Finkelstein et al v. San Mateo County District Attorney's Office et al

Filing 104

ORDER by Judge Edward M. Chen Granting 70 Plaintiffs' Motion for Summary Adjudication; Granting 95 Plaintiffs' Motion to File a Sur-Reply; and Denying 81 County Defendants' Motion for Summary Judgment. (emcsec, COURT STAFF) (Filed on 11/21/2018)

Download PDF
1 2 3 4 UNITED STATES DISTRICT COURT 5 NORTHERN DISTRICT OF CALIFORNIA 6 7 JOHN FINKELSTEIN, et al., Plaintiffs, 8 9 10 11 v. SAN MATEO COUNTY DISTRICT ATTORNEY’S OFFICE, et al., United States District Court Northern District of California Defendants. 12 15 ORDER GRANTING PLAINTIFFS’ MOTION FOR SUMMARY ADJUDICATION; GRANTING PLAINTIFFS’ MOTION TO FILE A SUR-REPLY; AND DENYING COUNTY DEFENDANTS’ MOTION FOR SUMMARY JUDGMENT Docket Nos. 70, 81, 95 13 14 Case No. 18-cv-00009-EMC Plaintiffs John and Jennifer Finkelstein have filed a § 1983 civil rights action based on a search that the police conducted of their home and cars. Defendants are as follows: 16 (1) Jeffrey S. Cichocki, a detective with the Loudoun County (Virginia) Sheriff’s Office; 17 (2) the City of San Mateo and Nicolas Ryan, a detective with the San Mateo Police 18 19 20 Department (“SMPD”) (collectively, the “City Defendants”); and (3) the San Mateo County District Attorney’s Office and a deputy D.A. Vishal Jangla (collectively, the “County Defendants”). 21 Plaintiffs have asserted the following claims for relief, all based on § 1983: (1) judicial deception 22 (individual defendants only); (2) use of untrustworthy information to establish probable cause 23 (individual defendants only); (3) use of untrustworthy information to procure a warrant (City and 24 County only); (4) use of a search warrant application lacking probable cause on its face to procure 25 a warrant (individual defendants only); (5) unreasonable search and seizure without a warrant, 26 probable cause, and exigent circumstances (individual defendants only). 27 28 Currently pending before the Court are two motions: (1) Plaintiffs’ motion for summary adjudication on the issue of probable cause and (2) the County Defendants’ motion for summary 1 judgment. Having considered the parties’ briefs and accompanying submissions, as well as the 2 oral argument of counsel, the Court hereby GRANTS Plaintiffs’ motion and DENIES the County 3 Defendants’ motion. I. 4 5 LEGAL STANDARD Federal Rule of Civil Procedure 56 provides that a “court shall grant summary judgment [to a moving party] if the movant shows that there is no genuine dispute as to any material fact and 7 the movant is entitled to judgment as a matter of law.” Fed. R. Civ. P. 56(a). An issue of fact is 8 genuine only if there is sufficient evidence for a reasonable jury to find for the nonmoving party. 9 See Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248-49 (1986). “The mere existence of a 10 scintilla of evidence . . . will be insufficient; there must be evidence on which the jury could 11 United States District Court Northern District of California 6 reasonably find for the [nonmoving party].” Id. at 252. At the summary judgment stage, evidence 12 must be viewed in the light most favorable to the nonmoving party and all justifiable inferences 13 are to be drawn in the nonmovant’s favor. See id. at 255. 14 Where a plaintiff moves for summary judgment on claims that it has brought (i.e., for 15 which it has the burden of proof), it “must prove each element essential of the claims . . . by 16 undisputed facts.” Cabo Distrib. Co. v. Brady, 821 F. Supp. 601, 607 (N.D. Cal. 1992) 17 Similarly, where a defendant moves for summary judgment based on an affirmative 18 defense (i.e., an issue on which it bears the burden of proof), the defendant must establish “all of 19 the essential elements of the . . . defense to warrant judgment in [its] favor.” Martin v. Alamo 20 Cmty. College Dist., 353 F.3d 409, 412 (5th Cir. 2003) (internal quotation marks omitted; 21 emphasis omitted); see also Clark v. Capital Credit & Collection Servs., 460 F.3d 1162, 1177 (9th 22 Cir. 2006) (noting that a defendant bears the burden of proof at summary judgment with respect to 23 an affirmative defense). 24 Summary adjudication differs from summary judgment only in that a Court focuses on a 25 limited issue as opposed to an entire claim or the entire action. See Moxley v. Texaco, Inc., No. 26 00-1518 CM (BQRx), 2000 U.S. Dist. LEXIS 20255, at *7 (C.D. Cal. Dec. 19, 2000). 27 28 2 II. 1 2 3 4 5 A. PLAINTIFFS’ MOTION Relevant Factual Background The evidence submitted by the parties in conjunction with Plaintiffs’ motion for summary adjudication reflects the following undisputed facts. The Finkelsteins’ home and cars were searched pursuant to a search warrant that was 6 issued by the San Mateo County Superior Court. The state court approved the search warrant 7 based on an affidavit submitted by Detective Ryan of the SMPD. The events that led to the 8 warrant and search were as follows. 9 In November 2015, the Loudoun County (Virginia) Sheriff’s Office – where Detective Cichocki works – received a report of an unknown suspect “sexting” a female minor. See Alberts 11 United States District Court Northern District of California 10 Decl., Ex. B (Cichocki Aff. at 3). The minor informed the police that “she had been contacted by 12 ‘Peter Mayfair’ on an application called LOL” and that “[t]he conversation moved to Skype where 13 she was encouraged by [him] bearing Skype Name ‘johrobbins6’ . . . to use the video function and 14 show herself in various forms of undress.” Alberts Decl., Ex. B (Cichocki Aff. at 3). The minor 15 showed her private areas to the suspect and eventually the suspect threatened her to “‘do exactly 16 what I say and beg me or I will share this video on the internet.’” Alberts Decl., Ex. B (Cichocki 17 Aff. at 3). The suspect claimed that “he was using a proxy server and could not be traced.” 