AI Case Brief
Generate an AI-powered case brief with:
đKey Facts
âď¸Legal Issues
đCourt Holding
đĄReasoning
đŻSignificance
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
FOR PUBLICATION
UNITED STATES COURT OF APPEALS
FOR THE NINTH CIRCUIT
UNITED STATES OF AMERICA, No. 18-50440
Plaintiff-Appellee,
D.C. No.
v. 3:15-cr-02838-GPC-1
LUKE NOEL WILSON,
Defendant-Appellant. OPINION
Appeal from the United States District Court
for the Southern District of California
Gonzalo P. Curiel, District Judge, Presiding
Argued and Submitted November 15, 2019
Pasadena, California
Filed September 21, 2021
Before: Marsha S. Berzon and Paul J. Watford, Circuit
Judges, and Robert H. Whaley, * District Judge.
Opinion by Judge Berzon
*
The Honorable Robert H. Whaley, United States District Judge for
the Eastern District of Washington, sitting by designation.
2 UNITED STATES V. WILSON
SUMMARY **
Criminal Law
The panel vacated a conviction for possession and
distribution of child pornography, reversed the district
courtâs denial of a motion to suppress, and remanded for
further proceedings in a case in which the panel addressed
whether the governmentâs warrantless search of the
defendantâs email attachments was justified by the private
search exception to the Fourth Amendment.
As required by federal law, Google reported to the
National Center for Missing and Exploited Children
(NCMEC) that the defendant had uploaded four images of
apparent child pornography to his email account as email
attachments. No one at Google had opened or viewed the
defendantâs email attachments; its report was based on an
automated assessment that the images the defendant
uploaded were the same as images other Google employees
had earlier viewed and classified as child pornography.
Someone at NCMEC then, also without opening or viewing
them, sent the defendantâs email attachments to the San
Diego Internet Crimes Against Children Task Force, where
an officer ultimately viewed the email attachments without
a warrant. The officer then applied for warrants to search
both the defendantâs email account and his home, describing
the attachments in detail in the application.
**
This summary constitutes no part of the opinion of the court. It
has been prepared by court staff for the convenience of the reader.
UNITED STATES V. WILSON 3
The private search doctrine concerns circumstances in
which a private partyâs intrusions would have constituted a
search had the government conducted it and the material
discovered by the private party then comes into the
governmentâs possession. Invoking the precept that when
private parties provide evidence to the government on their
own accord, it is not incumbent on the police to avert their
eyes, the Supreme Court formalized the private search
doctrine in Walter v. United States, 447 U.S. 649 (1980),
which produced no majority decision, and United States v.
Jacobson, 466 U.S. 109 (1984), which did.
The panel held that the government did not meet its
burden to prove that the officerâs warrantless search was
justified by the private search exception to the Fourth
Amendmentâs warrant requirement. The panel wrote that
both as to the information the government obtained and the
additional privacy interests implicated, the governmentâs
actions here exceed the limits of the private search exception
as delineated in Walter and Jacobsen and their progeny.
First, the government search exceeded the scope of the
antecedent private search because it allowed the government
to learn new, critical information that it used first to obtain a
warrant and then to prosecute the defendant. Second, the
government search also expanded the scope of the
antecedent private search because the government agent
viewed the defendantâs email attachments even though no
Google employeeâor other personâhad done so, thereby
exceeding any earlier privacy intrusion. Moreover, on the
limited evidentiary record, the government has not
established that what a Google employee previously viewed
were exact duplicates of the defendantâs images. And, even
if they were duplicates, such viewing of othersâ digital
communications would not have violated the defendantâs
expectation of privacy in his images, as Fourth Amendment
4 UNITED STATES V. WILSON
rights are personal. The panel concluded that the officer
therefore violated the defendantâs Fourth Amendment right
to be free from unreasonable searches when he examined the
defendantâs email attachments without a warrant.
COUNSEL
Devin Burstein (argued), Warren & Burstein, San Diego,
California, for Defendant-Appellant.
Peter Ko (argued), Assistant United States Attorney; Helen
H. Hong, Chief, Appellate Section, Criminal Division;
Robert S. Brewer, Jr., United States Attorney; United States
Attorneyâs Office, San Diego, California; for Plaintiff-
Appellee.
Jennifer Lynch and Andrew Crocker, Electronic Frontier
Foundation, San Francisco, California; Jennifer Stisa
Granick, American Civil Liberties Union Foundation, San
Francisco, California; Brett Max Kaufman and Nathan Freed
Wessler, American Civil Liberties Union Foundation, New
York, New York; for Amici Curiae Electronic Frontier
Foundation and American Civil Liberties Union Foundation.
Marc Rotenberg, Alan Butler, and Megan Iorio, Electronic
Privacy Information Center, Washington, D.C., for Amicus
Curiae Electronic Privacy Information Center (EPIC).
Ryan T. Mrazik, Erin K. Earl, and Rachel A.S. Haney,
Perkins Coie LLP, Seattle, Washington, for Amici Curiae
Google LLC and Facebook, Inc.
UNITED STATES V. WILSON 5
OPINION
BERZON, Circuit Judge:
We once again consider the application of the Fourth
Amendmentâs warrant requirement to new forms of
communication technology. See, e.g., United States v. Cano,
934 F.3d 1002 (9th Cir. 2019); cf. Carpenter v. United
States, 138 S. Ct. 2206 (2018). âWhen confronting [such]
concerns wrought by digital technology, th[e] [Supreme]
Court [and this court] ha[ve] been careful not to uncritically
extend existing precedents.â Id. at 2222. Our question this
time concerns the private search exception to the Fourth
Amendmentâspecifically, the intersection between
electronic communications providersâ control over material
on their own servers and the Fourth Amendmentâs restriction
of warrantless searches and seizures, which limits only
governmental action. See Burdeau v. McDowell, 256 U.S.
465 (1921); Walter v. United States, 447 U.S. 649 (1980);
United States v. Jacobsen, 466 U.S. 109 (1984).
The events giving rise to Luke Wilsonâs conviction and
this appeal were triggered when Google, as required by
federal law, reported to the National Center for Missing and
Exploited Children (NCMEC) that Wilson had uploaded
four images of apparent child pornography to his email
account as email attachments. No one at Google had opened
or viewed Wilsonâs email attachments; its report was based
on an automated assessment that the images Wilson
uploaded were the same as images other Google employees
had earlier viewed and classified as child pornography.
Someone at NCMEC then, also without opening or viewing
them, sent Wilsonâs email attachments to the San Diego
Internet Crimes Against Children Task Force (ICAC), where
an officer ultimately viewed the email attachments without
a warrant. The officer then applied for warrants to search
6 UNITED STATES V. WILSON
both Wilsonâs email account and Wilsonâs home, describing
the attachments in detail in the application.
Our question is whether the governmentâs warrantless
search of Wilsonâs email attachments was justified by the
private search exception to the Fourth Amendment. See
Walter, 447 U.S. at 655â56; Jacobsen, 466 U.S. at 113â14.
For the reasons that follow, we hold that it was not. We
therefore reverse the district courtâs denial of Wilsonâs
motion to suppress and vacate Wilsonâs conviction.
I. Background
A. Googleâs Identification of Apparent Child
Pornography
Electronic communication service providers are not
required âaffirmatively [to] search, screen, or scanâ for
apparent violations on their platforms of federal child
pornography laws. 18 U.S.C. §§ 2258A(f), 2258E. But â[i]n
order to reduce . . . and . . . prevent the online sexual
exploitation of children,â such providers, including Google,
are directed, âas soon as reasonably possible after obtaining
actual knowledgeâ of âany facts or circumstances from
which there is an apparent violation of . . . child pornography
[statutes],â to âmak[e] a report of such facts or
circumstancesâ to NCMEC. 18 U.S.C. § 2258A(a). 1
NCMEC then forwards what is known as a CyberTip to the
1
âA provider that knowingly and willfully failed to make a report
required . . . shall be fined.â 18 U.S.C. § 2258A(e). Further, in the case
of âintentional, reckless, or other misconduct,â there may be âa civil
claim or criminal charge against a provider . . . arising from the
performance of the reporting or preservation responsibilities.â Id. at
§§ 2258B(a), (b).
UNITED STATES V. WILSON 7
appropriate law enforcement agency for possible
investigation. Id. at §§ 2258A(a)(1)(B)(ii), (c).
According to a two-page declaration from a senior
manager at Google, the company âindependently and
voluntarily take[s] steps to monitor and safeguard [its]
platform,â including using a âproprietary hashing
technologyâ to identify apparent child pornography. 2
As described in the recordâvaguely, and with the gaps
notedâthe process works as follows:
First, a team of Google employees are âtrained by
counsel on the federal statutory definition of child
pornography and how to recognize it.â Neither the training
materials themselves nor a description of their contents
appear in or are attached to the Google managerâs
declaration.
Second, these employees âvisually confirm[]â an image
âto be apparent child pornography.â According to an
industry classification standard created by various electronic
service providers, there are four industry categorizations:
âA1â for a sex act involving a prepubescent minor; âA2â for
a lascivious exhibition involving a prepubescent minor;
âB1â for a sex act involving a pubescent minor; and âB2â
for a lascivious exhibition involving a pubescent minor.
Third, â[e]ach offending imageâ judged to be âapparent
child pornography as defined in 18 USC § 2256â is given a
hash value, which is âadded to [the] repository of hashes.â
2
âA hash value is (usually) a short string of characters generated
from a much larger string of data (say, an electronic image) using an
algorithm.â United States v. Ackerman, 831 F.3d 1292, 1294 (10th Cir.
2016).
8 UNITED STATES V. WILSON
As far as the record shows, Google âstores only the hash
valuesâ of images identified as apparent child pornography,
not the actual images. The government does not represent
otherwise.
Finally, Google â[c]ompare[s] these hashes to hashes of
content uploaded to [their] services.â The exact manner in
which hash values are assigned to either the original
photographs or the ones deemed to replicate them is not
described in the Google managerâs declaration or anywhere
else in the record.
B. Government Search
On June 4, 2015, Google, using its propriety technology,
âbecame awareâ that Wilson had attached to emails in his
email accountâwhich may or may not have been sentâfour
files that included apparent child pornography. United States
v. Wilson, No. 3:15-cr-02838-GPC, 2017 WL 2733879, at
*3 (S.D. Cal. June 26, 2017). In compliance with its
reporting obligations, Google automatically generated and
sent an electronic CyberTipline report to NCMEC. The
CyberTipline report included Wilsonâs four email
attachments. According to the Google managerâs
declaration, âa Google employee did not view the images . . .
concurrently to submitting the report to NCMEC.â The
CyberTipline report did specify that Google had classified
each of Wilsonâs four email attachments as âA1â under an
industry classification standard for âcontent [which]
contain[s] a depiction of a prepubescent minor engaged in a
sexual act.â
Googleâs report included Wilsonâs email address,
secondary email address, and IP addresses. NCMEC
supplemented Googleâs report with geolocation information
UNITED STATES V. WILSON 9
associated with Wilsonâs IP addresses, but did ânot open[]
or view[] any uploaded files submitted with this report.â
NCMEC then forwarded the CyberTip to the San Diego
Internet Crimes Against Children Task Force (âICACâ).
Agent Thompson, a member of the San Diego ICAC,
received the report. He followed San Diego ICAC
procedure, which at the time called for inspecting the images
without a warrant whether or not a Google employee had
reviewed them. 3
After Agent Thompson looked at Wilsonâs four email
attachments, he applied for a search warrant of Wilsonâs
email account. His affidavit asserted that probable cause for
the warrant was based on two facts: first, that âGoogle
became aware of four (4) image files depicting suspected
child pornography;â and second, that he had âreviewed the
four (4) images reported by Google to NCMEC and
determined they depict child pornography.â In support of his
own child pornography assessment, he included in the
warrant application detailed âdescriptions of each of these
images.â The affidavit did not include the fact that Google
had originally classified the images as âA1â or provide any
detail about how Google had either classified or later
automatically identified Wilsonâs images as apparent child
pornography.
On the basis of the application and affidavit submitted
by Agent Thompson, a magistrate judge issued a search
3
Agent Thompson testified that San Diego ICAC, which includes
both local, county, regional, and federal agencies, now obtains a search
warrant before opening a CyberTip when the provider has not viewed
the images. It is not clear from the record whether other ICAC task forces
across the country have adopted the same policy.
10 UNITED STATES V. WILSON
warrant for Wilsonâs email account. When Agent Thompson
executed the warrant, he discovered numerous email
exchanges in which Wilson received and sent images and
video files of alleged child pornography and in which
Wilson offered to pay for the creation of child pornography.
Agent Thompson then obtained a search warrant for
Wilsonâs residence. On executing the warrant, law
enforcement officers found and seized several electronic
devices that contained evidence of child pornography. One
officer observed a backpack being tossed over Wilsonâs
balcony at the time officers were knocking on Wilsonâs door
and announcing their presence. Wilsonâs checkbook and a
thumb drive containing thousands of images of child
pornographyâincluding the four images reported by
Googleâwere found in the backpack.
C. Motion to Suppress
Wilson filed a motion to suppress all evidence seized
from his email account and residence, arguing that Agent
Thompsonâs review of his email attachments without a
warrant was impermissible under the Fourth Amendment.
Relying principally on Jacobsen, 466 U.S. 109, and United
States v. Tosti, 733 F.3d 816 (9th Cir. 2013), the government
maintained in response that Agent Thompsonâs review of the
four images did not exceed the scope of Googleâs private
search and so, under the private search doctrine as
enunciated in Jacobsen and Tosti, was valid without a
warrant.
The district court agreed. The court denied Wilsonâs
motion to suppress on the ground that the governmentâs
warrantless search did not exceed the scope of the antecedent
private search and so did not require a warrant. The district
court also concluded that âif [Agent] Thompsonâs
UNITED STATES V. WILSON 11
warrantless viewing of the four images constituted an illegal
search, neither excising the tainted evidence from the
affidavit nor the good faith exception would prevent
operation of the exclusionary rule.â 4 Wilson, 2017 WL
2733879, at *12â13.
After waiving his right to a jury trial, Wilson was
convicted of possession and distribution of child
pornography 5 and sentenced to 11 years of incarceration and
4
The government does not contest these contingent rulings.
5
While this appeal was pending, the California Court of Appeal held
that âthe governmentâs warrantless search of Wilsonâs four images was
permissible under the private search doctrine.â People v. Wilson, 56 Cal.
