AI Case Brief
Generate an AI-powered case brief with:
đKey Facts
âïžLegal Issues
đCourt Holding
đĄReasoning
đŻSignificance
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
IN THE
SUPREME COURT OF THE STATE OF ARIZONA
STATE OF ARIZONA,
Appellee,
v.
WILLIAM MIXTON,
Appellant.
No. CR-19-0276-PR
Filed January 11, 2021
Appeal from the Superior Court in Pima County
The Honorable Sean E. Brearcliffe, Judge
No. CR20162038-001
AFFIRMED
Opinion of the Court of Appeals, Division Two
247 Ariz. 212 (2019)
[VACATED IN PART]
COUNSEL:
Mark Brnovich, Arizona Attorney General, Brunn âBeauâ W. Roysden III,
Solicitor General, Joseph T. Maziarz, Chief Counsel, Criminal Appeals
Section, Linley Wilson (argued), Deputy Solicitor General, Phoenix,
Attorneys for State of Arizona
Joel Feinman, Pima County Public Defender, Abigail Jensen (argued),
David J. Euchner, Deputy Public Defenders, Tucson, Attorneys for William
Mixton
Timothy Sandefur, Scharf-Norton Center for Constitutional Litigation at
the Goldwater Institute, Phoenix, Attorney for Amicus Curiae Goldwater
Institute
Paul V. Avelar, Timothy D. Keller, Keith E. Diggs, Institute for Justice,
Tempe, Attorneys for Amicus Curiae Institute for Justice
Elizabeth Burton Ortiz, Arizona Prosecuting Attorneysâ Advisory Council,
Phoenix, Attorney for Amicus Curiae Arizona Prosecuting Attorneysâ
Advisory Council
STATE V. MIXTON
Opinion of the Court
Jared G. Keenan, American Civil Liberties Union Foundation of Arizona,
Phoenix, Attorney for Amici Curiae American Civil Liberties Union of
Arizona, American Civil Liberties Union, and Electronic Frontier
Foundation
JUSTICE LOPEZ authored the opinion of the Court, in which JUSTICES
GOULD, BEENE, and MONTGOMERY joined. JUSTICE BOLICK, joined
by CHIEF JUSTICE BRUTINEL and VICE CHIEF JUSTICE TIMMER,
dissented.
JUSTICE LOPEZ, opinion of the Court:
¶1 We consider whether the Fourth Amendment to the United
States Constitution or article 2, section 8 of the Arizona Constitution
requires law enforcement officials to secure a judicially-authorized search
warrant or order to obtain either (1) a userâs Internet Protocol (âIPâ) address
or (2) subscriber information the user voluntarily provides to an Internet
Service Provider (âISPâ) as a condition or attribute of service. We hold that
neither the federal nor the Arizona Constitution requires a search warrant
or court order for such information and that law enforcement officials may
obtain IP addresses and ISP subscriber information with a lawful federal
administrative subpoena.
BACKGROUND
¶2 An ISP is a company that provides individuals with access to
the internet. United States v. Jean, 207 F. Supp. 3d 920, 931 (W.D. Ark. 2016),
affâd 891 F.3d 712 (8th Cir. 2018). The ISP assigns a string of numbers, called
an IP address, to a customerâs modem to facilitate access to the internet. Id.
at 928. Consequently, a user does not control nor own an IP address. IP
addresses are always attached, âlike a âreturn address,â to every âenvelopeâ
of information exchanged back and forth by computers that are actively
communicating with each other over the internet.â Id. at 928â29. When a
computer accesses a website, the IP address tells the website where to
transmit data. See Frederick Lah, Note, Are IP Addresses âPersonally
Identifiable Informationâ?, 4 I/S: J.L. & Polây for Info. Socây 681, 693 (2008).
Search engines, such as Google, also log IP addresses of users and use these
2
STATE V. MIXTON
Opinion of the Court
logs to improve the quality of search results and advertisements for
visitors. Id. at 693â94.
¶3 An IP address alone does not reveal an internet userâs
identity. Rather, it generally reveals only a userâs approximate geographic
location, such as a neighborhood, and the userâs ISP. Lincoln Spector, Your
IP address: Who can see it and what you can do about it, PCWorld (Mar. 17, 2014,
7:15 AM), https://www.pcworld.com/article/2105405/your-ip-address-
who-can-see-it-and-what-you-can-do-about-it.html. The ISP, however,
maintains records and information, such as the name, address, and
telephone number associated with an IP address, known as âsubscriber
information.â See Savanna L. Shuntich & Kenneth A. Vogel, Doe Hunting:
A How-to Guide for Uncovering John Doe Defendants in Anonymous Online
Defamation Suits, Md. B.J. 48, 51 (July/Aug. 2017).
¶4 Here, in 2016, an undercover Tucson Police Department
detective posted an advertisement on an online forum seeking users
interested in child pornography. The detective was contacted by someone
with the username âtabooin520,â who asked to be added to a group chat on
a messaging application called âKik.â Once added, tabooin520 sent images
and videos of child pornography to the group chat and to the detective.
¶5 Federal agents with Homeland Security Investigations
(âHSIâ), at the request of the detective, served a federal administrative
subpoena authorized under federal law on Kik to obtain tabooin520âs IP
address. Kik provided the IP address to the detective. The detective, using
publicly available databases, determined that Cox Communications
(âCoxâ) was the ISP for the IP address. HSI agents then served another
federal administrative subpoena on Cox for the subscriber information
associated with the IP address.
¶6 Cox complied with the subpoena, disclosing the subscriber
informationâname, street address, and phone numberâof William
Mixton. The detective used this information to obtain and execute a search
warrant on Mixtonâs residence. Detectives seized a cell phone, an external
hard drive, a laptop, and a desktop computer. A subsequent search of these
devices revealed photos and videos of child pornography, as well as the
messages, photos, and videos that Mixton, under the username
âtabooin520,â sent to the detective.
3
STATE V. MIXTON
Opinion of the Court
¶7 Mixton was indicted on twenty counts of sexual exploitation
of a minor under fifteen years of age. Mixton moved unsuccessfully to
suppress the subscriber information and all evidence seized from his
residence on the grounds that the Fourth Amendment to the United States
Constitution and article 2, section 8 of the Arizona Constitution require a
warrant or court order to obtain his IP address and ISP subscriber
information. A jury convicted Mixton on all counts, and he appealed.
¶8 In a split decision, the court of appeals affirmed Mixtonâs
convictions and sentences, holding that although Mixton lacked a
reasonable expectation of privacy under the Fourth Amendment, State v.
Mixton, 247 Ariz. 212, 220 ¶ 13 (App. 2019), the Arizona Constitution
required a search warrant to obtain his ISP subscriber information, id. at 225
¶ 27, and the federal third-party doctrine did not apply to the Arizona
Constitution, id. at 227 ¶ 33. The court concluded that, although the State
obtained Mixtonâs ISP subscriber information in violation of the Arizona
Constitution, suppression of the information was unnecessary because the
good-faith exception to the exclusionary rule applied, as no precedent
prohibited the search, controlling law deemed the search reasonable, and
law enforcement reasonably relied on existing precedent. Id. at 228 ¶ 39.
¶9 On review in this Court, the State argues that article 2, section
8 of the Arizona Constitution does not require a search warrant or court
order to obtain IP addresses and ISP subscriber information. Mixton
disagrees and further contends that the Fourth Amendment protects IP
addresses and ISP subscriber information in light of Carpenter v. United
States, 138 S. Ct. 2206 (2018).
¶10 We granted review to consider whether the United States or
Arizona Constitution requires a search warrant or court order to obtain IP
addresses and ISP subscriber information, a recurring issue of statewide
importance. We have jurisdiction under article 6, section 5(3) of the Arizona
Constitution and A.R.S. § 12-120.24.
DISCUSSION
¶11 Whether the United States or Arizona Constitution requires a
search warrant or court order to obtain an IP address and ISP subscriber
information involves the interpretation of constitutional provisions, a
matter we review de novo. See State v. Hegyi, 242 Ariz. 415, 416 ¶ 7 (2017).
4
STATE V. MIXTON
Opinion of the Court
I.
¶12 We consider first whether, in light of Carpenter, the United
States Constitution requires a search warrant or court order to obtain an IP
address and ISP subscriber information.
A.
¶13 The Fourth Amendment protects â[t]he right of the people to
be secure in their persons, houses, papers, and effects, against unreasonable
searches and seizures.â The Fourth Amendment was designed to protect
individuals against âarbitrary invasions by governmental officials.â
Carpenter, 138 S. Ct. at 2213 (quoting Camara v. San Francisco, 387 U.S. 523,
528 (1967)). Traditionally, the Supreme Court viewed search and seizure
under the Fourth Amendment through a lens of âcommon-law trespass.â
See United States v. Jones, 565 U.S. 400, 405 (2012). However, the Court has
recognized that the Fourth Amendment protects people, not just places,
when an individual âseeks to preserve something as privateâ and that
expectation is âone that society is prepared to recognize as reasonable.â
Carpenter, 138 S. Ct. at 2213 (quoting Smith v. Maryland, 442 U.S. 735, 740
(1979)). âA âsearchâ occurs when an expectation of privacy that society is
prepared to consider reasonable is infringed.â United States v. Jacobsen, 466
U.S. 109, 113 (1984).
B.
¶14 Federal appellate courts held uniformly, before Carpenter, that
the Fourth Amendment does not protect IP addresses and ISP subscriber
information because such information falls within the exception created by
the âthird-party doctrine.â See, e.g., United States v. Bynum, 604 F.3d 161,
164 (4th Cir. 2010) (noting that every federal court considering this issue has
held that subscriber information provided to an internet provider is not
protected by the Fourth Amendment); United States v. Perrine, 518 F.3d 1196,
1204â05 (10th Cir. 2008) (collecting cases that hold the Fourth Amendmentâs
privacy expectation does not apply to IP addresses and ISP subscriber
information); United States v. Forrester, 512 F.3d 500, 510 (9th Cir. 2008)
(holding that IP addresses and ISP subscriber information are not protected
by the Fourth Amendment). The third-party doctrine is premised on the
concept of privacy. Specifically, the doctrine is an analytical construct used
to differentiate between information a person seeks to preserve as private,
and information that, because he shares it with others, is not treated as
5
STATE V. MIXTON
Opinion of the Court
private. Using this construct, a person has no expectation of privacy in
information he voluntarily discloses to third parties, even if there is an
assumption it will be used only for a limited purpose. Carpenter, 138 S. Ct.
at 2216. And, because it is no longer private, the government may obtain
such information from a third party without triggering the Fourth
Amendmentâs protections. Id.
¶15 The third-party doctrine traces its roots to United States v.
Miller, 425 U.S. 435 (1976), and Smith v. Maryland, 442 U.S. 735 (1979). In
Miller, the government subpoenaed a defendantâs bank for records,
including the defendantâs checks, deposit slips, and statements. 425 U.S.
at 437â38. The Supreme Court held that those documents were business
records of the bank; thus, the defendant had no privacy interest in them. Id.
at 440.
¶16 In Smith, the Supreme Court held that a defendant did not
have âa legitimate expectation of privacy regarding the numbers he dialed
on his phone.â 442 U.S. at 742 (internal quotation marks omitted). The
Court emphasized that customers knew they were conveying phone
numbers to the telephone company and that the company could keep
records of those phone calls. Id. It also reasoned that recording the
numbers a customer dials does not convey the contents of the
communication, thus distinguishing Katz v. United States, 389 U.S. 347
(1967), which held that the warrantless monitoring of telephone
conversations from a public telephone booth violated the Fourth
Amendment. Smith, 442 U.S. at 741.
¶17 Thus, âSmith and Miller . . . did not rely solely on the act of
sharing [information]. Instead, they considered âthe nature of the particular
documents soughtâ to determine whether âthere is a legitimate âexpectation
of privacyâ concerning their contents.ââ Carpenter, 138 S. Ct. at 2219
(quoting Miller, 425 U.S. at 442). The Ninth Circuit has aptly described the
de minimis privacy interests implicated in the non-content information
generated by an IP address:
When the government obtains the to/from addresses of a
personâs e-mails or the IP addresses of websites visited, it
does not find out the contents of the messages or know the
particular pages on the websites the person viewed. At best,
the government may make educated guesses about what was
6
STATE V. MIXTON
Opinion of the Court
said in the messages or viewed on the websites based on its
knowledge of the e-mail to/from addresses and IP
addressesâbut this is no different from speculation about the
contents of a phone conversation on the basis of the identity
of the person or entity that was dialed. Like IP addresses,
certain phone numbers may strongly indicate the underlying
contents of the communication; for example, the government
would know that a person who dialed the phone number of a
chemicals company or a gun shop was likely seeking
information about chemicals or firearms. Further, when an
individual dials a pre-recorded information or subject-
specific line, such as sports scores, lottery results or phone sex
lines, the phone number may even show that the caller had
access to specific content information. Nonetheless, the Court
in Smith and Katz drew a clear line between unprotected
addressing information and protected content information
that the government did not cross here.
Forrester, 512 F.3d at 510.
¶18 As with bank records and dialed telephone numbers, an
internet user voluntarily provides subscriber information and IP addresses
to third-party ISPs and servers. Subscriber information and IP addresses
also do not reveal the substance or content of the internet userâs
communication any more than the information affixed to the exterior of a
mailed item. See Shuntich & Vogel, supra ¶ 3, at 51 (noting that 18 U.S.C.
§ 2701 et seq. prohibits companies from disclosing âcontents of a
communication,â but they may turn over non-content information like IP
addresses, phone numbers, and physical addresses in response to a
subpoena); cf. Forrester, 512 F.3d at 511 (âIn a line of cases dating back to the
nineteenth century, the Supreme Court has held that the government
cannot engage in a warrantless search of the contents of sealed mail, but can
observe whatever information people put on the outside of mail, because
that information is voluntarily transmitted to third parties.â).
C.
¶19 In Carpenter, decided nearly 40 years after Smith, officers
accessed cellphone data, commonly known as cell-site location information
(âCSLIâ), to reveal a suspectâs movements over the course of 127 days. 138
S. Ct. at 2217. CSLI is generated by a cellphone whenever it receives a text,
7
STATE V. MIXTON
Opinion of the Court
email, call, or when an app seeks to refresh data. Id. at 2220. As a result,
CSLI is generated continuously without a userâs affirmative act. The Court
described CSLI evidence as âdetailed, encyclopedic, and effortlessly
compiled,â id. at 2216, and noted that it âtracks nearly exactly the
movements of its owner,â allowing the government to achieve ânear perfect
surveillance, as if it had attached an ankle monitor to the phoneâs user,â
id. at 2218. Concerned that CSLI could be used to continuously and
effortlessly surveil cell phone users, the Court created a ânarrowâ exception
to the third-party doctrine, requiring the government to obtain a search
warrant for CSLI. Id. at 2220. The Court emphasized that a âdetailed
chronicle of a personâs physical presence compiled every day, every
moment, over several yearsâ implicated privacy concerns far exceeding
those in Smith and Miller. Id.
¶20 Following Carpenter, every federal appellate court addressing
the issue has affirmed that the Fourth Amendmentâs warrant requirement
does not reach IP addresses and ISP subscriber information. See, e.g., United
States v. Hood, 920 F.3d 87, 92 (1st Cir. 2019) (holding that IP addresses are
subject to the third-party doctrine and fall outside the scope of Carpenter);
United States v. Contreras, 905 F.3d 853, 857 (5th Cir. 2018) (ruling that, post-
Carpenter, ISP subscriber information âfalls comfortably within the scope of
the third-party doctrineâ); see also United States v. Wellbeloved-Stone, 777 F.
Appâx 605, 607 (4th Cir. 2019) (declining to revisit Bynumâs holding that
subscriber information was not protected by the Fourth Amendment in
light of Carpenter); United States v. VanDyck, 776 F. Appâx 495, 496 (9th Cir.
2019) (declining to revisit Forresterâs holding that IP addresses and ISP
subscriber information are not protected by the Fourth Amendment in light
of Carpenter).
¶21 Although this Court is not bound by federal appellate courtsâ
interpretations of federal constitutional provisions, see State v. Montano, 206
Ariz. 296, 297 ¶ 1 n.1 (2003), we may embrace them to âfurther predictability
and stability of the law.â See Weatherford ex rel. Michael L. v. State, 206 Ariz.
529, 533 ¶ 9 (2003). Here, because the federal appellate courtsâ
jurisprudence is uniform and sound, we decline to depart from it.
D.
¶22 Despite federal appellate courtsâ refusal to extend Carpenterâs
exception to the third-party doctrine to IP addresses and ISP subscriber
8
STATE V. MIXTON
Opinion of the Court
information, the court of appealsâ dissent and Mixton argue that this
information should fall within Carpenterâs exception. Mixton, 247 Ariz.
at 228â29 ¶¶ 42â43 (Eckerstrom, J., dissenting in part). We disagree. Both
stretch Carpenter beyond its jurisprudential reach.
¶23 First, Carpenter expressly preserved the third-party doctrineâs
existing application to information, such as cell phone and bank records,
that is shared with a third party. See 138 S. Ct. at 2216â17, 2220 (âWe do not
disturb the application of Smith and Miller.â). It is beyond contention that
IP addresses and ISP subscriber information fit this description. Second,
the nature of an IP address and ISP subscriber information is fundamentally
different from CSLIâs perpetual surveillance attributes.
âIP addresses . . . are widely and voluntarily disseminated in the course of
normal use of networked devices,â United States v. Weast, 811 F.3d 743, 748
(5th Cir. 2016), reveal only the approximate geographical location of a
subscriber, supra ¶ 3, and do not divulge the content of a userâs
communication, supra ¶¶ 17â18. ISP subscriber information includes only
data the subscriber voluntarily provides the ISPâtypically the subscriberâs
name, address, and phone number. Third, although internet activity may
be akin to cell phone use in its centrality to participation in a modern
society, CSLI is generated without an affirmative act by cell phone users
and can be avoided only by ceasing cell phone use entirely, whereas
internet users retain a measure of autonomy in masking their online
activities. For example, users can anonymously access the internet via
public and private services, such as public libraries and public WiFi
networks at private businesses, or mask their online movements through
proxy services like virtual private networks (âVPNâ). See Shuntich &
Vogel, supra ¶ 3, at 51. Thus, the IP address may not trace back to the user
if he uses a third-party network. See Hood, 920 F.3d at 89 (describing a
suspectâs use of a hotelâs Wi-Fi network to access a messaging app).
¶24 We also reject Mixtonâs request that we recognize a novel
Fourth Amendment protection to avert the governmentâs theoretical
derivative use of IP addresses to trace internet usersâ browsing history.
Mixtonâs sole source for this claim is a 2013 report by the Office of the
Privacy Commissioner of Canada, which asserts that an IP addressâs
internet history can be discovered by using the address as a search term in
Google and other public search engines. Off. of the Priv. Commâr of Can.,
What an IP Address Can Reveal About You (May 2013),
9
STATE V. MIXTON
Opinion of the Court
https://www.priv.gc.ca/en/opc-actions-and-
decisions/research/explore-privacy-research/2013/ip_201305/.
¶25 Mixtonâs claim is a thin reed upon which to rest a radical
departure from unanimous federal Fourth Amendment jurisprudence
concerning the lack of a privacy interest in an IP address. First, the study
appears premised on the unproven assumption that an IP address search
accurately and exhaustively identifies websites visited by a user. Second,
it is not apparent that the reportâs results have been replicated, and we are
unaware of any other authority that supports the reportâs claim that an IP
addressâs exhaustive search history is publicly accessible. See Product
Privacy Notice â VPN Products, Pango,
https://www.pango.co/privacy/vpn-
products/#:~:text=Our%20VPN%20products%20do%20not%20log%20or
%20otherwise%20record%20IP,accessed%20through%20a%20VPN%20con
nection (last visited Jan. 05, 2020) (explaining that an IP address only reveals
a userâs ISP and geographical identifiers). In fact, during argument, counsel
for Mixton conceded that, with respect to such Google searches, she did not
âknow specifically how much information [IP addresses] reveal.â Third,
even if an IP address could be used to peruse a userâs search history with a
public search engine, any assertion of privacy is even more attenuated
because a website would have to deliberately publicize its visitorsâ IP
addresses to reveal a userâs browser history. See Joshua J.
McIntyre, Balancing Expectations of Online Privacy: Why Internet Protocol (IP)
Addresses Should Be Protected As Personally Identifiable Information, 60 DePaul
L. Rev. 895, 896 (2011) (explaining that IP addresses are logged by a visited
website); Ron A. Dolin, J.D., Ph.D., Search Query Privacy: The Problem of
Anonymization, 2 Hastings Sci. & Tech. L.J. 137, 160â61 (2010) (asserting that
IP addresses disclosed to a search engine may become the intellectual
property of the search engine); Wikipedia, Welcome
unregistered editing, https://en.wikipedia.org/wiki/Wikipedia:Welcome_
unregistered_editing (last visited Jan. 05, 2020) (explaining that Wikipedia
records and publicizes the IP addresses of users who edit a page without
logging into an account); Zach Lerner, A Warrant to Hack: An Analysis of the
Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure, 18
Yale J.L. & Tech. 26, 64 (2016) (âThe collection of a userâs IP address is less
harmful to that user than the collection of his or her browsing history, email
content, or other, more personal information.â). Finally, there is no
allegation in this case that the State made derivative use of Mixtonâs IP
address. Instead, the sole issue before us is the constitutionality of the
10
STATE V. MIXTON
Opinion of the Court
Stateâs use of a federal administrative subpoena to obtain an IP address and
ISP subscriber information, which is the only relevant authority the federal
statute confers.
¶26 In sum, Carpenter expressly preserves existing applications of
Smith and Miller and its logic does not extend its exception to the third-party
doctrine for CSLI information to IP addresses and ISP subscriber
information. Such information does not implicate the privacy interests
embodied in the de facto omnipresent surveillance generated by âdetailed,
encyclopedicâ CSLI information. Carpenter, 138 S. Ct. at 2217. Therefore,
we hold thatâjust as every federal court has heldâthe Fourth Amendment
does not, in light of Carpenter, require a search warrant to obtain IP
addresses and ISP subscriber information.
II.
¶27 We turn next to Mixtonâs contention that the Arizona
Constitution, article 2, section 8, requires the State to obtain a warrant or
court order to acquire his IP address or ISP subscriber information.
A.
¶28 Our primary purpose when interpreting the Arizona
Constitution is to âeffectuate the intent of those who framed the provision.â
Jett v. City of Tucson, 180 Ariz. 115, 119 (1994). âWhen the language of a
provision is clear and unambiguous, we apply it without resorting to other
means of constitutional construction.â Heath v. Kiger, 217 Ariz. 492, 494 ¶ 6
(2008). We may examine its history, if necessary, to determine the framersâ
intent. Boswell v. Phx. Newspapers, Inc., 152 Ariz. 9, 12 (1986).
¶29 The Arizona Constitution provides that â[n]o person shall be
disturbed in his private affairs, or his home invaded, without authority of
law.â Ariz. Const. art. 2, § 8. This section, entitled âRight to Privacyâ and
often referred to as the âPrivate Affairs Clause,â was adopted verbatim
from the Washington State Constitution. See Wash. Const. art. 1, § 7.
Passage of Arizonaâs Private Affairs Clause preceded the Fourteenth
Amendmentâs incorporation of the Fourth Amendment, see John Leshy, The
Making of the Arizona Constitution, 20 Ariz. St. L.J. 1, 81 (1988), but it âis of
the same general effect and purpose as the Fourth Amendment to the
Constitution of the United States.â Turley v. State, 48 Ariz. 61, 70 (1936).
11
STATE V. MIXTON
Opinion of the Court
¶30 As an analytical starting point, we compare the texts of
Arizonaâs Constitution and the relevant federal amendments to determine
whether Arizonaâs Constitution provides greater protections than its
federal counterpart. See, e.g., Brush & Nib Studio, LC v. City of Phoenix, 247
Ariz. 269, 281 ¶ 45 (2019) (comparing the language in the First Amendment
and article 2, section 6 of the Arizona Constitution). We have observed that
â[t]he Arizona Constitution is even more explicit than its federal
counterpart in safeguarding the fundamental liberty of Arizona citizens.â
State v. Ault, 150 Ariz. 459, 463 (1986). The Fourth Amendment protects a
finite index of enumerated itemsââpersons, houses, papers, and effectsââ
whereas the Private Affairs Clause, by its terms, encompasses the
seemingly more expansive realm of âprivate affairs.â Compare U.S. Const.
amend. IV with Ariz. Const. art. 2, § 8.
¶31 We have noted since statehood that â[s]ection 8, article 2, of
the state Constitution . . . , although different in its language, is of the same
general effect and purpose as the Fourth Amendment, and, for that reason,
decisions on the right of search under the latter are well in point on section
8.â Malmin v. State, 30 Ariz. 258, 261 (1926). See also State v. Pelosi, 68 Ariz.
51, 57 (1948) (noting that the Private Affairs Clause âwas adopted for the
purpose of preserving the rights which the Fourth Amendment to the
Federal Constitution was intended to protectâ), overruled on other grounds by
State v. Pina, 94 Ariz. 243 (1963). âWe have the right, however, to give such
construction to our own constitutional provisions as we think logical and
proper, notwithstanding their analogy to the Federal Constitution and the
federal decisions based on that Constitution.â Turley, 48 Ariz. at 70â71.
¶32 Indeed, we have recognized that the Private Affairs Clause
provides broader protections to the home than the Fourth Amendment.
Ault, 150 Ariz. at 463. But we have also recognized the value in uniformity
with federal law when interpreting and applying the Arizona Constitution.
See State v. Casey, 205 Ariz. 359, 362 ¶ 11 (2003) (superseded by statute,
A.R.S. § 13â205(A)) (âAlthough this court, when interpreting a state
constitutional provision, is not bound by the Supreme Courtâs
interpretation of a federal constitutional clause, those interpretations have
âgreat weightâ in accomplishing the desired uniformity between the
clauses.â). To that end, we have held that the exclusionary rule, for
example, as a matter of state law is âno broader than the federal rule.â State
v. Bolt, 142 Ariz. 260, 269 (1984) (âIt is poor judicial policy for rules
12
STATE V. MIXTON
Opinion of the Court
governing the suppression of evidence to differ depending upon whether
the defendant is arrested by federal or state officers.â). Notably, we have
yet to expand the Private Affairs Clauseâs protections beyond the Fourth
Amendmentâs reach, except in cases involving warrantless home entries.
State v. Peltz, 242 Ariz. 23, 30 ¶ 24 n.3 (App. 2017).
B.
¶33 âPrivate affairsâ is not defined in the Arizona Constitution.
When the Arizona Constitution does not define its terms, we âlook to their
ânatural, obvious, and ordinary meaning,ââ Kotterman v. Killian, 193 Ariz.
273, 284 ¶ 33 (1999) (quoting Cnty. of Apache v. Sw. Lumber Mills, Inc., 92
Ariz. 323, 327 (1962)), and our focus is on their meaning at the time the
Constitution was adopted. See Antonin Scalia & Bryan A. Garner, Reading
Law: The Interpretation of Legal Texts 78 (2012) (âWords must be given the
meaning they had when the text was adopted.â). âPrivateâ is defined as
âaffecting or belonging to private individuals, as distinct from the public
generally.â Private, Blackâs Law Dictionary (2d. ed. 1910); see also Private,
New Websterian Dictionary (1912) (âpeculiar to oneâs self; personal; alone;
secret; not public; secluded; unofficialâ). âAffairsâ is defined as âa personâs
concerns in trade or property; business.â Affairs, Blackâs Law Dictionary
(2d. ed. 1910). Thus, because âprivate affairsâ is an ambiguous concept that
eludes precise demarcation, it is subject to differing interpretations.
Therefore, to discern its meaning, we may consider the context of the
provision, âthe language used, the subject matter, its historical background,
its effects and consequences, and its spirit and purpose.â Wyatt v.
Wehmueller, 167 Ariz. 281, 284 (1991).
¶34 To discern the meaning of the Private Affairs Clause, we
consider the history of its passage. Boswell, 152 Ariz. at 12â13. âArizonaâs
right to privacy was taken verbatim from the Washington constitution, and
the records of the Arizona constitutional convention contain no material
addressing its intent.â Hart v. Seven Resorts Inc., 190 Ariz. 272, 277 (App.
1997) (considering the Arizona constitutional convention record in holding
that article 2, section 8 does not restrict a private individualâs actions). The
most consequential reference to article 2, section 8, arose in the context of a
discussion of article 14, section 16, which requires the ârecords, books and
filesâ of most types of public corporations to be subject to the âfull visitorial
and inquisitorial powers of the state.â See Leshy, supra ¶ 29, at 86â87.
Delegates argued in favor of article 14, section 16, because âcorporations
13
STATE V. MIXTON
Opinion of the Court
were âpersonsâ and thus protected by the privacy provisions of the
Declaration of Rights in article II,â and the provision was necessary to
facilitate regulatory oversight of corporations. Id. at 87. To the extent this
reference may implicitly support the proposition that the Private Affairs
Clause shields a corporation from the stateâs sweeping legislative authority
to examine all of its records for regulatory purposes as envisioned under
article 14, section 16, it does not illuminate whether a federal administrative
subpoena seeking non-content information from a third-party corporation
to advance a criminal investigation of a subscriber runs afoul of the Arizona
Constitution. And although the constitutional convention record is silent
on the intent of the Private Affairs Clause, it details several delegatesâ
objections to extending state constitutional protections in other contexts
beyond those recognized under the federal Constitution at the time. See,
e.g., id. at 84â85 (discussing an amendment which would have suppressed
evidence obtained from prisoners âunder the âthird degreeââ or by torture,
and the conventionâs rejection of a proposal to ban the death penalty).
¶35 Mixton and Amici argue that the Arizona constitutional
conventionâs deliberations support the view that the Private Affairs Clause
protects IP addresses and ISP subscriber information. Amicus Goldwater
Institute and the dissent advance the argument that Arizona adopted the
provision to shield businesses and individuals from growing government
demands to investigate their financial dealings. See Timothy Sandefur, The
Arizona âPrivate Affairsâ Clause, 51 Ariz. St. L.J. 723, 731 (2019) (highlighting
historical editorial complaints from the Arizona Republican against
legislative investigations); infra ¶ 108. But, as noted, the constitutional
convention record is devoid of affirmative evidence of this sentiment.
Further, the dissentâs reliance on contemporaneous editorial comments
made to the Arizona Republican sheds no light on this issue, because those
complaints centered on the dangers of sweeping legislative investigations
involving unfettered state access to a corporationâs business records for
political or nefarious purposes. Id. In short, notably absent from the
records of the constitutional convention is any objection to state use of a
subpoena to obtain a business record to facilitate a legitimate criminal
investigation of a corporate customer.
¶36 Having failed to identify relevant support for its position in
the Arizona constitutional convention archives or contemporaneous
writings from the local paper of record, the dissent asserts the federal third-
party doctrine and its underlying logic are irreconcilable with the Arizona
14
STATE V. MIXTON
Opinion of the Court
Constitution because ââprivate affairsâ were understood in the early
Twentieth Century to broadly encompass both personal and business
matters, even if transmitted through third parties.â Infra ¶¶ 100, 107. But
the dissentâs examplesâtelegraphs, census data, tax returns, and the likeâ
concern the propriety of public disclosure of the content of communications
or sensitive information gathered by the government. Infra ¶ 106. The legal
protections afforded the contents of telegraphs or detailed personal census
or tax information collected by the government do not inform whether non-
content IP address or ISP information is a âprivate affairâ under the Arizona
Constitution.
¶37 The dissent also cites to Boyd v. United States, 116 U.S. 616
(1886), and Ex parte Jackson, 96 U.S. 727 (1877), in support of its claim that,
at the time of Arizona statehood, the Private Affairs Clause was widely
understood to include business transactions âeven within Fourth
Amendment jurisprudence at the turn of the century.â Infra ¶ 109. But Boyd
is distinguishable because it merely held that the Fourth and Fifth
Amendments foreclose the government from compelling a defendant
business owner in a criminal and forfeiture case, without a warrant, to
produce at trial self-incriminating business records. 116 U.S. at 620â22.
And Jackson simply establishes the unremarkable proposition that opening
and reading the contents of sealed mail requires a warrant. 96 U.S. at 733.
Boyd and Jackson fail to illuminate what convention delegates may have
thought about an entirely different constitutional propositionâthe
propriety of the stateâs use of an administrative subpoena for corporate
records to advance a criminal investigation against a customer who does
not own or control the records.
¶38 Significantly, even assuming the Private Affairs Clause
protects private information unrelated to business dealings, nothing in the
record supports the proposition that the Arizona Constitution prohibits the
state from obtaining an IP address and ISP information from a third-party
provider, via federal subpoena, to advance a criminal investigation. If
anything, the text of article 14, section 16, and the discussion preceding its
passage, militate in favor of state access to certain corporate records held by
third parties to aid criminal investigations. Accordingly, Arizonaâs
constitutional convention record does not support the conclusion that the
Private Affairs Clause protects such information and, thus, forecloses the
Stateâs warrantless access to it.
15
STATE V. MIXTON
Opinion of the Court
C.
¶39 We next address the applicability of the âreasonable
expectation of privacyâ analysis to our delineation of the scope of the
Private Affairs Clauseâs protections.
¶40 The dissent urges that we avoid any inquiry of the
reasonableness of our citizensâ expectation of privacy in discerning the
meaning of âprivate affairs.â Infra ¶ 127. But the very concept of âprivacyâ
is difficult to reconcile with persons who transmit information to third
parties, such as corporate entities, who are free to collect, maintain, and
make collateral commercial use of it. Consequently, any definition of
âprivacyâ must logically entail consideration of the nature of the
information, and whether and how it is shared with others. Additionally,
it must necessarily include an assessment of the reasonableness of an
asserted privacy interest to determine whether it is, in fact, private.
¶41 Our consideration of the reasonable expectation of privacy
analysis, or at least its inherent logic in defining the scope of the Private
Affairs Clause, is not novel, and the dissent ignores or discounts our long-
standing approach to article 2, section 8. We do not discern the scope of the
Private Affairs Clause in a vacuum, but rather we apply the âreasonable
expectation of privacy testâ to determine its protections. See, e.g., Mazen v.
Seidel, 189 Ariz. 195, 198â200 (1997) (holding that a homeowner forfeits any
reasonable expectation of privacy once firefighters enter his house); Ault,
150 Ariz. at 463 (âIt is clear that the Fourth Amendment . . . and article 2,
section 8 of the Arizona Constitution proscribe unreasonable search and
seizure by the state.â); State v. Juarez, 203 Ariz. 441, 445 ¶ 16 (App. 2002)
(âArizona courts have consistently applied the Fourth Amendmentâs
âlegitimate expectation of privacyâ requirement when determining
unlawful search or seizure claims made pursuant to Article 2, Section 8.â).
Thus, the Private Affairs Clause protects a privacy interest in an IP address
and ISP subscriber information only if society is prepared to accept such an
expectation of privacy as reasonable, see Mazen, 189 Ariz. at 198â200; Juarez,
203 Ariz. at 445 ¶ 16, or, stated differently, if the nature and use of the
information is consistent with what is reasonably conceived as being
private.
¶42 Mixton and the court of appeals contend that internet users
are entitled to a reasonable expectation of privacy in all internet activity.
16
STATE V. MIXTON
Opinion of the Court
But the technological reality belies this claim. Indeed, the websites
themselves are public, and are locatable through public search engines.
Moreover, third parties often engage in pervasive and prolific derivative
disclosure and sharing of internet usersâ online activity. For example,
â[i]nternet activity tracking is used frequently by online advertising
networks to create target[ed] advertisements based on usersâ individual
preferences by tracking the user in a variety of ways.â Alicia Shelton, A
Reasonable Expectation of Privacy Online âDo Not Trackâ Legislation, 45 U. Balt.
L.F. 35, 41 (2014). In fact, third-party advertisement networks often share
browsing information from multiple websites to build profiles on users. See
id. (âSuddenly the ad network knows not just technical details of a browser,
but potentially very personal information about its user.â). An
investigation of third-party collection and use of internet usersâ activity
revealed that numerous companies track online activity through the top 100
visited websites. Andrew Couts, Top 100 Websites: How They Track Your
Every Move Online, Digital Trends (Aug. 30, 2012),
http://www.digitaltrends.com/web/top-100-websites-how-are-they-
tracking-you/.
¶43 Website operators also collect data on, and analyze, internet
usersâ activities. For example, websites can use âbrowser fingerprintingâ
programs to gather âinnocuous bits of information, such as a browserâs
version number, plug-ins, operating system, and language, [so that]
websites can uniquely identify (âfingerprintâ) a browser and, by proxy, its
user.â Omer Tene & Jules Polonetsky, To Track or âDo Not Trackâ: Advancing
Transparency and Individual Control in Online Behavioral Advertising, 13 Minn.
J.L. Sci. & Tech. 281, 294â95 (2012); see also DuckDuckGo, Privacy
Mythbusting #4: I canât be identified just by browsing a website. (If only!) (July
11, 2017), https://spreadprivacy.com/browser-fingerprinting/. Apps and
other programs on mobile devices can also be used to âtrack users across
websites.â See Tene & Polonetsky, supra, at 296; Thomas Brewster,
Exclusive: Warning Over Chinese Mobile Giant Xiaomi Recording Millions of
Peopleâs âPrivateâ Web and Phone Use, Forbes (Apr. 30, 2020, 09:25 AM),
https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-
warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-
private-web-and-phone-use/#75527f831b2a. Websites also often employ
âcookiesâ that allow them to track internet usersâ browsing habits. In re
Nickelodeon Consumer Privacy Litig., 827 F.3d 262, 268 (3d Cir. 2016).
17
STATE V. MIXTON
Opinion of the Court
¶44 In sum, in this age of information sharing and inter-
connectivity, â[m]ost of us understand that what we do on the [i]nternet is
not completely private.â Id. at 266 (noting that our personal data âfeed[s]
an entire system of trackers, cookies, and algorithms designed to capture
and monetize the information we generateâ). Our âubiquitous and
pervasive internet useâ that is âinternet-connected, cloud-dependent, and
app-reliant for personal communications, all manner of commercial
transactions, 24-7 entertainment, and universal positional tracking,â makes
it hard to believe that anyone still retains âthis largely antiquated notionâ
of âanonymity in their internet use.â Mixton, 247 Ariz. at 230 ¶ 49
(Espinosa, J., dissenting in part). Whether internet users are troubled with
this degree of data collection and sharing is beyond the purview of our
authority. It is the legislatureâs prerogative to proscribe or curtail use of
such data. However, given third-partiesâ widespread and pervasive
collection, analysis, and sharing of detailed internet activity, including
website visitation, we are unpersuaded that Mixton held a reasonable
expectation of privacy in his IP address and ISP subscriber information.
Consequently, as here, when a person discloses non-content information to
a third party, even under the earnest but misguided belief that the third-
party will safeguard the information, such information sharing is
fundamentally inconsistent with any notion of privacy and he forfeits a
reasonable expectation of privacy in that information. See Carpenter, 138 S.
Ct. at 2216.
¶45 The dissent asserts that the reasonable expectation inquiry
provides an âamorphous standardâ that is absent in our constitutional text.
Specifically, the dissent claims that this framework âreplaces an objective
state constitutional command with a subjective standard whose meaning
changes over time to reflect an evolving societal consensus.â In so claiming,
the dissent dismisses the relevance of court decisions to the inquiry. Infra
¶ 111.
¶46 The dissent overlooks the obvious. The text of the Private
Affairs Clause does not define the meaning of âprivate affairs,â nor does
the history of its passage delineate the scope of its application. Thus, its text
does not command, objectively or otherwise, the standard by which we
determine its reach. We merely follow this Courtâs longstanding approach
in applying the reasonable expectation analysis to determine how to apply
the Private Affairs Clause, and the central inquiry remains whether an
asserted interest is private. See supra ¶ 41. The dissentâs invocation of âan
18
STATE V. MIXTON
Opinion of the Court
objective state constitutional commandâ does nothing to inform the
inquiry.
¶47 The unanimous federal court authority, supra ¶ 20, and the
clear consensus of state courts, infra ¶ 64, finding no privacy interest in IP
addresses and ISP subscriber information, have affirmed their respective
jurisdictionâs popular consensus on this point as reflected in their laws
permitting access to this information without court authorization. Federal
and state lawsâlike the one that authorized the federal administrative
subpoenas in this caseâreflect a consensus view of our citizensâ privacy
interests in IP addresses and ISP subscriber information. Furman v. Georgia,
408 U.S. 238, 383 (1972) (Burger, CJ., dissenting) (â[I]n a democratic society
legislatures, not courts, are constituted to respond to the will and
consequently the moral values of the people.â). Here, the Arizona
legislature also expressed the will of our citizens by authorizing law
enforcement officials to obtain such information with subpoenas. See A.R.S.
§ 13-3018(A), (C).
¶48 The dissent urges that in lieu of assessing what reasonable
expectation of privacy society is prepared to accept, we should adopt an
analytical framework wherein we ask two questions: â(1) whether the
search encompasses intimate details of a personâs life, and (2) whether the
disclosure of information was made for a limited purpose and not for
release to other persons for other reasons. If those two criteria are met, the
information is a private affair and the government may obtain it only with
authority of law.â Infra ¶ 127. The dissent then concludes that both criteria
are met here. We disagree.
¶49 First, IP addresses and ISP information do not reveal intimate
details of a personâs life. Supra ¶¶ 3, 25. Second, as discussed, an IP address
is akin to a return address on an envelope deposited in the mail, and an
internet userâs online activities are routinely âreleased to other persons for
other reasons.â Supra ¶¶ 2, 40â41. Third, IP addresses and ISP records
belong to the third-party provider, not the subscriber. Supra ¶ 25.
Moreover, despite the dissentâs assertion that sharing information with
individuals in an ostensible position of trust does not render the
information public, infra ¶ 130, providing information to a third-party ISP
that may disseminate the information for commercial purposes stretches
the notion of privacy too far. Thus, we conclude that IP addresses and ISP
19
STATE V. MIXTON
Opinion of the Court
information are not a âprivate affairâ even under the dissentâs alternative
analytical approach.
¶50 Essentially, the dissent contends that the textual differences
between the Fourth Amendment and the Private Affairs Clause necessarily
lead to different protections for IP addresses and subscriber information.
Infra ¶¶ 78, 86â89, 99. We disagree. Although we agree that the textual
variations signal broader protections under the Private Affairs Clause, we
reject the dissentâs implication that the term âprivate affairsâ forecloses
consideration of conductâsuch as sharing information with a third partyâ
that is inconsistent with the notion of privacy when defining the provisionâs
scope, or that its different terms necessarily provide broader protections
than the Fourth Amendment in every circumstance.
¶51 Thus, we conclude that an IP address and subscriber
information are not âprivate affairsâ under the Private Affairs Clause
because the nature of the information is inconsistent with privacy: an
internet userâs expectation of privacy in such non-content information is
unreasonable in light of the nature of the information; it is voluntarily
shared with third parties; and such third parties own, and often engage in
pervasive legal derivative use of, it.
D.
¶52 The court of appeals asserts that the stateâs possession of an
IP address and ISP subscriber information is the âtwenty-first-century
equivalent of a trip through a home to see what books and magazines the
residents read, who they correspond with or call, and who they transact
with and the nature of those transactions.â Mixton, 247 Ariz. at 225 ¶ 27.
We disagree. As discussed, supra ¶ 25, an IP address does not provide the
state with an illicit view into an internet userâs private affairs because,
absent a warrant, the state is prohibited from examining the substance or
content of a userâs communications. In fact, the only information the state
theoretically could acquire about an internet userâs online activities through
an IP address is the information a user discloses to a website and which the
website subsequently chooses to publicize. See, e.g., Kelly Weill, Edits to
Wikipedia pages on Bell, Garner, Diallo traced to 1
Police Plaza, Politico (Mar. 13, 2015, 05:28 AM), https://www.politico.com
/states/new-york/city-hall/story/2015/03/edits-to-wikipedia-pages-on-
bell-garner-diallo-traced-to-1-police-plaza-087652 (explaining that
20
STATE V. MIXTON
Opinion of the Court
reporters determined internet users at New York Police Department
headquarters edited Wikipedia pages because Wikipedia published the IP
addresses of unregistered editors).
¶53 The sole issue before us is whether the State may obtain an IP
address and ISP subscriber information with a valid federal administrative
subpoena. Although we hold that internet users, by virtue of voluntarily
providing this non-content information to third-party providers, do not
have a reasonable expectation of privacy in this discrete class of information
under the federal or Arizona Constitutions, we need not consider the
constitutionality of the Stateâs theoretical derivative use of this non-content
information to discover what some websites may publicize about a userâs
internet search history. We underscore, however, that the third-party
doctrine applies only to non-content information, see supra ¶¶ 14â20;
18 U.S.C. § 2702(a) (protecting the âcontents of a communicationâ), as does
our holding under the Arizona Constitution.
E.
¶54 Mixton and the court of appeals rely on cases from other
jurisdictions that have rejected applications of the third-party doctrine, or
the doctrineâs inherent logic, on state constitutional grounds. The court of
appeals claims that these states have rejected this approach under their state
constitutions because they have concluded that âpeople . . . have a
reasonable expectation of privacy in information they must furnish to
companies providing banking, phone, and internet services in order to use
those services.â See Mixton, 247 Ariz. at 224 ¶ 25 (collecting cases from
states that have rejected the third-party doctrine on state constitutional
grounds). But, save one of these cases, infra ¶ 62, these courts have not
recognized a reasonable expectation of privacy in an IP address or ISP
subscriber information.
¶55 In any event, numerous state courts have applied the third-
party doctrine or similar reasoning under their respective constitutions. See
State v. Clark, 752 S.E.2d 907, 921 n.13 (W. Va. 2013) (noting that Alabama,
Georgia, Kansas, Maryland, North Carolina, North Dakota, Oklahoma, and
South Carolina have adopted the third-party doctrine pursuant to Smith
and Miller). At best, Mixton correctly notes a split in state court authority
on the applicability of the third-party doctrine or similar reasoning to state
constitutions.
21
STATE V. MIXTON
Opinion of the Court
¶56 Mixton places particular emphasis on Washington state court
decisions, namely State v. Gunwall, 720 P.2d 808, 812 (Wash. 1986), and State
v. Miles, 156 P.3d 864, 868 ¶ 14 (Wash. 2007), for the proposition that the
third-party doctrine or its reasoning is inconsistent with Arizonaâs Private
Affairs Clause. Mixton contends that Washington has rejected Miller and
Smith and, thus, the third-party doctrine, and urges us to do the same. We
are unpersuaded. Washington has not categorically rejected the third-party
doctrine or its logic, but rather examines the scope of its state constitutionâs
protections on a case-by-case basis, and it has not considered whether its
constitution requires a warrant or court order to obtain an IP address and
ISP subscriber information.
¶57 Washington courts employ a non-exclusive, six-part test to
determine whether the state constitution affords broader protections than
the federal Constitution. Gunwall, 720 P.2d at 812â13 (enumerating factors
such as the textual language of the state constitution, significant textual
differences between the state and federal constitutions, state constitutional
and common law history, preexisting state law, structural variance between
the state and federal constitutions, and matters of state interest or local
concern). In interpreting the Washington Constitution, âthe relevant
inquiry for determining when a search has occurred is whether the State
unreasonably intruded into the defendantâs âprivate affairs.ââ Id. at 814.
Thus, Washington courts consider âthe type of information those records
revealedâ and âwhat kind of protection has historically been afforded to the
interest assertedâ when deciding whether a search violates the state
constitution. Miles, 156 P.3d at 868 ¶ 12â13.
¶58 In Gunwall, the Washington Supreme Court held that a
warrantless pen register violated the Washington Constitution. The court
emphasized that state statutes protecting communications were âbroad,
detailed and extend[ed] considerably greater protections to [Washington]
citizens in this regard than . . . comparable federal statutes and rulings.â
720 P.2d at 815. It also reasoned that a pen register, which records all of a
defendantâs outgoing calls, âmay affect other persons and can involve
multiple invasions of privacy as distinguished from obtaining documents
in a single routine search using a conventional search warrant.â Id. at 816.
As such, Gunwall relied on Washingtonâs statutes and the nature of pen
register information to inform its analysis of the scope of Washingtonâs
constitutional privacy protections.
22
STATE V. MIXTON
Opinion of the Court
¶59 In Miles, the Washington Supreme Court held that the stateâs
use of an administrative subpoena to search a personâs banking records
violated the state constitution. 156 P.3d at 866 ¶ 1. The courtâs analysis
centered on its precedents and the nature of the seized information to
determine whether it was protected by the state constitution. Id. at 868 ¶ 14
(noting that courtâs prior holding that garbage placed at the curb is
protected by the state constitution because it may contain sensitive personal
information). The court emphasized that banking records reveal âwhat
political, recreational, and religious organizations a citizen supports. They
potentially disclose where the citizen travels, their affiliations, reading
materials, television viewing habits, financial condition, and more.â
Id. at 869 ¶ 17. The Miles Court also noted, as in Gunwall, that state statutes
protect a customerâs banking information and govern third-party
disclosures. Id. at 869 ¶ 16. The court reasoned that the sensitive nature of
a customerâs banking records required a warrant or subpoena issued by a
neutral magistrate for its seizure. Id. at 869â70 ¶¶ 19â22.
¶60 We find Gunwall and Miles distinguishable. First, unlike
Washington, Arizona statutes and court decisions do not provide greater
protections concerning pen registers or banking records than do federal
statutes and rulings. See, e.g., A.R.S. § 13-1812 (authorizing county
attorneys to issue a subpoena duces tecum for financial institution account
records). In fact, contrary to Washingtonâs expansive legislative privacy
protections which animate its courtsâ constitutional decisions in this area,
see State v. Roden, 321 P.3d 1183, 1185â86 (Wash. 2014), the Arizona
legislature has authorized the state to issue administrative subpoenas for
subscriber information and other non-content service provider records
based on a showing that âthe information likely to be obtained is relevant
to an ongoing criminal investigation.â See § 13-3018(A), (C). Second, an IP
address or ISP subscriber information does not implicate the privacy
interests addressed in those cases. See supra ¶¶ 24â25.
¶61 The dissentâs reliance on State v. Hinton is similarly misplaced.
There, the Washington Supreme Court held that police may not inspect text
messages on a defendantâs cell phone without a search warrant because
they are a âprivate affairâ under the state constitution. 319 P.3d 9, 11 ¶ 1
(Wash. 2014). But a text message, unlike an IP address or subscriber
information, is considered âcontentâ and, thus, is also subject to the Fourth
23
STATE V. MIXTON
Opinion of the Court
Amendmentâs warrant requirement. See Riley v. California, 573 U.S. 373, 403
(2014). Hinton is inapposite to the issue before us.
