U.S. v. Caymen

Decision Date21 April 2005
Docket NumberNo. 03-30365.,03-30365.
Citation404 F.3d 1196
PartiesUNITED STATES of America, Plaintiff-Appellee, v. Nicolai CAYMEN, aka Andre Patrick Payne, Defendant-Appellant.
CourtU.S. Court of Appeals — Ninth Circuit

Mary C. Geddes, Assistant Federal Defender, Anchorage, AK, for the appellant.

Steven E. Skrocki, Assistant U.S. Attorney, Anchorage, AK, for the appellee.

Appeal from the United States District Court for the District of Alaska; Ralph R. Beistline, District Judge, Presiding. D.C. No. CR-03-00002-RRB.

Before: HALL, KLEINFELD, and WARDLAW, Circuit Judges.

KLEINFELD, Circuit Judge.

We consider a motion to suppress evidence found on the hard drive of a computer that had been obtained by fraud.

Facts

We take the facts from the hearing on the motion to suppress and the district court's decision on the motion.

Caymen worked as a desk clerk at a hotel in Ketchikan, one of Alaska's larger cities, but as cities go, a small one, with a population of about 7,500 people. A local business supply store called the police after a woman complained that the store had charged her credit card $1,654 for a computer that she had not purchased. The store discovered that Caymen had placed a telephone order for the computer using a credit card, and when Caymen picked it up the shop clerk had not asked him for any identification. Because the local business supply stores share information about customers who defraud them, the store clerk was able to tell the police that Caymen had tried to buy a computer from one of their competitors, also with credit card trickery. At the second store, Caymen had first tried to use a credit card that was rejected, then he used a different card that worked, but he later cancelled the order, saying that he had already obtained the computer he needed.

The police got a search warrant for the house where Caymen rented a room to look for the laptop and evidence of credit card fraud. The police discovered the laptop in Caymen's room. It was connected to a desktop tower, which did not have its own monitor (evidently he used the laptop as its monitor), and both computers were connected to a high-speed DSL internet connection. The police officer could see where a rental sticker had been torn off the back of the tower. It turned out that Caymen had rented the desktop tower from a store, but never made any payments and never returned it. The police then got a second warrant to seize the desktop tower.

Caymen was present during the search. He claimed that he had no idea what the police were talking about when they said that the laptop had been purchased with someone else's credit card. Caymen insisted that he had bought it with his own credit card. During the search, the police found documents showing that Caymen had changed his name from Andrew Patrick Payne. When the police ran the old name through the law enforcement database, they found that Caymen had outstanding warrants in two other states (which Caymen denied having), and that he had prior convictions for the possession of child pornography and unlawful acts with minors. In Caymen's wallet, the police found two receipts for the purchase and subsequent cancellation of the computer that Caymen had ordered from the second store. Printed on those receipts was yet another credit card number that did not belong to Caymen. Again, Caymen claimed not to know how this could have happened. The police also found some receipts containing the names and credit card information of guests who had stayed at the hotel where Caymen worked.

After seizing the laptop, the police called the business supply store where Caymen had gotten it to ask if they could look at it before returning it. The store's owner not only consented to the police request, but he specifically requested that the police search the laptop's hard drive because he didn't "want to have anything [on the computer] that shouldn't be there." The police looked on the laptop's hard drive for evidence of credit card fraud, but instead found images of boys, who were around ten or twelve-years-old, exhibiting their genitals for the camera. The police immediately stopped their search of the hard drive so that they could obtain a third search warrant, because they now had probable cause to believe that Caymen possessed child pornography. Using the third warrant, the police looked at the hard drives and storage media from both the laptop and tower computers for evidence of possession of child pornography. They found plenty — the hard drives were filled with sexually explicit images of children.

Caymen was indicted for possession of child pornography and fraudulent use of a credit device. He moved to suppress the evidence of the sexual photographs of children on the laptop. Caymen's theory was that the police had no constitutional justification for their first look on the laptop's hard drive, and that all the subsequently found child pornography was "fruit of the poisonous tree." Caymen's motion was denied. He pleaded guilty to possession of child pornography, but reserved for appeal the question of whether his motion to suppress was properly denied. The fraudulent use of a credit device charge was dismissed (it was apparently pursued by the state in state court, but our record does not include any state disposition). Caymen now appeals the district court's denial of his motion to suppress.

Analysis

We review the denial of Caymen's motion to suppress de novo, and the underlying factual findings for clear error.1

The parties argue the case exclusively in terms of whether Caymen has standing to assert a Fourth Amendment violation stemming from the initial police search of the laptop. We need not decide whether other grounds might have justified the examination of the laptop hard drive, or whether consent or a warrant (beyond the warrants the police already had) was needed for the first examination of the hard drive, because no such issues are raised in Caymen's motion to suppress, the district court's denial of that motion, or the appellate briefs.

Caymen attacks the initial police examination of the lap top's hard drive as a warrantless search. The police had neither Caymen's consent nor a warrant to look on the hard drive, and since the laptop was in police possession (and had been for weeks), the police could easily have sought and obtained a warrant. Caymen argues that the consent to search the laptop given by the business supply store was irrelevant because the computer belonged to Caymen and not to the store. Caymen had plainly not authorized the shop owner to consent to examination of the hard drive of his computer, so the line of third party consent cases2 has no bearing on this case. The laptop was in police possession pursuant to the first search warrant when the police looked at it, so this case does not raise the questions at issue in cases where a guest is still using a room that he obtained by fraudulent use of a credit card.3

Caymen argues that because he "neither conceded nor was convicted of wrongdoing in relationship to the transaction" involving the laptop, we have to proceed on the assumption that the laptop was his, as he claimed when the police conducted the search. Thus, Caymen would have us decide the case under the assumption that the laptop belonged to Caymen, that he had legitimately purchased and used it for several months, and that the police examination was illegal because it was done without Caymen's consent and without a warrant. Caymen's proposed mode of analysis is incorrect, however, because of the clearly established law on a defendant's burden to establish a Fourth Amendment violation.

The Supreme Court held in Rakas v. United States4 that "the proponent of a motion to suppress has the burden of establishing that his own Fourth Amendment rights were violated by the challenged search or seizure."5 In United States v. Freitas,6 we held that "[w]here a defendant fails to meet this burden in the suppression hearing, he cannot prevail on appeal even though the Government also did not establish the contrary, unless, of course, the record on appeal independently demonstrates the requisite standing."7 This is in accord with the general view that "the burden of proof is on the defendant" to demonstrate that he has a reasonable expectation of privacy.8

This is not to say that the defendant has to establish some sort of property interest. The "capacity to claim the protection of the Fourth Amendment depends not upon a property right in the invaded place,"9 but rather "whether the individual by his conduct has exhibited an actual (subjective) expectation of privacy,"10 and further, "whether the individual's subjective expectation of privacy is one that society is prepared to accept as reasonable."11 Thus we do not consider whether title to the laptop passed from the store to Caymen.

Although Caymen bases his claim on the fact that he "neither conceded nor was convicted of wrongdoing" in connection with the laptop, the record nonetheless shows that he has never carried his burden of proof to establish an "acceptable" expectation of privacy in the laptop. The police officer testified at the evidentiary hearing on the motion to suppress. Caymen did not. Caymen did not submit an affidavit or other evidence supporting his claim that he had honestly purchased and owned the laptop. While Caymen did make such a claim to the police during their search of his room, that claim was, of course, unsworn. While at the evidentiary hearing on the motion to suppress the district court never orally recited anything to the effect of "I find that Caymen obtained the laptop by fraud," the district court's written decision says so clearly enough. The written order denying the motion to suppress says "[d]ue to the laptop being purchased by the fraudulent use of a credit card, Caymen did not have a reasonable expectation of privacy in the laptop and cannot...

To continue reading

Request your trial
104 cases
  • US v. King
    • United States
    • U.S. District Court — District of Hawaii
    • March 1, 2010
    ...held in different names supported probable cause justifying a plain view seizure of the documents); see also United States v. Caymen, 404 F.3d 1196, 1200 (9th Cir. 2005) ("The Fourth Amendment does not protect a defendant from a warrantless search of property that he stole, because regardle......
  • United States v. Soto
    • United States
    • U.S. District Court — District of Massachusetts
    • April 26, 2011
    ...intrusiveness much greater in quantity, if not different in kind, from searches of other containers.”). But see United States v. Caymen, 404 F.3d 1196, 1200–1201 (9th Cir.2005) (defendant could not claim standing to object to the search of a fraudulently obtained computer hard drive). There......
  • Clements-Jeffrey v. City of Springfield, Case No. 3:09–cv–84.
    • United States
    • U.S. District Court — Southern District of Ohio
    • August 22, 2011
    ...a laptop by fraudulent means lacks a reasonable expectation of privacy in the contents of the hard drive. See United States v. Caymen, 404 F.3d 1196, 1201 (9th Cir.2005). Defendants argue that because Plaintiffs knew or should have known that the laptop computer being used by Clements–Jeffr......
  • Warshak v. U.S.
    • United States
    • U.S. Court of Appeals — Sixth Circuit
    • June 18, 2007
    ...the thief of a stolen laptop did not have an expectation of privacy in material on the computer's hard drive. See United States v. Caymen, 404 F.3d 1196, 1201 (9th Cir.2005). Where a thief steals someone else's property, it is true that he lacks an expectation of privacy in that property, s......
  • Request a trial to view additional results
8 books & journal articles
  • Table of Cases null
    • United States
    • Full Court Press California Guide to Criminal Evidence Table of Cases
    • Invalid date
    ...533 F.3d 1064 (9th Cir. 2008)—Ch. 5-A, §3.3.3(1) U.S. v. Castillo, 866 F.2d 1071 (9th Cir. 1988)—Ch. 5-A, §3.3.1(3)(c) U.S. v. Caymen, 404 F.3d 1196 (9th Cir. 2005)—Ch. 5-A, §5.2.1 U.S. v. Cazares, 788 F.3d 956, 97 Fed. R. Evid. Serv. 741 (9th Cir. 2015)—Ch. 1, §4.13.6(3) U.S. v. Cerna, 201......
  • Search and seizure of electronic devices
    • United States
    • James Publishing Practical Law Books Suppressing Criminal Evidence Fourth amendment searches and seizures
    • April 1, 2022
    ...to any other stolen property, such as a car or purse. See Hicks v. State , 929 So.2d 13 (Fla. Ct. App. 2006); United States v. Caymen , 404 F.3d 1196 (9th Cir. 2005). There are differing opinions on what constitutes abandonment. When a tenant failed to pay rent and was told to move out, but......
  • Search and seizure of electronic devices
    • United States
    • James Publishing Practical Law Books Archive Suppressing Criminal Evidence - 2020 Contents
    • July 31, 2020
    ...to any other stolen property, such as a car or purse. See Hicks v. State , 929 So.2d 13 (Fla. Ct. App. 2006); United States v. Caymen , 404 F.3d 1196 (9th Cir. 2005). There are differing opinions on what constitutes abandonment. When a tenant failed to pay rent and was told to move out, but......
  • Search and Seizure of Electronic Devices
    • United States
    • James Publishing Practical Law Books Archive Suppressing Criminal Evidence - 2016 Contents
    • August 4, 2016
    ...to any other stolen property, such as a car or purse. See Hicks v. State , 929 So.2d 13 (Fla. Ct. App. 2006); United States v. Caymen , 404 F.3d 1196 (9th Cir. 2005). There are differing opinions on what constitutes abandonment. When a tenant failed to pay rent and was told to move out, but......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT