State v. C.J.L.

Decision Date18 April 2022
Docket NumberDOCKET NO. A-1052-21
Citation471 N.J.Super. 477,274 A.3d 611
Parties STATE of New Jersey, Plaintiff-Appellant, v. C.J.L., Defendant-Respondent.
CourtNew Jersey Superior Court — Appellate Division

Monica do Outeiro, Special Deputy Attorney General/Acting Assistant Prosecutor, argued the cause for appellant (Lori Linskey, Acting Monmouth County Prosecutor, attorney; Monica do Outeiro, on the brief).

Charles J. Uliano, West Long Branch, argued the cause for respondent (Chamlin Uliano & Walsh, attorneys; Charles J. Uliano, of counsel; Andrew T. Walsh, West Long Branch, on the brief).

Before Judges Fisher, DeAlmeida and Smith.

The opinion of the court was delivered by

SMITH, J.A.D.

The State appeals the denial of its motion to compel a cell phone passcode from defendant, C.J.L. The State argues the motion court erred by overlooking critical ownership evidence and misapplying the foregone conclusion doctrine, effectively importing Fourth Amendment principles into what is a Fifth Amendment inquiry. After examining the record in light of the recent decision in State v. Andrews, 243 N.J. 447, 234 A.3d 1254 (2020), which extended the foregone conclusion doctrine to passcodes, we agree and reverse because the State presented sufficient evidence on the issue of ownership and possession.

I.

Detective Gregory Pancza of the Bradley Beach police department received two cyber tips, one reporting the uploading of child sexual abuse/exploitation materials via Dropbox using an iCloud email account containing defendant's last name and first initial, and the other reporting an image of child sexual abuse sent by way of an Instagram direct message. The detective investigated and learned that both tips were connected to defendant.

A Law Division judge authorized three search warrants – one each for defendant's home, defendant's car, and defendant's person – finding sufficient probable cause supporting each search for, among other things, electronic devices which could contain evidence of endangering the welfare of a child, N.J.S.A. 2C:24-4(b)(5)(a), or which could assist in identifying suspects or additional victims. The warrant judge also authorized an on-site search, or field preview, of any seized electronic devices.

Det. Pancza and members of the Internet Crimes Against Children Task Force executed the three warrants at 6:00 a.m. on July 16, 2021, at defendant's residence. Defendant was located in his locked bedroom. He was the only occupant of the room, and he refused to open the door. Ultimately, the officers forced entry into defendant's bedroom.

During their search of defendant's bedroom, officers located three electronic devices: a Samsung cell phone, an Asus laptop, and an Apple iPhone 7. The iPhone was found in a pull string bag hanging on the back of a computer chair.1

In accordance with the search warrant, Detective Brian Migliorisi attempted to access the iPhone 7, but he was prevented from doing so because the iPhone was passcode protected. The only information Det. Migliorisi could retrieve from the iPhone was its association with the same iCloud email account from the cyber tips, the one containing defendant's last name and first initial. Defendant was charged with third-degree endangering the welfare of children, N.J.S.A. 2C:24-4(b)(5)(b)(iii).

In order to complete the iPhone search, the State filed a motion to compel defendant to produce the cell phone passcode. In support of its motion, the State submitted an affidavit from Det. Pancza, setting forth the facts of the investigation as well as those facts that constituted probable cause for issuance of the warrants. Defendant opposed the motion, arguing that the facts asserted by the State did not establish his ownership and operation of the iPhone. During oral argument, defendant did not contest probable cause. He did, however, ask the court to limit the scope of the warrant should it find the foregone conclusion exception applied.

The State argued against this. It asserted that limiting the scope would be inappropriate for two reasons: (1) the lawfully obtained warrants were based on probable cause and authorized the entire contents of the electronics to be examined, and (2) the offense was one that could "only be committed by using an electronic device[.]"

The court denied the motion, concluding the State failed to establish defendant's ownership of the iPhone and knowledge of the passcode. The court found that officers locating the iPhone in "a backpack" in "a bedroom" was insufficient to prove defendant's ownership. The court also found "that the phone immediately being in the vicinity of the defendant at the time of the search" did not "conclusively demonstrate that ... defendant own[ed] the phone." The State appealed, arguing the motion court erred in denying the state's motion to compel the phone passcode.