App. 5th 128, 147 (2020), as modified on denial of rehâg (Nov. 6, 2020),
review denied (Jan. 20, 2021). We have not squarely addressed the
preclusive effect of the denial of a suppression motion in an earlier state-
court proceeding. Other circuits, however, have held that âthe
government may not collaterally estop a criminal defendant from
relitigating an issue against the defendant in a different court in a prior
proceeding.â United States v. Harnage, 976 F.2d 633, 636 (11th Cir.
1992); accord United States v. Pelullo, 14 F.3d 881, 896 (3d Cir. 1994);
United States v. Gallardo-Mendez, 150 F.3d 1240, 1244 (10th Cir.
1998). Citing those cases, we came to the similar conclusion that, in
criminal trials, the government âmay not use collateral estoppel to
establish, as a matter of law, an element of an offense or to conclusively
rebut an affirmative defense on which the Government bears the burden
of proof beyond a reasonable doubt.â United States v. Smith-Baltiher,
424 F.3d 913, 920 (9th Cir. 2005) (quoting United States v. Arnett,
353 F.3d 765, 766 (9th Cir. 2003) (en banc) (per curiam)).
We need not definitively resolve the preclusion question as it relates
to a motion to suppress, here, as the government has not asserted
collateral estoppel, so the argument is waived. Harbeson v. Parke Davis,
Inc., 746 F.2d 517, 520 (9th Cir. 1984) (âThe United States was unaware
that Mr. Wilson had raised the same issue in his state appeal until the
letter filed in this case by [defense counsel] on October 16, 2020.â).
12 UNITED STATES V. WILSON
10 years of supervised release for each count, to run
concurrently. 6
II. Discussion
The government does not dispute for purposes of this
case Wilsonâs assertion that Agent Thompsonâs review of
his email attachments was a search within the meaning of the
Fourth Amendment. We proceed on that assumption as
wellâthat is, we assume that Wilson had a subjective
expectation of privacy in his email attachments that society
is prepared to recognize as reasonable, see Kyllo v. United
States, 533 U.S. 27, 33 (2001) (citing Katz v. United States,
389 U.S. 347, 361 (1967) (Harlan, J., concurring)); see also
United States v. Miller, 982 F.3d 412, 427 (6th Cir. 2020)
(taking the same approach); cf. United States v. Ackerman,
831 F.3d 1292, 1308 (10th Cir. 2016) (holding that when the
government views email attachments it is a âsearchâ for
Fourth Amendment purposes under both an expectation-of-
privacy and a trespass-to-chattels theory). 7 Our question,
then, is whether Agent Thompson was permitted to look at
Wilsonâs email attachments under the private search
6
Wilson maintains that the district court did not obtain a valid
waiver of his right to a jury trial, as required by Fed. R. Crim. P. 23(a).
Because we vacate Wilsonâs conviction and reverse the district courtâs
denial of Wilsonâs motion to suppress, we do not reach this issue.
7
Because we hold that the governmentâs warrantless search violated
Wilsonâs privacy-based Fourth Amendment rights, we do not consider
Wilsonâs alternative argument that the governmentâs search violated his
property-based Fourth Amendment rights. See Carpenter v. United
States, 138 S. Ct. 2206, 2269 (2018) (Gorsuch, J. dissenting) (â[F]ew
doubt that e-mail should be treated much like the traditional mail it has
largely supplantedâas a bailment in which the owner retains a vital and
protected legal interest.â).
UNITED STATES V. WILSON 13
exception, such that the Fourth Amendment did not require
him to procure a warrant.
We review the district courtâs denial of Wilsonâs motion
to suppress de novo and the district courtâs underlying
factual findings for clear error. See United States v. Camou,
773 F.3d 932, 937 (9th Cir. 2014); see also United States v.
Mulder, 808 F.2d 1346, 1348 (9th Cir. 1987).
A. Private Search Exception
As the Fourth Amendment protects individuals from
government actors, not private ones, see Burdeau v.
McDowell, 256 U.S. 465 (1921), a private party may conduct
a search that would be unconstitutional if conducted by the
government. The private search doctrine concerns
circumstances in which a private partyâs intrusions would
have constituted a search had the government conducted it
and the material discovered by the private party then comes
into the governmentâs possession. Invoking the precept that
when private parties provide evidence to the government âon
[their] own accord[,] ⌠it [i]s not incumbent on the police
to . . . avert their eyes,â Coolidge v. New Hampshire,
403 U.S. 443, 489 (1971), the Supreme Court formalized the
private search doctrine in a pair of decisions about four
decades ago: Walter v. United States, 447 U.S. 649 (1980),
which produced no majority decision, and United States v.
Jacobsen, 466 U.S. 109 (1984), which did.
1. Doctrinal Foundations
Beginning from the initial articulation of the private
search doctrine, the extent to which it excuses the
government from compliance with the warrant requirement
of the Fourth Amendment has been the subject of concern.
The exception has, for example, been described as
14 UNITED STATES V. WILSON
âunsettlingâ for its potential reach. 1 Wayne R. LaFave,
Search and Seizure: A Treatise on the Fourth Amendment
§1.8(b) (6th ed. 2020); see also Jacobsen, 466 U.S. at 129â
34 (White, J., concurring in part and concurring in
judgment). On examination, however, the history of the
exception confirms that it is, in truth, a narrow doctrine with
limited applications.
Beginning with Burdeau, the Supreme Court has
distinguished between government agents and private
parties for purposes of the Fourth Amendment. Burdeau
considered whether the Fourth Amendment restricts the
governmentâs ability to use papers incriminating an
individual when those papers were volunteered to the
government by a private party who had stolen them. Burdeau
disregarded the private theft, noting that although â[t]he
Fourth Amendment gives protection against unlawful
searches and seizures, . . . its protection applies to
governmental action.â 256 U.S. at 475.
Coolidge, decided 50 years after Burdeau, addressed
whether a private party who provides the government with
another personâs contraband or evidentiary material can be
considered an agent of the government for purposes of the
Fourth Amendment. In that case, local police officers arrived
at a suspectâs home, questioned his wife about his
involvement in a murder, and obtained from his wife a rifle
and articles of clothing belonging to the suspect. Coolidge,
403 U.S. at 446, 486. The opinion does not explain whether
the suspectâs wife had proper possession of the items. The
Court stated only that, had the suspectâs wife, âwholly on her
own initiative, sought out her husbandâs guns and clothing
and then taken them to the police station to be used as
evidence against him, there can be no doubt under [Burdeau]
that the articles would later have been admissible in
UNITED STATES V. WILSON 15
evidence.â Id. at 487. The relevant inquiry, according to the
Court, was whether the suspectâs wife, âin light of all the
circumstances of the case, must be regarded as having acted
as an instrument or agent of the state when she produced her
husbandâs belongings.â Id. (internal quotation marks
omitted). As the record showed that the suspectâs wife had
shared the suspectâs guns and clothes with the local police
âof her own accord,â Coolidge held that âit was not
incumbent on the police to stop her or avert their eyesâ when
offered the critical evidence. Id. at 489.
2. Doctrinal Scope
Following Burdeau and Coolidge, both Walter and
Jacobsen considered a warrantless government search after
a private party âfreely made availableâ certain information
for the governmentâs inspection. Jacobsen, 466 U.S. at 119â
20 (citing Coolidge, 403 U.S. at 487â90). Together, the cases
determined that an antecedent private search excuses the
government from obtaining a warrant to repeat the search but
only when the government search does not exceed the scope
of the private one. That is, â[t]he additional invasions of
respondentsâ privacy by the government agent must be tested
by the degree to which they exceeded the scope of the private
search.â Id. at 115.