18 Alberts Decl., Ex. B (Cichocki Aff. at 3). 19 Through an administrative subpoena served on Skype, the police learned that the screen 20 name “johnrobbins6” “came back to an IP in Nam[i]bia, Africa,” which, according to the police, 21 “substantiat[ed] the claim that [the suspect] was using a proxy server.” Alberts Decl., Ex. B 22 (Cichocki Aff. at 3). The police also learned that the registered email that Skype had for 23 “johnrobbins6” was johnrob@gmail.com. 24 “An administrative subpoena to [Google] returned with a user of John Robert Finkelstein.” 25 Alberts Decl., Ex. B (Cichocki Aff. at 4). The recovery email for johnrob@gmail.com was 26 johnrob@cs.stanford.edu. See Alberts Decl., Ex. B (Cichocki Aff. at 4). Google also had a phone 27 number listed for SMS, which the police then used to subpoena AT&T, and this led the police to 28 Mr. Finkelstein in San Mateo. The email address for the AT&T account was also 3 1 2 johnrob@gmail.com. Because Mr. Finkelstein was located in San Mateo, Detective Cichocki reached out to the 3 SMPD for assistance. In December 2015, Detective Ryan of the SMPD “was tasked with 4 assisting” Detective Cichocki in the investigation. See Merin Decl., Ex. A (Ryan Aff. at 4). 5 Detective Ryan ultimately prepared an affidavit to support the application for a search warrant on 6 the Finkelsteins’ home and cars. In his affidavit, Detective Ryan noted, inter alia, as follows: 7 • The victim was “contacted by an unknown subject on an application called MyLOL 8 where she was sent a message by a user with the profile name ‘Peter Mayfair.’ The 9 profile picture for this user was of a juvenile male with the stated birthday of (01/03/1999).” Merin Decl., Ex. A (Ryan Aff. at 4). “MyLOL is a teenager social 11 United States District Court Northern District of California 10 networking/dating website.” Merin Decl., Ex. A (Ryan Aff. at 5). 12 • The suspect asked the victim to Skype him, and she eventually agreed. “The 13 suspect’s Skype profile name was ‘johnrobbins6.’” Merin Decl., Ex. A (Ryan Aff. 14 at 5). The profile also indicated that he was from London, England. See Merin 15 Decl., Ex. A (Ryan Aff. at 5). 16 • The suspect asked the victim for video via Skype, and “she used the video feature 2 17 or 3 times, but only spoke via text on Skype.” Merin Decl., Ex. A (Ryan Aff. at 5). 18 The suspect used the video feature but one time only, and the video simply 19 “showed a still image of a white juvenile male with brown hair.” Merin Decl., Ex. 20 A (Ryan Aff. at 5). The victim never saw the suspect, nor did she ever hear his 21 voice. See Merin Decl., Ex. A (Ryan Aff. at 5). 22 • The suspect asked the victim to show her breasts and genitalia via Skype video and 23 she did so. After she did so, the victim told the suspect she was leaving the chat 24 and the suspect threatened her, saying, e.g., “‘I showed u a video that’s not even 25 me’ [and] ‘u will do exactly what I say and beg me or I will share this video on the 26 internet.’” Merin Decl., Ex. A (Ryan Aff. at 5). The suspect told the victim that 27 “he used a proxy server so he could not be traced, he had her phone number[] and 28 IP address, and he could find where she lived.” Merin Decl., Ex. A (Ryan Aff. at 5. 4 • 1 Through an administrative subpoena on Skype, the police learned that the account 2 for “johnrobbins6” was created in August 2015 from an IP address in Namibia, 3 Africa, “which substantiated the suspect’s claim that he was likely using a proxy 4 server.” Merin Decl., Ex. A (Ryan Aff. at 5). The police also learned that, “[i]n 5 order to create a Skype account a valid email address is necessary. The email 6 address used to create this account was johnrob@gmail.com.” Merin Decl., Ex. A 7 (Ryan Aff. at 5). • 8 Through an administrative subpoena on Google, the police learned that “[t]he email account johnrob@gmail.com returned to a John Finkelstein and a recovery email 9 address was listed as johnrob@cs.stanford.edu.” Merin Decl., Ex. A (Ryan Aff. at 11 United States District Court Northern District of California 10 5). Google also had a phone number listed for SMS. See Merin Decl., Ex. A 12 (Ryan Aff. at 5). • 13 The police learned that the provider for the phone number was AT&T, and, through 14 an administrative subpoena on AT&T, the police obtained the subscriber 15 information for the phone number. AT&T identified the subscriber as John R. 16 Finkelstein with an address in San Mateo. See Merin Decl., Ex. A (Ryan Aff. at 5). 17 In January 2016, a San Mateo superior court judge signed off on the search warrant 18 application submitted by Detective Ryan. See Merin Decl., Ex. A (Ryan Aff. at 2). Subsequently, 19 a search of the Finkelsteins’ home and cars (for child pornography) was conducted. It appears 20 that, ultimately, nothing was found, and Mr. Finkelstein was never charged with any crime. 1 Thereafter, Mr. Finkelstein filed a motion in state court, challenging the search warrant and 21 22 asking for a return of the property seized from him during the search. In October 2017, the 23 superior court judge who signed off on the warrant issued an order on the motion favorable to Mr. 24 25 26 27 28 1 At the hearing, Mr. Cichocki suggested, for the first time, that the state judge’s approval of the search warrant application precludes this Court from considering, in a § 1983 civil action, whether there was probable cause for the search based on the four corners of the application. Mr. Cichocki, however, provided no authority to support the position that a state court’s issuance of a warrant precludes a finding by a federal court that the warrant was constitutionally deficient. Interestingly, Mr. Cichocki does not argue that the subsequent ruling of the state court – i.e., that the warrant was not legally obtained – is binding. See note 2, infra. 5 1 Finkelstein. The judge found, inter alia, that certain statements made in the Ryan affidavit in 2 support of the search warrant were made in reckless disregard for the truth and, once these 3 statements were excised, the remaining statements were insufficient to establish probable cause. 4 See Merin Decl., Ex. E (Order at 4). The judge also found that, even if it were to interpret the 5 misleading statements “in the manner consistent with the meaning the detectives” advocated, there 6 was still no probable cause. Merin Decl., Ex. E (Order at 5). The affidavit “simply showed that 7 Mr. Finkelstein’s email address was provided along with other misinformation when the Skype 8 account was created. Anyone could have randomly provided his email address during the creation 9 of the Skype account. Consequently, the affidavit failed to establish probable cause.”2 Merin Decl., Ex. E (Order at 5) (emphasis added). 11 United States District Court Northern District of California 10 B. Probable Cause In their motion for summary adjudication, Plaintiffs ask the Court to hold that (1) the 12 13 police affidavit used to obtain the search warrant failed to establish probable cause and that (2) the 14 search warrant was issued without probable cause.3 15 Under the Fourth Amendment, a search without probable cause is prohibited. “‘Probable 16 cause for a search requires a fair probability that contraband or evidence of a crime will be found 17 in a particular place, based on the totality of the circumstances.’” United States v. Fries, 781 F.3d 18 1137, 1150 (9th Cir. 2015). Fair probability does not mean “certainty or even a preponderance of 19 the evidence,” United States v. Gourde, 440 F.3d 1065, 1069 (9th Cir. 2006), but “‘[m]ere 20 suspicion, common rumor, or even strong reason to suspect are not enough.’” United States v. 21 Lopez, 482 F.3d 1067, 1072 (9th Cir. 2007). Although probable cause is a legal question, “the factual matters underlying the judgment 22 23 24 25 26 27 28 2 In their papers, Defendants suggest that, in assessing probable cause, the Court should give no consideration to the state court’s order discussed above. To the extent Defendants mean that the state court’s findings are not preclusive, they are correct but, that being said, Plaintiffs do not dispute such. Moreover, even if the Court were to effectively “strike” the state court’s order, that does not bar the Court from arriving at the same or similar conclusions on its own, based on the same or similar reasoning. 3 The Finkelsteins are moving for summary adjudication with respect to the issue of probable cause only. They are not asking the Court to make any ruling on judicial deception (as the state court did). 6 1 of reasonableness generally mean that probable cause is a question for the jury; and summary 2 judgment is appropriate only if no reasonable jury could find that the officers did or did not have 3 probable cause to [act].” McKenzie v. Lamb, 738 F.2d 1005, 1008 (9th Cir. 1984). 4 In the instant case, the Court finds that there are no genuine disputes of material fact 5 regarding probable cause. Moreover, because no reasonable juror could find probable cause based 6 on the undisputed facts, as discussed below, the Court grants Plaintiffs’ motion for summary 7 adjudication. The Court agrees with the analysis of the state court judge who signed off on the 8 warrant but then later found a lack of probable cause. At bottom, the sole link to Mr. Finkelstein 9 was the email given for the Skype account – johnrob@gmail.com – an email that could have been 10 given by anyone and that required no verification by Skype. United States District Court Northern District of California 11 According to Defendants, there was probable cause for the search because there 12 circumstances tying Mr. Finkelstein to the crime in addition to the above email address. Those 13 other circumstances, however, are not meaningful. For example: 14 • The fact that the suspect’s public username on Skype was johnrobbins6 – i.e., a 15 name consistent with the email address johnrob@gmail.com – shows nothing. The 16 suspect easily could have chosen the public username to be consistent with the 17 email address (or vice-versa) but that does not mean that the email address was the 18 suspect’s real email address (i.e., that the Skype account belonged to the person 19 with the email address johnrob@gmail.com). In testimony before the state court, 20 D.D.A. Jangla asked, “if someone was simply trying to create a random Skype 21 account, why try to coordinate the user name – which in this case was johnrobbins6 22 – to the e-mail address used to open it – which was johnrob@gmail – as opposed to 23 just entering in random data”? Alberts Decl., Ex. E (Tr. at 74). But the easy 24 answer to this is convenience, especially where a person is trying to hide his 25 identity. 26 • The fact that the email address johnrob@gmail.com had, per Google, a recovery 27 email of johnrob@cs.stanford.edu shows nothing. That the second email address 28 was consistent with the first does not establish that the first email address was the 7 1 suspect’s real email address (i.e., that the Skype account belonged to the person 2 with the email address johnrob@gmail.com). The recovery email does nothing to 3 substantiate the weak link of the email address provided to Skype. 4 • Although Defendants argue that there was a fair probability that Mr. Finkelstein was the perpetrator because the perpetrator was clearly tech savvy (e.g., using a 6 proxy server to hide his identity) and Mr. Finkelstein is a software engineer from 7 Silicon Valley, that argument lacks merit because there is nothing in the Ryan 8 affidavit to indicate that either he, Detective Cichocki, or anyone else involved in 9 the investigation knew at any time before the search that Mr. Finkelstein is a 10 software engineer. Therefore, that fact cannot be a part of the probable cause 11 United States District Court Northern District of California 5 calculus. To the extent Defendants have tried to argue that the recovery email 12 address johnrob@cs.stanford.edu shows that Mr. Finkelstein worked for the 13 Computer Science Department at Stanford, see Docket No. 81 (County Mot. at 12), 14 that argument is unavailing because nothing indicates that Defendants knew that 15 the “cs” referred to the Computer Science Department. And even if Defendants 16 knew that, nothing shows that Defendants knew what Mr. Finkelstein did at the 17 Computer Science Department. Certainly no mention is made in the Ryan affidavit 18 submitted as part of the search warrant application. 19 At oral argument, Defendants alluded to the fact that they sought a search warrant only and 20 not a more intrusive arrest warrant. But, Defendants have not cited any authority to support the 21 proposition that the standard for probable cause for a search warrant materially differs from that 22 for an arrest warrant. In both situations, the question is whether there is a “fair probability.” In 23 any event, in this case, if there was probable cause for a search warrant, there would have been 24 probable cause for an arrest warrant. The police wanted to search places within the possession, 25 custody, or control of Mr. Finkelstein (i.e., his home and cars) for child pornography; if the police 26 had a fair probability that Mr. Finkelstein possessed that, the police would have had probable 27 cause to believe he committed the crime. Cf. Chism v. Wash., 661 F.3d 380, 389 (9th Cir. 2011) 28 (noting that, in a prior case involving a search of a computer for child pornography, “we looked 8 1 for evidence in the affidavit: (1) that a crime was committed; (2) that it was Gourde who 2 committed the crime; and (3) that evidence of the crime would be found in the place to be 3 searched[;] [i]n light of this ‘triad of solid fact,’ we concluded that ‘the reasonable inference that 4 Gourde had received or downloaded [child pornographic] images easily meets the “fair 5 probability” test’”). At the end of the day, the email address registered with Skype (johnrob@gmail.com) was 6 7 the only link that Defendants had to tie Mr. Finkelstein with the crime. Anyone can establish a 8 Skype account and list as a “valid” email someone else’s email address. Skype does not verify the 9 email address given. See, e.g., Docket No. 93-3 (Merin Decl., Ex. 2) (Tr. at 19-22) (Plaintiffs’ expert, Neil Broom, testifying in the state court proceedings that he was able to register and create 11 United States District Court Northern District of California 10 a working Skype account using the email address barackobama@whitehouse.gov and that it is 12 possible to use an email that does not actually exist to create a working Skype account). And there 13 was nothing to corroborate that this email address supplied by the suspect was in fact the suspect’s 14 real email address. Moreover, there was actually evidence indicating that the suspect had supplied a false 15 16 email address in registering with Skype. The suspect had taken multiple steps to conceal his 17 identity – e.g., using different names for his MyLOL and Skype accounts (Peter Mayfair and 18 johnrobbins6, respectively), using a proxy server from Namibia,4 never showing his “live” face 19 during the video exchange with the victim, never communicating orally with the victim, and using 20 a picture of someone else during the video exchange (“‘I showed u a video that’s not even me’”). 21 As Plaintiffs argue, “[a]n email address provided by an internet criminal that has taken steps to 22 conceal his identity [is] not reasonably trustworthy information that can support a finding of 23 24 25 26 27 28 4 See Alberts Decl., Ex. A (Tr. at 107) (Detective Cichocki testifying before the state court that, “through my training and experience with other cases and speaking with other law enforcement officials, that Namibia is a location that hosts proxy servers”); Alberts Decl., Ex. B (Officer Cichocki’s response to Rog No. 7 stating that he “spoke with several law enforcement officers to consult upon the fact that the suspect said he was using a proxy server and that the IP address via Nam[i]bia was most likely that”; adding that he “verified via the FBI that attempts to get further IP information via the Nam[i]bia connection would be fruitless”). 9 1 probable cause.”5 Reply to County at 3. See generally United States v. Macias-Perez, No. CR 11- 2 2024, 2011 U.S. Dist. LEXIS 68305, at *40 (N.D. Iowa June 24, 2011) (stating that “the use of 3 false names and identifying information is common in criminal society”). Whether Detective 4 Ryan (or Detective Cichocki or anyone else) could have done more investigation – e.g., per 5 Plaintiffs, “to trace the [Namibian] IP address used by the suspect when the Skype account was 6 created . . . or trace the IP address used by the suspect on November 24, 2015, the date that the 7 ‘sexting’ incident is alleged to have occurred,” Mot. at 3, is not the question. The bottom line is 8 that Defendants did not do more investigation, and the Court must assess probable cause based on 9 what information Defendants did have when applying for the search warrant – which was simply an email address that had a great chance of being inaccurate (i.e., not the suspect’s real email 11 United States District Court Northern District of California 10 address). The above analysis in and of itself is sufficient to establish a lack of probable cause for the 12 13 search warrant. The analysis is consistent with the Ninth Circuit’s decision in Chism. The 14 plaintiffs in Chism were a husband and wife, Todd and Nicole Chism. They filed a § 1983 suit 15 after their home and Mr. Chism’s business office were searched for child pornography. The 16 search did not reveal any evidence of child pornography and charges were never filed against Mr. 17 Chism. The plaintiffs brought a claim for judicial deception and, in evaluating the claim and 18 whether qualified immunity applied, the Ninth Circuit noted that, if false statements in the 19 affidavit supporting the warrant application had been corrected, then the application would have 20 reflected that Mr. Chism’s only connection to the pornographic websites at issue was a credit card. 21 See Chism, 661 F.3d at 390 (stating that “[a] truthful version of [the officer’s] affidavit would 22 have indicated that the sole evidence connecting Todd Chism [the plaintiff] to the child 23 pornographic images was the fact that the credit card he shared with [his wife] Nicole was charged 24 three times for hosting the websites that contained child pornographic images”). The court then 25 26 27 28 5 At the hearing, Defendants’ only real comeback was that it was not impossible that the perpetrator provided his real email address because criminals sometimes do stupid or foolish things (and thus get caught). Although the Court recognizes that criminals sometimes do stupid or foolish things, Defendants have provided no evidence – and there was nothing in the Ryan affidavit – to substantiate how often that is the case, or any reason to believe that is what occurred here. 10 1 indicated agreement with an expert that “‘relying only on information provided by the user of a 2 credit card that is associated with criminal activity is inherently unreliable.’” Id. at 391 (emphasis 3 in original). The Court also approved a police training manual that stated “[m]uch, if not all, of the cyber-evidence (the E-mail addresses and IP addresses used) will lead you to an innocent person,] [which is] why simply identifying which account was used to commit a crime does not provide you with probable cause . . . You’ll need to do more investigating to determine if there is a link between the account holder (or other members of the household) with the criminal activity that was committed with that account.” 4 5 6 7 8 Id. A similar criticism is applicable in the instant case – i.e., relying only on information 10 provided by a person associated with criminal activity, particularly when the information provided 11 United States District Court Northern District of California 9 is identifying information and the person has taken a fair amount of effort to conceal his identity, 12 is inherently unreliable. III. 13 COUNTY DEENDANTS’ MOTION6 14 As noted above, the County Defendants are the County and D.D.A. Jangla. For the County 15 Defendants’ motion, the parties have submitted evidence in addition to that provided for Plaintiffs’ 16 motion. The additional evidence includes testimony from Plaintiffs’ expert, Neil Broom (provided 17 during the state court proceedings); testimony from D.D.A. Jangla (also provided during the state 18 court proceedings); and a declaration from Karen Guidotti, the Chief D.D.A. for the Country 19 District Attorney’s Office. The County Defendants argue that, based on the evidence submitted, they are entitled to 20 21 summary judgment on each of the claims asserted against them. 22 A. First Cause of Action – Judicial Deception Claim Plaintiffs’ first cause of action for judicial deception is asserted against the individual 23 24 defendants only. The judicial deception claim against D.D.A. Jangla is premised on the fact that 25 he allegedly approved the submission of the Ryan affidavit to the state court judge. D.D.A. Jangla 26 argues that he has qualified immunity with respect to the judicial deception claim. 27 28 6 The Court grants Plaintiffs’ motion for leave to file a sur-reply as there is no apparent prejudice to the County Defendants. See Docket No. 95 (motion). 11 “Courts engage in a two-pronged analysis to determine whether qualified immunity 1 2 applies: ‘[O]fficers are entitled to qualified immunity under § 1983 unless (1) they violated a 3 federal statutory or constitutional right, and (2) the unlawfulness of their conduct was “clearly 4 established at the time.”’” Easley v. City of Riverside, 890 F.3d 851, 856 (9th Cir. 2018). In Chism, the Ninth Circuit held that “governmental employees are not entitled to qualified 5 6 immunity on judicial deception claims.” Chism, 661 F.3d at 393. The reason why was fairly 7 simple: “[I]f an officer submitted an affidavit that contained statements he knew to be false or would have known were false had he not recklessly disregarded the truth and no accurate information sufficient to constitute probable cause attended the false statements, . . . he cannot be said to have acted in a reasonable manner, and the shield of qualified immunity is lost.” 8 9 10 United States District Court Northern District of California 11 12 13 Id. Therefore, in order for a plaintiff “to survive a defendant officer’s motion for summary 14 judgment on the ground of qualified immunity,” all that the plaintiff must do is “1) make a 15 ‘substantial showing of deliberate falsehood or reckless disregard for the truth and 2) establish 16 that, but for the dishonesty, the challenged action would not have occurred.” Liston v. Cty. of 17 Riverside, 120 F.3d 965, 973 (9th Cir. 1997). The first element of a judicial deception claim – “a 18 deliberate or reckless false statement or omission – is a question of fact,” even though “[t]he 19 second element – materiality – is for the Court and may be decided on summary judgment.” 20 Rhabarian v. Cawley, No. 2:10-cv-00767-TLN-KJN, 2013 U.S. Dist. LEXIS 112189, at *28-29 21 (E.D. Cal. Aug. 7, 2013); see also Liston, 120 F.3d at 974 (stating that, “[w]hile the materiality 22 issue is one ‘reserved to the court,’ if the [plaintiffs] make the required ‘substantial showing,’ the 23 question of intent or recklessness is ‘a factual determination for the trier of fact’”). 24 In the instant case, given that the evidence must be viewed in the light most favorable to 25 the Finkelsteins, see id. at 974-75, they have made out a substantial showing on the first element 26 above, i.e., that a deliberate or reckless false statement or omission was made. A reasonable jury 27 could find, just as the state court did, that, when Detective Ryan stated the following in his 28 affidavit – “In order to create a Skype account a valid email address is necessary. The email 12 1 address used to create this account was johnrob@gmail.com,” Merin Decl., Ex. A (Ryan Aff. At 2 6) (emphasis added) – he made a false statement. The state court found that “the meaning 3 intended by the phrase ‘used to create this account’ was that the owner of the email account ‘used’ 4 the email account in a manner involving control over the email account by the owner.” Merin 5 Decl., Ex. E (Order at 4) (emphasis added). The state court added that this statement was made in 6 reckless disregard for the truth “because the email address was not ‘used’ but instead was simply 7 included along with other requested information by the individual who created the Skype account 8 and had no reason to supply any accurate information.” Merin Decl., Ex. E at 4). Thus, the police 9 affidavit implied that there was a real connection between the Skype account and Mr. Finkelstein when in fact the factual basis for that implication was lacking. The misleading nature of the 11 United States District Court Northern District of California 10 affidavit was amplified by the fact that Detective Ryan failed to clarify that a “valid” email is not a 12 verified email. 13 While the above analysis applies to Detective Ryan, and the moving party here is D.D.A. 14 Jangla, D.D.A. Jangla allegedly reviewed and approved the search warrant application submitted 15 by Detective Ryan. Thus, it is plausible that D.D.A. Jangla had as much knowledge as Detective 16 Ryan as to the misleading nature of the affidavit. To be clear, the Court is not making any ruling at this juncture that there was, in fact, 17 18 judicial deception on the part of D.D.A. Jangla. Indeed, a reasonable jury might well find 19 otherwise. But given that all reasonable inferences must be drawn in Plaintiffs’ favor, summary 20 judgment must be denied. 21 B. Second and Fourth Causes of Action – Use of Untrustworthy Information to Establish 22 Probable Cause and Use of Search Warrant Application Lacking Probable Cause on Its 23 Face 24 As with the first cause of action above, Plaintiffs’ second and fourth causes of action – 25 both related to a lack of probable cause – are asserted against the individual defendants only. 26 D.D.A. Jangla argues that he has qualified immunity with respect to these claims as well, which 27 seem to be predicated on his approval of the Ryan affidavit for submission to the state court. 28 As an initial matter, the Court takes note that D.D.A. Jangla argues for a broad application 13 1 of qualified immunity based on the second prong of the doctrine – i.e., liability is dependent on 2 there being clearly established unlawful conduct. D.D.A. Jangla points out that, in White v. Pauly, 3 137 S. Ct. 548 (2017), the Supreme Court stated that it is a “longstanding principle that ‘clearly 4 established law’ should not be defined ‘at a high level of generality’” because, “[o]therwise, 5 ‘[p]laintiffs would be able to convert the rule of qualified immunity . . . into a rule of virtually 6 unqualified liability simply by alleging violation of extremely abstract rights.” Id. at 552 7 (emphasis added). The Supreme Court criticized the lower appellate court’s decision because 8 [i]t failed to identify a case where an officer acting under similar circumstances as Officer White was held to have violated the Fourth Amendment. Instead, the [panel] majority relied on Graham, Garner, and their Court of Appeals progeny [excessive force cases], which . . . lay out excessive-force principles at only a general level. Of course, “general statements of the law are not inherently incapable of giving fair and clear warning to officers, but “in the light of pre-existing law the unlawfulness must be apparent.” For that reason, we have held that Garner and Graham do not themselves create clearly established law outside “an obvious case.” 9 10 United States District Court Northern District of California 11 12 13 14 Id. (emphasis added). The Supreme Court added that “[t]his is not a case where it is obvious that 15 there was a violation of clearly established law under Garner and Graham”; the case was not a 16 run-of-the mill Fourth Amendment violation but rather presented unique facts and circumstances. 17 Id. 18 D.D.A. Jangla overstates the reach of White. He suggests that White “stands for the 19 proposition that in order to demonstrate that the law was ‘clearly established,’ a plaintiff must 20 identify a published opinion addressing nearly identical facts that concludes that an officer 21 violated the Constitution.” McKenney v. Mangino, No. 2:15-cv-00073-JDL, 2017 U.S. Dist. 22 LEXIS 55649, at *22 (D. Me. Apr. 12, 2017). But, in McKenney, the Supreme Court only 23 “faulted the lower court for failing to identify a case with similar factual circumstances” because 24 the case presented a unique set of facts and circumstances. Id. at *23-24. “Because Officer 25 White’s conduct [in White] did not amount to a ‘run-of-the-mill constitutional violation, a case 26 with similar facts would be required to put the officer on notice that his conduct violated clearly 27 established law.” Id. at *24. “As a practical matter, the standard advanced by [the defendant 28 officer] fails to account for the reality that the factual circumstances of each case are, by their 14 1 nature, unique, and two cases seldom involve nearly identical facts. Courts should therefore look 2 to cases that analyze similar circumstances.” Id. at 25. “A case presenting a nearly identical 3 alignment of facts is not required so long as the existing cases would enable an officer, as a matter 4 of reason and common sense, to understand that his or her conduct in a specific situation crossed 5 the constitutional line.” Id. 6 Plaintiffs argue that Chism, 661 F.3d at 380, fits this criteria. While there is language in 7 Chism that strongly supports Plaintiffs’ position, Chism arguably is not dispositive because the 8 Ninth Circuit’s holding was not predicated solely on the false statements made in the police 9 affidavit. The Ninth Circuit did not hold that the false statements when corrected (i.e., to show that the only connection between Mr. Chism and the websites was the credit card) alone 11 United States District Court Northern District of California 10 established a lack of probable cause. Rather, the Ninth Circuit’s ruling took into account both the 12 correction of false statements and the supplementation of information that had been omitted (i.e., 13 IP addresses traced to persons other than the Chisms). 14 But even assuming Chism is not dispositive, the facts in the instant case – i.e., that 15 identifying information (such as an email address) provided by a person intent on hiding his 16 identity is likely unreliable – presents an obvious situation where probable cause is lacking. Thus, 17 White would not afford qualified immunity on the probable cause question. See also Easley v. 18 City of Riverside, 890 F.3d 851, 855-56 (9th Cir. 2018) (noting that “[t]he doctrine [of qualified 19 immunity] is designed to balance “two important, competing interests: the need to hold public 20 officials accountable for irresponsible actions, and the need to shield them from liability when 21 they make reasonable mistakes”) (emphasis added). 22 D.D.A. Jangla argues he is nonetheless entitled to qualified immunity because he “was in a 23 different position than Detectives Ryan or Cichocki. His only involvement with the search 24 warrant was that Detective Ryan asked him to determine whether Detective Ryan’s affidavit 25 should be submitted to a judge for a determination of probable cause.” Mot. at 10-11. But all 26 reasonable inferences must be drawn in favor of the party opposing summary judgment, and, for 27 purposes of this motion, the Court must infer that D.D.A. Jangla did not have a reasonable belief 28 that there was probable cause to support the warrant application. See id. at 856 (noting that, as 15 1 part of the qualified immunity analysis, a court must ask “‘whether the facts as alleged could 2 support a reasonable belief that the conduct in question conformed to the established law’”). This 3 is a question that cannot be resolved on a motion to dismiss.7 4 C. Fifth Cause of Action – Unreasonable Search and Seizure Without a Warrant, Probable 5 Cause, and Exigent Circumstances 6 The fifth cause of action is essentially a claim for unreasonable search and seizure based 7 on a lack of probable cause. It is asserted against the individual defendants only and is predicated 8 not on the initial seizure but on the fact that Detective Ryan and D.D.A. Jangla “turned over to 9 [Detective] CICHOCKI computers, hard drives and cell phones seized . . . so that they could be searched in Virginia” and “[Detective] Cichocki then had this seized property unlawfully searched 11 United States District Court Northern District of California 10 and forensically examined in Virginia without a warrant, judicial authorization, probable cause or 12 exigent circumstances.” Compl. ¶ 124. As to this cause of action, D.D.A. Jangla makes two 13 arguments: (1) there was no violation of the Finkelsteins’ constitutional rights because “[t]here is 14 no case law in this Circuit holding that a person has a Constitutional right for his or her seized 15 property to remain in the jurisdiction where the search warrant was issued,” Mot. at 13, and (2) 16 even if the Finkelsteins “had a Constitutional right for their seized electronics to remain in 17 California, such right was not ‘clearly established’ in the spring of 2016.” Mot. at 14. 18 To the extent the Finkelsteins are claiming a constitutional right not to have their property 19 turned over to a different law enforcement agency, D.D.A. Jangla has a strong argument that there 20 is no such constitutional right or, at the very least, he is protected by qualified immunity because 21 such a right was not clearly established. While the Finkelsteins argue that the “transfer [of the 22 property] was prohibited by Cal. Pen. Code §§ 1528(a) and 1536,” Opp’n at 18, that is not a 23 constitutional right but rather a state statutory right. However, it appears that the fifth cause of action is not necessarily about the transfer per 24 25 se; rather, it also seems to encompass the fact that, once property (i.e., computers, hard drives, and 26 27 28 7 Notably, D.D.A. Jangla asserts only qualified immunity, not prosecutorial immunity in his act of reviewing the proposed search warrant. Cf. Patterson v. Yamhill Cty., No. 3:14-cv-00501-BR, 2015 U.S. Dist. LEXIS 131036, at *10 (D. Or. Sep. 29, 2015) (“Defendant is absolutely immune from suit for the prosecutorial act of presenting the arrest warrant to Judge Tichenor.”). 16 1 cell phones) was seized, it was then searched. According to the Finkelsteins, that search should 2 not have taken place because there was no probable cause. The County Defendants have not 3 explained why this theory is not viable. Accordingly, the County Defendants’ motion is denied to 4 the extent Plaintiffs’ theory is an improper search (rather than an improper transfer). 5 D. 6 Third Cause of Action – Use of Untrustworthy Information to Procure a Warrant Unlike the other causes of action above, the third cause of action has been asserted against 7 the entity defendants only, i.e., the County and City. In the pending motion, the County 8 Defendants argue that the County is entitled to summary judgment on the third cause of action 9 because there is insufficient evidence to support Monell liability. See Monell v. Dep’t of Soc. 10 United States District Court Northern District of California 11 12 13 14 15 16 17 18 Servs., 436 U.S. 658 (1978). It is well established that a municipality may be held liable for a violation of 42 U.S.C. § 1983. But “Congress did not intend to create respondeat superior liability”; rather, it intended to hold municipalities liable only when action pursuant to official municipal policy of some nature caused a constitutional tort. The official policy requirement was intended to distinguish acts of the municipality from acts of employees of the municipality, and thereby make clear that municipal liability is limited to action for which the municipality is actually responsible. Although a constitutional violation must result from official municipal policy, a county need not expressly adopt the policy. It is sufficient that the constitutional violation occurred pursuant to a longstanding practice or custom. 19 Christie v. Iopa, 176 F.3d 1231, 1235 (9th Cir. 1999) (emphasis in original; internal quotation 20 marks omitted). In certain situations, deliberate indifference to a risk of constitutional violations 21 can also be deemed a policy or custom. See Flores v. Cty. of L.A., 758 F.3d 1154, 1157 n.8 (9th 22 Cir. 2014) (noting that, “[u]nder City of Canton v. Harris, ‘[o]nly where a municipality’s failure to 23 train its employees in a relevant respect evidences a deliberate indifference to the rights of its 24 inhabitants can such a shortcoming be properly thought of as a city policy or custom under § 25 1983’[;] [w]here deliberate indifference is proved, ‘failure to provide proper training may fairly be 26 said to represent a policy for which the city is responsible, and for which the city may be held 27 liable if it actually causes injury’”). 28 In the instant case, the County argues that there is no evidence to support municipal 17 1 liability because, e.g., the Finkelsteins cannot establish a failure to train that amounted to 2 deliberate indifference. See, e.g., Guidotti Decl. ¶ 6 (testifying that the County District Attorney’s 3 Office “provides onsite training on Penal Code section 1524, the legal standards for motions to 4 quash and traverse search warrants, and the components of a search warrant application”); see also 5 Jangla Decl. ¶ 3 (testifying about training facilitated by County District Attorney’s Office). The 6 County also notes that there is no indication that a final policymaker ratified D.D.A. Jangla’s 7 actions vis-à-vis the search warrant application, and hence there is no Monell liability under a 8 ratification theory. See Christie, 176 F.3d at 1238 (noting that a municipality “can be liable for an 9 isolated constitutional violation if the final policymaker ‘ratified’ a subordinate’s actions”). 10 In response, the Finkelsteins argue that D.D.A. Jangla provided testimony before the state United States District Court Northern District of California 11 court that “is sufficient to create a question of material fact.” Opp’n at 19. D.D.A. Jangla’s 12 testimony was as follows: 13 A. 14 15 Look I think the question is, you know, you could task an investigator with doing an infinite amount of investigative steps before submitting an investigation. The question is what is a reasonable investigative technique to try to get a suspect and to have sufficient probable cause? That’s the question. What is the standard practice and what is an acceptable practice as opposed to what is ideal in theory. 16 17 18 And so, what I can tell you about is what is a standard practice and acceptable practice. And as I indicated, I have reviewed a lot of these electronic warrants. And I have not come across an investigation, in the warrants I have reviewed or in the trainings that I have attended, where a step has been to verify that the service [such as Skype] validates the e-mail address [i.e., sends a confirming email to the email address submitted by the user]. 19 20 21 22 Q. Do you think it is reasonable to rely on the documents that you get from a corporation, in this case, Skype? 24 A. That’s what we have to go on. So, yes, of course. 25 Q. And would that be the standard practice, in your opinion, for detectives or officers writing search warrants? A. Always. 23 26 27 28 Merin Decl., Ex. 1 (Tr. at 29-30). 18 1 Viewing the above testimony, including all reasonable inferences drawn therefrom, in 2 Plaintiffs’ favor, the Court agrees that there is a question of fact that precludes summary judgment 3 in the County’s favor. D.D.A. Jangla’s testimony suggests that it was the practice of the County to 4 accept an email address given to a provider such as Skype at face value – i.e., not to investigate an 5 email address further to determine whether the email address provided did in fact belong to the 6 person who provided it. IV. 7 8 9 10 CONCLUSION For the foregoing reasons, Plaintiffs’ motion for summary adjudication is granted and the County Defendants’ motion for summary judgment is denied. This order disposes of Docket Nos. 70, 81, and 95. United States District Court Northern District of California 11 12 IT IS SO ORDERED. 13 14 Dated: November 21, 2018 15 16 17 ______________________________________ EDWARD M. CHEN United States District Judge 18 19 20 21 22 23 24 25 26 27 28 19

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?