¶62 We also note that the Washington Supreme Court considers
the interests of national uniformity when determining whether to extend its
state constitutional provisions beyond the federal constitutional
protections. Gunwall, 720 P.2d at 813. We recognize the utility in uniform
state and federal criminal rules, procedures, and standards. See, e.g., Bolt,
142 Ariz. at 269. The nature of cybercrime squarely implicates these
interests and militates in favor of uniform federal and state search and
seizure standards. See, e.g., Megan McGlynn, Competing Exclusionary Rules
in Multistate Investigations: Resolving Conflicts of State Search-And-Seizure
Law, 127 Yale L.J. 406, 411 (2017) (noting that multi-jurisdictional search and
seizure issues are proliferating as a consequence of advancing
technologies).
¶63 Thus, we conclude that, even applying the Washington
courtsâ approach, Arizonaâs Private Affairs Clause does not require a
warrant or court order to obtain an IP address or subscriber information.
F.
¶64 State courts may be split on the applicability of the third-party
doctrine or similar approaches to state constitutions, but a clear consensus
now exists concerning whether such constitutions protect an IP address and
ISP subscriber information. Of the six states that have considered the issue,
all but one have determined that their citizens hold no reasonable
expectation of privacy in such information. See Rader v. State, 932 N.E.2d
755, 761â62 (Ind. Ct. App. 2010) (holding that the state constitution does not
require a warrant for internet subscriber information); State v. Leblanc, 137
So. 3d 656, 658â62 (La. Ct. App. 2014) (âEven if we were to assume that
defendant or his wife had an actual or subjective expectation of privacy in
the subscriber information provided to Cox, we would still find that this
expectation of privacy would not be recognized by society as reasonable.â);
State v. Mello, 27 A.3d 771, 776â77 (N.H. 2011) (â[W]hile individuals may
have a reasonable expectation of privacy in the contents of their
communications, i.e., the content of e-mails and the specific content viewed
over the Internet, they have no such privacy interest in information
voluntarily disclosed to an Internet service provider in order to gain access
to the Internet.â); State v. Delp, 178 P.3d 259, 262â65 (Or. Ct. App. 2008)
(â[D]efendant has not directed us to any source of law that establishes that
24
STATE V. MIXTON
Opinion of the Court
he has some interest in keeping private the noncontent information that is
held by a third party regarding his Internet usage. Nor are we aware of any
principle that would prevent AOL from responding to a proper
government subpoena concerning his subscriber information.â); State v.
Simmons, 27 A.3d 1065, 1069â70 (Vt. 2011) (âNothing in our [state
constitutional] rulings suggest that an internet subscriber address and
frequency of use data, unembellished by any personal information, should
be treated as private.â).
¶65 Apart from the court of appeals and dissent here, the only
court to recognize a state constitutional right to privacy in subscriber
information provided to an ISP did not require the state to procure a search
warrant for such information, but rather permitted disclosure of the
information with a grand jury subpoena and without notice to the
subscriber. State v. Reid, 945 A.2d 26, 33â37 (N.J. 2008). The dissentâs search
warrant requirement for non-content IP address and ISP subscriber
information calls into question the viability of other long-standing law
enforcement compulsory process investigative tools, including those that
require a court order to collect private information but permit disclosure
under a lower standard than probable cause. See, e.g., A.R.S. § 13-3017
(authorizing law enforcement officials to obtain a judicial ex parte order to
install and use a pen register or trap and trace device based upon the
likelihood that the information âto be obtained is relevant to an ongoing
criminal investigationâ); A.R.S. § 13-1812 (authorizing a county attorney to
issue âa subpoena duces tecum to a financial institution to obtain account
recordsâ in an investigation or prosecution of enumerated offenses).
¶66 The dissent contends that âit should not be difficultâ for the
state to obtain a search warrant âin the circumstances of this case.â Infra
¶ 131. But requiring a search warrant to obtain an IP address and
subscriber information would essentially limit law enforcement to
investigating completed internet-based offenses. For example, what if
Mixton had merely queried the undercover detective about trading child
pornographic images, but never transferred the photographs? This
unworkable approach would invariably stifle proactive investigations of
internet-based crimes.
G.
25
STATE V. MIXTON
Opinion of the Court
¶67 The court of appeals and Mixton warn that the logic
underlying the third-party doctrine may lead to eradication of anonymous
speech and that internet users would have to engage in âsome unidentified
Herculean effort to maintain anonymityâ to partake in internet activities
free from government intrusion. Mixton, 247 Ariz. at 226 ¶ 31. Not true.
¶68 First, Mixtonâs assertion of a right to speak anonymously does
not extend to anonymous distribution of illicit material without legal
consequence. See New York v. Ferber, 458 U.S. 747, 763 (1982) (noting âchild
pornography as a category of material outside the protection of the First
Amendmentâ); Mobilisa, Inc. v. Doe, 217 Ariz. 103, 108 ¶ 12 (App. 2007)
(âThe right to speak anonymously, however, is not absolute . . . [and] an
anonymous speaker, like a known one, has no First Amendment right to
engage in obscenity.â). Neither the federal administrative subpoena here,
nor any provision under Arizona law, would permit the state to acquire an
IP address or subscriber information for a reason unrelated to a criminal
investigation, and no federal or Arizona constitutional provision protects
the anonymous distribution of child pornography.
¶69 Second, anonymous speech is not implicated in this case
because Mixton did not plausibly endeavor to elude identification.
Although he used a pseudonym as his personal identifier on his Kik
account, he conveyed data files to others using his actual IP address. As
noted, supra ¶ 2, an IP address functions as a return address for any
internet-based computer activity. Essentially, Mixtonâs internet use of a
pseudonym is analogous to his mailing a letter under a pseudonym but
scrawling his actual return address on the outside of the envelope.
Unsurprisingly, a letter sender is afforded no constitutional protections to
the information on the outside of an envelope. See Forrester, 512 F.3d at 511.
Although we embrace the principle of anonymous speech and recognize its
inestimable contribution to our liberty, authoring an essay under the
pseudonym âPubliusâ does little to preserve the authorâs anonymity if the
exterior of the envelope containing the essay reads âFrom the Office of
Alexander Hamilton.â
¶70 Third, the court of appeals and Mixton exaggerate the lengths
necessary to maintain anonymity over the internet. An internet userâs
âHerculean effort to maintain anonymityâ entails no more than using
publicly available computers, publicly available WiFi networks, or VPNs to
mask his IP address. Shuntich & Vogel, supra ¶ 3, at 51; supra ¶ 23.
26
STATE V. MIXTON
Opinion of the Court
¶71 Finally, Mixton and the court of appealsâ remonstrance on the
demise of anonymous speech is curious in light of its persistence in the
wake of more than a decade of uniform federal jurisprudence affirming the
constitutionality of law enforcement subpoena access to IP address and ISP
subscriber information. Supra ¶¶ 14â20.
H.
¶72 The court of appeals and Mixton raise the specter of official
misuse of the non-content fruits of the federal administrative subpoena.
This reasoning is highly speculative and beyond the facts before us. We
decline the invitation to center our constitutional analysis on such
speculation about potential abuse of government authority. See Golden v.
Zwickler, 394 U.S. 103, 108 (1969) (noting that ââconcrete legal issues,
presented in actual cases, not abstractionsâ are requisiteâ to adjudicating
constitutional issues (quoting United Pub. Workers of Amer. (C.I.O.) v.
Mitchell, 330 U.S. 75, 89 (1947))).
¶73 First, in this case, the scope of the federal administrative
subpoena is not subject to abuse on its terms because, as relevant here, it
only allows an agency district director or special agent to obtain IP address
and ISP subscriber information based upon an articulable belief that the
information is relevant to investigation of a child-exploitation crime. 19
U.S.C. § 1509(a)(1) (âIn any investigation . . . conducted for the purpose
of . . . insuring compliance with the laws of the United States administered
by the United States Customs Service, the Secretary (but no delegate of the
Secretary below the rank of district director or special agent in charge) may
â examine . . . any record . . . which may be relevant to such
investigation.â). The subpoena did not permit the government to obtain
content-based information, which remains subject to a warrant
requirement. Supra ¶¶ 14â20. Any concern that the government may
misuse the non-content IP address and ISP subscriber information, once
lawfully obtained, is not before us.
¶74 Second, it is illogical to condition the constitutionality of an
otherwise lawful compulsory process based on speculation that the process
may be abused or its fruits may be put to illegal use. Instead, an aggrieved
party may seek recourse from the courts to rectify an unlawful search or
seizure. See, e.g., State v. Buccini, 167 Ariz. 550, 558 (1991) (suppressing
27
STATE V. MIXTON
Opinion of the Court
evidence when a police officer âhas deliberately or recklessly made material
misstatements and omissions in the original affidavitâ and a redrafted
affidavit would otherwise lack probable cause). Here, the state obtained
Mixtonâs IP address and ISP subscriber information with a valid federal
administrative subpoena, and could similarly have done so under Arizona
law (§ 13-3018(A), (C)), which ensures that a record is generated to justify
its issuance and to afford a remedy. See United States v. Barnes, No. CR18-
5141 BHS, 2019 WL 2515317, at *7 (W.D. Wash. June 18, 2019) (noting that,
although 19 U.S.C. § 1509(a)(1) provides no suppression remedy, evidence
seized based upon a statutory violation may be suppressed if âthe excluded
evidence arose directly out of statutory violations that implicated important
Fourth and Fifth Amendment interestsâ (quoting Sanchez-Llamas v. Oregon,
548 U.S. 331, 348 (2006))).
CONCLUSION
¶75 We hold that neither the Fourth Amendment to the United
States Constitution nor article 2, section 8 of the Arizona Constitution
requires law enforcement officials to secure a search warrant or court order
to obtain IP addresses or subscriber information voluntarily provided to
ISPs as a condition or attribute of service. The Fourth Amendment does not
apply to IP addresses or subscriber information under the third-party
doctrine, and this information is not a âprivate affairâ under the Private
Affairs Clause. Thus, the state lawfully obtained this information with a
valid federal administrative subpoena.
¶76 Because we hold that IP address and ISP subscriber
information does not qualify for protection as a âprivate affairâ under
article 2, section 8, and that the state lawfully obtained this information with
a federal administrative subpoena, we need not address whether the
Arizona Constitutionâs âlawful authorityâ requirement is necessarily
limited to a search warrant, nor do we consider the stateâs good-faith
exception argument.
¶77 We affirm Mixtonâs convictions and vacate the court of
appealsâ opinion.
28
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
BOLICK, J., joined by BRUTINEL, C.J. and TIMMER, V.C.J., dissenting.
¶78 We are now in the second century of Arizona statehood, yet
this is the first time the Court has given more than cursory consideration to
the meaning of the private affairs clause of article 2, section 8 of the Arizona
Constitution. That provision has no analogue in the federal constitution
and was clearly intended to provide additional and forceful protections to
Arizonans against government intrusions into their private affairs. Because
the majority interprets the private affairs clause in lockstep with the less-
protective Fourth Amendment as construed by the United States Supreme
Court, thereby draining the meaning expressed in the clause and intended
by its architects, we respectfully dissent.
I.
¶79 As Arizona was the forty-eighth state, its framers âhad the
opportunity to ponder more than 100 years of United States history before
penning their own constitution, allowing them to adopt or adjust
provisions employed by the federal government or other states to meet
Arizonaâs needs.â Rebecca White Berch et al., Celebrating the Centennial: A
Century of Arizona Supreme Court Constitutional Interpretation, 44 Ariz. St. L.J.
461, 468 (2012) [hereinafter âBerchâ]. In some instances, the framers
concluded they could not improve upon the federal constitutional framersâ
handiwork; in others, they sought to add greater protections of individual
rights and constraints on government power.
¶80 In particular, as this Court has recognized, our constitutionâs
Declaration of Rights is the âmain formulation of rights and privileges
conferred on Arizonans.â Mountain States Tel. & Tel. Co. v. Ariz. Corp.
Commân, 160 Ariz. 350, 356 (1989). Thus, it is our duty to âfirst consult our
constitutionâ whenever a right it âguarantees is in question.â Id. As former
Chief Justice Rebecca Berch observed, â[h]ad the framers merely intended
to mirror the guarantees found in the Federal Bill of Rights, they could have
simply adopted the first eight amendments of the U.S. Constitution. But
records of Arizonaâs convention clearly show that the framers did not
always agree with the language or implementation of the Federal Bill of
Rights.â Berch, supra ¶ 79, at 469.
29
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
¶81 The federal constitution is the baseline for the protection of
individual rights, below which the states cannot go; but in our system of
federalism, states are free to provide greater protections. City of Mesquite v.
Aladdinâs Castle, Inc., 455 U.S. 283, 293 (1982); see also PruneYard Shopping Ctr.
v. Robins, 447 U.S. 74, 81 (1980). Our constitutionâs framers repeatedly did
so in the Declaration of Rights, and especially in the private affairs clause.