In Walter, a package of obscene films was mistakenly
delivered to the wrong recipient. 447 U.S. at 651. The
recipient opened the external packaging and examined the
boxes containing individual films. Id. at 651â52. Each box
displayed âsuggestive drawingsâ on one side and âexplicit
descriptions of the contentsâ of the film on the other. Id.
at 652. After reading these descriptions, and âattempt[ing]
without success to view portions of the film by holding it up
to the light,â the recipient notified the FBI about the
mistaken delivery. Id. The FBI then seized the boxes and
16 UNITED STATES V. WILSON
screened one of the films without first obtaining a warrant.
Id.
Walter did not result in a majority opinion, but a majority
of the justices concluded that there had been a violation of
the Fourth Amendment, and a different majority of justices
agreed on the standard to be applied.
Justice Stevens, joined by Justice Stewart, announced the
judgment of the Court. Their opinion concluded that the
government search exceeded the scope of the antecedent
actions by the private individuals in two respects. First, the
government agents had screened the film for the purpose of
learning information necessary to determine that a crime had
been committed:
It is perfectly obvious that the agentsâ reason
for viewing the films was to determine
whether their owner was guilty of a federal
offense. To be sure, the labels on the film
boxes gave them probable cause to believe
that the films were obscene and that their
shipment in interstate commerce had
offended the federal criminal code. . . . [But]
a search of the contents of the films . . . was
necessary in order to obtain the evidence
which was to be used at trial.
Id. at 654. Second, the government agents had gone beyond
the physical bounds of the private search, because âthe
private party had not actually viewed the films.â Id. at 657.
âThe private search [thus] merely frustrated [the]
expectation [of privacy] in part,â not in full. Id. at 659. âIt
UNITED STATES V. WILSON 17
did not simply strip the remaining unfrustrated portion of
that expectation of all Fourth Amendment protection.â Id. 8
The four justices in dissent would have concluded that
there was no Fourth Amendment violation. The dissenters
disputed not the basic approach of Justice Stevensâ opinion
but its application to the facts of the case. Specifically, the
dissent stressed that â[t]he containers . . . clearly revealed the
nature of their contents,â such that the private employees âso
fully ascertained the nature of the films . . . [that] the FBIâs
subsequent viewing of the movies . . . was not an additional
search subject to the warrant requirement.â Id. at 663â64
(Blackmun, J., dissenting, joined by Burger, C.J., and Powell
and Rehnquist, JJ.).
Four years after Walter, the Supreme Court again applied
the private search doctrine. Importantly, Jacobsen
recognized âthe agreement [in Walter] on the standard to be
applied in evaluating the relationship between the two
searches.â 466 U.S. at 117 n.12.
Jacobsen concerned a government search of a Federal
Express (âFedExâ) package that had been partially opened
by FedEx employees. See 466 U.S. at 111. While examining
a damaged package, the FedEx employees âopened the
8
Justice Marshall concurred only in the judgment. Justice White,
joined by Justice Brennan, concurred, noting that âthe packages already
had been opened, and the Government saw no more than what was
exposed to plain view.â Walter, 447 U.S. at 661 (White, J., concurring
in part and concurring in judgment). Although Justice Stevens
emphasized that the private parties had not screened the film, see id. at
657 & n.9, the concurring justices would have found a Fourth
Amendment violation even if the private parties had done so, as âa
private screening of the films would not have destroyed petitionersâ
privacy interest in them.â Id. at 662.
18 UNITED STATES V. WILSON
package,â âcut open the tubeâ within the package, and
âfound a series of four zip-lock plastic bags, the outermost
enclosing the other three and the innermost containing about
six and a half ounces of white powder.â Id. The employees
âobserved . . . white powder in the innermost plastic bag,â
but did not open the (presumably transparent) bag. Id.
Instead, they called the Drug Enforcement Administration
(DEA), put the plastic bags back in the tube, and placed the
tube back in the box. Id.
When DEA agents arrived, they did two things: First, to
visually inspect the contents of the plastic bags, DEA agents
removed the tube from the box and the plastic bags from the
tube. See id. Second, federal agents âopened each of the four
bags and removed a trace of the white substance with a knife
blade.â Id. at 111â12. They performed a field test to
determine whether the powder in the plastic bags was
cocaine. See id.
Jacobsen considered whether the private search
exception as adopted by a majority of justices in Walter
applied to the facts at hand. In doing so, Jacobsen, like
Justice Stevensâ opinion in Walter, looked at both the degree
to which the governmentâs actions led to observing new
information not uncovered by the private search and the
extent to which the governmentâs investigation intruded on
the package ownerâs privacy interests to a greater degree
than had the private partyâs actions. As to the first parameter,
the information gleaned by the government, Jacobsen
permitted the government agent to âreexamineââthat is,
examine in the same mannerâthe package previously
examined by FedEx, the private party. The government
âcould utilize the [private] employeesâ testimony concerning
the contents of the package,â noted Jacobsen; â[p]rotecting
the risk of misdescription . . . is not protected by the Fourth
UNITED STATES V. WILSON 19
Amendment.â 466 U.S. at 119. As to the second parameter,
the additional impairment of privacy interests, Jacobsen
emphasized that the private search exception turns on parity
with the impact of the private search: â[O]nce frustration of
the original expectation of privacy occurs, the Fourth
Amendment does not prohibit governmental use of the now-
nonprivate information.â Id. at 117.
Applying these precepts, Jacobsen concluded that the
âremoval of the plastic bags from the tube and the
[government] agentâs visual inspection of their contentsâ did
not exceed the scope of the private search as to the
information obtained. Id. at 120. â[T]he agent[s] . . .
learn[ed] nothing [from those actions] that had not
previously been learned during the private searchâ and
conveyed to the federal agents by the FedEx employees. Id.
And as to the privacy interests, the governmental search to
that point âinfringed no legitimate expectation of privacy
and hence was not a âsearchâ within the meaning of the
Fourth Amendment,â id., as â[t]he package itself, which had
previously been opened, remained unsealed, and the Federal
Express employees had invited the agents to examine its
contents,â such that âthe package could no longer support
any expectation of privacy,â id. at 121.
Jacobsen then separately considered the chemical field
test, conducted by the DEA agents, including the federal
agentsâ removal of the white powder from the plastic bag.
Critically for our purposes, Jacobsen began this inquiry from
the premise that because the field test âhad not been
conducted by the Federal Express agents,â it âtherefore
exceeded the scope of the private search.â Id. at 122
(emphasis added). The majority then determined that the
governmentâs chemical field test of the substance in the
properly seized plastic bags was nonetheless not a search
20 UNITED STATES V. WILSON
within the meaning of the Fourth Amendment, because
âgovernmental conduct that can reveal whether a substance
is cocaine, and no other arguably âprivateâ fact, compromises
no legitimate privacy interest.â Id. at 122â23. This
conclusion, Jacobsen explained, was âdictatedâ by the
Courtâs earlier decision in United States v. Place, 462 U.S.
696 (1983), âin which the Court held that subjecting luggage
to a âsniff testâ by a trained narcotics detection dog was not
a âsearchâ within the meaning of the Fourth Amendment.â
Jacobsen, 466 U.S. at 123.
