IN THE Supreme Court of the United States - applawyers.org Court 2012/Brief1.pdf · IN THE Supreme...

50
NO. 12-1776 ________________ IN THE Supreme Court of the United States OCTOBER TERM 2012 ________________ UNITED STATES OF AMERICA, Petitioner, v. MARK ZUCKERMAN, Respondent. ________________ On Writ of Certiorari to the United States Court of Appeals for the Thirteenth Circuit ________________ BRIEF FOR PETITIONER ________________ Devin Wagner Erren Chen Jeffrey Westwood TEAM NO. 1 Counsel for Petitioner

Transcript of IN THE Supreme Court of the United States - applawyers.org Court 2012/Brief1.pdf · IN THE Supreme...

NO. 12-1776

________________

IN THE

Supreme Court of the United States OCTOBER TERM 2012

________________

UNITED STATES OF AMERICA,

Petitioner,

v.

MARK ZUCKERMAN,

Respondent.

________________

On Writ of Certiorari to the

United States Court of Appeals

for the Thirteenth Circuit

________________

BRIEF FOR PETITIONER

________________

Devin Wagner

Erren Chen

Jeffrey Westwood

TEAM NO. 1

Counsel for Petitioner

i

QUESTIONS PRESENTED

I. Whether the Evans DNA Collection Act violates the Fourth Amendment to the United States Constitution.

II. Whether Respondent Mark Zuckerman has a privacy interest protected by the Fourth

Amendment in his Facepoke page.

ii

TABLE OF CONTENTS Page QUESTIONS PRESENTED ............................................................................................................ i TABLE OF AUTHORITIES ......................................................................................................... iv OPINIONS BELOW ........................................................................................................................1 CONSTITUTIONAL AND STATUTORY PROVISIONS INVOLVED ......................................1 STATEMENT OF THE CASE ........................................................................................................1 SUMMARY OF THE ARGUMENT ..............................................................................................5 ARGUMENT AND AUTHORITIES ..............................................................................................7

I. UNDER THE TOTALITY OF THE CIRCUMSTANCES BALANCING TEST,

COLLECTION OF A DNA SAMPLE FROM A VIOLENT PRETRIAL ARRESTEE DOES

NOT AMOUNT TO A FOURTH AMENDMENT VIOLATION ....................................................7

A. Collection of DNA from a Pre-Trial Detainee, Arrested on Probable Cause of Committing a Violent Crime, Results in a De Minimis Intrusion on an Already Impaired Expectation of Privacy...................................................................9

1. As a violent arrestee and pre-trial detainee, Zuckerman has a severely

diminished privacy expectation in his identity .....................................................9

2. The collection of Zuckerman’s DNA and its subsequent analysis are minor intrusions—further demonstrating the reasonableness of the search .................................................................................................................. 11

a. Performing a buccal swab on Zuckerman is physically harmless ................12

b. The type of information processed to create Zuckerman’s DNA is

scientifically and practically limited to that which only identifies

him.................................................................................................................13

3. Collection of Zuckerman’s DNA under the EDCA, like fingerprinting, is simply a routine booking procedure used for identification ...........................15

B. The Government’s Many Legitimate and Compelling Interests Served by

the EDCA Outweigh Zuckerman’s Reduced Expectation of Privacy in His Identity ......................................................................................................................17

iii

1. The lower court failed to properly assess the government’s compelling interest in accurately identifying violent individuals arrested with probable cause .....................................................................................................17

2. Because the EDCA identifies arrestees with infallible precision, the

law significantly advances a multitude of compelling governmental interests ...............................................................................................................20

II. BECAUSE ZUCKERMAN HAS NO REASONABLE EXPECTATION OF PRIVACY IN HIS

FACEPOKE ACCOUNT, HE MAY NOT AVAIL IT TO THE PROTECTIONS OF THE

FOURTH AMENDMENT .....................................................................................................23

A. Zuckerman Held No Reasonable Expectation of Privacy in His Facepoke Publications Because He “Assumed the Risk” That the Recipients Would Disclose the Messages to the Government ...............................................................24

1. Courts applying the “assumption of the risk” doctrine to other

mediums of communication find that the Fourth Amendment does not prohibit the government from accessing content from intended recipients .............................................................................................................26

2. The principal rationale for the decision in Miller—that the sharing

party “assumes the risk”—is more cogent in the social media context than in e-mail or letter writing ............................................................................27

3. Several courts have applied Miller and its progeny to cases involving

social media—finding that, regardless of privacy measures, social media users enjoy no legitimate expectation of privacy in information they intentionally share online ............................................................................29

4. It must be observed that what Zuckerman claims is an expectation of

privacy in another’s Facepoke account ...............................................................30

B. Supplying Fourth Amendment protection to an individual’s Facepoke page belies the very purpose of social media—the sharing of information—which users have demonstrated is worth the “risk” ..................................................32

C. Zuckerman had notice that EST would pursue an investigation into his

Facepoke account if its use compromised EST’s interests .......................................34

CONCLUSION ..............................................................................................................................36

iv

TABLE OF AUTHORITIES Page(s)

CASES: Anderson v. Commonwealth, 650 S.E.2d 702 (Va. 2007)..............................................................................................15, 21 Bell v. Wolfish, 441 U.S. 520 (1979) ....................................................................................................8, 10, 14 California v. Ciraolo, 476 U.S. 207 (1986) ..............................................................................................................23 Florence v. Bd. of Chosen Freeholders of Cnty. of

Burlington, 132 S. Ct. 1510 (2012) ..........................................................................................................10 Guest v. Leis, 255 F.3d 325 (6th Cir. 2001) ....................................................................................26, 27, 28 Haskell v. Harris, 669 F.3d 1049 (9th Cir. 2012) ................................................9, 12, 14, 15, 16, 18, 19, 20, 21 Hayes v. Florida, 470 U.S. 811 (1985) ..............................................................................................................16 Hoffa v. United States, 385 U.S. 293 (1966) ..............................................................................................................24 Johnson v. Phelan, 69 F.3d 144 (7th Cir. 1995) ..................................................................................................10 Jones v. Murray, 962 F.2d 302 (4th Cir. 1992) ..............................................................................10, 16, 18, 21

Katz v. United States, 389 U.S. 347 (1967) ..............................................................................................................23

King v. State, 42 A.3d 549 (Md. 2012) ...............................................................................10, 13, 15, 18, 19 Knights v. United States, 534 U.S. 112 (2001) ......................................................................................................8, 9, 17

v

O’Connor v. Ortega, 480 U.S. 709 (1987) ..............................................................................................................35 Ornelas v. United States, 517 U.S. 690 (1996) ................................................................................................................7 People v. Harris, 949 N.Y.S.2d 590 (N.Y. Crim. Ct. 2012) .............................................................................28 Rise v. Oregon, 59 F.3d 1556 (9th Cir. 1995) ................................................................................................11 Romano v. Steelcase, Inc., 907 N.Y.S.2d 650 (2010) ..........................................................................................29, 30, 34 Samson v. California, 547 U.S. 843 (2006) ..............................................................................................................11

Schmerber v. California, 384 U.S. 757 (1966) ..............................................................................................................12 Skinner v. Ry. Labor Executives’ Ass’n, 489 U.S. 602 (1989) ......................................................................................................7, 8, 13

Smith v. Maryland, 442 U.S. 735 (1967) ..............................................................................................................24

State v. Hinton, 280 P.3d 476 (Wash. Ct. App. 2012) ....................................................................................31 State v. O’Hagen, 914 A.2d 267 (N.J. 2007)......................................................................................................12 United States v. Amerson, 483 F.3d 73 (2d Cir. 2007)........................................................................................13, 17, 18 United States v. Jones, 132 S. Ct. 945 (2012) ....................................................................................13, 17, 18, 19, 22 United States v. Kincade, 379 F.3d 813 (9th Cir. 2004) ..........................................................................9, 10, 11, 20, 22 United States v. King, 55 F.3d 1193 (6th Cir. 1995) ....................................................................................26, 27, 28

vi

United States v. Maxwell, 45 M.J. 406 (C.A.A.F. 1996) ................................................................................................28 United States v. Meregildo, No. 11-Cr.-576(WHP), 2012 WL 3264501 (S.D.N.Y. Aug. 10, 2012) ................................................................29, 30 United States v. Meriwether, 917 F.2d 955 (6th Cir. 1990) ................................................................................................30 United States v. Miller, 425 U.S. 435 (1976) ......................................................................................23, 24, 25, 26, 27 United States v. Mitchell, 652 F.3d 387 (2d Cir. 2012).................................................8, 9,11, 13, 14, 15, 16, 17, 18, 19 United States. v. Sczubelek, 402 F.3d 175 (3d Cir. 2005)................................................................................12, 16, 20, 22 United States v. Simons, 206 F.3d 392 (5th Cir. 2000) ..........................................................................................35, 36 United States v. Warshak, 631 F.3d 266 (6th Cir. 2010) ..........................................................................................26, 27

United States v. Weikert, 504 F.3d 1 (1st Cir. 2007) .....................................................................................................15

Widgren v. Maple Grove Township, 429 F.3d 575 (6th Cir. 2005) ................................................................................................23 Winston v. Lee, 470 U.S. 753 (1985) ..............................................................................................................12 Zimmerman v. Weis Mkts., Inc., No. CV-09-1535, 2011 WL 2065410 (Pa. Com. Pl. May 19, 2011) ................................................................................................34

CONSTITUTIONAL PROVISIONS: U.S. Const. amend. IV ...................................................................................................................23

vii

LEGISLATIVE MATERIALS:

151 Cong. Rec. S13,756 (daily ed. Dec. 16, 2005)........................................................................20 H.R. Rep. No. 106-900 (2000) .............................................................................................9, 13, 18

REGULATORY PROVISIONS:

DNA-Sample Collection and Biological Evidence Preservation in the Federal Jurisdiction, 73 Fed. Reg. 74932-01 (Dec. 10, 2008) ................................................................................19

BOOKS:

3 Wayne R. LaFave, Search and Seizure (4th ed. 2004) ........................................................................................16

LEGAL PERIODICALS:

Jules Epstein, “Genetic Surveillance”—The Bogeyman Response

to Familial DNA Investigations, 2009 U. Ill. J.L. Tech. & Pol’y 141 (2009) ...........................................................................12 Nathan Petrashek, The Fourth Amendment and the Brave New World

of Online Social Networking, 93 Marq. L. Rev. 1495 (2010) ........................................................................................28, 32 Patricia Sanchez et al., Blurred Boundaries: Social Media Privacy and the

Twenty-First-Century Employee, 49 Am. Bus. L.J. 63 (2012) ...................................................................................................33

viii

INTERNET SOURCES:

Facebook & Your Privacy: Who Sees the Data You Share

on the Biggest Social Network?, Consumer Rep. Mag. (June 2012), http://www.consumerreports.org/cro/magazine/ 2012/06/facebook-your-privacy/index.htm ..........................................................................33 Facebook Data Use Policy, https://www.facebook.com/full_data_use_policy (last visited Oct. 10, 2012) ....................................................................................................34 FBI, CODIS—NDIS Statistics, http://www.fbi.gov/about-us/lab/codis/ndis-statistics (last visited Oct. 5, 2012) ......................................................................................................20 Adam Pash, Accepting Friend Requests from People You Don’t

Know Is a Recipe for ID Theft, Lifehacker (Dec. 8, 2009, 8:35 AM), http://lifehacker.com/5421597/accepting-friend- requests-from-people-you-dont-know-is-a-recipe- for-id-theft .............................................................................................................................33 Ian Paul, Facebook Users Don’t Trust Site on Privacy Issues, PCWorld (May 15, 2012), http://www.pcworld.com/article/255615/facebook_ users_dont_trust_site_on_privacy_issues.html .....................................................................33 Jose Antonio Vargas, The Face of Facebook, New Yorker (Sept. 20, 2010), available at http://www.newyorker.com/reporting/ 2010/09/20/100920fa_fact_vargas?currentPage=all ............................................................32

1

OPINIONS BELOW

The opinion and order of the United States Court for The Eastern District of Evans is

unreported, but appears in the record at pages 4-10. The opinion and order of the Thirteenth

Court of Appeals is also unreported but appears in the record at pages 12-23.

CONSTITUTIONAL AND STATUTORY PROVISIONS INVOLVED

This case involves the Fourth Amendment of the United States Constitution. It also

involves provisions of the Evans DNA Collection Act, codified in Evans Code 2010, § 337.

STATEMENT OF THE CASE

This appeal arises from Respondent Mark Zuckerman’s conviction for assaulting a federal

officer and embezzlement. R. at 12. The Respondent (“Zuckerman”) was charged with the

above offenses after his former employer, Evans Software Technologies, Inc. (“EST”), suspected

improprieties in his accounting. R. at 13. Following an investigation, he was convicted of both

charges. R. at 13. Zuckerman complains the investigation violated his Fourth Amendment rights

in two distinct ways. R. at 13.

Zuckerman’s Arrest. EST is a software consulting service that advises clients who

advertise on a social media network called Facepoke. R. at 5. Facepoke allows users to connect

with others for the purpose of sharing information. R.at 18. Before his arrest, Zuckerman

worked as EST’s Accounts Payable Manager. R. at 5. Because EST works closely with

Facepoke sponsors, it requires all employees to furnish their Facepoke passwords to the Human

Resource Department. R. at 5. The company’s written policy provides that an employee’s

Facepoke password is confidential. R. at 5. Moreover, EST may access an employee’s Facepoke

account only if the company has reason to believe the employee has used Facepoke against the

interests of EST and its customers. R. at 5.

2

Although Zuckerman opposed disclosing his Facepoke password “as a matter of principal,”

he obliged to fulfill EST’s condition of employment. R. at 17. Nine months into his employment

with EST, the company’s President, Jordan Tracey, discovered some inconsistencies in

accounting. R. at 17. Specifically, the company’s checks were not accounted for, and its bank

statements did not match the ledger. R. at 18. Tracey instructed Human Resources to conduct a

comprehensive review of Zuckerman’s file. R.at 5. The process usually involves a review of the

employee’s Facepoke page. R. at 5.

Human Resources was unable to access Zuckerman’s Facepoke account because the

password he provided was invalid. R.at 5. EST asked Zuckerman to provide the correct

password but he refused—at which time he was terminated. R. at 5. Refusing to leave EST’s

facility peacefully, Zuckerman attacked the escorting FBI officer. R. at 5. He was arrested and

charged with assault. R.at 5.

After taking his fingerprints, authorities asked Zuckerman to submit a DNA sample. R. at

8. The Evans DNA Collection Act (EDCA) requires every person arrested or convicted of a

violent crime to provide a DNA sample by rubbing a cotton instrument on the inner cheek—a

process otherwise known as a buccal swab. R. at 8. The DNA is then implemented into a profile

and stored in a database for future analysis. R. at 8-9. Zuckerman refused to provide the sample.

R. at 8. After securing further authorization from the trial court, the police forcefully obtained

the sample through the process described. R. at 8. At the time Zuckerman’s DNA sample was

obtained, law enforcement knew he was a person of interest in a sexual assault case. R. at 8.

Embezzlement Investigation. EST and the authorities continued to investigate Zuckerman.

R. at 6. Police tried to obtain evidence from Zuckerman’s Facepoke account, but access was

limited to designated individuals called Facepoke “friends.” R. at 18. The police discovered the

3

name of one of Zuckerman’s acquaintances when reviewing his EST email account. R. at 18.

During an interview with the individual, the police asked about Zuckerman’s Facepoke use. R. at

18. After learning the individual was a Facepoke “friend” of Zuckerman’s, they asked his

permission to view Zuckerman’s page. R. at 18. At first the individual refused, but agreed to

avoid a subpoena. R. at 6. Investigators reviewed Zuckerman’s Facepoke postings from the date

he began working at EST. R at 19. Zuckerman published the following post shortly after starting

at EST:

New job: Working for a whole flock of chickens, no heads. So disorganized they are just waiting to be ripped off. These idiots are lucky I’m honest, I could rob them blind and they would never know about it.

R. at 6. The authorities soon learned that EST was missing over $200,000. R. at 19. Shortly

thereafter, Zuckerman was charged with embezzlement. R. at 6.

The District Court. At trial, Zuckerman moved to suppress both his DNA sample and the

evidence obtained from his Facepoke page. R. at 6, 8. Zuckerman argued the EDCA violated his

Fourth Amendment right to be free from unreasonable searches and seizures. R. at 6. Zuckerman

further contended his Fourth Amendment rights were impinged when his Facepoke friend

permitted law enforcement to view the incriminating Facepoke message. R. at 7.

The trial court denied both motions. R. at 4. Regarding Zuckerman’s challenge to the

EDCA, the court concluded that collecting DNA with a buccal swab, like finger-printing, only

infringed Zuckerman’s diminished privacy interest to a minimal degree. R. at 10. The court

explained that law enforcement has legitimate and compelling interests in identifying arrestees

and solving and preventing crime, and just as collecting and comparing fingerprints help law

enforcement in these matters, so too does the collection of pretrial arrestees’ DNA. R. at 10. The

court, therefore, upheld the EDCA’s constitutionality. R. at 10.

4

In rejecting Zuckerman’s argument that he enjoys a reasonable expectation of privacy in

his Facepoke statements, the court reasoned that sharing information is the “sole purpose” of

sites like Facepoke. R. at 7. The court described Zuckerman’s expectation of privacy as

“frivolous” because nothing prevented those with whom he shared his posts from disclosing

them to the government. R.at 7. The court further observed that Zuckerman had notice that EST

would investigate his Facepoke under certain circumstances. R. at 7. Judge Denzel therefore

held that investigators did not violate the Fourth Amendment by viewing Zuckerman’s Facepoke

page. R. at 7.

Court of Appeals. The United States Court of Appeals for the Thirteenth Judicial Circuit

reversed both decisions. R. at 12. Writing for the majority, Chief Judge Baldwin acknowledged

that Zuckerman’s expectation of privacy is less than that of the general public. R.at 15. The

court, however, determined that the government’s interests in collecting pretrial arrestees’ DNA

are insufficient to outweigh Zuckerman’s mitigated expectation of privacy. R. at 16. The court

found the government’s lack of individualized suspicion or probable cause in collecting the

sample problematic and expressed concern that DNA collection “brings to mind the words of

George Orwell that ‘Big Brother’ is watching you.” R. at 16. The court held that the EDCA is

unconstitutional as applied to Zuckerman. R. at 16.

The court of appeals held that the Fourth Amendment protects Facepoke publications. R. at

21. The court noted that by sharing his information online, Zuckerman’s actions suggest he

maintained no legitimate expectation of privacy in what was shared. R. at 20. But the court

voiced its concern over the informant’s hesitation in cooperating with the government and chose

not to accept the trial court’s position that Zuckerman lost an expectation of privacy by virtue of

5

sharing information on Facepoke. R.at 20. The court concluded that Zukerman had a legitimate

expectation of privacy in his Facepoke page. R. at 21.

SUMMARY OF THE ARGUMENT

I.

Under the totality of the circumstances balancing test, this Court should find that collecting

Zuckerman’s DNA sample with a buccal swab is consistent with the Fourth Amendment. The

EDCA provides for a minimal intrusion—both physically and emotionally—on a violent

arrestee’s already diminished expectation of privacy in his identity. In this regard, the argument

advancing the constitutionality of the EDCA is substantially similar, indeed even stronger, than

what is traditionally used to uphold the constitutionality of obtaining an arrestee’s fingerprints.

The lower court’s decision finding the EDCA unconstitutional should be reversed, and the Court

should uphold the EDCA as constitutional.

As a violent pretrial arrestee, Zuckerman has a severely diminished expectation of

privacy. By virtue of being arrested for assaulting a federal agent, Zukerman is subject to a litany

of searches and seizures—each of which is substantially more intrusive than the collection of his

DNA. These procedures range from the physically invasive to those which disclose his identity.

The EDCA merely provides for an additional booking mechanism to enhance timeworn

identification techniques like fingerprinting and photographing.

Further, under national standards and scientific restrictions, the EDCA limits its analysis

of violent arrestee DNA only to information that identifies the individual. This scientific and

practical reality undermines the lower court’s concerns of “Big Brother.” In fact, nothing in the

record supports the theory that the government abuses or might abuse an arrestee’s DNA

6

identification information. Thus, collecting Zuckerman’s DNA posed a minimal intrusion onto

his identity.

The government has a range of legitimate and compelling interests for obtaining pretrial

arrestee DNA. In promoting these interests, the State of Evans passed a law giving police a tool

that more accurately and reliably identifies individuals arrested for violent crimes. But the lower

court ignored this interest by overlooking the multi-layered concept of criminal identification. In

reality, the only material difference between fingerprinting and DNA collection is that the latter

permits law enforcement to more effectively and efficiently reach its goals of protecting the

public.

The Court should reverse the court of appeals and hold that the EDCA does not violate

Zuckerman’s Fourth Amendment rights.

II.

Because Zuckerman holds no legitimate expectation of privacy in the contents of his

Facepoke page, the Fourth Amendment affords it no protection. To establish a violation of the

Fourth Amendment’s prohibition on unreasonable searches, the challenging party must have both

a subjective and objective expectation of privacy in the object targeted. While Zuckerman may

have exhibited conduct suggesting he subjectively believed no one outside his online community

would view his broadcasts, such an expectation is not one that society is prepared to recognize as

reasonable.

This Court has repeatedly held that one holds no legitimate expectation of privacy in that

which he voluntarily discloses to another. Here, Zuckerman posted information on his Facepoke

page knowing that anyone who viewed it—including the government’s informant—had complete

7

discretion to disclose what was seen. Carving out an exception in Zuckerman’s case would erode

decades of precedent.

Moreover, it is clear that social media networks like Facepoke are based on people

sharing information; the entire concept of social media is dependent on such disclosures. The

simple truth is that Facepoke users are aware of this fact and have shown their willingness to

forego privacy protection to engage in the social benefits derived from the free-flow of personal

information. As such, it cannot be said that society has recognized as reasonable an expectation

of privacy in one’s Facepoke page.

This Court should reverse the court of appeals decision on the Facepoke issue should be

reversed, and hold that Zuckerman has no legitimate expectation of privacy in his Facepoke

page.

ARGUMENT AND AUTHORITIES

Zuckerman asserts two violations under the Fourth Amendment’s prohibition against

unreasonable searches and seizures. Both issues merit de novo review. Ornelas v. United States,

517 U.S. 690 (1996).

I. UNDER THE TOTALITY OF THE CIRCUMSTANCES BALANCING TEST, COLLECTION OF A

DNA SAMPLE FROM A VIOLENT PRETRIAL ARRESTEE DOES NOT AMOUNT TO A FOURTH

AMENDMENT VIOLATION.

The compelled collection of Zuckerman’s DNA is reasonable under the totality of the

circumstances. “[T]he Fourth Amendment only protects individuals from unreasonable searches

and seizures. Skinner v. Ry. Labor Executives’ Ass’n, 489 U.S. 602, 613 (1989). It follows then

that when a “search is reasonable, there is no constitutional problem.” Id. In assessing whether a

warrantless search is reasonable, courts apply the “totality of the circumstances balancing test.”

See Samson v. California, 547 U.S. 843, 848 (2006) (applying totality of the circumstances test

8

to determine whether warrantless search as condition of parole violates the Fourth Amendment);

Bell v. Wolfish, 441 U.S. 520, 559 (1979) (using the totality of the circumstances to determine

whether strip searches for pretrial detainees are constitutional). The test requires a court to

balance the degree of intrusion upon an individual's privacy against the degree to which it

promotes legitimate governmental interests. Knights v. United States, 534 U.S. 112 (2001).

There is no dispute as to the lower court’s analytical framework. Indeed, the totality of the

circumstances balancing test has been adopted by almost every circuit court to consider the

constitutionality of warrantless DNA collection. United States v. Mitchell, 652 F.3d 387, 403 (2d

Cir. 2012) (noting that in addition to the Third Circuit, the First, Fourth, Fifth, Sixth, Eighth,

Ninth, Eleventh, and District of Columbia have endorsed a totality of the circumstances

approach). Instead, the point of dissension lies in the lower court’s application of the totality of

the circumstances exception in determining the search’s reasonableness. In finding the EDCA

unconstitutional, the lower court placed an improper emphasis on a lack of individualized

suspicion. R. at 16. But “[t]he touchstone of the Fourth Amendment is reasonableness, not

individualized suspicion.” Samson, 547 U.S. at 843; see also Skinner, 489 U.S. at 624 (“a

showing of individualized suspicion is not a constitutional floor, below which a search must be

presumed unreasonable”).

A proper totality of the circumstances analysis requires the reversal of the lower court’s

decision. Zuckerman’s arrest and pretrial detainment severely diminished his expectation of

privacy in his identity, rendering it analogous to an individual in prison or on supervised release.

Moreover, DNA collection is one of the least intrusive searches—both physically and

emotionally—and is substantially comparable to fingerprinting. Finally, Congress has recognized

DNA identification technology as “one of the most important advances in criminal identification

9

methods in decades.” H.R. Rep. No. 106-900, pt. 1, at 9 (2000). Thus, the nominal intrusion on

Zuckerman’s diminished expectation of privacy, weighed against the government’s compelling

interests served by the EDCA, should result in this Court’s finding that DNA collection of a

violent pretrial arrestee is a reasonable search. Therefore, the Court should reverse the appellate

court’s decision and find that the EDCA does not violate the Fourth Amendment.

A. Collection of DNA from a Pre-Trial Detainee, Arrested on Probable Cause of

Committing a Violent Crime, Results in a De Minimis Intrusion on an

Already Impaired Expectation of Privacy.

A minimal intrusion on a violent arrestee’s weakened expectation of privacy provides little

weight in the totality of the circumstances analysis. Determining the reasonableness of a search

by considering the totality of the circumstances begins “by assessing . . . the degree to which [the

search] intrudes upon an individual’s privacy. Knights, 534 US at 118. Zuckerman’s expectation

of privacy in his identity—the discovery of which is the focus of the EDCA—is severely

diminished by virtue of his status as a pretrial arrestee. Mitchell, 652 F.3d at 412. Further, the

intrusion permitted by compelled DNA collection “can only be described as minimally

invasive—both in terms of the bodily intrusion it occasions, and the information it lawfully

produces.” Haskell v. Harris, 669 F.3d 1049, 1055 (9th Cir. 2012) (quoting United States v.

Kincade, 379 F.3d 813, 838 (9th Cir. 2004)). Thus, this first prong of the analysis does not

suggest that Zuckerman’s privacy interests were unreasonably impinged by the EDCA.

1. As a violent arrestee and pre-trial detainee, Zuckerman has a severely

diminished privacy expectation in his identity.

According to the court of appeals, the EDCA “brings to mind the words of George Orwell

that ‘Big Brother’ is watching you.” R. at 16 (internal quotations omitted). Notwithstanding its

hyperbolic tone, the court was correct to the extent that the principal purpose of DNA collection

under the EDCA is arrestee identification. Mitchell, 652 F.3d at 412 (explaining that arrestees

10

and pretrial detainees have reduced privacy interests in DNA information because it is “used

only for identification purposes”). And once Zuckerman was arrested on probable cause—an

uncontested fact—“his identification bec[came] a matter of legitimate state interest,” meaning

“he can hardly claim privacy in it.” Jones v. Murray, 962 F.2d 302, 306 (4th Cir. 1992). When a

suspect is arrested upon probable cause, like a prisoner or parolee, any right he may have in the

secrecy of his identity is eviscerated and is subject to warrantless searches. See, e.g., Bell, 441

U.S. at 545–46, 557 (pre-trial detainees have “a diminished expectation of privacy after

commitment to a custodial facility,” and are subject to the same limitations and intrusions as any

other prisoner); Kincade, 379 F.3d at 837 (persons who are “lawfully arrested and booked into

state custody” have no privacy interest in their identifying information).

It should be noted from the outset that as a violent pretrial arrestee, Zuckerman’s privacy

was subject to a myriad of deprivations, each of which is significantly more intrusive than DNA

collection. See King v. State, 42 A.3d 549, 583 (Md. 2012) (Barbera, J., dissenting). For

example, Zuckerman’s person was undoubtedly searched head-to-toe immediately upon arrest.

See United States v. Robinson, 414 U.S. 218, 235 (1973). After his booking, nothing within the

constitution protects Zuckerman from being observed, by the police or other detainees, while

using the toilet. Johnson v. Phelan, 69 F.3d 144, 145 (7th Cir. 1995). Perhaps no intrusion

diminishes an expectation of privacy more so than the body cavity search—which Zuckerman

may lawfully experience as a pretrial detainee. Florence v. Bd. of Chosen Freeholders of Cnty. of

Burlington, 132 S. Ct. 1510, 1514 (2012). Specifically, this Court recently reaffirmed that

pretrial arrestees such as Zuckerman may be required to “lift [their] genitals, turn around, and

cough in a squatting position” as part of the intake process. Id. In light of such procedures, even

11

critics of DNA sampling concede that felony arrestees’ privacy interests “appear to be

significantly reduced.” Kincade, 379 F.3d at 864 (Reinhardt, J., dissenting).

Moreover, any expectation of privacy Zuckerman had in his identity was thwarted by

identification procedures that preceded the collection of his DNA. Namely, by the time law

enforcement performed the buccal swab, Zuckerman was already fingerprinted and likely

photographed. R. at 13; see also Rise v. Oregon, 59 F.3d 1556, 1559–60 (9th Cir. 1995)

(“[E]veryday ‘booking’ procedures routinely require even the merely accused to provide

fingerprint identification.”). Such standard procedures are why those who are “lawfully arrested

and booked into state custody” have no privacy interest in their identifying information. Kincade,

379 F.3d at 837.

As a pretrial arrestee, Zuckerman has a diminished expectation of privacy. And what is left

of such expectation does not allow him to hide his identity. Zuckerman simply does not enjoy the

same privacy rights as the general public. His privacy interests are minimal and thus, this prong

of the totality of the circumstances analysis is not weighty, nor does it favor Zuckerman.

2. The collection of Zuckerman’s DNA and its subsequent analysis are

minor intrusions—further demonstrating the reasonableness of the

search.

The collection and analysis of Zuckerman’s DNA represents two “searches,” neither of

which unreasonably interfere with his expectation of privacy. Mitchell, 652 F.3d at 406. The first

search was performed when the government swiped Zuckerman’s inner cheek with a cotton

instrument. Second, the processing and storing of Zuckerman’s DNA also triggers a Fourth

Amendment analysis. But neither one of these “intrusions” presents novel Fourth Amendment

questions. Indeed, by collecting and storing Zuckerman’s DNA, the government did no more

12

than utilize advances in technology to identify Zuckerman in a physically harmless manner. See

United States v. Sczubelek, 402 F.3d 175, 185–86 (3d Cir. 2005).

a. Performing a buccal swab on Zuckerman is physically harmless.

The process by which the government obtained Zuckerman’s DNA sample can be

described as “perhaps the least intrusive of all seizures.”1 The buccal swab allows officers to

secure the DNA sample by gently sweeping a cotton instrument along an arrestee’s inner cheek.

Haskell, 669 F.3d at 1059. The event, therefore, is “no more intrusive than the fingerprint

procedure and taking of one’s photograph that a person must already undergo as part of the

normal arrest process.” State v. O’Hagen, 914 A.2d 267, 280 (N.J. 2007). Indeed, it “cannot be

seriously viewed as an unacceptable violation of a person’s bodily integrity.” Haskell, 669 F.3d

at 1059. The benign nature with which the EDCA touches a pretrial arrestee’s expectation of

privacy weighs in favor of finding the law reasonable under the totality of the circumstances.

The method of DNA collection in this case is substantially less intrusive than many other

types of approved procedures that identify and examine pretrial arrestees. For example, a buccal

swab is less invasive than the drawing of blood, which this Court addressed in Schmerber v.

California, 384 U.S. 757 (1966). The Court held in that case that the drawing of an arrestee’s

blood without a warrant did not violate the Fourth Amendment because drawing blood is

“commonplace” and “involves virtually no risk, trauma, or pain.” Id. at 771. Since Schmerber,

this Court has characterized the intrusiveness of blood-drawing as “not . . . an unduly extensive

imposition on an individual's personal privacy and bodily integrity.” Winston v. Lee, 470 U.S.

753, 762 (1985).

1Jules Epstein, “Genetic Surveillance”—The Bogeyman Response to Familial DNA

Investigations, 2009 U. Ill. J.L. Tech. & Pol’y 141, 152 (2009).

13

But unlike the drawing of blood, a buccal swab “can be taken in seconds without any

discomfort.” United States v. Amerson, 483 F.3d 73, 84 n.11 (2d Cir. 2007). Recognizing this

distinction, one judge reasoned that:

If the subcutaneous removal of blood from a person's veins presents only a marginal intrusion into that person's privacy interest, a fortiori the insertion of a cotton swab into a person's mouth is less of an intrusion and fairly characterized as de minimis. Unlike the process of drawing blood, performing a buccal swab does not require skin to be pierced, or a hard, foreign object to be situated inside of the body.

42 A.3d at 583. Thus, the minimal physical intrusion upon Zuckerman’s inner cheek

provides nothing to advance an argument that the EDCA violates the Fourth Amendment.

b. The type of information processed to create Zuckerman’s DNA

profile is scientifically and practically limited to that which only

identifies him.

The second “search” provided by the EDCA is the processing and storage of Zuckerman’s

DNA sample. Skinner, 489 U.S. at 616 (“The ensuing chemical analysis of the sample to obtain

physiological data” is also a search covered by the Fourth Amendment). Like its innocuous

physical imposition, the EDCA’s use and retention of DNA does not significantly impinge

Zuckerman’s privacy. As the appellate court observed, the EDCA’s purpose is to “solv[e] and

prevent[] past and future criminal activity.” R. at 14. This is done by developing DNA profiles

that function only for identification purposes. See Mitchell, 652 F.3d at 412. While the EDCA is

silent as to the scope of information analyzed, “in the current state of scientific knowledge, the

DNA profile . . . establishes only a record of the offender's identity.” Amerson, 483 F.3d at 85.

Moreover, under “national standards,” DNA profiles “do not reveal information relating to any

medical condition or other trait.” H.R. Rep. No. 106-900, at 27. Given such expressed and

scientific limitations, the lower court’s aversion to “Big Brother”—ostensibly to evoke a

scenario in which Zuckerman’s DNA is misused—is misguided.

14

Haskell demonstrates that embellished hypotheticals in which the government abuses

arrestee DNA do nothing but distort the analysis. 669 F.3d at 1061–62. In Haskell, a pretrial

arrestee challenged the collection and use of the information contained in his DNA. Id. at 1059.

He argued that the Fourth Amendment reaches “not only what the [government] actually does

with the DNA samples, but what it could do with the information.” Id. at 1061 (emphasis in

original). Rejecting the plaintiff’s fears that the government could “test the DNA for diseases,”

the court opined that such arguments are based on “hypothetical scenarios” described in “bleak

Orwellian terms.” Id. Instead, the court relied on the facts, stating “there is no evidence in the

record of a single case of DNA misuse.” Id. And “[w]hile it is hypothetically possible that . . .

rogue Government employees may record and analyze more extensive DNA information, . . . we

cannot legitimately weigh the constitutionality of the current legal regime by arguing about . . .

highly speculative actions.” Id. at 1062.

The court in Mitchell also refused to consider the fear of “Big Brother” in deciding whether

collecting a pretrial arrestee’s DNA comports with the Fourth Amendment. 652 F.3d at 408. In

that case, a man arrested but not yet convicted of drug possession argued the collection of his

DNA violated the Fourth Amendment—asserting that “with technological advances, [a DNA

profile] could reveal far more extensive information than it presently discloses.” Id. at 407. The

court was not persuaded. Id. It noted that “every one of our sister circuits to have considered

the[se] concerns . . . has rejected them given their speculative nature.” Id. As was the case in

Haskell, the court concluded that “these hypothetical possibilities are unsupported by the record

. . . and thus do not have any substantial weight in our totality of the circumstances analysis.” Id.

at 408.

15

Here, the lower court’s concerns are no less speculative than those portrayed in Haskell and

Mitchell. And like those cases, the record is completely devoid of evidence to justify fears

conveyed in “bleak Orwellian terms.” Indeed, there are no facts to connect the hypothetical

scenarios in which the lower court alludes with a “reality that is far less troubling.” Haskell, 669

F.3d at 1059. It is true that unlike the laws challenged in Haskell and Mitchell, the EDCA is

silent regarding punishment for DNA misuse. Id. at 1051 (“[u]nauthorized access or disclosure

of DNA information is punishable by State law.”); Mitchell, 652 F.3d at 399 (same under federal

law). But in practice, law enforcement has developed a steadfast policy of analyzing only what is

commonly called “junk DNA,” which is incapable of disclosing Zuckerman’s genetic make-up.

Mitchell, 652, F.3d at 400. There is nothing in the record indicating the government will deviate

from this practice. See also King v. State, 42 A.3d at 559 (noting that state “DNA samples are

analyzed in accordance with FBI standards”). Therefore, Zuckerman’s “meaningful . . . genetic

information” is protected from misuse by virtue of how the EDCA processes DNA. See id. As

such, the threat of punishment as a means for protecting arrestees’ DNA is superfluous in light of

accepted practice. See United States v. Weikert, 504 F.3d 1, 13 n.10 (1st Cir. 2007) (“The

government has stated repeatedly that it uses only junk DNA in creating individual DNA

profiles. . . . For purposes of this appeal, we take the government at its word . . . .”). Therefore,

the lower court’s concerns regarding potential abuse of Zuckerman’s DNA are unfounded.

3. Collection of Zuckerman’s DNA under the EDCA, like fingerprinting,

is simply a routine booking procedure used for identification.

Fingerprinting a violent arrestee has long been considered a part of the routine booking

process. Anderson v. Commonwealth, 650 S.E.2d 702, 706 (Va. 2007). Similarly, using a buccal

swab to take a DNA sample “is justified by the legitimate interest of the government in knowing

for an absolute certainty the identity of the person arrested, in knowing whether he is wanted

16

elsewhere, and in ensuring his identification in the event he flees prosecution.” 3 Wayne R.

LaFave, Search and Seizure § 5.3(c), at 168 (4th ed. 2004).

The analogous treatment of the taking of DNA samples to the taking of fingerprints is

widely accepted. The Second and Ninth Circuits accepted the comparison. See Haskell, 669 F.3d

at 1049; Mitchell, 652 F.3d at 387. The Fourth Circuit opined in Jones that like fingerprinting,

the “Fourth Amendment does not require an additional finding of individualized suspicion”

before a DNA sample can be taken. 962 F.2d at 306–07. The Third Circuit held that “[t]he

governmental justification for [DNA] identification . . . relies on no argument different in kind

from that traditionally advanced for taking fingerprints and photographs, but with additional

force because of the potentially greater precision of DNA sampling and matching methods.”

Sczubelek, 402 F.3d at 185–86.

This readily apparent analogy illustrates with clarity the lower court’s improper reliance on

individualized suspicion. Like standard fingerprinting, Zuckerman’s DNA collection under the

EDCA only occurred after law enforcement determined with probable cause that he committed a

violent crime. See Evans Code 2010, § 337 (the EDCA allows law enforcement to collect DNA

sample after violent individual is arrested). As discussed above, this event diminished

Zuckerman’s expectation of privacy in his identity—which in turn, allowed law enforcement to

take his fingerprints. See Hayes v. Florida, 470 U.S. 811, 813 (1985) (explaining that

suspicionless fingerprinting of all citizens would violate the Fourth Amendment). Thus, law

enforcement did not need individualized suspicion to collect Zuckerman’s DNA for the same

reason it did not need it to obtain his fingerprints.

As a violent pre-trial arrestee, Zuckerman simply does not enjoy the same expectation of

privacy as those who choose to behave lawfully. And just as pre-trial arrestees must submit to

17

finger-printing and other routine identification procedures, so too should they be required to

submit DNA samples as a measure of standard procedure. See Mitchell, 652 F.3d at 414 (“DNA

profiling is simply a more precise method of ascertaining identity and is thus akin to

fingerprinting, which has long been accepted as part of routine booking procedures.”). In

considering the degree to which the EDCA intrudes on Zuckerman’s expectation of privacy, the

Court should find such intrusion of little weight in its totality of the circumstances analysis.

B. The Government’s Many Legitimate Interests Served by the EDCA

Outweigh Zuckerman’s Reduced Expectation of Privacy in His Identity.

The second step in the totality of the circumstances analysis is to assess “the degree to

which [the search] is needed for the promotion of legitimate government interests.” Knights, 534

U.S. at 119. The purpose of the EDCA is to provide law enforcement with an innovative

technique to solve and prevent past and future crimes. Evans Code 2010, § 337.1. The lower

court failed to give these interests proper weight by distorting what the EDCA actually does. By

harnessing the individuality of an arrestee’s DNA, the EDCA seeks to utilize a “dramatic new

tool for matching suspects and criminal conduct.” Amerson, 483 F.3d at 87. In that vein, DNA

identification of arrestees is an invaluable law enforcement gambit, assisting police in saving

lives, preventing and solving crimes, and protecting the public and innocent. This Court should

find that the public interests served by the EDCA outweigh Zuckerman’s diminished expectation

of privacy as a violent arrestee.

1. The lower court failed to properly assess the government’s compelling

interest of accurately identifying violent individuals arrested on

probable cause.

The lower court refused to give adequate consideration to the EDCA’s primary function—

the identification of arrestees. See, e.g., Mitchell, 652 F.3d at 399 (noting that the EDCA’s

federal counterpart is used “for law enforcement identification purposes”). “When a suspect is

18

arrested upon probable cause, his identification becomes a matter of legitimate state interest.”

Jones, 962 F.2d at 306. This is so “because the identification of suspects is relevant not only to

solving the crimes for which the suspect is arrested, but also for maintaining a permanent record

to solve other past and future crimes.” Id.

Against this backdrop, it must be recognized that collecting Zuckerman’s DNA is simply

the technological progression of fingerprints and photographs, neither of which trigger a

constitutional quandary. See Jones, 962 F.2d at 307 (explaining that DNA identification “relies

on no arguments different in kind from . . . taking fingerprints and photographs”); Haskell, 669

F.3d at 1060 (“Fingerprinting has been consistently upheld as constitutional.”). What

distinguishes DNA identification is an offering of “unparalleled speed and, more importantly,

accuracy in solving crimes.” Amerson, 483 F.3d at 82–83. Indeed, Congress has recognized

“DNA identification technology [a]s one of the most important advances in criminal

identification methods in decades.” H.R. Rep. No. 106-900, pt. 1, at 9.

Courts that reject DNA collection as a method for identification claim that fingerprinting

and photographing are themselves sufficient. See, e.g., King v. State, 42 A.3d at 579 (“We

simply will not allow warrantless, suspicionless searches . . . without a showing that accurate

identification is not possible using ‘traditional’ methods.”). But nothing in the constitution

commands this Court to prevent the government from using this new and highly effective tool of

identification to replace or supplement older ones.” Id. at 586 (Barbera, J., dissenting).

Moreover, this argument is no different in kind than one asserting that fingerprinting is excessive

because the government already knows what an individual looks like. Such a position is easily

rejected because, quite obviously, a criminal’s “identification” includes different types of

information. See Mitchell, 652 F.3d at 414 (noting that a person’s identity consists of “who that

19

person is . . . and what that person has done”). It should be of no consequence that photographs,

fingerprints, and DNA serve overlapping interests while simultaneously serving those which they

exclusively or more reliably advance. Notably, “there is a vast class of crimes that be solved

through DNA matching that could not be solved . . . if the biometric identification information

collected . . . were limited to fingerprints.” 73 Fed. Reg. at 74934.2 This is because the odds that

two individuals share identical samples of the DNA tested under methods similar to the EDCA is

“one in several hundred billion.” Haskell, 669 F.3d at 1051 (citation omitted).

The court below dismissed—without citing any authority—the government’s interest in

accurately identifying Zuckerman because “there was no question that [he] was the offender in

this case.” R. at 16. But this failed to grasp the concept of criminal identification. It is true that

Zuckerman’s name and date of birth were never at issue, nor was the fact that it was he who

attacked a federal officer. Still, criminal “[i]dentification encompasses not merely a person’s

name, but also other crimes to which the individual is linked.” Haskell, 669 F.3d at 1062.3 To

suggest the definition of “identification” excludes a person’s past raises the question: Why would

law enforcement want to confirm an arrestee’s name, process his fingerprints, and take his

photograph, if not to know whether he is linked to another crime? King, 42 A.3d at 586. Indeed,

like fingerprinting, whether DNA sampling can assist in criminal investigations and prosecutions

“depend[s] on accurately identifying the suspect.” Mitchell, 652 F.3d at 414 (emphasis added).

2 For example, although an offender might wear gloves or a mask to conceal his identity, he “cannot escape the match that his DNA might make with a sample contained in a DNA bank.” Amerson, 483 F.3d at 87. And because “DNA is more often left at crime scenes than fingerprints,” Id. at 1061, even an arrestee who alters his or her fingerprints in order to avoid detection can still be identified through DNA collection. Mitchell, 652 F.3d at 414. 3 See also, Webster’s Third New International Dictionary 1123 (2002) (defining “identity” as “the condition of being the same with something described, claimed, or asserted or of possessing a character claimed”).

20

2. Because the EDCA identifies arrestees with infallible precision, it

significantly advances a multitude of compelling governmental

interests.

A DNA database such as the one provided by the EDCA promotes increased accuracy and

efficiency in solving and preventing crime as well as protecting the innocent from undue

investigation and harassment. See Haskell, 669 F.3d at 1062 (explaining that interests served by

DNA collection are “solving past crimes, preventing future crimes, and exonerating the

innocent”). Furthermore, just like fingerprints, utilizing DNA identification to solve crimes other

than the one for which a person is arrested serves the government’s interest and also the public’s

interest. See Sczubelek, 402 F.3d at 185 (“The interest in accurate criminal investigations and

prosecutions is a compelling interest that [DNA identification] can reasonably be said to

advance.”). These well-established law enforcement interests weigh heavily in favor of

upholding the EDCA as constitutional.

The added value of early DNA sample collection in solving and preventing murders, rapes,

and other crimes served as a specific motive in Congress’ adoption of the EDCA’s federal

counterpart. See 151 Cong. Rec. S13,756–58 (daily ed. Dec. 16, 2005) (comments by Sen. Kyl

explaining value of the inclusion of arrestee DNA bank); see also Kincade, 379 F.3d at 839

(DNA collection “helps bring closure to countless victims of crime who long have languished in

the knowledge that perpetrators remain at large”). Jurisdictions adopting law similar to the

EDCA, including the federal government, have experienced DNA collection’s measurable

impact on solving crime. See, e.g., FBI, CODIS—NDIS Statistics, http://www.fbi.gov/about-us/

lab/codis/ndis-statistics (last visited Oct. 5, 2012) (“As of August 2012, [the national DNA

database] has produced over 187,700 hits assisting in more than 180,000 investigations.”);

21

Haskell, 669 F.3d at 1064 (noting that ten months after implementing arrestee DNA profiling,

the “samples had aided California police in 291 database hits”).

Virginia’s experience illustrates the benefits that flow from sampling an arrestee’s DNA.

Anderson, 650 S.E.2d at 706. In Anderson, a woman was raped and robbed while walking to

work. Id. at 703. Forensics took a DNA sample from the woman’s body, but the case went

unresolved for twelve years. Id. at 704. After the state implemented pretrial arrestee DNA

sampling, the offender was arrested on charges unrelated to sexual assault. Id. A DNA sample

was taken and entered into a database, where a routine analysis matched a hit to the DNA taken

from the rape that occurred over a decade earlier. Id.4

Although Zuckerman’s DNA profile has yet to match him with the sexual assault for which

he is a person of interest, the facts in Anderson cannot be ignored when assessing the utility of

analyzing his DNA. Regardless of Zuckerman’s guilt or innocence, upholding the EDCA takes a

step towards ensuring that the victim need not wait a decade or more to secure justice and peace

of mind.

DNA profiling not only solves past crimes, it provides a deterring effect to those who

would otherwise be more likely engage in illicit conduct. Haskell, 669 F.3d at 1064 (“The mere

existence of the DNA database creates a strong deterrent effect.”). DNA, unlike a fingerprint, is

difficult to prevent from leaving at the scene of a crime. Id. at 1060. Burdened with the

knowledge that his DNA is catalogued in the Evans Laboratory, a violent arrestee is less likely to

seek future criminal activity. See, e.g., Jones, 962 F.2d at 311 (holding that state’s interest in

deterring criminal behavior “justifies the involuntary taking of the sample and the creation of the

DNA data bank”).

4 The court in Anderson upheld the extraction of the rapist’s DNA, finding it “analogous to the taking of a suspect’s fingerprints upon arrest.” Id. at 706.

22

Past and potential victims of violent crimes are not the only class of people who benefit

from the EDCA. Like all DNA collecting statutes, the EDCA protects “innocent individuals—

whose DNA does not match the DNA collected at the crime scene—from even becoming

potential suspects.” Amerson, 483 F.3d at 87. Moreover, catalogued DNA identification “will

help exculpate individuals who are serving sentences of imprisonment for crimes they did not

commit.” Sczubelek, 402 F.3d at 185. The EDCA, therefore, provides the public with security

from criminals and from a heightened risk of unwarranted police intrusions. Kincade, 379 F.3d at

839 n.38 (the “use of [DNA databases] promptly clears thousands of potential suspects”—which

prevents unnecessary intrusions into the lives of innocent people while “‘advancing the

overwhelming public interest in prosecuting crimes accurately’”) (citation omitted) (emphasis in

original).

As a person of interest in a sexual assault case, the usefulness of Zuckerman’s DNA profile

cuts both ways. If Zuckerman’s profile does not strike a match with DNA collected from the

scene of the assault, his status as a person of interest will be nullified—thereby excusing him

from further inquisition while allowing the government to more narrowly tailor its investigation.

See Sczubelek, 402 F.3d at 185 (“While the presence of [defendant’s] DNA in [the database] may

inculpate him . . . it may also exonerate him.”). Thus, Zuckerman’s case provides a clear

illustration of how the EDCA advances the interests of the innocent.

The Court should reverse the lower court’s holding because the nominal intrusion provided

by the EDCA on Zuckerman’s diminished expectation of privacy in his identity, coupled with

the legitimate and compelling interest served by the collection of pretrial arrestee DNA, do not

amount to a violation of the Fourth Amendment.

23

II. BECAUSE ZUCKERMAN HAS NO REASONABLE EXPECTATION OF PRIVACY IN HIS

FACEPOKE ACCOUNT, HE MAY NOT AVAIL IT TO THE PROTECTIONS OF THE FOURTH

AMENDMENT.

Because Zuckerman has no reasonable expectation of privacy in his Facepoke account, the

Fourth Amendment does not afford protection to its contents. The Fourth Amendment provides

that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against

unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon

probable cause.” U.S. Const. amend. IV. But not all government actions are invasive enough to

implicate the Fourth Amendment. Its “protections hinge on the occurrence of a ‘search.’”

Widgren v. Maple Grove Township, 429 F.3d 575, 578 (6th Cir. 2005). A “search” occurs when

an expectation of privacy that society is prepared to consider reasonable is infringed. Katz v.

United States, 389 U.S. 347 (1967). This standard breaks down into two inquiries: (1) “has the

individual manifested a subjective expectation of privacy in the object of the challenged search?”

and (2) “is society willing to recognize that expectation as reasonable?” California v. Ciraolo,

476 U.S. 207, 211 (1986).

The government does not contest whether Zuckerman had a subjective expectation of

privacy in his Facepoke page. Zuckerman might well have thought what he displayed for many

to see remained private. Nevertheless, Zuckerman’s expectation of privacy fails the second prong

of the analysis. This Court has long held that one does not have a reasonable expectation of

privacy in information he voluntarily discloses to a another, regardless of whether he did so in

confidence. United States v. Miller, 425 U.S. 435 (1976). As such, the Fourth Amendment does

not protect Zuckerman’s Facepoke message when his “friend”—one of the message’s many

recipients—discloses it to the government. Moreover, it is clear that society has behaved in a

manner inconsistent with an expectation of privacy regarding social media. Therefore, this Court

24

should reverse the lower court’s decision and find that Zuckerman enjoys no privacy interest in

his Facepoke profile that is protected by the Fourth Amendment.

A. Zuckerman Held No Reasonable Expectation of His Facepoke Publications

Because He “Assumed the Risk” That the Recipients Would Disclose the

Messages to the Government.

Once Zuckerman shared his denigrating message online, his legitimate privacy interest in it

was extinguished. This Court has consistently held that a person has no legitimate expectation of

privacy in information he voluntarily turns over to another. See, e.g., Miller, 425 U.S. at 442;

Smith v. Maryland, 442 U.S. 735, 744–45 (1979). It is well understood that the Fourth

Amendment does not protect “a wrongdoer’s misplaced belief that a person to whom he

voluntarily confides his wrongdoing will not reveal it.” Hoffa v. United States, 385 U.S. 293, 302

(1966). Thus, the lower court’s decision should be reversed, and this Court should find that

Zuckerman’s expectation of privacy in his Facepoke page is unreasonable.

Miller serves as the seminal case illustrating the “assumption of the risk” doctrine. 425 U.S.

at 443. In Miller, the defendant was charged with tax fraud. Id. at 436. He sought to exclude

from evidence records the government obtained through the banks in which he held accounts. Id.

Miller argued that the records kept by the banks were personal documents he made available

only for a limited purpose—and therefore reserved his legitimate expectation of privacy in their

contents. Id. at 442.

This Court disagreed. Id. It reasoned that once shared with the bank, the records were no

longer Miller’s private possessions. Id. at 440–41. Consequently, he “t[ook] a risk, in revealing

his affairs to another, that the information will be conveyed by that person to the Government.”

Id. at 443. Rejecting the Miller’s argument, the Court explained that the Fourth Amendment is

25

not implicated “even if the information is revealed on the assumption that it will be used only for

a limited purpose and the confidence placed in the third party will not be betrayed.” Id.

Applying the “assumption of the risk” doctrine in this case leads to a conclusion consistent

with that found in Miller—Zuckerman held no legitimate expectation of privacy in his Facepoke

broadcasts. Just as the defendant in Miller voluntarily gave bank employees financial

information, Zuckerman voluntarily disclosed his pejorative message to his Facepoke “friends.”

Arguing that Zuckerman’s privacy settings trigger Fourth Amendment protection is as tenuous as

Miller’s “limited purpose” theory. In both scenarios, the defendants claim an expectation of

privacy based on restrictions placed on the information shared. Miller assumed his bank records

would only be used for purposes related to his bank account. Zuckerman assumed his Facepoke

postings would only be seen by his Facepoke friends.

But these arguments speak only to the sharing party’s subjective belief. As the Miller Court

made clear, the disclosing parties’ assumptions regarding the use of the information shared is not

dispositive. Likewise, any confidence placed in the bank employees and Facepoke friends of

Miller and Zuckerman respectively are of no consequence. Again, the Fourth Amendment does

not prohibit the government from obtaining information shared to a third-party, regardless of the

subjective intentions or beliefs of the sharing individual. Miller, 425 U.S. at 443.

The Miller Court circumscribed one’s reasonable expectation of privacy to exclude

financial documents handed over to a bank—an institution oft thought of as a fiduciary. It cannot

be said that Zuckerman assumed less risk by sharing his posts in a virtual world with

acquaintances who owe him no duty of confidentiality. In disposing of this case, the Court need

not look further than its longstanding decision in Miller—which succinctly points to the

conclusion that Zuckerman held no reasonable expectation of privacy in his Facepoke page.

26

1. Courts applying the “assumption of the risk” doctrine to other

mediums of communication find that the Fourth Amendment does not

prohibit the government from accessing content from intended

recipients.

The “assumption of the risk doctrine” has been applied with equal force to various modes

of communication. For example, in United States v. King, 55 F.3d 1193, 1195 (6th Cir. 1995),

the defendant moved to suppress from evidence letters he sent to his wife that revealed his

involvement in bank fraud. Id. Rather than destroying the letters, as was instructed, they were

turned over to the authorities. Id. The court held that although letters are afforded protection

under the Fourth Amendment, “if a letter is sent to another, the sender’s expectation of privacy

ordinarily terminates upon delivery . . . even though the sender may have instructed the recipient

to keep the letters private.” Id. at 1196. Therefore, the Fourth Amendment was not violated when

the government obtained the letters from the defendant’s wife. Id.

Similarly, courts hold no expectation of privacy exists in emails once they are sent. See,

e.g., Guest v. Leis, 255 F.3d 325, 333 (6th Cir. 2001). The court in Guest explained:

Users would logically lack a legitimate expectation of privacy in the materials intended for publication or public posting. They would lose a legitimate expectation of privacy in an e-mail that had already reached its recipient; at this moment, the e-mailer would be analogous to a letter-writer, whose expectation of privacy ordinarily terminates upon delivery of the letter.

Id. (citations omitted). Of notable distinction is the opinion in United States v. Warshak, 631

F.3d 266 (6th Cir. 2010). There, the defendant sought to exclude from evidence thousands of

personal emails the government obtained from his email service provider. Id. at 281.

Distinguishing Miller, the court noted that the service provider “was an intermediary, not the

intended recipient of the email. Id. at 287 (emphasis in original). The court held “the mere ability

of a third-party intermediary to access the contents of a communication . . . cannot extinguish a

reasonable expectation of privacy.” Id. (emphasis in the original).

27

The opinions in King and Guest lend guidance here. Just as the King defendant’s

expectation of privacy dissolved upon his wife’s receipt of the damning letter, Zuckerman’s

expectation of privacy ended once he disseminated messages to his “friends” on Facepoke. As

the Guest court explained, a legitimate expectation of privacy in internet communications is lost

once they reach their recipients Indeed, Zuckerman’s “friend,” like the defendant’s wife in King,

was free to use the information however he wanted—including sharing it with the government.

The decision in Warshak is useful when considering its distinguishable facts. Unlike the

service provider in Warshak, Zuckerman’s Facepoke friend—the party from whom the

government obtained the information—was not a mere intermediary. This fact is of critical to the

analysis. As long as the party disclosing information to the government is the intended recipient,

Warshak runs concurrent with Miller. That is, Warshak distinguished Miller’s facts on the basis

that, unlike Miller and the case here, the intended recipients of the defendant’s emails were not

the revealing parties. The implication of the Warshak decision is that Zuckerman had no

reasonable expectation of privacy in his Facepoke messages.

2. The principal rationale for the decision in Miller—that the sharing

party “assumes the risk”—is more cogent in the social media context

than in email or letter writing.

The communicative nature of social networking, email, and letter writing furnishes a

common nexus between their Fourth Amendment analyses. That is, in each instance, the party

sharing the information loses his expectation of privacy because he “assumes the risk” that the

information will be disclosed to the government. See King, 55 F.3d at 1193; Guest, 255 F.3d at

325.

But the qualities exclusive to social media brush a particular gloss on the relationship

between “assumption of the risk” and Facepoke. Unlike a letter, Facepoke allow users to

28

simultaneously send messages to hundreds if not thousands of recipients. The necessary

implication is that Facepoke users assume a significantly greater risk that information will be

shared with strangers or the government. See United States v. Maxwell, 45 M.J. 406, 419

(C.A.A.F. 1996) (recognizing that as transmissions reach more recipients, the “subsequent

expectation of privacy incrementally diminishes”). This goes to the heart of the “assumption of

the risk” doctrine. If one cannot reasonably assume his wife will keep his personal letters secret,5

it is difficult to imagine why he may hold a reasonable belief that hundreds of online

acquaintances would refuse to do the same.

The differences between social media and email, while not as obvious as those between

social media and letter writing, highlight why the assumption of the risk doctrine applies with

greater force to Facepoke users. One court observed that “[a]t best, the defense may argue that

[social media] is more akin to an e-mail that is sent to a party and carbon copied for hundreds of

others.” People v. Harris, 949 N.Y.S.2d 590, 594 (N.Y. Crim. Ct. 2012). But while an email’s

reach can be stretched to permit mass dissemination, unlike social media, its existence does not

depend on it.6 Thus, when Facepoke users such as Zuckerman create their accounts, they consent

to the fact that their personal information will be shared with a wide group of people. See

Romano v. Steelcase, Inc., 907 N.Y.S.2d 650, 657 (2010).

5 See United States v. King, 55 F.3d at 1193.

6 Nathan Petrashek, The Fourth Amendment and the Brave New World of Online Social

Networking, 93 Marq. L. Rev. 1495, 1500 (2010) (noting that self-disclosure is what drives social media).

29

3. Several courts have applied Miller and its progeny in the social media

context—finding that, regardless of privacy measures, social media

users enjoy no legitimate expectation of privacy in information they

intentionally share online.

A number of courts applying the “assumption of the risk” doctrine in the social context find

that restrictive access does nothing to bolster and argument for a reasonable privacy interest.

Romano v. Steelcase exemplifies the relationship between social media and the assumption of the

risk doctrine. 907 N.Y.S.2d at 650. In that case, the defendants in a personal injury suit moved

for an order permitting discovery of the plaintiff’s social media accounts. Id. at 652. The plaintiff

objected, arguing that by restricting access to her Facebook and MySpace pages, she enjoyed a

reasonable expectation of privacy in the information she conveyed through them. Id. at 655.

The court disagreed—reasoning that sharing information “is the very nature and purpose of

these social networking sites else they would cease to exist.” Id. at 657. Noting that sites like

Facepoke allow “millions of users” to share information, the court explained that “‘[i]n this

environment, privacy is no longer grounded in reasonable expectations, but rather in some

theoretical protocol better known as wishful thinking.’” Id. (brackets in original) (citation

omitted). Thus, when “Plaintiff created her Facebook and MySpace accounts, she consented to

the fact that her personal information would be shared with others, notwithstanding her privacy

settings.” Id.

The decision in United States v. Meregildo, No. 11-Cr.-576(WHP), 2012 WL 3264501

(S.D.N.Y. Aug. 10, 2012), is particularly demonstrative. In that case, the government accessed

the defendant’s Facebook profile through a cooperating witness—the defendant’s Facebook

“friend.” Id. at *2. The defendant argued that by limiting access to his friends, he manifested his

intent to keep the postings private. Id. The court held that “[w]hile [the defendant] undoubtedly

believed that his Facebook profile would not be shared with law enforcement, he had no

30

justifiable expectation that his ‘friends’ would keep the profile private.” Id. Indeed, “those

‘friends’ were free to use the information however they wanted—including sharing it with the

Government.” Id. Thus to the extent that “Facebook privacy settings allow viewership of

postings by ‘friends,’ the Government may access them through a cooperating witness who is a

‘friend’ without violating the Fourth Amendment.” Id.

The facts in this case are indistinguishable from Meregildo. Zuckerman, like the defendant

in Meregildo, may not have expected law enforcement to read his posts. Still, nothing suggests

that Zuckerman could reasonably believe that his “friends” would not disclose the messages he

announced. Indeed, like the Facebook friends in Meregildo, Zuckerman’s friends are free to

share the information with whomever they please. Thus, as the court in Romano reasoned, as

long as Facepoke’s privacy settings permit Zuckerman’s friends to view his profile, he cannot

hold a legitimate expectation that said friends will not share the information.

4. It must be observed that what Zuckerman claims is an expectation of

privacy in another’s Facepoke page, an expectation that cannot be

viewed as legitimate.

Zuckerman is effectively arguing that his privacy interest extends to what he made

accessible to another through Facepoke. Specifically, Zuckerman contends that when the agent

read his posting via his the informant’s Facepoke account, the agent conducted a search that

violated the Fourth Amendment. But as a corollary to the assumption of the risk doctrine,

Zuckerman has no expectation of privacy in his Facepoke friend’s profile because he has no

control over it. See United States v. Meriwether, 917 F.2d 955, 959 (6th Cir. 1990) (“[A]ppellant

fails to show that he has sought to preserve a message as private by transmitting it into a paging

receiver over which he has no control.”).

31

State v. Hinton, 280 P.3d 476 (Wash. Ct. App. 2012), illustrates the above principle. In that

case, the Defendant sought to exclude from evidence the text messages he sent to the phone of

his drug dealer—a phone that happened to be in the possession of the police. Id. at 478. The

police proceeded to act under the guise of the drug dealer, which led to a meeting with the

defendant. Id. The defendant was subsequently arrested for possession of cocaine. Id. The court

noted that “Hinton is arguing a privacy interest in another's electronic device, not his own.” Id.

And by sending a text message to another’s phone, the defendant “ran the risk that whomever

possessed the [phone] . . . would receive his messages.” Id. at 482.

Like the defendant in Hinton, Zuckerman does not claim a privacy interest in his Facepoke

page, but rather an interest in his friend’s. The FBI in this case, like the police in Hinton, did not

access Zuckerman’s Facepoke by circumventing Zuckerman’s privacy protections. Rather, it

sought out one of the many individuals with whom Zuckerman intended to share his postings.

