United States v. Dixon

984 F. Supp. 2d 1347, 2013 WL 6055396, 2013 U.S. Dist. LEXIS 162743
CourtDistrict Court, N.D. Georgia
DecidedNovember 15, 2013
DocketCriminal Action File No. 1:12—CR-205-1-0DE-ECS
StatusPublished
Cited by7 cases

This text of 984 F. Supp. 2d 1347 (United States v. Dixon) is published on Counsel Stack Legal Research, covering District Court, N.D. Georgia primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Dixon, 984 F. Supp. 2d 1347, 2013 WL 6055396, 2013 U.S. Dist. LEXIS 162743 (N.D. Ga. 2013).

Opinion

ORDER

ORINDA D. EVANS, District Judge.

This criminal case is before the Court on the Final Report and Recommendation of United States Magistrate Judge E. Clayton Scofield III filed August 30, 2013 [Doc. 155]. No objections have been filed.

In the Report and Recommendation, the Magistrate Judge recommends that Defendant’s motion to suppress evidence from mobile telephone be granted. Specifically, the Magistrate Judge found that the BATF agent violated Defendant’s Fourth Amendment rights when the agent, without a warrant, took Defendant’s cell phone back to the agent’s office and searched, downloaded, and extracted all the data he could from it and its storage media.

The Court having read and considered the Report and Recommendation and noting the absence of any objections, it is hereby adopted as the opinion and order of the Court. For the reasons set forth in the Report and Recommendation, Defendant’s motion to suppress evidence [Docs. 87, 99] is GRANTED.

[1348]*1348 REPORT AND RECOMMENDATION OF THE MAGISTRATE JUDGE

E. CLAYTON SCOFIELD III, United States Magistrate Judge.

I.

Introduction

This matter is presently before the Court on the motion to suppress evidence seized from a mobile telephone, [Docs. 87, 99], filed on behalf of Defendant Woodrow Rudolph Dixon, Jr. (“Defendant”). Defendant moves to suppress any evidence obtained from the search of his Samsung cell phone by an agent with the Bureau of Alcohol, Tobacco, and Firearms (“BATF”) conducted after it was seized from him at the time of his arrest on June 26, 2012. Defendant argues that the warrantless search of his phone cannot be sustained in light of the Supreme Court’s recent decision in Arizona v. Gant, 556 U.S. 332, 129 S.Ct. 1710, 173 L.Ed.2d 485 (2009). Defs Brief at 12-13 [Doc. 134]. He submits that neither officer security nor evidence preservation — the dual justifications for searches incident to arrest — apply to validate the search of Defendant’s cell phone and the extraction of its data. Id.

The government responds that the search of the cell phone falls squarely within the well-established exception to the warrant requirement permitting searches and seizures from persons incident to their arrest. Gov’t Brief at 14-15 [Doc. 143]. The government argues that this exception encompasses the right to search any closed containers, including a cell phone taken from the arrestee’s person, and that Arizona v. Gant does not limit this well-established exception. Id. at 15-16. The government alludes to the risk that the phone could be remotely locked or its data remotely deleted, thus implicating the need to preserve evidence. Id. at 17-18.

II.

The Seizure and Search of the Cell Phone

The supplemental evidentiary hearing on March 11, 2013, addressed the circumstances of the seizure of Defendant’s cell phone at the time of his arrest.1 At that hearing, Agent Spence Burnett testified that Defendant was arrested on an arrest warrant issued on the basis of a complaint charging him with conspiracy to rob an individual he believed was a drug trafficker and with possession of firearms in relation to the conspiracy. [T. 152]; Gov’t Ex. 11, 13.2 Agent Burnett confirmed that Defendant was arrested as he exited a building and was handcuffed and secured at that time. [T. 155], Agent Burnett also testified that before the arrest he was aware of information indicating that Defendant had used telephones in connection with the commission of the offense for which he was being arrested. [T. 152].

It was stipulated by the parties that the only phone at issue is the Samsung cell phone that Defendant had open in his hand and was using when he was arrested. [T. 135-36]. The subject phone is a Samsung Galaxy “smart-phone” with an Android operating system. [T. 161]. Agent Daniel Arrugueta with BATF testified that he was present when Defendant was arrested and that he was the agent who seized the phone. [T. 159-60]. Defendant had exited a nearby building and was starting to get into his car when he was arrested. [T. 160]. He was ordered to put his hands on [1349]*1349the car. [Id.]. The phone, which was in his hand, was taken from him and put on top of the car. [Id.]. Agent Arrugueta seized the phone off of the car roof and took the phone back to his office. [T. 161-62].

Agent Arrugueta further testified that when he got back to his offices he extracted the data from Defendant’s cell phone, from both the phone itself and from the micro “SD Card,” a storage media in the phone. [T. 159, 169]. He is trained in extracting evidence as a “Computer Examiner.” [T. 157]. He used a device called “Cellebrite” which plugs into the phone to extract data from the phone. [T. 163]. While he was performing his extractions, Agent Arrugueta called Agent Spence to be sure that the process of booking Defendant, which was being( done at a different location, was still ongoing so that his search would be “within the parameters of the incident to arrest.” [T. 164]. He was advised that Defendant was still being booked. [Id.]. He burned CDs of the information he extracted from the phone. [Id.].

Agent Arrugueta had no concern that the device was dangerous at all. [T. 166]. But he also allowed as how there is always concern that data might disappear by virtue of a “remote wipe.” [T. 171]. Therefore, the first thing Agent Arrugueta would do would be to turn the phone off and take out the battery. [T. 167]. These actions eliminate the possibility that the phone could be wiped remotely. [T. 185]. In this case, Agent Arrugueta did not do a “full dump” on the phone because that process can take hours and likely would extend beyond arrest and booking. [T. 169], He would usually get a warrant if a “full dump” were needed. [Id.]. But he did extract data from the SD card, a form of storage media, which took about thirty minutes. [T. 159, 169-70]. Agent Arrugueta considered the cell phone to be a “container” that he could go through as long as it was done while the booking process was still ongoing. [T. 172].

III.

Discussion and Analysis

The issue presented in this motion is whether the search of Defendant’s cell phone without a warrant was authorized under the Fourth Amendment based upon the “search incident to arrest” exception to the warrant requirement. The government relies upon this “long-standing” exception to the warrant requirement permitting not only the seizure of items from the arrestee’s person but the search of any container, to include cigarette packs and cell phones, found on the arrestee as well, even when made after the actual arrest back at the agents’ offices. The government cites United States v. Robinson, 414 U.S. 218, 233-34, 94 S.Ct. 467, 476, 38 L.Ed.2d 427 (1973) (upholding search of closed cigarette package on arrestee’s person); United States v. Edwards, 415 U.S. 800, 807-08, 94 S.Ct.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Gomez, Gilberto
Court of Appeals of Texas, 2015
United States v. Lustig
3 F. Supp. 3d 808 (S.D. California, 2014)
State of Texas v. Granville, Anthony
423 S.W.3d 399 (Court of Criminal Appeals of Texas, 2014)
United States v. Chaidez-Reyes
996 F. Supp. 2d 1321 (N.D. Georgia, 2014)
United States v. Gholston
993 F. Supp. 2d 704 (E.D. Michigan, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
984 F. Supp. 2d 1347, 2013 WL 6055396, 2013 U.S. Dist. LEXIS 162743, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-dixon-gand-2013.