B. Application of the Private Search Exception to
This Case
The government bears the burden to prove Agent
Thompsonâs warrantless search was justified by the private
search exception to the Fourth Amendmentâs warrant
requirement. Before considering the private search
exception, Coolidge emphasized âthe most basic
constitutional ruleâ in the Fourth Amendment arena:
warrantless searches are per se unreasonable, subject to few
exceptions that are âjealously and carefully drawn.â
403 U.S. at 454â55. Accordingly, â[t]he burden is on those
seeking the exemption.â Id. at 455 (quoting United States v.
Jeffers, 342 U.S. 48, 51 (1951)). The government has not
met its burden here.
Both as to the information the government obtained and
the additional privacy interests implicated, the governmentâs
actions here exceed the limits of the private search exception
as delineated in Walter and Jacobsen and their progeny. 9
Wilson opines that the private search exception to the Fourth
9
Amendment should be overruled, and seeks to preserve that question for
any Supreme Court review of this case. As a court of appeals, we of
UNITED STATES V. WILSON 21
First, the government search exceeded the scope of the
antecedent private search because it allowed the government
to learn new, critical information that it used first to obtain a
warrant and then to prosecute Wilson. Second, the
government search also expanded the scope of the
antecedent private search because the government agent
viewed Wilsonâs email attachments even though no Google
employeeâor other personâhad done so, thereby
course cannot overrule Supreme Court cases. United States v. Weiland,
420 F.3d 1062, 1079 n.16 (9th Cir. 2005) (â[W]e are bound to follow a
controlling Supreme Court precedent until it is explicitly overruled by
that Court.â); accord Nunez-Reyes v. Holder, 646 F.3d 684, 692 (9th Cir.
2011). We do note that the private search doctrine rests directly on the
same precepts concerning the equivalence of private intrusions by
private parties and the government that underlie the so-called third-party
doctrine. See e.g., Smith v. Maryland, 442 U.S. 735, 744 (1979) (holding
that by âvoluntarilyâ conveying to his telephone company the phone
numbers he dialed, the defendant forsook his reasonable expectation of
privacy in that information); United States v. Miller, 425 U.S. 435, 442
(1976) (holding the defendant lacked a reasonable expectation of privacy
in âinformation [he had] voluntarily conveyed to [his] bank[]â like
financial statements and deposit slips). In Jacobsen, the Supreme Court
reasoned that the private search exception follows from the premise,
underlying the third-party doctrine, that âwhen an individual reveals
private information to another, he assumes the risk that his confidant will
reveal that information to the authorities.â 466 U.S. at 117. In recent
years, however, the Court has refused to âmechanically apply[] the third-
party doctrine,â stressing that âthe fact of âdiminished privacy interests
does not mean that the Fourth Amendment falls out of the picture
entirely.ââ Carpenter, 138 S. Ct. at 2219 (quoting Riley, 573 U.S. at 392);
see United States v. Jones, 565 U.S. 400, 417 (2012) (Sotomayor, J.,
concurring) (explaining that the third-party doctrine âis ill suited to the
digital age, in which people reveal a great deal of information about
themselves to third parties in the course of carrying out mundane tasksâ);
Susan Freiwald & Stephen Wm. Smith, The Carpenter Chronicle: A
Near-Perfect Surveillance, 132 Harv. L. Rev. 205, 224 (2018) (noting
that Carpenter âsignificantly narrowed the [third-party] doctrineâs
scopeâ).
22 UNITED STATES V. WILSON
exceeding any earlier privacy intrusion. Moreover, on the
limited evidentiary record, the government has not
established that what a Google employee previously viewed
were exact duplicates of Wilsonâs images. And, even if they
were duplicates, such viewing of othersâ digital
communications would not have violated Wilsonâs
expectation of privacy in his images, as Fourth Amendment
rights are personal.
1. Additional Information
The district court analogized Agent Thompsonâs review
of Wilsonâs email attachments to the government search in
Jacobsen, concluding that Agent Thompsonâs search
allowed him to âlearn nothing new,â because Google had
already classified the images as child pornography. Wilson,
2017 WL 2733879, at *10â11. The government similarly
argues on appeal that its official search did not
impermissibly expand the scope of the private search
because it âjust confirmed what Google employees already
knew and could say.â Both the district courtâs conclusion
and the governmentsâ argument misstate the record.
The record indicates that Google does not keep a
repository of child pornography images, so no Google
employee could have shown the government the images it
believed to match Wilsonâs. Nor does the record identify the
individual who viewed those images in the repository, so no
identified Google employee âknew and could sayâ what
those images showed. Instead, Google keeps a repository of
unique hash values corresponding to illicit images, and tags
each image with one of four generic labels. All Google
communicated to NCMEC in its CyberTip was that the four
images Wilson uploaded to his email account matched
images previously identified by some Google employee at
some time in the past as child pornography and classified as
UNITED STATES V. WILSON 23
depicting a sex act involving a prepubescent minor (the âA1â
classification). 10 Based only on the barebones CyberTip,
Agent Thompson testified, he opened and reviewed each of
Wilsonâs images to determine âwhether or not it is a case
that . . . can be investigatedâ for violations of federal law.
A detailed description of the images was then included
in the applications for search warrants. The gulf between
what Agent Thompson knew about Wilsonâs images from
the CyberTip and what he subsequently learned is apparent
from those descriptions. In contrast to Googleâs label of the
images just as âA1,â which the government did not mention
in the warrant application, the government learned the
following:
1. 140005125216.jpg â This image depicts a
young nude girl, approximately five (5) to
nine (9) years of age, who is lying on her
stomach with her face in the nude genital
region of an older female who is seated with
her legs spread. A second young girl,
approximately five (5) to nine (9) years of
age, is also visible in this image and she is
partially nude with her vagina exposed.
Google identified this image was uploaded
on June 4, 2015, at 16:11:04 UTC.
2. 140005183260.jpg â This image depicts a
young nude girl, approximately five (5) to
nine (9) years of age, who is lying on top of
10
Perhaps a Google employee could also have testified to details
about the companyâs proprietary technology. But no such information
appears in the record, and the CyberTip did not convey any more
information than what is now included in the record.
24 UNITED STATES V. WILSON
an older nude female, approximately
eighteen years of age. Within this image the
girlâs genital regions are pressed against one
another and the older girl appears to be
touching the face of the younger child with
her tongue. Google identified this image was
uploaded on June 4, 2015, at 16:11:21 UTC.
3. 140005129034.jpg â This image depicts a
partially nude young girl, approximately five
(5) to nine (9) years of age, who is lying on
her back with her legs spread and her vagina
exposed. An older female is positioned in
front of this girlâs exposed vagina in this
image and the younger girl has her left hand
on the vaginal/buttocks area of a second nude
girl of similar age. Google identified this
image was uploaded on June 4, 2015, at
16:11:06 UTC.
4. 1400052000787.jpg â This image depicts
a wider angle view of the previously
referenced images possessing file names
140005125216.jpg and 140005129034.jpg as
reported by Google.
Wilson, 2017 WL 2733879, at *4â5.
Given the large gap between the information in the
CyberTip and the information the government obtained and
used to support the warrant application and to prosecute
Wilson, the government search in Walter offers a much more
apt comparison to the circumstances here than does the
government search in Jacobsen. Googleâs categorization of
Wilsonâs email attachments as âA1â functioned as a label for
UNITED STATES V. WILSON 25
the images in the same way that the boxes describing the
films in Walter suggested that the images on the films were
obscene. The âA1â labels, in fact, provided less information
about the imagesâ contents than did the boxes in Walter,
which had âexplicit descriptions of the contentsâ of the film.
447 U.S. at 652. The âA1â labels, in contrast, specified only
the general age of the child and the general nature of the acts
shown.
Viewing Wilsonâs email attachmentsâlike viewing the
movie in Walterâsubstantively expanded the information
available to law enforcement far beyond what the label alone
conveyed, and was used to provide probable cause to search
further and to prosecute. The government learned at least
two things above and beyond the information conveyed by
the CyberTip by viewing Wilsonâs images: First, Agent
Thompson learned exactly what the image showed. Second,
Agent Thompson learned the image was in fact child
pornography. Until he viewed the images, they were at most
âsuspectedâ child pornography. Just as it âwas clearly
necessary for the FBI to screen the films [in Walter], which
the private party had not done, in order to obtain the evidence
needed to accomplish its law enforcement objectives,â
Walter, 447 U.S. at 659 n.14 (plurality), so here, to prosecute
Wilson it was necessary for Agent Thompson to view the
images no Google employee had opened. Id. Until Agent
Thompson viewed Wilsonâs images, no one involved in
enforcing the child pornography ban had seen them. Only by
viewing the images did the government confirm, and convey
to the fact finder in Wilsonâs criminal case, that they
depicted child pornography under the applicable federal
standard.
Importantly, the district court foundâand we agreeâ
that if Agent Thompsonâs affidavit in support of a warrant
26 UNITED STATES V. WILSON
had been âexcise[d]â of âthe tainted evidence,â âthe affidavit
would not support issuance of the search warrant for
Defendantâs email account.â Wilson, 2017 WL 2733879,
at *12. 11 The district courtâs findings about the inadequacy
of the warrant application without the important information
Agent Thompson obtained by viewing Wilsonâs images
demonstrate that the government learned new, critical
information by viewing Wilsonâs images, information ânot
previously . . . learned during the private search,â Jacobsen,
466 U.S. at 120. Because the government saw more from its
search than the private party had seen, it exceeded the scope
of the private search.
2. Additional Intrusion on Wilsonâs Privacy
Interest
The government also maintains that directly viewing
Wilsonâs images for the first time was not a further invasion
of Wilsonâs privacy, beyond any privacy invasion by
Google. The governmentâs expectation of privacy analysis
fails for much the same reason as did its argument that it
learned nothing new by viewing the images.
The governmentâs central submission in this regard is
that Wilsonâs expectation of privacy in his images was fully
frustrated when Googleâs computer technology scanned
them, such that any further government search of the images
We also agree with the district court that the government might
11
have been able to demonstrate probable cause sufficient to obtain a
warrant without the descriptions of Wilsonâs images, by presenting, for
example, more âinformation about Googleâs screening process for child
pornography,â Wilson, 2017 WL 2733879, at *12.
UNITED STATES V. WILSON 27
should be exempt from the Fourth Amendmentâs warrant
requirement. 12 We cannot agree.
Although Googleâs proprietary technology labelled
Wilsonâs email attachments as âA1,â âthe content of the
[images] . . . was [no more] apparentâ to Google than the
image content was to the private party in Walter, as no
Google employee had opened and viewed the attachments,
and Google does not appear to retain any record of the
original images used to generate hash matches. See Tosti,
733 F.3d at 823. Agent Thompson did not obtain a specific
description of the content of Wilsonâs attachments from
Google, so he was not simply confirming what he had been
told. Until he viewed the images, he had no image at hand at
all; the entire composition was hidden. Only the image itself
could reveal, for example, the number of minors depicted,
their identity, the number of adults depicted alongside the
minors, the setting, and the actual sexual acts depicted.
Reading a label affixed to an image is a different experience
entirely from looking at the image itself. To read even a
detailed description, which this A1 classification was not, is
still not to see. Wilsonâs privacy interest was in the actual
imageâwhich could have included features in addition to
child pornographyânot just in its classification as child
pornography.
The governmentâs argument to the contrary
mischaracterizes the record, by representing that Googleâs
scan âequates to a full-color, high-definition viewâ of
Wilsonâs images. It does not. The critical fact is that no
Google employee viewed Wilsonâs files before Agent
12
The government stated at oral argument that it is not relying on
the contraband nature of child pornography as a justification for the
search.
28 UNITED STATES V. WILSON
Thompson did. When the government views anything other
than the specific materials that a private party saw during the
course of a private search, the government search exceeds
the scope of the private search. That is the clear holding of
Jacobsen. In that case, â[t]he field test . . . had not been
conducted by the Federal Express agents and therefore
exceeded the scope of the private search.â 466 U.S. at 122
(emphasis added); see supra Part II.B.1.
3. Personal Nature of the Fourth Amendment
The government attempts to save its warrantless search
by shifting the analysis from the private search of Wilsonâs
files, flagged by Google and classified as A1 by its
proprietary technology, to the private search of other
individualsâ files, which some Google employee previously
viewed and classified as child pornography in Googleâs
database of hash values. The government argues that Agent
Thompsonâs search did not exceed the bounds of the private
search because a Google employee had previously viewed
different child pornography files, and Googleâs computers
flagged Wilsonâs email attachments as containing the same
images as those files, using an unspecified hash value
comparison system. This line of argument cannot save the
validity of the governmentâs search. Even if Wilsonâs email
attachments were precise duplicates of different files a
Google employee had earlier reviewed and categorized as
child pornography, both Walter and Jacobsenâand general
Fourth Amendment principlesâinstruct that we must
specifically focus on the extent of Googleâs private search of
Wilsonâs effects, not of other individualsâ belongings, to
assess whether âthe additional invasions of [Wilsonâs]
privacy by the government agent . . . exceeded the scope of
the private search.â Jacobsen, 466 U.S. at 115.
UNITED STATES V. WILSON 29
To see why, consider whether Walter would have come
out differently had the misdirected package come into the
hands of someone who had previously viewed another copy
of the same film and, recognizing the box, told the police
that the film in it was, in her view, legally obscene. Under
Walter, the government in the hypothesized circumstance
would still need a warrant to view the film in the box.
Viewing the copy of the film actually in the box, which the
mistaken recipient of the box had not done, would still entail
an additional governmental intrusion on both the physical
integrity of the film and the ownerâs privacy interest in its
content.
Fourth Amendment rights are personal rights. Rakas v.
Illinois, 439 U.S. 128 (1978), is illustrative: Rakas held that
a passenger could not challenge a police search as violative
of the Fourth Amendment because he owned neither the
vehicle that was searched nor the rifle found. Although the
owners of each item had an expectation of privacy, the
defendant did not. See id. at 134.
So Wilson did not have an expectation of privacy in
other individualsâ files, even if their files were identical to
his files. The corollary of this principle must also be true:
Wilson did have an expectation of privacy in his files, even
if others had identical files. If, for example, police officers
search someone elseâs house and find documents evidencing
wrongdoing along with notes indicating that I have identical
documents in my house, they cannot, without a warrant or
some distinct exception to the warrant requirement, seize my
copies. I would retain a personal expectation of privacy in
them, and in my connection to them, even if law enforcement
had a strong basis for anticipating what my copies would
contain. A violation of a third partyâs privacy has no bearing
30 UNITED STATES V. WILSON
on my reasonable expectation of privacy in my own
documents. The government does not argue otherwise.
In short, whether Google had previously reviewed, at
some earlier time, other individualsâ files is not pertinent to
whether a private search eroded Wilsonâs expectation of
privacy. Under the private search doctrine, the Fourth
Amendment remains implicated âif the authorities use
information with respect to which the expectation of privacy
has not already been frustrated.â Jacobsen, 466 U.S. at 117
(emphasis added).
C. Relevant Appellate Caselaw
(i) Our application of Jacobsen and Walter is consistent
with Ninth Circuit case law. The district court misapplied
United States v. Tosti, 733 F.3d 816 (9th Cir. 2013), in
reaching the contrary conclusion.
In Tosti, a private party entrusted with the defendantâs
computer found thumbnails of images believed to be child
pornography and alerted law enforcement officers. 733 F.3d
at 818â19. The private party showed the thumbnails to law
enforcement, and the agents âcould tell from viewing the
thumbnails that the images contained child pornography.â
Id. at 822.
Tosti held that law enforcementâs enlarging of the
thumbnails did not expand on the antecedent private search.
For one, based on the standard articulated in Jacobsen, âthe
police learned nothing new through their actions.â Tosti,
733 F.3d at 822. Further, âscrolling through the images [the
private party] had already viewed was not a search because
any private interest in those images had been extinguished.â
Id.
UNITED STATES V. WILSON 31
Neither is true in this case. Here, what was conveyed to
Agent Thompson was that a not-yet-viewed image uploaded
by Wilson matched a different image that an unidentified
Google employee had previously viewed and classified as
child pornography. So until Agent Thompson actually
viewed the images, he knew only that Googleâs propriety
technology had identified a match between Wilsonâs images
and other images that Google had classified as child
pornography. He âlearned . . . [a]new through [his] actions,â
for the first time, what the images actually showed. See
supra pp. 23â24. And, as no one at Google had previously
viewed Wilsonâs attachments, âany privacy interest in those
images had [not] been extinguished.â Tosti, 733 F.3d at 822.
Googleâs algorithm âfrustrated [Wilsonâs] [privacy]
expectation in part,â but it âdid not . . . strip the remaining
unfrustrated portion of that expectation of all Fourth
Amendment protection.â Walter 447 U.S. at 659 (plurality);
see also Jacobsen, 466 U.S. at 116 n.11.
For these reasons, Tosti is fully consistent with our
conclusion that Agent Thompsonâs search exceeded the
scope of the private search and so required a warrant.
(ii) In so holding, we contribute to a growing tension in
the circuits about the application of the private search
doctrine to the detection of child pornography.
In United States v. Ackerman, 831 F.3d 1292, 1294 (10th
Cir. 2016), AOL automatically identified one of the
defendantâs four email attachments as apparent child
pornography, based on a hash value match. AOL then sent
the text of the defendantâs email and all four attachments to
NCMEC, where an analyst âopened the email, viewed each
of the attached images, and confirmed that all four [images]
(not just the one AOLâs automated filed identified) appeared
to be child pornography.â Id. Ackerman emphasized that
32 UNITED STATES V. WILSON
âAOL never opened the email itself. Only NCMEC did
that.â Id. at 1305â06. Then-Judge Gorsuch, after holding that
NCMEC is either a governmental entity or a government
agent, see id. at 1308, concluded that âin at least this way
[the government] exceeded rather than repeated AOLâs
private search,â id. at 1305â06.
Ackerman did suggest that, had the government viewed
only the attachment AOL identified as a hash value match
and not other attachments and the text of the defendantâs
email, that distinction might âbring the government closer to
a successful invocation of the private search doctrine.â Id.
at 1308 (emphasis added). But Ackerman also noted that in
that circumstanceâwhich appears to be what happened
hereâthe governmentâs action may still be a new search, as
the government, âmight . . . have risked exposing new and
protected information, maybe because the hash value match
could have proven mistaken . . . or because the AOL
employee who identified the original image as child
pornography was mistaken in his assessment.â Id. at 1306.
Although Ackerman did not decide the precise issue before
us, and expressly disavowed âprejudg[ing]â it, id. at 1308â
09, its underlying analysis is entirely consistent with ours,
and its suggestions about why there could be a search in our
circumstances echo some of the reasons we have given for
so concluding.
Other private search cases concerning the discovery of
child pornography, outside the context of automated hash
value matching, have also ruled consistently with our
understanding of the limited scope of the private search
exception. For example, in United States v. Lichtenberger,
786 F.3d 478 (6th Cir. 2015), the defendantâs girlfriend had
discovered child pornography on his computer. She later
showed his computer to the police and opened some
UNITED STATES V. WILSON 33
computer files that were determined to contain child
pornography. But the defendantâs girlfriend was ânot at all
sure whether she opened the same files with [the police] as
she had opened earlier that day.â Id. at 490. As a result, the
Sixth Circuit concluded that the government search
exceeded the scope of the private search. This reasoning
supports our result here. The record does not identify the
Google analyst who could have stated that the images Agent
Thompson viewed were identical to images the analyst
previously viewed, nor does it explain Googleâs algorithm in
any detail. Given these gaps, there is no way to be âat all
sureâ that the images Agent Thompson viewed were the
same images a Google analyst had earlier viewed, so the
government search exceeded the scope of Googleâs search.
Further, in United States v. Sparks, 806 F.3d 1323 (11th
Cir. 2015), overruled on other grounds by United States v.
Ross, 963 F.3d 1056 (11th Cir. 2020), a store employee and
her fiancĂŠ discovered child pornography on a lost cell phone
and showed the phone to the police. The police officer
ultimately viewed two videos on the cell phone, one of
which the private parties âhad not watched.â Id. at 1332.
Because the government search exposed new information,
not seen by the private party, the Eleventh Circuit concluded
that the government search exceeded the scope of the private
search. 13
13
Both the Fifth Circuit and the Seventh Circuit have held that an
individualâs privacy interest in a digital container, such as an email
account, cell phone, or laptop, is entirely frustrated whenever any part of
the container is searched. See United States v. Runyan, 275 F.3d 449, 465
(5th Cir. 2001); Rann v. Atchison, 689 F.3d 832 (7th Cir. 2012). But this
approach is squarely contrary to the Ninth Circuitâs approach to digital
devices, has been undermined by more recent Supreme Court cases about
34 UNITED STATES V. WILSON
Conversely, the Fifth and Sixth Circuits recently decided
the issue before us and came to a conclusion contrary to the
one we reach, although the reasoning of the two opinions
diverged. The circumstances in both cases were similar to
those here. See United States v. Reddick, 900 F.3d 636 (5th
Cir. 2018); United States v. Miller, 982 F.3d 412, 427 (6th
Cir. 2020). In both cases, after an electronic service provider
flagged certain email attachments as apparent child
pornography, the attachments were forwarded to a local law
enforcement agency, whose officers viewed the images for
the first time without a warrant.
The Fifth Circuit held the private search exception
justified the governmentâs warrantless search because the
government agentâs âvisual review of the suspect images . . .
the scope of digital information, and is inconsistent with Jacobsen. For
starters, Tosti did not regard the viewing of some files as sufficient for
purposes of the private search doctrine to show that the government only
invaded a defendantâs privacy interests to the same extent as the private
party. See 733 F.3d at 822. More generally, and dispositively, the Ninth
Circuit has not treated digital devices as unitary, such that a permissible
search of one file or attachment justifies a search of a larger swatch of
digital material. See United States v. Cotterman, 709 F.3d 952 (9th Cir.