Just as the drug dealer was the intended recipient of the text in Hinton, Zuckerman’s Facepoke

friend was one of the intended recipients of Zuckerman’s Facepoke messages. Similar to the

drug dealer’s phone, Zuckerman’s friend’s Facepoke page was an object over which Zuckerman

had no control. That is, he exercised no discretion as to who viewed the information available to

it. Therefore, Zuckerman assumed no less risk than the defendant did in Hinton.

B. Supplying Fourth Amendment Protection to an Individual’s Facepoke Page

Belies the Very Purpose of Social Media—the Sharing of Information—

Which Users Have Demonstrated Is Worth the “Risk.”

To hold that Zuckerman enjoyed a reasonable expectation of privacy in his Facepoke page

is to ignore the essential purpose of social media. Facepoke can be described as “an online

service that encourages self-disclosure by requiring members to populate a profile with personal

information and allows them to create a virtual community by linking their personal profile with

32

those of other members.”7 Thus, “[t]he more information the user shares, the greater her ability

to connect with others.”8 And this benefit does not run unilaterally to the user. A site like

Facepoke’s “business model depends on our shifting notions of privacy, revelation, and sheer

self-display. The more that people are willing to put online, the more money [social networking]

site[s] can make from advertisers.”9 Quite simply, in order for social media to work, “people

have to give up more and more information.”10

But at what cost? Justice Alito recently observed that “[n]ew technology may provide

increased convenience or security at the expense of privacy, and many people may find the

tradeoff worthwhile.” United States v. Jones, 132 S. Ct. 945, 962 (2012) (Alito, J., concurring).

In the context of social media, Justice Alito is correct. According to a recent study, roughly half

the users of sites like Facepoke accept “friend” requests from perfect strangers.11 Further, the

privacy settings that Zuckerman claims afford his online statements the protection of the Fourth

Amendment are ignored by millions of Americans.12 Another recent survey found that 59 percent

of Facepoke-like users “had little to no trust” that their social network provider would keep their

7 Nathan Petrashek, The Fourth Amendment and the Brave New World of Online Social

Networking, 93 Marq. L. Rev. 1495, 1500 (2010).

8 Id.

9 Jose Antonio Vargas, The Face of Facebook, New Yorker (Sept. 20, 2010), available at http://www.newyorker.com/reporting/2010/09/20/100920fa_fact_vargas?currentPage=all.

10 Id.

11Adam Pash, Accepting Friend Requests from People You Don’t Know Is a Recipe for ID Theft, Lifehacker (Dec. 8, 2009, 8:35 AM), http://lifehacker.com/5421597/accepting-friend-requests-from-people-you-dont-know-is-a-recipe-for-id-theft.

12 Facebook & Your Privacy: Who Sees the Data You Share on the Biggest Social Network?, Consumer Rep. Mag. (June 2012), http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm.

33

information private.13 Nevertheless, the “network keeps on growing, and users continue to share

their most personal information.”14

The American Business Law Journal performed an empirical study on employees’ views

on social media as it relates to the workplace.15 The findings provide further evidence in support

of Justice Alito’s theory:

Although many respondents expressed unease at the lack of control they exercise over the information about them available on [social networking sites], it is clear that respondents were not willing to forgo participation in social networks to achieve privacy or separation of work and personal life. They displayed a strong desire to socialize, to interact, and to share truthful information about themselves on social networks. The majority believed participation on social networks is worth the risk.16 Moreover, the privacy policies of Facepoke’s counterparts reinforce what users such as

Zuckerman already know—post at your own risk. For example, a social media outlet that

provides identical services to Facepoke warns: “Always think before you post. Just like anything

else you post on the web or send in an email, information you share on Facebook can be copied

or re-shared by anyone who can see it.”17 Such unambiguous reminders have not been lost on

courts finding one has no reasonable expectation of privacy in his or her social media profile.

See, e.g., Romano, 907 N.Y.S.2d at 656 (“[A]s neither Facebook nor MySpace guarantee

complete privacy, Plaintiff has no legitimate reasonable expectation of privacy.”); Zimmerman v.

13 Ian Paul, Facebook Users Don’t Trust Site on Privacy Issues, PCWorld (May 15, 2012, 9:00 AM), http://www.pcworld.com/article/255615/facebook_users_dont_trust_site_on_privacy_issues.html.

14 Id.

15 Patricia Sanchez et al., Blurred Boundaries: Social Media Privacy and the Twenty-First-

Century Employee, 49 Am. Bus. L.J. 63, 108 (2012).

16 Id.

17 Facebook Data Use Policy, https://www.facebook.com/full_data_use_policy (last visited Oct. 10, 2012).

34

Weis Mkts., Inc., No. CV-09-1535, 2011 WL 2065410, (Pa. Com. Pl. May 19, 2011) (“All the

authorities recognize that . . . Facebook’s privacy policy explains that users post any content on

the site at their own risk and informs users that this information may become publicly

available.”).

The behavioral tendencies of social media users demonstrate a collective understanding

that online socialization is enjoyed in lieu of privacy. Indeed, the observations by academia and

modern jurisprudence show that Zuckerman’s alleged expectation of privacy in his Facepoke

page is not one that society has recognized as reasonable.

C. Zuckerman Had Notice That EST Would Pursue an Investigation into His

Facepoke Page if He Used It in the Manner He Chose. Therefore, He Can

Claim No Reasonable Expectation of Privacy in the Account.

Before posting the message in question here, Zuckerman had sufficient notice that EST

investigates an employee’s Facepoke profile when the employee’s use of it is potentially harmful

to EST. Such notice severely undermines Zuckerman’s purported reasonable expectation of

privacy. Under this Court’s precedent, an “employee’s expectation of privacy must be assessed

in the context of the employment relation.” O’Connor v. Ortega, 480 U.S. 709, 717 (1987). The

salient point here is that Zuckerman published a message to a number of individuals that clearly

ran counter to the interests of EST and its clients. This is the type of scenario EST contemplated

when adopting its Facepoke policy—and why it required Zuckerman to agree to the policy’s

terms as a condition of his employment. Zuckerman was on notice that if he published

defamatory content about EST—the type involved here—it would pursue access to his Facepoke.

Therefore, he could not reasonably expect that no one outside of his Facepoke friends would see

the post.

35

United States v. Simons, 206 F.3d 392 (5th Cir. 2000), demonstrates that employees who

knowingly breach an employer’s internet policy do not enjoy a reasonable expectation of privacy

in the information produced by the violating conduct. In Simons, the defendant worked for the

Federal Bureau of Intelligence. Id. at 395. The employer’s policy expressly prohibited employees

from using the internet while at work for unlawful purposes. Id. at 395–96. The policy provided

that “users shall . . . understand FBIS will periodically audit, inspect, and/or monitor the user’s

Internet access as deemed appropriate.” Id. at 396. After instituting the policy and informing

employees of its terms, the employer searched the network and found child pornography on the

defendant’s hard drive. Id.

The defendant moved to suppress the evidence obtained from his computer arguing the

search violated his Fourth Amendment rights. Id. at 397. The Fifth Circuit held the defendant had

no legitimate expectation of privacy with regard to his internet use in light of the employer’s

written policy. Id. at 398. The court reasoned that “[t]he policy clearly stated that FBIS would

‘audit, inspect, and/or monitor’ employees’ use of the internet . . . as deemed appropriate.” Id. As

such, the “policy placed employees on notice they could not reasonably expect that their Internet

activity would be private.” Id. Therefore, “regardless of whether [the defendant] subjectively

believed that the files he transferred from the Internet were private, such a belief was not

objectively reasonable after FBIS notified him that it would be overseeing his Internet use.” Id.

Because Zuckerman had notice that EST investigates its employees’ illicit Facepoke

messages, he had no reasonable expectation of privacy in the post at issue here. Although EST is

not a government employer, the reasoning in Simons is instructive. Just as the defendant in

Simons was notified of his employer’s internet policy, Zuckerman had notice that EST would

pursue access to his Facepoke under certain circumstances. Zuckerman, like the defendant in

36

Simons, ignored the warning and engaged in conduct he knew was prohibited. Indeed,

Zuckerman’s disparaging remarks were just as proscribed under EST’s policy as downloading

pornography was under FBIS’s. Thus, Zuckerman had no less notice that his Facepoke would be

reviewed than the defendant had in Simons. Therefore, regardless of Zuckerman’s subjective

belief—which he manifested by concealing his password—he has no reasonable expectation of

privacy in the Facepoke page because he used it against the interests of EST.

Zuckerman holds no reasonable expectation of privacy in his Facepoke page. By publishing

his messages to an unspecified number of people, he assumed the risk that each of them would

disclose the information to the government. Moreover, the universally accepted purpose of social

media and its fundamental characteristic of full disclosure are proof positive that Zuckerman

held no expectation of privacy in his derisive posts.

CONCLUSION

For the foregoing reasons, this Court should reverse the Thirteenth Court of Appeals’

judgment and find in favor of the United States Government.

Respectfully submitted, Devin Wagner Erren Chen Jeffrey Westwood ___________________________ COUNSEL FOR PETITIONER

37

CERTIFICATE OF COMPLIANCE

The undersigned counsel certifies that the Petitioner’s Brief complies with the word

limitation specified in Rule C(3)(d) of the ALA Moot Court Competition Rules.

Petitioner’s Brief contains 11,086 words.

Devin Wagner TEAM NO. 1 COUNSEL FOR PETITIONER