Appeals Court Says No Evidence Suppression For Arrestee Who Tried To Eat Five SD Cards Found In His Possession
from the well,-it's-several-years-of-prison-either-way dept
There are a few questionable assumptions made by the Fourth Circuit Appeals Court in its denial [PDF] of a suppression request, but the opening suggests drug cartels might want to vet their employees a little better.
David Sierra Orozco was paid to drive a car with over $100,000 in drug-tainted cash hidden in a secret dashboard compartment. When police pulled him over, he acted suspiciously: He quickly shut down the GPS application running on his smartphone and struggled to answer where he was going with the money. His odd behavior continued when he arrived at the station: When police found five SD cards wrapped in a $100 bill in Orozco’s shoe, Orozco tried to destroy them by eating them. When police got a warrant to search the phone and SD cards, things went from bad to worse for Orozco—both the phone and the chips contained graphic and heinous child pornography.
If you want your cash runner to survive detainment and questioning by police, make sure they’ve got a good story to tell and, more importantly, a shoe free of evidence linking them to another crime entirely.
That being said, there are some problematic assumptions made here by the Appeals Court.
Orozco was unable to provide a good cover story during the stop. He also was not the owner of the vehicle he was driving. Officers noticed the dashboard of the car was not flush and bore tool marks, suggesting it had been recently removed. That resulted in the calling of a drug dog to the scene. The dog alerted on the passenger side door, which was apparently enough to justify allowing the dog to search the car’s interior. It alerted on the dashboard. The dash was removed and officers found $111,252 hidden in a secret compartment.
Officers arrested Orozco, seized both cellphones found in the car, and then supposedly added to their probable cause by performing this meaningless act:
In a money line-up, some cash is placed into a bag, and several identical control bags are filled with things other than the cash. The K-9 is then paraded past each bag. Here, the K-9 alerted to only the bag containing the money found in Orozco’s car.
Most cash in circulation has drug residue on it, thanks to cash still being king in drug transactions and cross-contamination occurring in ATMs and other places where cash is stored/distributed. So, a dog alerting on cash should be indicative of nothing more than the presence of US currency.
The next bit of probable cause is Orozco’s fault, though.
At the station, Corporal Robert Kimbrough searched Orozco’s person. He found a folded-up $100 bill in Orozco’s shoe, and as he unfolded it, five micro-SD cards fell out onto the floor. Orozco quickly scooped up two of the cards and shoved them into his mouth. Kimbrough managed to recover one SD card—though chewed and inoperable—from Orozco’s mouth; Orozco apparently swallowed the other.
The officers obtained a warrant to search the seized Samsung phone and the three remaining operable SD cards for “evidence of drug trafficking.” They never got a chance to find drug trafficking evidence, apparently.
Narcotics officers began searching one SD card; they immediately saw what they believed to be child pornography. A second warrant was then obtained for the SD cards; two SD cards contained several hundred images and videos of child pornography. A third warrant was then issued for the Samsung smartphone; its internal temporary storage contained five child pornography images.
This is the equivalent of plain view. Cops were searching for evidence of one thing and came across evidence of something else. Narrowly crafted warrants are supposed to prevent officers from going fishing for other criminal evidence, but it appears in this case, the CSAM was one of the first things seen by the officer perform the search of the SD card.
That leaves Orozco with only one option: asserting officers had no probable cause to perform the search. And, while there are cases where it’s tough to see the connection between seized electronic devices/storage, the court says there was enough here to justify the initial search.
We begin with Orozco’s argument that the warrant affidavit did not give cause to believe he was engaged in illegal drug trafficking. Orozco’s argument essentially boils down to the idea that it “is not illegal to be paid to drive a car” and that “[c]ash is not contraband.” This is true. And so, Orozco insists, driving another person’s car with a large sum of drug-tainted cash stashed in a secret compartment is not enough evidence of drug-trafficking activity to justify further investigation. There, we disagree.
That Orozco might propose an innocent explanation for his conduct does not defeat probable cause.
The court notes the probable cause is still a pretty low bar and officers are not expected to consider every conceivable innocent explanation for things they’ve observed when seeking a warrant.
But there also must be a nexus — something linking the items being searched to the suspected crime. And Orozco pretty much defeated any inference of innocence in the SD cards by doing what he did when they were discovered by an officer.
We begin with the SD cards, which Orozco hid in a $100 bill inside his shoe. That alone is suspicious and might reveal a connection between those SD cards and Orozco’s ongoing criminal conduct. But we need not fret about whether it is by itself suspicious enough to establish probable cause to search the cards. Because after dropping the cards on the ground, Orozco shoved some in his mouth and started chewing, and apparently swallowed one.
The court says this action pretty much undermines Orozco’s assertions that officers did not have probable cause to believe the SD cards contained evidence of wrongdoing.
Orozco does not argue that chewing memory cards is typical, innocent behavior. Chewing on the chips can be taken only as an attempt to hide something. Orozco just insists that the “something” is not necessarily evidence of his crime. And so, he argues, more was required of the warrant application to tie the SD cards to the crimes for which he was being investigated.
Orozco’s contentions defy longstanding legal principles. Intentionally destroying an item before it can be examined would permit someone to believe the item is inculpatory.
Because the most logical assumption was that Orozco was trying to destroy evidence related to the suspected crime he was arrested for, a warrant to search the cards for evidence of that crime was enough to justify the search that uncovered a completely separate crime. Not only was this evidence in plain view (seen “immediately” by investigators), it would also have been inevitably discovered during the course of the search.
Orozco took a bad situation and made it immediately worse. That it likely would have ended up just as badly for him by the time the searches were performed is unfortunate (for him), but without the attempted (and apparently partially successful) ingestion of SD cards, he would have at least had a better shot as disproving the nexus between the SD cards in his shoe and the alleged drug money in his dashboard.
That being said, the court says something really interesting about the Supreme Court’s Riley decision that seemingly inverts the Supreme Court’s findings in that case, which established a warrant requirement for cellphone searches incident to an arrest. Justifying the warrant requirement, the Supreme Court said searching a smartphone is like searching someone’s house. Every phone contains a wealth of private information, making it far more intrusive than simply searching an address book or wallet or suitcase (analogies made by the government).
Here, the court says that because phones are like houses, that’s pretty much all the probable cause anyone needs to secure a warrant.
Though smartphones were decades away at the time of Anderson, the Supreme Court has since noted that searching one’s smartphone is like searching his home. See Riley v. California, 573 U.S. 373, 395–97 (2014). Much like homes, cellphones contain “a digital record of nearly every aspect of [their owner’s] lives—from the mundane to the intimate.” A phone will often contain the suspect’s “Internet browsing history, a calendar,” “photographs labeled with dates, locations, and descriptions,” a “record of all his communications” with various associates, and location information allowing one to “reconstruct [his] specific movements down to the minute.” The all-encompassing information on cellphones explains why unconstrained warrantless cellphone searches, like warrantless home searches, contravene the Fourth Amendment. But it is also why phones “can provide valuable incriminating information about dangerous criminals.” So just as it is sometimes reasonable to believe that a suspect’s home may contain evidence of their crimes, it might be reasonable to believe that his cellphone will. At least this might be true for crimes like drug trafficking that involve coordination.
Maybe the Appeals Court isn’t reading Riley the way it comes across here. At least I would hope not. The point of the Riley decision was that searching a phone is as intrusive as searching a house. This footnote implies something else: that the nexus between phones and suspected criminal activity is pretty much a foregone conclusion. Fortunately, the court only says it “might be reasonable to believe” phones contain evidence. But it’s a twist on Riley I didn’t see coming.
A suppression challenge requires several things to be successful. Attempting to eat SD cards, however, definitely isn’t one of those things. Suppression denied.
Filed Under: 4th amendment, probable cause
Comments on “Appeals Court Says No Evidence Suppression For Arrestee Who Tried To Eat Five SD Cards Found In His Possession”
When police found five SD cards wrapped in a $100 bill in Orozco’s shoe, Orozco tried to destroy them by eating them.
Maybe Orozco was just trying to get some extra iron in his diet. 😉
He should have used micro SD cards, then he could have swallowed all five at once. 🙂
Re:
It says they were micro-sd in 1 place then sd everywhere else… I’m confused.
Re: Re:
The two terms are synonymous because you never see full-size SD cards for phones anymore, so when people say “SD cards” in ralation to phones and tablets, they invariably mean micro SD cards.
I’m just sort of happy that they applied for and got warrants at multiple stages in this rather than just looking at everything based on “he tried to eat them” (which is freaking stupid to begin with but…)
Huh...
Not that I’m siding with this guy, by any means, but who the hell is trying to carry sensitive information these days without encrypting it first…? Encrypted zips are hardly rocket science (7z preferred), and if the guy is just a carrier don’t even tell him the passcode so he can’t reveal it even if he decided to do so…
Re:
I think you have a bit of a mild misunderstanding.
The sdcards were not associated with the reason he was driving the car. The sdcards were evidence of a separate independent crime the driver was involved with.
This comment has been flagged by the community. Click here to show it.
Oh, look! TD’s forum is full of anonymous assholes. Surprise! Real people no longer care about the material, b/c anonymous assholes.
Might want to fix that.
Re:
Might want to fix that.
Yes, you might, Phillip. You can start by fucking off, you hypocritcal bastard.
This comment has been flagged by the community. Click here to show it.
Re: Re:
Said the neoNazi, fascist pig aka, You.
Watching your censorship regime now, article in Rolling Stone or other to follow.
Re: Re: Re:
Said the neoNazi, fascist pig aka, You.
Every accusation a confession, Phillip. I reiterate: fuck off, hypocrite.
Re:
Yes, it is. Would you prefer to see Techdirt have an account system that would prevent your drive-by trolling?
Re: Re:
I’m guessing not, making my charge of hypocrisy doubly apt! 😊
Re:
At the time you posted this, every single comment on this article had some sort of name for the author, even if it was a pseudonym. Yours was the first posted under the default nym “Anonymous Coward”.
Maybe you should check if the glass house you’re throwing stones at isn’t your own first.
This comment has been flagged by the community. Click here to show it.
I am actually logging the response time between my posting, and comparing it to earlier examples of posts-times.
You lose the “free speech” discussion. TD is totally modded by fascist censorship -by-proxy assholes, as most US-FVEYs forums are. Once upon a time, in America….
The logs demonstrate that exact fact–you sit in a position at the switch–and as such, I will direct resources to you, for further examples of “US-FVEY’s not so free speeching” no more.
But I know who you are now, here, and elsewhere (leaks, LOL) Next time, I will come with Kali, and lots of arms. Your kind of speech suppression is a bane to democracy everywhere/n/s.
Re:
Commenting on Techdirt is a privilege. Having your comments hidden by flagging is moderation. You wouldn’t know censorship unless it started burning library books, and even then, I’m not so sure.
Re:
I am actually logging the response time between my posting, and comparing it to earlier examples of posts-times.
Which proves what, exactly? There’s more evidence in your previous two comments on this page.
You lose the “free speech” discussion.
Yes, you do.
TD is totally modded by fascist censorship -by-proxy assholes…
Every accusation a confession.
…as most US-FVEYs forums are.
There’s no such thing as “US-FVEYs forums”. There are, however, CCP-aligned trolls, which I learnt when you began spamming up Techdirt’s comments sections. Now fuck off, would you kindly?
This comment has been flagged by the community. Click here to show it.
Even then, you can’t stop yourself from censoring comments. ADL spergbots deserve what they get–anywhere in the world YOU occur.
Re:
Engaging in hypocrisy can’t disguise you, Phillip. Fuck off, a CCP-aligned troll like you isn’t welcome here. Baidu Tieba is probably more to your taste.
Re:
What other conspiracy theories do you believe in?
Re:
Given that only two people here have even claimed to have autism, one of which being someone you pointed out was autistic before they even mentioned it and the other being someone you have yet to interact with, this accusation of there being “spergbots” here rings incredibly hollow. You have also yet to demonstrate any connection between literally anyone here and the ADL.
Also, just so you know, “sperg” is a slur against autistic persons, period, akin to the N word. It’s one of the rare cases where the only context it could be forgiven is when quoting someone else. Stop with the ableist language already.
100k only?, maybe this is like an interview run. Toss em a few bucks and see if he sinks or swims.
This comment has been flagged by the community. Click here to show it.
Car Accident Lawyer San Francisco Dolan Law
The Founder of the Company Chris Dolan Has Repeauttedly Been Recognized As One of the Lawyers in the Trial of the San Francisco Gulf Gulf Area and California.
https://badbola.in/law/car-accident-lawyer-san-francisco-dolan-law-10027/