Whereas the vast majority of state constitutions have provisions that
roughly parallel the language of the Fourth Amendment, only twoâours
and Washington Stateâs, whose provisions are identicalâdeliberately chose
to depart from the Fourth Amendmentâs language in favor of a distinct
provision encompassing a protection for private affairs. Timothy Sandefur,
The Arizona âPrivate Affairsâ Clause, 51 Ariz. St. L.J. 723, 724 (2019).
¶82 Rather than accord independent vitality to a protection of
individual rights in our constitution, the majority urges that we should
extol âthe value in uniformity with federal law when interpreting and
applying the Arizona Constitution.â Supra ¶ 32. Uniformity is certainly a
value, and when all other things are equal, uniformity may be preferable to
divergence. But where the Constitutionâs framers made deliberate effort to
distinguish our state constitutional protections from the narrower confines
of the federal constitution, our failure to credit and enforce our
constitutionâs language and intent inevitably means that those protections
will not have their intended effect. See Berch, supra ¶ 79, at 473 (â[I]t is not
always appropriate to assume that state and federal provisions should be
construed identically, given the unique legislative history, purpose, and
text of the Arizona provision.â); see also Ruth V. McGregor, Recent
Developments in Arizona State Constitutional Law, 35 Ariz. St. L.J. 265, 276
(2003) (âNone of the opinions from our court provide any in-depth analysis
of the reasons we have so often opted for a goal of uniformity.â).
¶83 Indeed, the Supreme Court has recognized that an âinterest
in uniformity . . . does not outweigh the general principle that States are
independent sovereigns with plenary authority to make and enforce their
own laws as long as they do not infringe on federal constitutional
guarantees.â Danforth v. Minnesota, 552 U.S. 264, 280 (2008). The statesâ
authority to make distinct rules of criminal procedure, the Court remarked,
âis not otherwise limited by any general, undefined federal interest in
30
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
uniformity. Nonuniformity is, in fact, an unavoidable reality in a federalist
system of government.â Id.
¶84 This Court has consistently recognized âthat a Constitution
should be construed so as to ascertain and give effect to the intent and
purpose of the framers and the people who adopted it.â State ex rel.
Morrison v. Nabours, 79 Ariz. 240, 245 (1955); accord Rumery v. Baier, 231 Ariz.
275, 278 (2013). Arizonaâs framers did not leave us guessing what they had
in mind in crafting the Declaration of Rights, emphasizing in the first two
sections âthe security of individual rightsâ and that the purpose of
government is âto protect and maintain individual rights.â Ariz. Const. art.
2, §§ 1â2.
¶85 Constitutional text should be interpreted according to its
ordinary public meaning, that is, by reference to the meaning of the
language generally understood when it was adopted. See, e.g., District of
Columbia v. Heller, 554 U.S. 570, 577 (2008). Thus, this Court has emphasized
that âeffect be [especially] given to the purpose indicated, by a fair
interpretation of the language used, and unless the context suggests
otherwise words are to be given their natural, obvious and ordinary
meaning.â Morrison, 79 Ariz. at 245; accord State ex rel. Brnovich v. City of
Phoenix, 468 P.3d 1200, 1205 ¶ 21 (2020) (explaining that, in interpreting
state constitutional provisions, âwe give the words their ordinary meaning,
unless the context suggests a different oneâ).
¶86 A comparison of the words of the Fourth Amendment and
those chosen by the framers of article 2, section 8 underscore the stark
differences:
The right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and
seizures, shall not be violated, and no Warrants shall issue,
but upon probable cause, supported by Oath or affirmation,
and particularly describing the place to be searched, and the
persons or things to be seized.
U.S. Const. amend. IV.
31
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
No person shall be disturbed in his private affairs, or his home
invaded, without authority of law.
Ariz. Const. art. 2, § 8.
¶87 Most obvious and pertinent here, the protection of âprivate
affairsâ is nowhere found in the Fourth Amendment. Indeed, a right to
privacyâbased not on express constitutional text but on âpenumbras,
formed by emanationsââwould not be found in the federal constitution for
another 53 years. See Griswold v. Connecticut, 381 U.S. 479, 484 (1965). Its
express inclusion in a 1912 state constitution strongly suggests that the
framers had a significant protection in mind, one whose omission in the
federal constitution they found wanting.
¶88 Moreover, by its terms, the Fourth Amendment is limited to
âpersons, houses, papers, and effects,â which are protected only against
âunreasonable searches and seizures.â By contrast, the scope of âprivate
affairsâ under article 2, section 8 is broader on its face, and the protection is
categorical. See State v. Simpson, 622 P.2d 1199, 1205 (Wash. 1980)
(construing identical language that âclearly recognizes an individualâs right
to privacy with no express limitationsâ).
¶89 And our constitutional language was not chosen randomly.
The delegates to the constitutional convention considered language parallel
to the Fourth Amendment, but instead adopted language containing the
private affairs clause from the Washington Constitution. See Goff, Records
of the Arizona Constitutional Convention 507â08 (1991). In other words, the
language of article 2, section 8 was deliberately chosen as an alternative to the
language of the Fourth Amendment. Cf. State v. Gunwall, 720 P.2d 808, 814â
15 (Wash. 1986) (noting that delegates to the Washington State
constitutional convention specifically rejected Fourth Amendment
language, which âlends support to reading [the private affairs clause]
independently of federal lawâ).
¶90 Indeed, in rejecting language echoing the Fourth
Amendment, Arizonaâs constitutional framers changed existing Arizona
law. The Arizona territory was governed by the Howell Code, which
contained a provision nearly identical to the Fourth Amendment. Howell
32
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
Code art. VII (1864). Once statehood was achieved, the new constitutionâs
architects abandoned that approach in favor of the broader, express privacy
provision of article 2, section 8. And when a legislature amends a provision
by making a significant change in language, we presume it intended a
different meaning. Antonin Scalia & Bryan A. Garner, Reading Law: The
Interpretation of Legal Texts 256 (2012).
¶91 All of which invites the question: if the framers wanted to
craft language that would be enforced on its own terms, how could they
have better done so than to reject one set of words and deliberately adopt
another? Under such circumstances, we should be loath to interpret the
language the framers chose in lockstep with language the framers
consciously rejected, and indeed, not only as it was interpreted in 1912 but
as the Supreme Court has construed it many years later. See Sandefur, supra
¶ 81, at 750 (âEven if the wording of both constitutions is identical, there is
no constitutional justification for following federal precedent that only
originates after the people of a state ratify their state constitution.â).
¶92 That the framers meant our constitutional language to have
independent vitality necessarily follows from the fact that when our
constitution was adopted, the Fourth Amendment was not yet applicable
to the states through incorporation under the Fourteenth Amendment. See
Wolf v. Colorado, 338 U.S. 25, 33 (1949) (declining to apply exclusionary rule
against the states); see also Twining v. New Jersey, 211 U.S. 78, 108â14 (1908)
(discussing history of incorporation and collecting cases). Thus, our
Declaration of Rights was meant to provide the solitary protection for
individual liberty against the state. Berch, supra ¶ 79, at 468. As former
Chief Justice Ruth McGregor has observed, because the Bill of Rights did
not yet apply to the states, âthe drafters of our state constitution could not
have operated under the assumption that interpretations of the federal
constitution would control the rights guaranteed citizens under the state
constitution.â McGregor, supra ¶ 82, at 275.
¶93 And the dominant school of state constitutional interpretation
at the time was originalism, so the framers likely expected their handiwork
to be interpreted on its own terms rather than through federal court
interpretations of a different constitution. See Jeremy M. Christiansen,
Originalism: The Primary Canon of State Constitutional Interpretation, 15 Geo.
33
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
J.L. & Pub. Polây 341, 351 (2017); id. at 368â69 (recounting Arizona cases to
that effect). Our early cases specified that the purpose of rules of
interpretation is to arrive at the intent of the framers. See, e.g., State v.
Osborne, 14 Ariz. 185, 204 (1912) (stating that the rule of constitutional
construction that each clause should be given meaning exists âso that intent
of the framers may be ascertained and carried outâ).
¶94 This Court frequently has interpreted provisions of our state
constitution more broadly than their federal counterparts, and sensibly, we
have done so especially where the language is different. Thus, we have
repeatedly held that our speech protection is broader than that accorded by
the First Amendment. See, e.g., Brush & Nib Studios, LC v. City of Phoenix,
247 Ariz. 269, 281â82 ¶ 45 (2019); Mountain States, 160 Ariz. at 354â56.
Likewise, our courts have construed the broader language of article 2,
section 17 of the Arizona Constitution to provide greater protection against
eminent domain than does the Fifth Amendmentâs takings clause as
construed by the Supreme Court. See, e.g., Inspiration Consol. Copper Co. v.
New Keystone Copper Co., 16 Ariz. 257, 259â60 (1914) (stating that court
decisions construing takings provisions in the federal and other state
constitutions âare not controlling in this state, and, indeed, lend us but little
aidâ in interpreting art. 2, § 17); Bailey v. Myers, 206 Ariz. 224, 229 ¶ 20 (App.
2003) (âThe federal constitution provides considerably less protection
against eminent domain than our Constitution provides.â). By contrast,
where the state constitutional language parallels that of the Bill of Rights,
we have tended to construe it in tandem with Supreme Court
interpretations of the federal constitutional provision. See, e.g., State v.
Carter, 469 P.3d 449, 449 ¶ 1 n.2 (2020) (âThe analysis under both the federal
and state constitutions is the same because the language is virtually
identical . . . .â).
¶95 Before today, this Courtâs analysis of the private affairs clause
has been scant. Indeed, the Courtâs initial analysis of the interplay between
article 2, section 8 and the Fourth Amendment comprised fewer than fifty
words. Malmin v. State, 30 Ariz. 258, 261 (1926) (cited supra § 31) (stating
that the two provisions âare of the same general effect and purposeâ).
Shortly thereafter, the Court emphasized that despite Malmin, â[w]e have
the right . . . to give such construction to our own constitutional provisions
as we think logical and proper, notwithstanding their analogy to the
34
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
Federal Constitution and the federal decisions based on that Constitution.â
Turley v. State, 48 Ariz. 61, 70â71 (1936).
¶96 By contrast, as the majority acknowledges, this Court has
construed the second provision of article 2, section 8âthe home invasion
clauseâmore broadly than the Fourth Amendment. Supra ¶ 32. See State
v. Ault, 150 Ariz. 459, 464â65 (1986) (rejecting the federal inevitable
discovery doctrine); State v. Bolt, 142 Ariz. 260, 264â65 (1984) (holding that
warrantless home entry is per se unlawful absent exigent circumstances).
In Bolt, the Court was âcognizant of the need for uniformity in
interpretation,â but recognized that â[o]ur constitutional provisions were
intended to give our citizens a sense of security in their homes and personal
possessions.â Id. at 264â65. Thus, it rendered its decision âbased upon our
own constitutional provision, its specific wording, and our own cases,
independent of federal authority.â Id. at 265. Likewise, in Ault, the Court
noted that â[u]nlawful entry of homes was the chief evil which the Fourth
Amendment was designed to prevent,â 150 Ariz. at 463, and that âour
constitutional provisions were generally intended to incorporate federal
protections . . . [but] they are more specific in preserving the sanctity of
homes and in creating a right of privacy.â Id. at 466 (emphasis added) (citation
omitted).
¶97 These cases, juxtaposed against the Courtâs decision today,
leave us in a curious and perplexing place. On the one hand, this Court has
construed the home invasion provision of article 2, section 8 more broadly
than the Fourth Amendment and has rejected Supreme Court doctrines
inconsistent with that clause, even though both provisions protect homes.
By contrast, the majority here subsumes the private affairs clause within the
Supreme Courtâs interpretation of the Fourth Amendment, even though the
Fourth Amendment does not on its face protect against government
intrusions into private affairs. By what principle does it do so? We are left
to ponder not only that, but by what standard we will determine when to
give independent meaning to our state constitutional language in other
contexts. By our lights, we should at least do so where the language is
conspicuously different, and certainly where (as here) no analogous
provision exists in the federal constitution. Otherwise, the necessary
consequence is to diminish constitutional protections.
35
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
¶98 It is especially hazardous to hitch the meaning of our
constitution to the Supreme Courtâs Fourth Amendment jurisprudence,
which the majority charitably depicts as âuniform and sound,â supra ¶ 21,
but is in fact characterized by confusion and constant change. The opacity
of this jurisprudence is visible in our recent decision in State v. Jean, in which
we attempted to determine whether the Supreme Courtâs Fourth
Amendment precedent requires a warrant for police to install a GPS device
on a commercial vehicle under the facts of the case. 243 Ariz. 331 (2018).
The case generated five separate opinions, including a majority opinion
with different parts written by two different justices who disagreed with
the parts of the opinion they did not write. Indeed, even the lodestars
invoked by the majority hereâSmith v. Maryland, 442 U.S. 735 (1979), and
United States v. Miller, 425 U.S. 435 (1976)âare called into question, to an
unknown extent, by Carpenter v. United States, 138 S. Ct. 2206 (2018).
¶99 We should not follow that long and winding road of Fourth
Amendment jurisprudence to its uncharted destination. See State v. Ingram,
914 N.W.2d 794, 797â98 (Iowa 2018) (holding that âwe encourage stability
and finality in law by decoupling Iowa law from the winding and often
surprising decisions of the United States Supreme Court,â and âtake the
opportunity to stake out higher constitutional groundâ). When the
constitutions converge, it makes sense to take Supreme Court decisions into
account and place value on uniform application. But where the language
of the two constitutions differsâand especially where our provision does
not appear in the federal constitution in any mannerârelying on the
Supreme Court to determine our constitutional meaning deprives our
citizens of the precious freedoms their forebears proclaimed when they
embraced a wider conception of liberty than the federal constitution. After
all, Supreme Court justices do not take an oath to uphold the Arizona
Constitution. But we do.
II.
¶100 This is the first case to attach the Supreme Courtâs Fourth
Amendment third-party doctrine to the Arizona Constitution. A fair
36
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
independent reading of the text and intent of article 2, section 8 shows the
protection of private affairs is incompatible with that doctrine.
¶101 While the Fourth Amendment specifies that âpersons, houses,
papers, and effectsâ are protected, article 2, section 8 more broadly protects
âprivate affairs.â And while the Fourth Amendment prohibits
âunreasonableâ searches and seizures, article 2, section 8 categorically
prohibits any disturbance âwithout authority of law.â By the provisionâs
clear terms, then, if the state wishes to invade a personâs private affairs, it
may do so only with authority of law, which makes the definition of
âprivate affairsâ determinative.
¶102 This Court gives provisions in law âtheir ordinary meaning
unless it appears from the context or otherwise that a different meaning is
intended.â Arizona ex rel. Brnovich v. Maricopa Cnty. Cmty. Coll. Dist. Bd., 243
Ariz. 539, 541 ¶ 7 (2018). The dictionary definition of âprivate,â both now
and at the time of Arizonaâs constitutional adoption, includes anything
concerning an individual or group that is not âintended to be known
publicly.â Private, Merriam-Webster, https://www.merriam-
webster.com/dictionary/private (last visited Jan. 16, 2020); see also Harry
Thurston Peck, New Websterian 1912 Dictionary Illustrated 649 (defining
private as ânot publicâ and âpeculiar to oneâs self.â). Likewise, âaffairsâ
means âpersonal business.â Affairs, Merriam-Webster; accord Peck at 17.
¶103 The majority similarly defines âprivateâ as âaffecting or
belonging to private individuals, as distinct from the public generallyâ; and
âaffairsâ as âa personâs concerns in trade or property; business.â Supra ¶ 33.
That is the first and only time the majority grapples with the original
meaning of âprivate affairs,â and it ultimately disposes of the term as
âambiguous,â id., never to be raised again.
¶104 True, âprivate affairsâ is not unambiguous. But this Court
does not throw up its hands in the face of ambiguity: if
âa constitutional provision is not clear on its face, we can use extrinsic
evidence to show the intent of the framers and the electorate that adopted
it.â Heath v. Kiger, 217 Ariz. 492, 495 ¶ 9 (2008). And significant,
uncontroverted evidence suggests we should read article 2, section 8 in a
way that gives effect to its text.
37
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
¶105 âPrivate affairsâ was a commonly used term during the
period preceding our constitutionâs adoption, and the protection of private
affairs was a major preoccupation of contemporary legislatures, courts, and
scholars. See, e.g., Samuel D. Warren & Louis D. Brandeis, The Right to
Privacy, 4 Harv. L. Rev. 193 (1890). A review of these efforts concludes that
ââ[m]ind your own businessâ was an eleventh commandment in nineteenth
century America.â The Right to Privacy in Nineteenth Century America, 94
Harv. L. Rev. 1892, 1904 (1981).
¶106 In particular, Americans in the twilight of the Nineteenth and
dawn of the Twentieth Centuries sought to keep what was private from
becoming public. A major concern was preventing the disclosure of private
information when third parties, such as telegraph operators, were entrusted
with transmission or delivery and the âmessages were necessarily read by
the operators who sent and received them.â Id. at 1901â02. Similarly,
Congressman James Garfield championed legislation against disclosure of
census information, so that an individualâs âprivate affairs, the secrets of
his family and his business,â would not be revealed. Id. at 1905. The
shielding of tax returns, in the words of the newspaper The Nation,
protected âthe ânatural and inalienable rightâ of everybody to keep his
affairs to himself.â Id. at 1906. Courts likewise protected the confidentiality
of certain public records to prevent making âpublic menâs private affairs.â
Id. at 1907 (quoting Buck & Spencer v. Collins, 51 Ga. 391, 397 (1874)).
¶107 These examples illustrate that âprivate affairsâ were
understood in the early Twentieth Century to broadly encompass both
personal and business matters, even if transmitted through third parties,
thus making Arizonaâs constitutional provision irreconcilable with the
later-emerging federal âthird-partyâ doctrine allowing any information
divulged to a third party to be obtained by the government without a
warrant.
¶108 The protection of private affairs was also reflected in local
concerns. In 1912, the year our constitution was adopted, the Arizona
Republican editorialized against a proposal to disclose the names of their
subscribers, condemning it as a âperniciously inquisitorialâ effort to gain
access to âprivate business affairs and financial affairs.â Sandefur, supra
38
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
¶ 81, at 731 n.47. That same year, the newspaper warned against
congressional investigations of alleged monopolies because âattacks upon
corporate credit and private affairs . . . ought to be deprecated.â Id. at 731.
It appears clear that the common meaning of âprivate affairsâ in statehood-
era Arizona encompassed the type of business transactions that would be
swept up by the third-party doctrine many decades later.
¶109 Indeed, this meaning of private affairs and its inclusion
within our constitutional protections is manifested even within Fourth
Amendment jurisprudence at the turn of the century. In Boyd v. United
States, the Court invalidated, under the Fourth and Fifth Amendments,
federal laws pursuant to which business invoices were obtained without a
warrant. 116 U.S. 616 (1886). The Court held that the principles animating
those amendments âapply to all invasions on the part of the government
and its employe[e]s of the sanctity of a manâs home and the privacies of
life,â holding that obtaining the business records âis the invasion of his
indefeasible right of personal security, personal liberty, and private
property.â Id. at 630. Seemingly anticipating a decision like todayâs, the
Court urged âthat constitutional provisions for the security of person and
property should be liberally construed. A close and literal construction
deprives them of half their efficacy, and leads to gradual depreciation of the
right, as if it consisted more in sound than in substance.â Id. at 635; see also
Ex parte Jackson, 96 U.S. 727, 733 (1877) (holding that sealed mail cannot be
opened without a warrant).
¶110 Given that the framers of article 2, section 8 intended to
incorporate the protections of the Fourth Amendment, see Ault, 150 Ariz.
at 463, these decisions form at minimum the baseline for the rights
protected. That our framers understood that private affairs meant oneâs
business, including transactions with others, is uncontestable. Surely it
would surprise the framers to know that the protections they embraced
would be subject to severe diminution through Supreme Court
interpretations of different provisions in the federal constitution many
decades later.
¶111 Yet the majority asserts that the private affairs clause
âprotects a privacy interest . . . only if society is prepared to accept such an
expectation of privacy as reasonable.â Supra ¶ 41. That amorphous
39
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
standard derives not from our constitutional text, but from a concurring
opinion in a Supreme Court decision applying the Fourth Amendment,
Katz v. United States. 389 U.S. 347, 361 (1967) (Harlan, J., concurring). 1 In so
doing, the majority replaces an objective state constitutional command with
a subjective standard whose meaning changes over time to reflect an
evolving societal consensus. 2
¶112 That standard has no textual or historical foundation in article
2, section 6. The framers of that provision informed us what society was
prepared to recognize when our constitution was adopted: that any
invasion of private affairs requires authority of law. And for us, then, the
proper inquiry is whether a particular matter constitutes a private affair.
1 In contrast to the majority here, however, Justice Harlan repeatedly
expressed an âaversion to national uniformity,â which he rejected as
inconsistent with our system of federalism that protects pluralism and
individual rights. See J. Harvie Wilkinson III, Justice John M. Harlan and the
Values of Federalism, 57 Va. L. Rev. 1185, 1196 (1971) (citing, inter alia, Duncan
v. Louisiana, 391 U.S. 145, 182 n.21 (1968) (Harlan, J., dissenting) (disdaining
âthe needless pursuit of uniformityâ) and Ker v. California, 374 U.S. 23, 45
(1963) (Harlan, J., concurring) (expressing concern over a âconstitutional
straitjacketâ)).
2 Even at the federal level, the Katz formulation has been subjected
to substantial criticism. See, e.g., Carpenter, 138 S. Ct. at 2244 (Kennedy,
Thomas, and Alito, JJ., dissenting) (âThat the Katz test departs so far from
the text of the Fourth Amendment is reason enough to reject it. But the Katz
test also has proved unworkable in practice.â); United States v. Jones, 565
U.S. 400, 407 (2012) (stating that courts must, at minimum, preserve the
degree of privacy that existed when the Fourth Amendment was adopted,
and that Katz does not provide the exclusive means to determine that
protection). Remarking on the Katz testâs inherent subjectivity, Justice
Scalia observed that it âbear[s] an uncanny resemblance to those
expectations of privacy that this Court considers reasonable,â and âhas no
plausible foundation in the text of the Fourth Amendment.â Minnesota v.
Carter, 525 U.S. 83, 97 (1998) (Scalia, J., concurring).
40
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
¶113 The third-party doctrine is the progeny of Katz. The majority
explains it aptly:
[A] person has no expectation of privacy in information he
voluntarily discloses to third parties, even if there is an
assumption it will be used only for a limited purpose . . . .
And, because it is no longer private, the government may
obtain such information from a third party without triggering
the Fourth Amendmentâs protections.
Supra ¶ 14.
¶114 Whatever the continuing vitality of this doctrine following
Carpenter in the Fourth Amendment context, we should reject it here, just
as this Court rejected Supreme Court doctrines that did not reflect the text
and intent of article 2, section 8âs home invasion clause in Ault and Bolt.
Whereas the Fourth Amendment warrant protection applies only where a
reasonable expectation of privacy exists, our protection applies to all
private affairs. As reflected by the types of business transactions that
animated article 2, section 8âs framers, affairs can still be considered private
even if they are shared by two or more people in a position of trust.
¶115 For that reason, the Washington Supreme Court, whose
private affairs provision is both identical to and the source of ours, 3 has
rejected the Fourth Amendment âreasonable expectation of privacyâ
construct in interpreting its provision. âWhile we may turn to the Supreme
Courtâs interpretation of the United States Constitution for guidance in
establishing a hierarchy of values and principles under the Washington
Constitution, we rely, in the final analysis, upon our own legal foundations
in determining its scope and effect.â State v. Myrick, 688 P.2d 151, 153
(Wash. 1984). Whereas under Fourth Amendment jurisprudence âthe
3 We have often looked for guidance to the Washington Supreme
Courtâs decisions when interpreting similar provisions in our constitutions.
See, e.g., Mountain States, 160 Ariz. at 355 (â[O]ur recognition of the broad
protection for speech in Arizona conforms with the Washington Supreme
Courtâs reading of Washington Constitution art. 1, § 5, the model for
Arizonaâs art. 2, § 6.â).
41
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
inquiry is whether the defendant possessed âa reasonable expectation of
privacy,ââ id. (quoting Katz, 389 U.S. at 357), âunder the Washington
Constitution the relevant inquiry for determining when a search has
occurred is whether the state unreasonably intruded into the defendantâs
âprivate affairs.ââ Id. at 153â54.
¶116 Nonetheless, several other states have rejected the third-party
doctrine in construing their own constitutions even when they parallel the
Fourth Amendment. See, e.g., State v. Walton, 324 P.3d 876, 906 (Haw. 2014);
State v. Thompson, 810 P.2d 415, 418 (Utah 1991); Shaktman v. State, 553 So.
2d 148, 151 (Fla. 1989); State v. Thompson, 760 P.2d 1162, 1165 (Idaho 1988);
People v. Sporleder, 666 P.2d 135, 141â42 (Colo. 1983); Commonwealth v.
DeJohn, 403 A.2d 1283, 1289 (Pa. 1979). Notably, all those decisions interpret
constitutions that do not contain a private affairs provision.
¶117 Indeed, the Supreme Court itself has questioned the
foundations of the third-party doctrine in the information technology era.
In declining to extend Smith and Miller to certain cell phone records under
control of a third party, the Court noted the âseismic shifts in digital
technologyâ that have made cell phones and the data they contain and
transmit ââsuch a pervasive and insistent part of daily lifeâ that carrying one
is indispensable to participating in modern society.â Carpenter, 138 S. Ct.
at 2220 (quoting Riley v. California, 573 U.S. 373, 385 (2014)). As with
Internet Protocol (âIPâ) addresses, âthere is no way to avoid leaving behind
a trail of location data. As a result, in no meaningful sense does the user
voluntarily âassume[] the riskââ of having the data turned over to
government officials. Id. (quoting Smith, 442 U.S. at 745).
