State v. McDonnell

Annotate this Case
Justia Opinion Summary

The Supreme Court affirmed the judgment of the appellate court reversing the decision of the circuit circuit court that examination of data contained on Defendant's hard drive was not a search in violation of the Fourth Amendment, holding that the government violated Defendant's Fourth Amendment rights in this case.

Defendant voluntarily consented to government agents seizing his laptop computer, creating a copy of its hard drive, and searching the data on it. After the copy was made but before the government examined the data Defendant withdrew his consent. Defendant moved to suppress the evidence from the forensic examination of the copy of his laptop's hard drive. The circuit court denied the motion. On appeal, Defendant asserted that he had a legitimate expectation of privacy in the mirror-image copy of his laptop hard drive. The appellate court agreed and reversed. The Supreme Court affirmed, holding (1) Defendant had a reasonable expectation of privacy in the data contained on his hard drive; (2) because the government did not examine the data before Defendant withdrew his consent Defendant did not lose his reasonable expectation of privacy in the data; and (3) the government conducted an unreasonable search by examining the data without any authority to do so.

Download PDF
State of Maryland v. Daniel Ashley McDonnell, No. 36, September Term, 2022 CONSTITUTIONAL LAW – FOURTH AMENDMENT – SEARCHES AND SEIZURES – REASONABLE EXPECTATION OF PRIVACY – CONSENT – FORENSIC COPY OF DIGITAL DATA – Supreme Court of Maryland held that defendant had reasonable expectation of privacy in data stored on his laptop’s hard drive, whether data was electronically stored on his hard drive or government’s copy of hard drive made with defendant’s consent. Defendant’s reasonable expectation of privacy was not eliminated by government’s copying of hard drive because no data was exposed prior to his withdrawal of consent. Supreme Court held that, under circumstances of defendant’s consent, reasonable person would not think that government could examine data on copy after withdrawal of consent when no examination occurred prior to withdrawal. Government’s examination of data after defendant withdrew consent was search, which was unreasonable because government lacked any authority to conduct search, by warrant or exception to warrant requirement. Circuit Court for Anne Arundel County Case No. C-02-CR-21-000487 Argued: June 2, 2023 IN THE SUPREME COURT OF MARYLAND* No. 36 September Term, 2022 ______________________________________ STATE OF MARYLAND v. DANIEL ASHLEY MCDONNELL ______________________________________ Fader, C.J. Watts Hotten Booth Biran Gould Eaves, JJ. ______________________________________ Opinion by Watts, J. ______________________________________ Pursuant to the Maryland Uniform Electronic Legal Materials Act (§§ 10-1601 et seq. of the State Government Article) this document is authentic. Filed: July 7, 2023 2023-07-07 13:50-04:00 Gregory Hilton, Clerk *At the November 8, 2022 general election, the voters of Maryland ratified a constitutional amendment changing the name of the Court of Appeals of Maryland to the Supreme Court of Maryland. The name change took effect on December 14, 2022. In this case, we must determine what protection, if any, the Fourth Amendment provides to a person who voluntarily consents to the government seizing his laptop computer, creating an exact copy of its hard drive, and searching the data on it, but who, after the copy is made but before the government has examined the data, withdraws the consent. We must decide whether, for Fourth Amendment purposes, the consensual creation of a copy of the hard drive permanently eliminates the laptop owner’s privacy interest in the data on the hard drive, i.e., what impact the owner’s withdrawal of consent has on the government’s right to examine the data on the copy. In this case, we conclude that Daniel Ashley McDonnell, Respondent, had a reasonable expectation of privacy in the data contained on his hard drive, whether the data was electronically stored on his laptop’s hard drive or the government’s computer via a copy of the hard drive. We hold that, because the government did not examine the data before he withdrew his consent, Mr. McDonnell did not lose his reasonable expectation of privacy in the data, and the examination of the data was a search. As such, we conclude that the government conducted an unreasonable search by examining the data without any authority to do so, by a warrant or an exception to the warrant requirement. We, therefore, affirm the judgment of the Appellate Court of Maryland1 reversing the Circuit Court for Anne Arundel County’s decision that examination of the data was not a search in violation of the Fourth Amendment. 