2013) (en banc); United States v. Cano, 934 F.3d 1002, 1007 (9th Cir.
2019). Further, Runyan and Rann are in tension with recent Supreme
Court cases, which express concern that given the âimmense storage
capacityâ of modern technology, the Fourth Amendment will be
undermined unless government searches of digital material are
meaningfully confined in accord with established Fourth Amendment
doctrine. Riley v. California, 573 U.S. 373, 393 (2014); see also
Carpenter v. United States, 138 S. Ct. 2206, 2214 (2018). Finally, if, in
Jacobsen, law enforcement officers had opened and searched not only
the specific containers investigated by the FedEx employees but others
included in the same box, the private search doctrine would not have
applied to the still-sealed containers. There is no basis for ruling
otherwise with regard to unopened digital files. Runyan and Rann were
in our view wrongly decided.
UNITED STATES V. WILSON 35
was akin to the government agentsâ decision to conduct
chemical tests on the white powder in Jacobsen,â insofar as
âopening the file merely confirmed that the flagged file was
indeed child pornography, as suspected.â Reddick, 900 F.3d
at 639.
We cannot accept this analysis for several reasons. First,
and most important, Reddick conflates Jacobsenâs first
holding regarding the private search exception to the Fourth
Amendment with its second holding regarding whether the
field test constituted a search under the Fourth Amendment.
The private search exception excuses a warrantless
government search that would otherwise violate the Fourth
Amendment; the field test determination in Jacobsen, based
on Fourth Amendment law outside the private search
context, was that a warrantless government field drug test
simply does not trigger the Fourth Amendmentâs
protections. 466 U.S. at 123â24. In other words, the
warrantless chemical test in Jacobsen was not excused via
the private search exception but for an entirely different
reasonâthat confirming through a field test that an already
exposed and seized contraband substance was a drug is not
a search for Fourth Amendment purposes. Id. at 122.
Moreover, in Jacobsen, the white powder was fully
visible to the government officers when they repeated the
steps taken by the FedEx employees to inspect the package.
Not so here, as no human had viewed Wilsonâs images
before. The part of Jacobsen that does elucidate the private
search doctrine cannot govern here.
Notably, we have held that the chemical field test
exception to the Fourth Amendmentâs warrant requirement
does not apply to a more complete chemical analysis of a
drug. In United States v. Mulder, 808 F.2d 1346 (9th Cir.
1987), a hotel security officer removed items left behind in
36 UNITED STATES V. WILSON
a hotel room after a guestâs scheduled departure, including
plastic bags full of tablets, and provided them to federal
agents. Id. at 1347. The tablets âwere tested at the Western
Regional Laboratory through the use of mass spectrometry,
infrared spectroscopy and gas chromatography.â Id. at 1348.
Mulder distinguished between the chemical field test in
Jacobsen and a laboratory test: â[T]he chemical testing in
this case was not a field test which could merely disclose
whether or not the substance was a particular substance, but
was a series of tests designed to reveal the molecular
structure of a substance and indicate precisely what it is.
Because of the greater sophistication of these tests, they
could have revealed an arguably private fact,â and thus
compromised the defendantâs legitimate privacy interest. Id.
at 1348â49.
To the extent opening an email attachment to view its
contents is analogous to drug testing at all, it is akin to a
laboratory test with the potential to reveal new private
information, as in Mulder, not a binary field test that yields
either a positive or negative result. Just as a laboratory test
of a suspected drug reveals its precise molecular structure
and so potentially exposes additional private information
like other illicit contaminants or the source of the substance,
so viewing an image of suspected child pornography reveals
innumerable granular private detailsâfor example, the faces
of the people depicted, the setting, and, perhaps, other
speech or conduct also in the frame. Viewing the images
here allowed the government to do more than just confirm
the imagesâ classification as child pornography, implicating
privacy interests beyond a binary classification. Contrary to
Reddick, the governmentâs âvisual review of the suspect
imagesâ was not analogous to âthe government agentsâ
decision to conduct chemical tests on the white powder in
Jacobsen.â 900 F.3d at 639 (emphasis added).
UNITED STATES V. WILSON 37
The Sixth Circuit recognized the error in Reddick
concerning the reach of the private search holding in
Jacobsen and âopt[ed] not to relyâ on it. Miller, 982 F.3d
at 429. As Miller points out, the government agentâs
âinspection (unlike the [field] test) qualifies as the invasion
of a âlegitimate privacy interestâ unless Googleâs actions had
already frustrated the privacy interest in the files.â Id.
Miller instead resolved the Fourth Amendment question
it faced by focusing exclusively on the assumed reliability of
Googleâs proprietary technology. âAt bottom,â Miller
explained, âthis case turns on the question whether Googleâs
hash-value matching is sufficiently reliable.â Id. at 429â30.
Because the defendant in Miller ânever challenged the
reliability of hashing,â id. at 430 (internal brackets and
quotation omitted) (Miller thought the burden was on the
defendant, see id. at 430), Miller deferred to the district
courtâs finding âthat the technology was âhighly reliable.ââ
Id.
Wilson, by contrast, did challenge the âaccuracy and
reliabilityâ of Googleâs hashing technology in the district
court. And, contrary to Millerâs assertion, the government
bears the burden to prove its warrantless search was
permissible, see supra p. 20âa burden it failed to carry.
Our analysis, however, relies only contingently on the
adequacy of the record with regard to the hash match
technology. In our view, the critical factors in the private
search analysis, both unacknowledged in Miller, include the
personal nature of Fourth Amendment rights and the breadth
of essential information Agent Thompson obtained by
opening the attachment, informationâand a privacy
invasionâwell beyond what Google communicated to
NCMEC. See supra Parts II.B.1, II.B.2. The reliability of
Googleâs proprietary technology, in our estimation, is
38 UNITED STATES V. WILSON
pertinent to whether probable cause could be shown to
obtain a warrant, not to whether the private search doctrine
precludes the need for the warrant.
And, as the district court noted, and we have noted as
well, the warrant application here contained inadequate
information about Googleâs proprietary technology to
establish probable cause without reliance on the descriptions
of the actual images. See supra p. 25.
III. Conclusion
âWhen confronting new concerns wrought by digital
technology, this Court has been careful not to uncritically
extend existing precedents.â Carpenter, 138 S. Ct. at 2222.
The government reports there were 18.4 million CyberTips
in 2018, making it all the more important that we take care
that the automated scanning of email, and the automated
reporting of suspected illegal content, not undermine
individualsâ Fourth Amendment protections.
Having examined this case with the requisite care, we
hold, for the reasons explained, that Agent Thompson
violated Wilsonâs Fourth Amendment right to be free from
unreasonable searches when he examined Wilsonâs email
attachments without a warrant. Wilsonâs conviction is
vacated, the district courtâs denial of Wilsonâs motion to
UNITED STATES V. WILSON 39
suppress is reversed, and this case is remanded for further
proceedings. 14
14
As noted, the district court concluded that if Agent Thompsonâs
warrantless actions constituted an illegal search, no exception âwould
prevent operation of the exclusionary rule.â Wilson, 2017 WL 2733879,
at *13. The government did not raise before us any argument to the
contrary, and thus waived any challenge. See United States v. Gamboa-
Cardenas, 508 F.3d 491, 502 (9th Cir. 2007).