¶118 Justice Gorsuch made the point even more directly:
Even our most private documentsâthose that, in other eras,
we would have locked safely in a desk drawer or destroyedâ
now reside on third-party servers. Smith and Miller teach that
the police can review all of this material, on the theory that no
one reasonably expects any of it will be kept private. But
no one believes that, if they ever did.
42
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
Id. at 2262 (Gorsuch, J., dissenting). Justice Gorsuch added that âI do not
agree with the Courtâs decision to keep Smith and Miller on life support and
supplement them with a new and multilayered inquiry that seems to be
only Katz-squared.â Id. at 2272.
¶119 Whatever the scope and persistence of the third-party
doctrine after Carpenter, or the implications of that case for the facts here,
the Carpenter dissenters aptly remark that the decision âdestabilizes long-
established Fourth Amendment doctrine,â id. at 2247 (Alito, J., dissenting)
and will âkeep defendants and judges guessing for years to comeâ id.
at 2234 (Kennedy, J., dissenting) (citation omitted); see also id. at 2213â14
(main opinion) (â[N]o single rubric definitively resolves which expectations
of privacy are entitled to protection.â).
¶120 The majority here prizes national uniformity even where
Arizonans have chosen a markedly different approach in their organic law.
That priority is misplaced given that in our federalist system, âstate
constitutions are our basic charters of state governance.â Simpson v. Miller,
241 Ariz. 341, 345 ¶ 8 (2017); accord State v. Wein, 244 Ariz. 22, 32 ¶ 39 (2018)
(Bolick, Gould, and Lopez, JJ., dissenting); see also Jeffrey S. Sutton, 51
Imperfect Solutions: State Constitutions and the Development of American
Constitutional Law 42â83 (2018) (highlighting greater state constitutional
protections for the rights of criminal defendants). We do Arizonans a
disservice by elevating the value of discordant national uniformity over
enforcement of our own constitution and the greater clarity and protection
it affords.
III.
¶121 The majority asserts that a âclear consensusâ of state courts
hold that their state constitutions do not protect IP addresses or ISP
subscriber information. Supra ¶ 47. Unfortunately, those decisions do little
to aid us, for none of the constitutions at issue contains a private affairs
clause. Applying the language and intent of our state constitutional
provision, rather than decisions more than a half-century later applying
markedly different constitutional language, we conclude that the data here
43
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
is protected by article 2, section 8âs private affairs clause and may be
obtained by the government only with authority of law. 4
¶122 We entrust private information to third parties every day:
every time we use a credit card, provide our Social Security number, use a
security card reader, mail a saliva sample to a genetics lab, make a bank
deposit or withdrawal, use a password to enter a website, or even send an
email. Even under a reasonable expectation of privacy analysis, â[p]eople
often do reasonably expect that information they entrust to third parties,
especially information subject to confidentiality agreements, will be kept
private.â Carpenter, 138 S. Ct. at 2263 (Gorsuch, J., dissenting). Indeed,
sharing such information often is a precondition to engaging in commerce.
The majority points to the widespread third-party data collection on the
internet, supra ¶¶ 42-44, but that observation is simply irrelevant as the
private affairs clause restricts government action. The notion that anything
one must share for purposes of voluntary transactions is thereby subject to
government inspection would eviscerate any meaningful notion of privacy.
¶123 The private affairs clause âencompasses those legitimate
privacy expectations protected by the Fourth Amendment; but is not
confined to the subjective privacy expectations of modern citizens who, due
to well publicized advances in surveillance technology, are learning to
expect diminished privacy in many aspects of their lives.â Myrick, 688 P.2d
at 154. âIn determining whether a certain interest is a private affair . . . a
central consideration is the nature of the information soughtâthat is,
whether the information obtained via the governmental trespass reveals
4 Because we would decide the case on independent and adequate
state grounds, it is unnecessary to reach the Fourth Amendment issue. Ault,
150 Ariz. at 466. We note, however, that the third-party doctrine may not
apply given that Mixton did not provide the information obtained by the
government to a single entity. No employee at Kik knew Mixtonâs identity,
only his IP address; and no employee at the ISP could have connected
Mixtonâs IP address to the postings. The police aggregated information,
rather than retrieving it from a third party to which Mixton conveyed it in
its totality. Cf. Bond v. United States, 529 U.S. 334, 338â39 (2000) (holding
that physical manipulation of luggage was a search, even though the
luggage itself was exposed to the public in the storage rack of a bus).
44
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
intimate or discrete details of a personâs life.â State v. Jorden, 156 P.3d 893,
896 ¶ 8 (Wash. 2007). When the search âinvolves the gathering of personal
information by the government, this court has also considered the purpose
for which the information sought is kept, and by whom it is kept.â Id. at
¶ 9.
¶124 Thus, courts that have rejected the Supreme Courtâs
reasonable expectation of privacy analysis have focused not on societal or
subjective expectations of privacy, but instead have made an objective
determination about whether the information obtained reveals intimate or
discrete details of a personâs life. See, e.g., Myrick, 688 P.2d at 153â54. This
is in keeping with the meaning of private affairs and the provisionâs
historical intent and context. Moreover, limited disclosure of personal
information to a private third party, as opposed to the public generally,
does not give the government carte blanche access to that information. See,
e.g., Gunwall, 720 P.2d at 816 (citing State v. Hunt, 450 A.2d 952, 956 (N.J.
1982)) (holding that telephone records are a private affair because, among
other things, telephones are a necessary component of public life and the
disclosure of information to the telephone company was made for a limited
purpose and not for release to other persons for other reasons); People v.
Chapman, 679 P.2d 62, 67 (Cal. 1984) (holding that a telephone company
âcustomerâs expectation of privacy in information gathered by the company
during the regular course of its business must be honored as a reasonable
one. That expectation cannot be deemed to have been abandoned because
the customer is required to discloseâ such information).
¶125 The Washington Supreme Court has construed the identical
language of its constitution that way. âGiven the realities of modern life,
the mere fact that an individual shares information with another party and
does not control the area from which that information was accessed does
not place it outside the realmâ of the private affairs clause. State v. Hinton,
319 P.3d 9, 15 ¶ 17 (Wash. 2014). In Hinton, the Washington Supreme Court
ruled that police need a warrant to inspect text messages. The Court
acknowledged that those who share personal information assume the risk
that it will be disclosed by a third party, â[b]ut that risk should not be
transposed into an assumed risk of intrusion by the government.â Id.
45
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
¶126 Washington State courts have applied those principles under
the private affairs provision to forbid warrantless inspections in a broad
variety of contexts, even garbage. State v. Boland, 800 P.2d 1112, 1116 (Wash.
1990) (holding that although someone placing garbage can expect
scavengers to snoop through it, â[p]eople reasonably believe that police will
not indiscriminately rummage through their trash bags to discover their
personal effectsâ (quoting State v. Tanaka, 701 P.2d 1274, 1275 (Haw. 1985));
see also State v. Jorden, 156 P.3d 893 (Wash. 2007) (motel registry); State v.
Miles, 156 P.3d 864, 869 (Wash. 2007) (bank records, as they âpotentially
reveal[] sensitive informationâ); State v. Butterworth, 737 P.2d 1297 (Wash.
Ct. App. 1987) (unpublished telephone listing). None of these likely would
be shielded from police inspection under the pre-Carpenter third-party
doctrine, but all were deemed private affairs under Washington Stateâs
private affairs clause. These cases hold that where private information is
disclosed to limited persons for limited purposes, it retains its private
character for purposes of constitutional protection against searches without
authority of law.
¶127 Adopting this framework for interpreting the identical
language of our private affairs clause would provide greater clarity,
consistency, and predictability than the evolving and uncertain post-
Carpenter Fourth Amendment framework. It adheres to both the text of the
private affairs clause and the intent of its framers to include business
transactions within its protection. Applying this framework, we would not
have toâas the majority has undertaken to do conscientiously yet
unnecessarilyâforecast what privacy interests society is prepared to
accept, assess whether a person has a reasonable expectation of privacy
with an anvil on the scale if the person has conveyed that information to a
third party in any fashion, or delve into a fact-based determination of the
nature of the technology or precisely what information it contains or emits.
Rather, in this context, we would ask (1) whether the search encompasses
intimate details of a personâs life, and (2) whether the disclosure of
information was made for a limited purpose and not for release to other
persons for other reasons. If those two criteria are met, the information is a
private affair and the government may obtain it only with authority of law.
¶128 Here, both criteria are plainly met. The IP address and ISP
information at issue, standing alone, do not disclose intimate personal
46
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
information. But when combined (in this case through two different
subpoenas), they allow the police to determine which websites a person has
visited. That information was not made available to the public (indeed, in
combination it was not made available to anyone). Rather, the information
shared through an IP address and with an ISP is necessary to obtain access
to the internet. It is furnished for a limited purpose with the expectation it
will not be shared with others, and certainly not with the government. IP
addresses and ISP location data are not normally held out to the public but,
like a credit card, disclosed to the provider to consummate the transaction.
See Joshua J. McIntyre, Balancing Expectations of Online Privacy: Why Internet
Protocol (IP) Addresses Should be Protected as Personally Identifiable Information,
60 DePaul L. Rev. 895, 900 (2011) (noting that, unlike a physical letter, which
can be mailed without a return address, internet browsing requires leaving
sender data).
¶129 In this regard, the New Jersey Supreme Courtâs opinion in
State v. Reid is especially instructive. 945 A.2d 26 (N.J. 2008). The court
recognized that âit is hard to overstate how important computers and the
Internet have become to everyday, modern life. Citizens routinely access
the Web for all manner of daily activities: to gather information, explore
ideas, read, study, shop, and more.â Id. at 33. As they do so, they transmit
a numerical IP address to the websites they visit. Only an ISP, however,
can translate an IP address into a userâs name (or, in this case, a street
address). Having that combined information, âone can track a personâs
Internet usage. âThe government can learn the names of stores at which a
person shops, the political organizations a person finds interesting, a
personâs . . . fantasies, her health concerns, and so on.ââ Id. (quoting Daniel
Solove, The Future of Internet Surveillance Law, 72 Geo. Wash. L. Rev. 1264,
1287 (2004)). But key for our purposes is the courtâs recognition that âthe
nature of the technology requires individuals to obtain an IP address to
access the Web. Users make disclosures to ISPs for the limited goal of using
that technology and not to promote the release of personal information to
others.â Id. Construing the New Jersey Constitution, whose provision
mirrors the Fourth Amendment, the court held that âusers are entitled to
expect confidentiality under these circumstances.â Id. Even though New
Jerseyâs constitution has no private affairs clause, this analysis dovetails
with our constitutional text and intent.
47
STATE V. MIXTON
JUSTICE BOLICK, joined by CHIEF JUSTICE BRUTINEL and VICE CHIEF
JUSTICE TIMMER, Dissenting
¶130 The majority suggests that even if such information is a
private affair, the person sharing it must take extraordinary precautions,
such as encryption, or it loses its private character. We have expressly
rejected that argument in the Fourth Amendment context. State v. Peoples,
240 Ariz. 244, 248â49 (2016) (rejecting the arguments that leaving a
cellphone in plain view, or failing to password-protect it, allowed police to
inspect its contents). Rather, we would adhere to the view that when police
seek information about the intimate details of a personâs life by obtaining
information that was shared in limited fashion with persons in a position
of trust, rather than with the public at large, the private nature of the
transaction is maintained to prevent police inspection without a warrant.
¶131 The majority does not reach the question of what constitutes
âauthority of lawâ under these circumstances, so neither do we. But
assuming that a warrant would be necessary, it should not be difficult to
obtain one in this case. Cf. Riley, 573 U.S. at 401 (noting that technology has
made âthe process of obtaining a warrant itself more efficientâ). As Judge
Eckerstrom noted, â[t]he warrant requirement would have posed no
impediment to the investigation of the instant case. Mixtonâs . . .
correspondence with the undercover officer, together with the attachment
of child pornography to that correspondence, provided ample basis to
secure a warrant for Mixtonâs personal identifying information.â State v.
Mixton, 247 Ariz. 212, 230 ¶ 47 n.15 (Eckerstrom, J., concurring in part and
dissenting in part); accord id. at 226 ¶ 32 (majority opinion). Regardless of
the burden the government might face in securing such permission, the
protection of having a neutral judge determine the propriety and scope of
a search is essential. That protection becomes more crucial, not less, as
information technology and our dependence upon it grows.
¶132 Our constitutionâs framers aimed, as plainly as they could, to
protect our private affairs from unsupervised government scrutiny. The
majorityâs non-textual opinion drains meaning from this essential
constitutional protection. For these reasons, and with great respect to our
colleagues, we dissent.
48