United States v. Mulholland

628 F. App'x 40
CourtCourt of Appeals for the Second Circuit
DecidedOctober 14, 2015
DocketNo. 14-4126-cr
StatusPublished
Cited by3 cases

This text of 628 F. App'x 40 (United States v. Mulholland) is published on Counsel Stack Legal Research, covering Court of Appeals for the Second Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Mulholland, 628 F. App'x 40 (2d Cir. 2015).

Opinion

PRESENT: DENNY CHIN, CHRISTOPHER F. DRONEY, Circuit Judges, KATHERINE B. FORREST, District Judge.1

SUMMARY ORDER

Defendant-appellant Patrick Nayyar appeals from a judgment entered October 31, 2014, after a jury trial, convicting him of conspiracy to provide and providing material support to terrorists, conspiracy to contribute and contributing goods to and for the benefit of Hizballah, and conspiracy to traffic firearms and ammunition. 18 U.S.C. §§ 371, 2339B; 50 U.S.C. § 1705(a). On October 27, 2014, the district court sentenced Nayyar to fifteen years’ incarceration. We assume the parties’ familiarity with the underlying facts, procedural history of the case, and issues on appeal.

On September 24, 2009, Nayyar was arrested by the FBI. With the consent of his wife, the FBI searched Nayyar’s apartment and seized his laptop. Nayyar’s wife also provided written consent to search the laptop. More than a year later, on October 29, 2010, the government obtained a search warrant for the laptop. Nayyar’s wife’s written consent form, the search warrant and warrant application, and evidence obtained from the search of the computer were produced to Nayyar during pre-trial discovery. The laptop was found to contain internet bookmarks and browsing history for websites relating to military equipment, as well as a news article that identified Hizballah as an Iran-backed terrorist organization, and the computer evidence was received at trial.

On the second day of trial, Special Agent Candace Hunter, an FBI forensic examiner, testified on cross-examination that she began her examination of the computer on December 2, 2009, although the search warrant was not obtained until October 29, 2010. The next day, Nayyar moved for a [42]*42mistrial on the grounds that the evidence from his computer was the product of an illegal search. Nayyar claimed that before Hunter’s testimony, he had not been apprised of the fact that the hard drive had been searched prior to the application for the search warrant. On the motion for a mistrial, the district court suggested recalling Hunter to testify at a hearing. But the government told the court that she was already on her way back to Alabama, and that it was not necessary to bring her back because there was no material factual dispute, and because the motion could be denied on the basis of waiver or the inevitable discovery doctrine.

Rather than conduct an evidentiary hearing, the district court agreed to proceed by means of a government proffer. The district court denied Nayyar’s motion for a mistrial, and declined to strike the testimony regarding evidence obtained from the laptop or the evidence itself, holding that because Nayyar had not challenged the validity of his wife’s consent to search the computer before trial, the instant challenge was waived. Even if there was no waiver, the district court held, testimony derived from the laptop searches was protected by the inevitable discovery doctrine.

On appeal, Nayyar argues that (1) he did not waive his right to challenge the search of his laptop; (2) the agents did not receive valid consent to search the laptop from Nayyar’s wife; (3) the independent source doctrine does not salvage the evidence; and (4) the evidence was insufficient to prove that Nayyar engaged in a gun and ammunition trafficking conspiracy-

We hold that the district court could not properly deny the suppression motion on this record, and we remand for the district court to conduct a post-trial hearing on the issues relating to the computer evidence received at trial. See, e.g., United States v. Hamilton, 538 F.3d 162, 164, 169-70 (2d Cir.2008) (remanding for post-trial suppression hearing, where district court erred in denying suppression motion made at trial, but did not reach alternative arguments for and against suppression); United States v. Pena, 961 F.2d 333, 339-40 (2d Cir.1992) (remanding for post-trial suppression hearing concerning evidence that had been introduced at trial).

First, the government concedes on appeal that the record before this Court is insufficient to determine whether Nayyar’s wife had the authority to consent to a search of her husband’s laptop, and the question was insufficiently addressed below. Indeed, the written consent form that the government includes in its addendum was not part of the record before the district court, and the district court explicitly acknowledged that it had not seen it.

Second, at oral argument, the government acknowledged that it misspoke during its evidentiary proffer when it advised the district court that Nayyar himself gave the agents the password. This was an error the government did not correct in the district court.

Third, the record is unclear as to the issue of the timeliness of Nayyar’s motion to suppress.2 Under Federal Rule of [43]*43Criminal Procedure 12(c)(3), “[i]f a party does not meet the deadline for making a Rule 12(b)(3) motion, the motion is untimely. But a court may consider the defense, objection, or request if the party shows good cause.” Fed.R.Crim.P. 12(c)(3). It is unclear whether good cause exists here. There is a lack of clarity as to whether the evidence introduced at trial was obtained from a search of the laptop based on the wife’s purported consent or based on the warrant. Moreover, while Nayyar’s trial counsel apparently was unaware until Hunter testified that the government had searched the contents of the laptop a year before the warránt issued, it is unclear whether Nayyar’s prior counsel was on notice before trial that the laptop had been searched before the warrant issued. See J. App. at 158.

Fourth, there is uncertainty as to the applicability of the independent source doctrine. The government bears the burden of establishing by a preponderance of the evidence that the independent source (or inevitable discovery) doctrine applies. See Murray v. United States, 487 U.S. 533, 540, 108 S.Ct. 2529, 101 L.Ed.2d 472 (1988); Nix v. Williams, 467 U.S. 431, 444, 104 S.Ct. 2501, 81 L.Ed.2d 377 (1984) (“If the prosecution can establish by a preponderance of the evidence that the information ultimately or inevitably would have been discovered by lawful means ... then the deterrence rationale has so little basis that the evidence should be received;”). For the independent source doctrine to apply, “(1) the warrant must be supported by probable cause derived from sources independent of the illegal entry; and (2) the decision to seek the warrant may not be prompted by information gleaned from the illegal conduct.” United States v. Johnson, 994 F.2d 980, 987 (2d Cir.1993).3 Here, there is a lack of clarity in the record as to the second prong: it is unclear whether the agents, were prompted to seek the warrant by what they saw on the laptop before

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Correa
340 Conn. 619 (Supreme Court of Connecticut, 2021)
United States v. Nayyar
221 F. Supp. 3d 454 (S.D. New York, 2016)
United States v. Gigliotti
145 F. Supp. 3d 203 (E.D. New York, 2015)

Cite This Page — Counsel Stack

Bluebook (online)
628 F. App'x 40, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-mulholland-ca2-2015.