated with session times and dates. Any and all contents of electronic files that the above subscriber has stored in the subscriber's Yahoo! Account. Any and all Yahoo! IDs listed on the subscriber's Friends list." 13 Pitt faxed the search warrant to the Yahoo legal compliance team in 14 California. In response to the search warrant, Yahoo sent Pitt a computer disk containing 15 the requested information, including large quantities of e-mail. Pitt then searched the e- 16 mail records it contained, concentrating on the e-mails from June and July 2010. Pitt 17 found the two photographs of the victim's breasts among the e-mails. 18 Defendant moved to suppress the photographs before trial. He argued that 19 the warrant was invalid because it was not statutorily authorized and that, in any event, 20 the warrant was insufficiently particular. The trial court ruled that ORS 136.583 21 authorized the issuance of the warrant and appears to have rejected without discussion 22 defendant's "insufficient particularity" argument. Defendant ultimately was convicted of 23 using a child in a display of sexually explicit conduct, ORS 163.670, based on the first 24 photograph. 25 On appeal, defendant assigns error to the trial court's denial of his motion to 3 1 suppress and renews his two arguments.3 We first address defendant's argument that, 2 contrary to the trial court's ruling, the circuit court lacked authority to authorize an out-of- 3 state search warrant under ORS 136.583. That statute provides, in relevant part: 4 5 6 7 8 9 "(1) Notwithstanding ORS 136.557, 136.563, 136.565 or 136.567 and subject to ORS 136.580(2), criminal process authorizing or commanding the seizure or production of papers, documents, records or other things may be issued to a recipient, regardless of whether the recipient or the papers, documents, records or things are located within this state, if: 10 11 "(a) The criminal matter is triable in Oregon under ORS 131.205 to 131.235; and 12 13 "(b) The exercise of jurisdiction over the recipient is not inconsistent with the Constitution of this state or the Constitution of the United States. 14 "* * * * * 15 "(11) As used in this section: 16 "* * * * * 17 18 "(b) 'Criminal process' means a subpoena, search warrant or other court order. 19 "* * * * * 3 Defendant also argues that, under both Article I, section 9, of the Oregon Constitution and the Fourth Amendment to the United States Constitution, he has a protected privacy interest in the content of his emails. The state argues that defendant's position below, i.e., that the officer conducted an illegal search under the state and federal constitutions, assumed the existence of a constitutionally protected privacy interest in the emails and electronic files. Accordingly, the state argues, we should not consider that issue because it was not raised and litigated below. We agree with the state, and, therefore, we analyze this appeal assuming, without deciding, that defendant had a protected privacy interest in the emails and electronic files produced under the warrant. 4 1 2 3 4 5 "(e) 'Recipient' means a business entity or nonprofit entity that has conducted business or engaged in transactions occurring at least in part in this state." ORS 136.583. Defendant argues that the circuit court lacked statutory authority under 6 ORS 136.583 to issue the search warrant to be executed in California because (1) 7 warrants issued under ORS 136.583(1)(b) must be consistent with certain requirements of 8 the Oregon and federal constitutions and (2) out-of-state search warrants are not 9 permitted under either of those constitutions. Defendant's argument thus depends on two 10 premises: his reading of ORS 136.583(1)(b) and his constitutional arguments. Because 11 we reject defendant's reading of ORS 136.583(1)(b), we do not reach defendant's 12 arguments concerning the limits of the Oregon and federal constitutions, which the state 13 has opposed both on the merits and on preservation grounds. 14 As a preliminary matter, we address the state's argument that defendant 15 failed to preserve his challenge to the warrant's issuance based on his reading of ORS 16 136.583(1)(b). At the suppression hearing, defendant did not focus on ORS 17 136.583(1)(b), but he did argue that the state could not avail itself of ORS 136.583 as 18 support for the warrant. The trial court ruled that ORS 136.583 was the source of the 19 circuit court's authority to issue the warrant. As the Supreme Court observed in Peeples 20 v. Lampert, 345 Or 209, 219, 191 P3d 637 (2008), the rule of preservation "gives a trial 21 court the chance to consider and rule on a contention, thereby possibly avoiding an error 22 altogether or correcting one already made, which in turn may obviate the need for an 5 1 appeal." In State v. Walker, 350 Or 540, 548, 258 P3d 1228 (2011), the court noted that 2 the rule "also ensures fairness to opposing parties, by requiring that the positions of the 3 parties are presented clearly to the initial tribunal" to avoid hampering the ability of those 4 parties to meet an argument. (Internal quotation marks omitted.) The court explained: 5 6 7 8 9 10 11 12 13 14 15 "Precisely what suffices to 'present[ ] clearly' a particular position, for preservation purposes, is not something that can be explained by a neat verbal formula. And, in fact, this court has cautioned that 'problems * * * may arise if the preservation onion is sliced too thinly.' State v. Amaya, 336 Or 616, 629, 89 P3d 1163 (2004). Instead, the court has counseled attention to the purposes of the rule and the practicalities it serves. As we explained in State v. Parkins, 346 Or 333, 341, 211 P3d 262 (2009), '[u]ltimately, the preservation rule is a practical one, and close calls * * * inevitably will turn on whether, given the particular record of a case, the court concludes that the policies underlying the rule have been sufficiently served.'" 16 Walker, 350 Or at 548 (brackets and ellipses in Walker). Keeping in mind that this is a 17 criminal case, that the realities of limited time and resources in a criminal trial practice 18 are typically different than in civil trial practice, see id. at 550-51, and that the trial court 19 ruled that ORS 136.583 authorized the issuance of the warrant, we conclude that 20 defendant sufficiently preserved a challenge to the warrant based on the inapplicability of 21 ORS 136.583. 22 As for the merits of defendant's argument, the state points to the text of 23 ORS 136.583 and the reason for its enactment as authority for the court's issuance of the 24 warrant in this case. The state argues that ORS 136.583 by its plain terms authorized the 25 circuit court to issue a search warrant for stored electronic files in Yahoo's database in 26 California. The state also argues that its reading of the statute is correct in light of the 6 1 statute's purpose, which was to allow Oregon courts to issue warrants for electronic 2 communications in accordance with the Stored Communications Act (SCA), 18 USC 3 sections 2701 to 2712. We conclude that the circuit court was authorized under the terms 4 of ORS 136.583 to issue the warrant in this case. 5 Because it provides helpful background to the statutory construction issue 6 in this case, we describe the SCA before addressing the parties' textual arguments 7 concerning ORS 136.583. The SCA was enacted as part of the Electronic 8 Communications Privacy Act of 1986, with the dual purpose of "protect[ing] the privacy 9 of users of electronic communications by criminalizing the unauthorized access of the 10 contents and transactional records of stored wire and electronic communications, while 11 providing an avenue for law enforcement entities to compel a provider of electronic 12 communication services to disclose the contents and records of electronic 13 communications." In re United States for an Order Pursuant to 18 USC, 707 F3d 283, 14 286-87 (4th Cir 2013). 15 Relevant to this case is section 2703 of the SCA, which governs the 16 circumstances in which a government entity, including state governments, see 18 USC § 17 2711(4), may compel a provider of electronic communication services or remote 18 computing services4 to disclose the contents of a customer's electronic communications 4 The SCA does not define the term "electronic communication service" but does define the term "remote computing service" to mean "the provision to the public of computer storage or processing services by means of an electronic communications system[.]" 18 USC § 2711(2). 7 1 or the customer's records or other information. Under section 2703, the government can 2 require a provider of electronic communications services or remote computing services to 3 disclose the contents of electronic communications if the entity obtains a warrant "issued 4 using the procedures described in the Federal Rules of Criminal Procedure (or, in the case 5 of a State court, issued using State warrant procedures) by a court of competent 6 jurisdiction." 18 USC § 2703(a), (b)(1)(A). Under the SCA, a state court is a "court of 7 competent jurisdiction" if it is "a court of general criminal jurisdiction of a State 8 authorized by the law of that State to issue search warrants." 18 USC § 2711(3)(B). 9 Thus, under federal law, a state entity may compel a provider of electronic 10 communication services or remote computing services, such as an e-mail provider, to 11 disclose the contents of emails if the entity has a warrant "issued using State warrant 12 procedures * * * by a court of competent jurisdiction." 18 USC § 2703(a), (b)(1)(A). 13 The SCA does not expressly address whether a state court can issue a search warrant for 14 such content located in another state.5 Instead, the SCA broadly authorizes warrants for 5 The state seems to argue that the SCA provides states with independent authority to issue out-of-state warrants. However, the definition of a "court of competent jurisdiction" in the SCA is limited in the state court context to "court[s] of general criminal jurisdiction" that are "authorized by the law of that State to issue search warrants." Neither that definition nor any other provision of the SCA grants state courts the power to issue an out-of-state warrant if such a warrant is not authorized by state law. In contrast, in the context of federal courts, the SCA defines the term "court of competent jurisdiction" to include "any district court * * * that * * * has jurisdiction over the offense being investigated[.]" 18 USC § 2711(3)(A)(i) (emphasis added). Thus, under the SCA, a federal district court in Oregon could issue a warrant compelling the disclosure of content in another state so long as the court has territorial jurisdiction over the offense related to the warrant. See In re Search of Yahoo, Inc., 2007 WL 1539971 at *3-4 (D Ariz 2007) (explaining that, in context of federal courts, the term "jurisdiction" in the 8 1 such content so long as the warrant is issued "using State warrant procedures" by a "court 2 of general criminal jurisdiction of a State authorized by the law of that State to issue 3 search warrants[.]" The Oregon legislature created such a procedure in 2009, when it 4 enacted ORS 136.583 through House Bill (HB) 2502 (2009). Or Laws 2009, ch 617, § 5 1.6 That statute expressly states that, under certain circumstances, Oregon courts are 6 authorized to issue "criminal process," including warrants, to a recipient "commanding 7 the seizure or production of papers, documents, records or other things * * * regardless 8 of whether the recipient or the papers, documents, records or things are located within 9 this state[.]" ORS 136.583(1) (emphasis added); see also ORS 136.583(11)(b) (defining 10 "criminal process" to include "a subpoena, search warrant or other court order"); ORS 11 136.583(11)(e) (defining "recipient" as "a business entity or nonprofit entity that has 12 conducted business or engaged in transactions occurring at least in part in this state"). 13 The legislature placed two jurisdictional limitations on a court's ability to 14 issue such criminal process under ORS 136.583, each directed at ensuring that the court 15 issuing the process has jurisdiction over the criminal matter as well as the recipient. The 16 first limitation relates to the subject matter jurisdiction of the court issuing the process, 17 requiring that the criminal matter be "triable in Oregon under ORS 131.205 to 131.235." 18 ORS 136.583(1)(a). Those statutes, in turn, describe the conditions for establishing SCA refers to territorial jurisdiction). 6 Since its enactment in 2009, the legislature has amended ORS 136.583 once. See Or Laws 2013, ch 218, § 17 (changing definition of "declaration" in ORS 136.583(11)(c)). That amendment is not relevant to our analysis. 9 1 criminal jurisdiction in Oregon. 2 The second limitation, which defendant focuses on, relates to the court's 3 jurisdiction over the recipient of the criminal process. The statute allows a warrant to 4 issue only if the "exercise of jurisdiction over the recipient is not inconsistent with the 5 Constitution of this state or the Constitution of the United States." ORS 136.583(1)(b). 6 As mentioned above, defendant argues that Oregon courts lack authority under the 7 Oregon and federal constitutions to issue search warrants that will be executed outside of 8 Oregon. Thus, in defendant's view, the warrant in this case was not authorized by ORS 9 136.583(1)(b). Defendant interprets the constitutional limitation in subsection (1)(b) as a 10 territorial jurisdictional limitation, not a personal jurisdictional limitation. That 11 interpretation, however, runs counter to the plain terms of subsection (1)(b), which 12 expressly refers to "jurisdiction over the recipient," indicating a requirement of personal 13 jurisdiction over the recipient of the warrant, not a requirement pertaining to the court's 14 jurisdiction to issue warrants generally. Moreover, defendant's interpretation would 15 preclude an Oregon court from ever issuing a search warrant under ORS 136.583 that is 16 to be executed outside the state, which was precisely the purpose of that statute. See 17 Testimony, Senate Committee on Judiciary, HB 2502, May 22, 2009, Ex 2 at 1 18 (statement of Rep Andy Olson) (explaining that HB 2502 amended the current process 19 for obtaining business records in another state, which was "time consuming, expensive, 20 and, in circumstances where a search warrant is required, nonexistent").7 7 We note that defendant is not arguing that ORS 136.583, as applied, is 10 1 The legislative history confirms that defendant's view of subsection (1)(b) 2 is incorrect. In written testimony in support of the bill, Representative Andy Olson 3 explained that HB 2502 amended the process for obtaining records from businesses, 4 allowing "a prosecutor or a defense attorney to obtain business records from a business 5 doing business in Oregon, even if the records or the business is located outside of the 6 state." Id. Olson noted that 7 8 9 10 11 "[b]usiness records are often vital evidence in criminal cases. For the criminal justice system to work properly, prosecutors and defense attorneys must have access to business records and be able to use them in court. For example, business records are essential in identity theft cases as well as cases involving crimes committed via the Internet. 12 13 14 "The business records of many businesses that conduct transactions in Oregon are located in another state--for example, the records of an Internet Service Provider such as Yahoo!" 