II.
A.

For purposes of appellate review, we analyze the State's motion to compel defendant to turn over evidence using the same standard we employ to review a defendant's motion to suppress evidence. " ‘[A] trial court's factual findings in support of granting or denying a motion to [compel] must be upheld when ‘those findings are supported by sufficient credible evidence in the record.’ " State v. A.M., 237 N.J. 384, 395, 205 A.3d 213 (2019) (quoting State v. Gamble, 218 N.J. 412, 424, 95 A.3d 188 (2014) ). We will only disturb those findings "if they are so clearly mistaken that the interests of justice demand intervention and correction." State v. Williams, 461 N.J. Super. 80, 94, 218 A.3d 356 (App. Div. 2019) (quoting State v. Robinson, 200 N.J. 1, 15, 974 A.2d 1057 (2009) ). "We deferentially review the trial judge's factual findings, crediting those ‘which are substantially influenced by [the] opportunity to hear and see the witnesses and to have the "feel" of the case, which a reviewing court cannot enjoy.’ " State v. Alessi, 240 N.J. 501, 517, 223 A.3d 184 (2020) (alteration in original) (quoting State v. Elders, 192 N.J. 224, 244, 927 A.2d 1250 (2007) ). However, "we owe no deference to the trial judge's legal conclusions, which we review de novo." Ibid. (citing State v. Hinton, 216 N.J. 211, 228, 78 A.3d 553 (2013) ).

B.

The Fifth Amendment provides that "[n]o person ... shall be compelled in any criminal case to be a witness against himself." U.S. Const. amend. V. That right against self-incrimination "applies only when the accused is compelled to make a [t]estimonial [c]ommunication that is incriminating." Fisher v. United States, 425 U.S. 391, 408, 96 S.Ct. 1569, 48 L.Ed.2d 39 (1976).

A privilege against compelled self-incrimination is not expressed in New Jersey's Constitution, but it "is deeply rooted in this State's common law and codified in both statute and an evidence rule." Andrews, 243 N.J. at 481, 234 A.3d 1254 (quoting State v. Muhammad, 182 N.J. 551, 567, 868 A.2d 302 (2005) ). The common law privilege "generally parallels federal constitutional doctrine," but also "offers broader protection than its federal counterpart ...." Id. at 483, 234 A.3d 1254 (first quoting State v. Chew, 150 N.J. 30, 59, 695 A.2d 1301 (1997) ; and then quoting Muhammad, 182 N.J. at 568, 868 A.2d 302 ). "[I]n contrast to federal law which distinguishes between Fourth and Fifth Amendment inquiries, New Jersey's common law views the privilege against self-incrimination as incorporating privacy considerations." Id. at 485, 234 A.3d 1254.

Even when a communication is testimonial, there is an exception to the Fifth Amendment which arises when the act of production has minimal testimonial value, because the information conveyed by the act is a foregone conclusion. Id. at 480, 234 A.3d 1254. In Andrews, our Supreme Court held that the foregone conclusion doctrine, historically applied to documents, also applied to the production of passcodes. Ibid. ("concluding that compelled production of the passcodes falls within the foregone conclusion exception."). To fall under this exception, the State must demonstrate (1) the passcode's existence, (2) the defendant's possession and operation of the passcode-protected device, and (3) the passcode enables access to the cell phone's contents. Id. at 480-81, 234 A.3d 1254. If all three requirements are met, then compelled disclosure of the passcode will not violate a defendant's Fifth Amendment protection against self-incrimination. Id. at 480, 234 A.3d 1254.

Andrews found this doctrine applied to New Jersey's protections against self-incrimination. The Court agreed with our conclusion that once "the State has established the elements for application of the ‘foregone conclusion’ doctrine, New Jersey's common law [and statutory] privilege[s] against self-incrimination do[ ] not bar compelled disclosure of passcodes ...." Id. at 461, 234 A.3d 1254 (citing State v. Andrews, 457 N.J. Super. 14, 24, 197 A.3d 200 (App. Div. 2018) ); see also id. at 485, 234 A.3d 1254. Accordingly, the Court determined that because all three elements of the foregone conclusion test were met, the production of the defendant's passcodes was not self-incrimination under New Jersey's protections. Ibid.

Andrews also addressed the relationship between Fourth Amendment privacy concerns and self-incrimination principles. In Andrews, the search and seizure of the devices was "authorized by ... lawfully issued search warrants[.]" Id. at 465, 234 A.3d 1254. As such, defendant did not argue that the warrants were unsupported by probable cause. Id. at 464, 234 A.3d 1254. Instead, he claimed the "compelled disclosure of his ... passcodes ... violate[d] federal and state protections against self-incrimination." Id. at 465, 234 A.3d 1254. Accepting the defendant's argument, the Court determined "the proper focus" for evaluating motions to compel passcodes was "the Fifth Amendment[,] and ... Fourth Amendment[ ] privacy protections should not factor into [the] analysis ...." Id. at 479-80, 234 A.3d 1254.

III.
A.

The State argues that the motion court...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT