Child Pornography Evidence Suppressed When Search Overbroad
The Reader’s Digest Version: Evidence of child pornography suppressed when warrant described the premises to be searched as only one of three residences at a certain street address, but officers proceeded to search a second residence, finding such child pornography on the laptop of a police officer living in the second residence. The important fact to this case was the police officer could not access the Internet signal that the house identified in the warrant had.
In response to a police inquiry, Comcast identified the suspect’s IP address owner was Jennie Reynolds at 309 South 23rd Street in San Jose. The police then searched a database for names associated with that address and found three names associated with that address: Jennie Reynolds, Joshua Blankenship and Kevin Nguyen.
Police obtained a search warrant for the residence at 309 South 23rd Street, describing the appearance of the front door of only the front house from the street. The warrant also authorized the search of any and all yards, garages, carpets, out buildings, storage areas, and sheds assigned to the premises. While searching Reynold’s house, the police discovered defendant Kevin Nguyen living in a separate residence behind the house. The police then searched Nguyen’s residence and found a laptop also with child pornography. Police also seized a computer in the Reynolds house.
Police searched for wireless network signals in the area in front of the house. There were no “open” wireless networks, i.e. networks unprotected by a password. This meant that Nguyen could not access the Comcast IP address used by Reynolds to share the child pornography.
Police also determined that Nguyen was a police officer for the Mountain View Police Department.
The warrant did identify Jennie Reynolds as the subscriber to the Comcast account with the suspect IP address. The warrant did not identify Nguyen at all.
The prosecution charged Nguyen with one count of possessing child pornography (Penal Code § 311.11(a)).
Nguyen moved to quash and traverse the warrant and to suppress the fruits of the search under Penal Code § 1538.5. Nguyen argued that nothing in the warrant established probable cause to believe his residence had any connection to the network with the suspect IP address.
The prosecution argued that the search of Nguyen’s property in the rear was proper because it authorized the search of “any residence” on the property because anyone on the property could have accessed Reynold’s computer network wirelessly.
The trial court held that the police lacked probable cause to search defendant’s residence because they had no basis to believe the suspect network was accessible from defendant’s residence. Moreover, the warrant did not expressly authorize the search of the rear house and the police lacked a good faith reliance on the warrant.
The People appealed the trial court’s ruling to the Sixth Appellate District.
In People v. Kevin Nguyen (2017 DJDAR 5394), the Sixth Appellate District affirmed the trial court’s ruling, expressly finding the police did not act in good faith reliance on the warrant.
The Sixth Appellate District agreed that Nguyen’s house was neither a garage nor an out building, such that it fell outside the express, specific terms of the warrant. Moreover, there was no evidence that the suspect network could be accessed from Nguyen’s residence.
The appellate court agreed with Nguyen that the warrant failed to meet the requirement of the Warrant Clause of the Fourth Amendment because it did not describe Nguyen’s residence “with particularity.” Nguyen’s residence much larger than a garage, shed or outbuilding, so it was clearly not included in the scope of the warrant.
We appreciate this ruling and hope that the same ruling would have been made if Nguyen had not been a police officer.