1 At the November 8, 2022 general election, the voters of Maryland ratified a constitutional amendment changing the name of the Court of Special Appeals of Maryland to the Appellate Court of Maryland. The name change took effect on December 14, 2022. BACKGROUND On June 1, 2019, agents of the United States Army Criminal Investigation Command (“USACIDC”)2 visited Mr. McDonnell’s home for a “knock-and-talk” with him. Lacking a warrant, the agents asked for Mr. McDonnell’s consent to search his home, phone, and computers as part of an investigation into his possession and distribution of child pornography. Mr. McDonnell declined. On July 12, 2019, however, Mr. McDonnell met with the agents and signed a written consent form, permitting the agents to search his home and seize electronic devices. With his signature on the consent form and initials next to each paragraph of the document, Mr. McDonnell indicated his understanding of and consent to the search of his home and the seizure and search of his electronic devices and media as follows: I have been informed of my right to refuse to consent to such a search. I hereby authorize the undersigned Special Agent, another Special Agent or other person designated by USACIDC, to conduct at any time a complete search of: . . . all digital media including cell[ ]phones, thum[b ]drive[s], hard disk drives, laptops & any other media relevant to this investigation. *** I understand that any contraband or evidence found on these devices may be used against me in a court of law. I relinquish any constitutional right to privacy in these electronic devices and any information stored on them. I authorize USACIDC to make and keep a copy of any information stored on these devices. I understand that any copy made by USACIDC will become the property of USACIDC and that I will 2 In 2021, USACIDC was renamed the United States Army Criminal Investigation Division, or “CID.” See U.S. Dep’t of the Army Crim. Investigation Div., Our History, https://www.cid.army.mil/The-Agency/Our-Mission/ [https://perma.cc/7TGL-EWX4]. Because the events at issue occurred before the name change, we will refer to the agency as “USACIDC,” as the parties do. -2- have no privacy or possessory interest in the copy. I give this written permission voluntarily. I have not been threatened, placed under duress, or promised anything in exchange for my consent. I have read this form or it has been read to me and I understand it. . . . I understand that I may withdraw my consent at any time. (Some capitalization omitted). After Mr. McDonnell signed the consent form, the agents entered his home and seized a number of electronics, including a Dell laptop computer. Shortly thereafter, at their offices, the agents imaged,3 i.e., copied, the laptop’s hard drives,4 between July 12 and July 16, 2019. On July 19, 2019, counsel for Mr. McDonnell sent an email to USACIDC withdrawing “any purported consent to the seizure of [Mr. McDonnell’s] Imaging a computer’s hard drive is the first of a two-step process in most forensic computer examinations: acquiring the data and analyzing it. See Orin S. Kerr, Searches and Seizures in a Digital World, 119 Harv. L. Rev. 531, 547 (2005). Imaging a hard drive “duplicates every bit and byte on the target drive including all files, the slack space, Master File Table, and metadata in exactly the order they appear on the original.” Id. at 541 (footnote omitted). This creates a replica of the computer’s data at the time of imaging that cannot be edited, but can be searched and analyzed. See id. at 540. The identical nature of this mirror-image (also called a bitstream) copy and the original drive is verified by a mathematical function called hashing. See id. at 541. Imaging is necessary because of the length of time that a forensic analysis requires, and the ease with which data on a computer can be inadvertently changed or lost. See id. at 540-41; Stephen Moccia, Bits, Bytes, and Constitutional Rights: Navigating Digital Data and the Fourth Amendment, 46 Fordham Urb. L.J. 162, 184-85 (2019). 4 According to the Agent’s Investigation Report dated July 16, 2019, two hard drives from the Dell laptop were “imaged.” The agent who authored the report stated for each hard drive that “[t]he image was verified to be an exact, bit-for-bit-copy of the hard drive through a comparison of hash values with no errors.” The image copies of Mr. McDonnell’s hard drives were put onto a new hard drive and the new hard drive containing the copy of Mr. McDonnell’s hard drives was submitted to the agency’s evidence repository. In this opinion, we will refer to the hard drives imaged from Mr. McDonnell’s laptop as the “laptop’s hard drive” and the imaged copies as the “copy of the hard drive” or the “copy.” 3 -3- laptop, or examination of its contents” and requesting the laptop’s return. On September 3, 2019, a Special Agent of the USACIDC’s Digital Forensics and Research Branch authored a report concerning the results of a forensic examination of the data on the copy of Mr. McDonnell’s hard drive, which the agent had conducted between August 5 and 20, 2019. The report noted that the evidence examined was a hard disk drive containing the forensic images of the Dell laptop’s operating system hard disk drive and storage hard disk drive. The report stated that “no evidence of child pornography” was found but explained that “[a]n examination of the media revealed evidence of child pornography search terms in the internet browser history[.]” Proceedings in the Circuit Court On March 26, 2023, Mr. McDonnell was indicted in the circuit court on charges of possessing, promoting, and distributing child pornography. Thereafter, Mr. McDonnell filed an omnibus motion that included a request to suppress illegally seized evidence, and later filed a memorandum in which he asked the circuit court to suppress the evidence from the forensic examination of the copy of his laptop’s hard drive. On August 16, 2021, the circuit court held a hearing on Mr. McDonnell’s motion to suppress. The relevant facts relating to the motion were not disputed. The State argued that “a valid consent to search carries with it the right to examine and photocopy” and that downloading and creating the “mirror image copy” of the hard drive of Mr. McDonnell’s laptop was “essentially photocopying digitally.” Continuing with that analogy, the State asserted that federal case law instructs that, once the originals of documents are returned, the government can lawfully retain photocopies and then examine them. Relying on our -4- holding in Varriale v. State, 444 Md. 400, 119 A.3d 824 (2015), the State argued that, in circumstances involving DNA, blood samples, or firearms, the government can analyze samples even after consent has been withdrawn. The State contended that “once something was outside of the possession of the defendant, [] there was no more reasonable expectation” of privacy in the item. Mr. McDonnell’s counsel asserted that the laptop was akin to the cell phone in Riley v. California, 573 U.S. 373 (2014), and, therefore, the agents needed authority both to seize it and then to examine its contents. Mr. McDonnell’s counsel contended that the language of the consent form purported to waive his Fourth Amendment rights and permit copying of the laptop, but did not permit the examination of the data on the copy. Mr. McDonnell’s counsel argued that applying this Court’s holding in Varriale concerning the ability to test DNA samples in a case that did not involve the withdrawal of consent would be contrary to the holding of the Supreme Court of the United States in Riley. At the conclusion of the hearing, the circuit court indicated that within one week’s time either party could submit research on whether defense counsel is authorized to withdraw consent. On August 30, 2021, the circuit court issued a one-page order denying Mr. McDonnell’s motion to suppress. On September 24, 2021, the circuit court conducted a plea proceeding at which Mr. McDonnell entered a plea of not guilty with an agreed statement of facts, reserving the -5- right to appeal the circuit court’s denial of the motion to suppress.5 The prosecutor advised the circuit court of agreed-upon facts, which we summarize as follows. Special Agents of USACIDC had identified an IP address6 connected to a network that was sharing files depicting child pornography. The agents contacted Comcast to determine the IP address. The result of a subpoena revealed that the IP address that was associated with the uploaded pornography came back as Comcast subscriber Daniel McDonnell at an address in Severn, Maryland. Thereafter, on June 1, 2019, the agents conducted a knock-and-talk with Mr. McDonnell and subsequently on July 12, 2019, Mr. McDonnell met with the agents and signed the written consent form. The laptop computer was copied between July 12 and 16, 2019. On July 19, 2019, Mr. McDonnell’s counsel sent an email withdrawing consent to search the laptop. Between August 5 and 20, 2019, the copy of Mr. McDonnell’s hard drive was forensically analyzed. The forensic examination did not reveal images of child pornography; however, it did reveal that Mr. McDonnell had run “digital forensic deleting software” on June 7, 2019, a few days after the knock-and-talk. The examination also In Maryland, a defendant can plead not guilty, forgo a full trial, and proceed “on an agreed statement of facts or stipulated evidence to preserve appeal on a suppression issue.” Bishop v. State, 417 Md. 1, 16, 7 A.3d 1074, 1083 (2010). “Under an agreed statement of facts[,] both the State and the defense agree as to the ultimate facts” and “the facts are not in dispute[.]” Taylor v. State, 388 Md. 385, 396, 879 A.2d 1074, 1081 (2005) (cleaned up). “The trier of fact is not called upon to determine the facts as the agreement is to the truth of the ultimate facts themselves. . . . To render judgment, the court simply applies the law to the facts agreed upon.” Id. at 396-97, 879 A.2d at 1081 (cleaned up). 6 “The term ‘IP address’ is derived from the phrase ‘Internet protocol[,]’ and means ‘the numeric address of a computer on the Internet[.]’” State v. Sample, 468 Md. 560, 572 n.6, 228 A.3d 171, 179 n.6 (2020) (citing IP Address, Merriam-Webster, https://www. merriam-webster.com/dictionary/IP%20address [https://perma.cc/2C7G-TX4Q]) (alterations in original). 5 -6- revealed that Mr. McDonnell had made recent searches with terms consistent with the search for child pornography. The State introduced into evidence Exhibits 1 through 6, which, among other things, included images that the parties agreed would in fact have constituted child pornography, and were related to Counts I, II, and III of the indictment. The circuit court found Mr. McDonnell guilty of three counts of distribution of child pornography and sentenced him to ten years’ incarceration on each of the three counts, consecutively, for a total of thirty years’ incarceration, all suspended, and five years of supervised probation with the conditions that Mr. McDonnell register as a Tier II sex offender, have no unsupervised contact with minors, and allow authorities to monitor his computer and phone. Mr. McDonnell timely appealed. Opinion of the Appellate Court of Maryland On December 1, 2022, the Appellate Court of Maryland reversed the circuit court’s judgment. See McDonnell v. State, 256 Md. App. 284, 297, 286 A.3d 113, 120 (2022). Relying on Riley, 573 U.S. 373, the Appellate Court concluded that, “because individuals have a legitimate expectation of privacy in the digital data within their computer,” Mr. McDonnell’s “revocation of his consent to examine data from his laptop computer precluded a forensic examination of the mirror-image copy of its hard drive without a warrant.” McDonnell, 256 Md. App. at 296, 286 A.3d at 120. The Appellate Court did not accept the State’s argument that Mr. McDonnell had no privacy interest in the copy of the hard drive. See id. at 295-96, 286 A.3d at 119-20. The Appellate Court distinguished Varriale, 444 Md. 400, 119 A.3d 824, and Wallace v. State, 373 Md. 69, 816 A.2d 883 (2003), because, unlike the defendants in those -7- cases, Mr. McDonnell unequivocally revoked his consent, which “expressly limited or eliminated the examination of the data” and “reclaimed [his] reasonable expectation of privacy in the data.” McDonnell, 256 Md. App. at 296, 286 A.3d at 120. The Appellate Court held that, because Mr. McDonnell revoked his consent before the data on the copy was examined, the government’s examination of the data was precluded without a warrant. See id. at 296, 286 A.3d at 120. The Appellate Court relied on this Court’s discussion in Richardson v. State, 481 Md. 423, 282 A.3d 98 (2022), regarding the “importance and sensitivity of digital information” and the need for courts to be vigilant in enforcing the requirements of the Fourth Amendment in the digital age, as support for its conclusion. McDonnell, 256 Md. App. at 296, 286 A.3d at 120. The Appellate Court emphasized the obligation of courts to not allow “subtler and more far-reaching means of invading privacy [that] have become available to the Government . . . [to] erode Fourth Amendment protections.” McDonnell, 256 Md. App. at 296, 286 A.3d at 120 (quoting Carpenter v. United States, ___ U.S. ___, 138 S. Ct. 2206, 2223 (2018)) (internal quotation marks omitted). Petition for a Writ of Certiorari On January 19, 2023, the State petitioned for a writ of certiorari, raising the following two issues: 1. Did McDonnell lack any legitimate expectation of privacy in a mirror-image copy of his laptop hard drive that the government created with his consent, and as to which he expressly disclaimed any possessory or privacy interest before the copy was created? 2. Did the Appellate Court of Maryland err in holding that McDonnell’s revocation of consent to examine the contents of his laptop -8- barred investigators from examining the mirror-image copy of his hard drive, when the post-withdrawal examination of the copy was not a search? On March 2, 2023, we granted the petition. See State v. McDonnell, 483 Md. 263, 291 A.3d 776 (2023). DISCUSSION7 A. The Parties’ Contentions The State contends that USACIDC’s examination of the copy of the hard drive was not a search because Mr. McDonnell had consented to his laptop’s seizure, search, and copying. According to the State, by consenting to the copying of his laptop’s hard drive, Mr. McDonnell “retain[ed] no reasonable expectation of privacy in any copies the government create[d] within that consent.” The State asserts that the lack of case law addressing “whether a defendant retains any reasonable expectation of privacy in copies of digital data created within the scope of consent” merits reliance on case law regarding photocopies of paper evidence for guidance. (Citation omitted). The State brings to our attention opinions from federal appellate courts, such as United States v. Ponder, 444 F.2d 816, 820 (5th Cir. 1971), and United States v. Ward, 576 F.2d 243, 244-45 (9th Cir. 1978), holding that a defendant’s consent to search also signifies consent to copy and that the government can retain and examine copies of papers made before consent is withdrawn. The State argues that courts in other jurisdictions have applied this approach and determined that a defendant has no reasonable expectation of privacy in a copy of digital 7 We address the two questions raised in the petition for certiorari together because of the interrelation of the issues. -9- data made while consent was in effect. The State cites unreported decisions of federal District Courts that treated imaged copies of hard drives as photocopies of papers and determined that copying prior to revocation of consent allowed the ongoing use of the copies.8 The State argues that, in two cases, United States v. Lutcza, 76 M.J. 698, 703 (A.F. Ct. Crim. App. 2017), and United States v. Campbell, 76 M.J. 644, 658 (A.F. Ct. Crim. App. 2017), the United States Air Force Court of Criminal Appeals has reached the conclusion that a defendant consenting to the initial copying allows examination of the copied hard drive after the defendant withdraws consent. The State also asserts that, in United States v. Thomas, 818 F.3d 1230, 1242 (11th Cir. 2016), the Eleventh Circuit affirmed the validity of consent to the copying of files from the defendant’s computer with the use of a forensic tool and law enforcement’s reliance on the copy where the copy was made before consent was withdrawn but the examination occurred afterward. The State contends that, because a warrantless search under the consent exception is legitimate only within the scope of the consent, we should assess the scope of Mr. McDonnell’s consent based on an objective standard of what a reasonable person would have understood the consent to include. According to the State, “[n]o reasonable person would let the government search their digital information, then expect to retain a privacy 8 The State cites United States v. Megahed, No. 8:07-cr-342-T23-MAP, 2009 WL 722481 (M.D. Fla. Mar. 18, 2009) (unreported order); United States v. Thomas, No. 8:13cr-462-T-33-TBM, 2014 U.S. Dist. LEXIS 33443 (M.D. Fla. Feb. 14, 2014) (unreported report and recommendation); United States v. Sharp, No. 1:14-cr-229-TCB, 2015 WL 4641537 (N.D. Ga. Aug. 4, 2015) (unreported order), contending that, under our precedent, although such citation “‘ordinarily is not appropriate,’” it is permissible in the face of a lack of authority on the issue. (Quoting Clancy v. King, 405 Md. 541, 558 n.17, 954 A.2d 1092, 1102 n.17 (2008)). - 10 - interest in copies that the government made with their consent.” (Emphasis in original). The State contends that, in this case, Mr. McDonnell lost any reasonable expectation of privacy when he signed a form consenting to the seizure, search, and copying of his laptop’s hard drive, and disclaiming his possessory and privacy interests in the copy. The State asserts that this Court’s holding in Varriale, 444 Md. at 418-19, 423-24, 119 A.3d at 835, 838-39, supports its position because, in that case, we held that, by consenting to the use of his DNA in a rape investigation and any future criminal prosecution, without placing any constraints on its use, the defendant waived his expectation of privacy in the DNA sample with regard to the State’s subsequent analysis that linked him to an unrelated crime. For the State, because Mr. McDonnell similarly did not limit his consent when he gave it, he lost any privacy interest he had in the data on his laptop’s hard drive and the copy made while his consent remained in effect. The State contends that the Appellate Court erred by concluding that Mr. McDonnell’s withdrawal of consent after USACIDC copied his laptop’s hard drive precluded subsequent examination of data on the copy. According to the State, Mr. McDonnell’s withdrawal of consent after the copy was made did not change USACIDC’s ability to examine the copy, as the copy was USACIDC’s property. The State asserts that the language on the consent form indicating that Mr. McDonnell could withdraw his consent at any time is not applicable, because, according to the form, once the copy was made, Mr. McDonnell had no privacy interest in the data on the copy. The State contends that the Appellate Court improperly applied the holding of the Supreme Court of the United States in Riley, which the State distinguishes as being focused - 11 - on the privacy interest implicated in a search of a cell phone’s data and not answering the question of whether law enforcement’s examination of a copy of digital data constitutes a search. The State asserts that Riley’s emphasis on a person’s privacy interest in the digital contents of a cell phone does not support the proposition that a person “always retains identical expectations of privacy in all copies of one’s digital data.” The State acknowledges that there is another view, as expressed by law professor Orin Kerr, that “[c]ourts should apply identical rules regardless of whether the data analyzed is the original version or a government-generated copy.” (Quoting Orin S. Kerr, Searches and Seizures in a Digital World, 119 Harv. L. Rev. 531, 563 (2005)). The State acknowledges that the Supreme Court of Illinois determined that this was the appropriate approach in People v. McCavitt, 185 N.E.3d 1192, 1207 (Ill. 2021), where the Court observed that the defendant had an informal privacy interest in his personal data and that this privacy interest extended to an image copy. According to the State, in McCavitt, after a defendant had been acquitted in a criminal case, a law enforcement officer re-examined a copy of the defendant’s computer that had been previously obtained pursuant to a search warrant and new charges were brought against the defendant. The State distinguishes McCavitt from this case, however, on the ground that, here, Mr. McDonnell consented to USACIDC copying the hard drive and, according to the State, treating it as USACIDC’s own property, thereby affirmatively relinquishing his privacy interest in it. In sum, the State asserts that, pursuant to the consent form signed by Mr. McDonnell, the copy of the hard drive was USACIDC’s property and, therefore, Mr. McDonnell had no privacy interest in the data on it at any time. The State argues that the - 12 - forensic analysis of the copy was therefore not a search. The State contends that, under a reasonableness analysis, in signing the consent form, Mr. McDonnell disclaimed any privacy interest in the data on the copy of the hard drive. Mr. McDonnell responds that he “had a reasonable expectation of privacy in his digitally-stored personal information[.]” (Cleaned up). Mr. McDonnell asserts that, under Riley, 573 U.S. at 386, 393-94, a search of such information must be independently justified apart from any legal seizure of the physical apparatus containing the information or data, because searches of a cell phone or computer “bear ‘little resemblance’ to searches of containers like bags, which are ‘limited by physical realities’” or boundaries. Mr. McDonnell contends that the Supreme Court of the United States reinforced the distinction between a privacy interest in digital information and its physical storage apparatus in Carpenter, 138 S. Ct. at 2213, 2219-20, by holding that “an individual maintains a legitimate expectation of privacy in the record of his physical movements as captured through [cell site location information,]” collected and stored by a third party. According to Mr. McDonnell, recognizing this distinction, the Supreme Court therefore concluded that “the Government’s acquisition of the cell[]site records is a search and seizure within the meaning of the Fourth Amendment.” (Cleaned up). Mr. McDonnell contends that, in Richardson, 481 Md. at 472, 282 A.2d at 126, this Court took the same approach by holding that an abandoned backpack could legitimately be searched without a warrant, but a warrant authorizing a search of information on a cell phone found therein did not satisfy the particularity requirement for search warrants. Mr. McDonnell argues that our holding in Richardson “necessarily recognizes an independent - 13 - expectation of privacy in information as distinguished from the digital media on which it is stored[.]” Mr. McDonnell asserts that, because he had a reasonable expectation of privacy in the information on his laptop, and because USACIDC did not examine the information before he withdrew his consent, the examination of the data thereafter was a search for which a warrant was required. Mr. McDonnell argues that the USACIDC agents’ possession of the copy of his hard drive after he withdrew consent left them “in the same position as the officers in Riley and Richardson, who had lawfully seized the cell[ ]phones at issue but did not yet have authorization to search the information stored thereon.” Mr. McDonnell argues that forensic copies enjoy the same Fourth Amendment protections as originals and asserts that Katz v. United States, 389 U.S. 347, 352-53 (1967), and Walter v. United States, 447 U.S. 649, 652-54 (1980) (plurality opinion), stand for the proposition that, to have a reasonable expectation of privacy in a searched item, an individual need not have a possessory or property interest in the item. Mr. McDonnell contends that the Supreme Court applied this concept to the electronic and digital realm in United States v. Karo, 468 U.S. 705, 714-15 (1984), and Carpenter, 138 S. Ct. at 2219-20, by recognizing the defendants’ privacy interests in their data or personal information despite their lack of a “property interest in the devices and media used to collect their personal information[.]” At bottom, Mr. McDonnell asserts, these cases instruct “that if an individual has a reasonable expectation of privacy in his personal information,” the person “retains that expectation regardless of where that information is stored[,]” i.e., the original hard drive or the copy of the hard drive. - 14 - For Mr. McDonnell, the act of copying, without accessing, the hard drive does not remove his privacy interest in the data on the hard drive. Mr. McDonnell contends that, in McCavitt, 185 N.E.3d at 1206, the Supreme Court of Illinois came to the same conclusion where a hard drive was copied pursuant to a search warrant. Mr. McDonnell asserts that this approach is consistent with the principle reflected in a number of cases, including Richardson, that the justification needed for seizing an electronic device is distinct from the justification needed to search its digital contents. Mr. McDonnell contends that the State erroneously relies on opinions treating a copy of a hard drive like a copy of a piece of paper, because “[t]he U.S. Supreme Court has already rejected the false equivalency between physical documents and digital media.” Mr. McDonnell asserts that, in Riley, 573 U.S. at 393, the Supreme Court dispositively ruled out the idea that searches of a cell phone’s digital contents and physical containers are “materially indistinguishable” because the breadth of information contained in a cell phone merits “privacy concerns far beyond those implicated by the search of a cigarette pack, a wallet, or a purse.” Mr. McDonnell points out that the Fourth Amendment’s “touchstone” is reasonableness and argues that it is unreasonable “to categorically equate digital media with paper documents” due to the difference