15 Id. Olson clarified, however, that the procedure created by HB 2502 for obtaining such 16 records affects only businesses "that have subjected themselves to Oregon's jurisdiction 17 by doing business in Oregon." Id. at 2. Therefore, contrary to defendant's argument, 18 subsection (1)(b) requires that the court issuing the warrant have personal jurisdiction 19 over the recipient business and does not require that the issuance of the warrant itself be 20 predicated on its execution within Oregon. 21 22 In effect then, as the state aptly observes, ORS 136.583 acts as a long-arm statute authorizing Oregon courts to issue search warrants to be executed on businesses unconstitutional. He is merely arguing that the constitutional limitations within ORS 136.583(1)(b) are such that the out-of-state search warrant in this case was not authorized under that statute. We therefore do not consider the constitutionality of ORS 136.583. 11 1 located outside of Oregon so long as such an exercise of jurisdiction over the business 2 comports with constitutional requirements of due process. Those constitutional 3 requirements for personal jurisdiction have been discussed at length in both Oregon cases 4 and United States Supreme Court cases. See, e.g., O'Neil v. Martin, 258 Or App 819, 5 829-35, 312 P3d 538 (2013), rev den, 355 Or 381 (2014) (discussing Oregon case law); 6 Burnham v. Superior Court of Cal., Marin County, 495 US 604, 110 S Ct 2105, 109 L Ed 7 2d 631 (1990). Defendant, however, does not argue that the circuit court in this case 8 lacked personal jurisdiction over Yahoo.8 Accordingly, because ORS 136.583 authorizes 9 an Oregon court to issue a search warrant to be executed on a business located outside of 10 Oregon so long as the court has personal jurisdiction over the recipient business, and 11 defendant does not dispute the circuit court's personal jurisdiction over Yahoo, we affirm 12 the trial court's denial of defendant's motion to suppress. 13 14 We now turn to defendant's remaining challenge to the validity of the search warrant: that the warrant was insufficiently particular. Specifically, defendant 8 The state points out that California also has a statute that directs California corporations, like Yahoo, to produce customer records or information when served with a warrant issued by another state as if the warrant had been issued by a California court: "A California corporation that provides electronic communication services or remote computing services to the general public, when served with a warrant issued by another state to produce records that would reveal the identity of the customers using those services, data stored by, or on behalf of, the customer, the customer's usage of those services, the recipient or destination of communications sent to or from those customers, or the content of those communications, shall produce those records as if that warrant had been issued by a California court." Cal Penal Code § 1524.2(c). 12 1 argues that the warrant violated the particularity requirements of Article I, section 9, of 2 the Oregon Constitution, and the Fourth Amendment to the United States Constitution, 3 because it authorized a search of all of defendant's e-mails stored on his Yahoo account, 4 despite the fact that the officer knew that the alleged photographs of the victim were sent 5 in June or July of 2010. For the reasons that follow, we conclude that the warrant was 6 sufficiently particular. 7 Both Article I, section 9, of the Oregon Constitution, and the Fourth 8 Amendment to the United States Constitution require that warrants describe, with 9 particularity, the place to be searched and the persons or things to be seized.9 The 10 purpose behind the particularity requirement 11 12 13 14 15 16 "is a prohibition against general warrants whereby administrative officers determine what is and what is not to be seized. The decision to seize must be judicial, not administrative, and the command to seize must be sufficiently particular to guide the officer to the thing intended to be seized and to minimize the danger of unwarranted invasion of privacy by unauthorized seizures." 17 State v. Tidyman, 30 Or App 537, 542-43, 568 P2d 666, rev den, 280 Or 683 (1977). 18 "The objective is that the search be as precise as the circumstances allow and that undue 19 rummaging be avoided." State v. Massey, 40 Or App 211, 214, 594 P2d 1274, rev den, 20 289 Or 409 (1979). 9 Article I, section 9, provides, in relevant part: "[N]o warrant shall issue but upon probable cause, supported by oath, or affirmation, and particularly describing the place to be searched and the person or thing to be seized." The Fourth Amendment provides for the same particularity requirement. 13 1 The degree of specificity required to accomplish that purpose depends on 2 the circumstances and the nature of the property to be seized and "may also be affected 3 by the nature of the right which is protected." Tidyman, 30 Or App at 543. For example, 4 the United States Supreme Court recognized in Stanford v. Texas, 379 US 476, 485, 85 S 5 Ct 506, 13 L Ed 2d 431, reh'g den, 380 US 926 (1965), that a person's First Amendment 6 rights implicate a higher level of particularity, explaining that "the constitutional 7 requirement that warrants must particularly describe the 'things to be seized' is to be 8 accorded the most scrupulous exactitude when the 'things' are books, and the basis for 9 their seizure is the ideas which they contain." 10 In this case, defendant argues that the description of the things to be 11 searched was insufficiently particular. According to defendant, the police had probable 12 cause to believe that the victim had e-mailed defendant photographs of her bare breasts in 13 June or July 2010, but the warrant authorized a search of "[a]ny and all contents of 14 electronic files" stored on his Yahoo account and did not limit the search by any time 15 period or subject matter, such as a search for photographs of bare breasts. Furthermore, 16 defendant argues that the fact that the warrant authorized a search for First Amendment 17 material--e-mail communications--required the warrant to identify the items to be 18 searched and seized with scrupulous particularity. 19 In response, the state argues that the search warrant was sufficiently 20 particular. According to the state, by referencing the crimes of using a child in a display 21 of sexually explicit conduct and of encouraging child sexual abuse, and by identifying 14 1 defendant's specific Yahoo account, the search warrant adequately identified the place to 2 be searched and the items to be seized. As for defendant's argument that the warrant 3 needed to specifically identify the two photographs that the officer knew of at the time 4 and needed to limit the search to those photographs, the state responds that the universe 5 of potential evidence was greater than that and "clearly could encompass all the 6 communications between the victim and defendant as well as other electronic files that 7 contained direct or circumstantial evidence of defendant's intent with respect to the 8 crimes." We agree with the state that the warrant in this case was sufficiently particular 9 because it identified the place to be searched--defendant's Yahoo account--and the thing 10 to be searched for and seized--evidence of the crimes of using a child in a display of 11 sexually explicit conduct and of encouraging child sexual abuse. 12 First, defendant's reliance on the principle that a heightened degree of 13 particularity is required for searches dealing with First Amendment materials is 14 unavailing. Though not yet considered by this court, many federal and state courts have 15 concluded that First Amendment rights and the "scrupulous exactitude" standard are not 16 implicated "when the materials to be seized are sought as evidence of a crime and not for 17 the ideas which they contain." State v. Lehman, 1999 ME 124, ¶ 13, 736 A2d 256, 261 18 (1999), cert den, 528 US 1154 (2000) (internal quotation marks omitted); see also United 19 States. v. Layne, 43 F3d 127, 132-33 (5th Cir), cert den, 514 US 1077 (1995) (explaining 20 that no First Amendment rights were implicated by a search warrant issued to seize 21 pornographic videotapes, magazines, and devices because the material was seized to 15 1 corroborate a victim's testimony, not because of the ideas they contained); State v. 2 Patscheck, 129 NM 296, 299, 6 P3d 498, 501, rev den, 129 NM 249 (2000) (same); 3 United States v. Stelten, 867 F2d 446, 450 (8th Cir), cert den, 493 US 828 (1989) ("When 4 the government wishes to seize written material for any reason other than the content of 5 the material, the first amendment is not infringed and the scrupulous exactitude test does 6 not apply."). We agree with those courts that, in cases like this in which the search 7 warrant is seeking material as evidence of a crime, and not for the ideas that it contains, 8 the "scrupulous exactitude" test is not applicable. 9 We further conclude that, under the circumstances of this case, the warrant 10 was sufficiently particular. The warrant stated that the police could search for, and seize, 11 evidence of the crimes of using a child in a display of sexually explicit conduct and 12 encouraging child sexual abuse located in the electronic files stored in defendant's Yahoo 13 account. Thus, the warrant was limited to a particular location, and the description of the 14 items to be seized left the officers with no discretion in the matter. 15 We also agree with the state that the two photographs sent by the victim to 16 defendant was not the only evidence of those crimes that could exist in defendant's 17 Yahoo account. In the affidavit supporting the warrant, Pitt stated that he had spoken to 18 the victim on July 22, 2010. During that conversation, the victim told Pitt that she and 19 defendant had known each other for several years and that they had been communicating 20 over the last few months via the telephone, e-mails, and instant-messaging chats online. 21 The victim also told Pitt that during those conversations, she and defendant had discussed 16 1 sexually explicit details. Those facts indicated that possible evidence of defendant's 2 crimes, aside from the two photographs, such as his inducement of the victim under ORS 3 163.670(1), were being stored by defendant in his e-mail account. 4 In sum, we conclude that the warrant in this case was authorized under the 5 terms of ORS 136.583 and that it was sufficiently particular. Accordingly, the trial court 6 did not err in denying defendant's motion to suppress. 7 Affirmed. 17

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.