in sophistication between the two, particularly because “a forensic copy of a personal device gives insight into ‘many distinct types of information’ that can ‘reveal much more in combination than any isolated record[,]’ Riley, 573 U.S. at 394[,]” in a way that copies of paper documents do not. Mr. McDonnell argues that, while his signing of the consent form made the seizure of his laptop reasonable under the Fourth Amendment and any search of it reasonable while - 15 - his consent was effective, by withdrawing his consent, he preserved a reasonable expectation of privacy in his unexamined digital data. Mr. McDonnell contends that consent can be withdrawn at any time and “does not extinguish the individual’s reasonable expectation of privacy[.]” Mr. McDonnell argues that his revocation of consent nullified the consent provided to USACIDC, including the disclaimer in the consent form of any “privacy or possessory interest in the copy” of his laptop. Mr. McDonnell maintains that accepting the State’s contention otherwise would allow consent to become permanent when framed as a “disclaimer” and that this would contravene the principle that consent can be withdrawn at any time. Mr. McDonnell points out that the consent form itself in this case instructed that he could withdraw his consent “at any time.” In addition, Mr. McDonnell contends that this Court’s holding in Varriale is not dispositive because it did not involve a withdrawal of consent. B. Standard of Review “The validity of a suppression ruling is a mixed question of law and fact.” Richardson, 481 Md. at 444, 282 A.3d at 110 (citation omitted). We consider only the record from the suppression hearing, which we assess in the light most favorable to the prevailing party, and we accept the trial court’s factual findings absent clear error. See id. at 444-45, 282 A.3d at 110. However, when assessing the constitutionality of a search or seizure, we conduct “an independent constitutional evaluation . . . applying the law to the facts found in each particular case.” Id. at 445, 282 A.3d at 110 (cleaned up). We review de novo any legal conclusions about the constitutionality of a search or seizure. See id. at 445, 282 A.3d at 110. - 16 - C. Fourth Amendment Protections The Fourth Amendment provides: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. U.S. Const. amend. IV. The Fourth Amendment9 does not prohibit all searches and seizures, just unreasonable ones. See United States v. Sharpe, 470 U.S. 675, 682 (1985). “A search compromises the individual interest in privacy; a seizure deprives the individual of dominion over his or her person or property.” Horton v. California, 496 U.S. 128, 133 (1990) (citation omitted). “The touchstone of the Fourth Amendment is reasonableness.” Florida v. Jimeno, 500 U.S. 248, 250 (1991). Two tests can determine whether government action constitutes a search that implicates the Fourth Amendment. The first approach, set forth in Katz, 389 U.S. at 351, focuses on “people, not places[.]” Under this test, “[w]hen an individual seeks to preserve something as private, and his expectation of privacy is one that society is prepared to recognize as reasonable, . . . official intrusion into that private sphere generally qualifies as a search[.]” Carpenter, 138 S. Ct. at 2213 (cleaned up). The burden is on the defendant asserting Fourth Amendment protection to “demonstrate that a government actor infringed 9 The Fourth Amendment is applicable to the States through the Fourteenth Amendment. See Varriale, 444 Md. at 411, 119 A.3d at 831. Additionally, we interpret Article 26 of the Maryland Declaration of Rights in pari materia with the Fourth Amendment, such that it provides the same protections. See King v. State, 434 Md. 472, 482, 76 A.3d 1035, 1041 (2013). - 17 - upon his or her actual, subjective expectation of privacy in an item or place searched and that the expectation of privacy is one that society is prepared to recognize as reasonable.” In re Russell, 464 Md. 390, 406, 211 A.3d 426, 435 (2019) (cleaned up). The second prong of this test requires that the defendant show an objectively reasonable expectation of privacy, “either by reference to concepts of real or personal property law or to understandings that are recognized and permitted by society[.]” Williamson v. State, 413 Md. 521, 535, 993 A.2d 626, 634 (2010) (cleaned up). Next, because the amendment’s text “reflects its close connection to property,” historically, “the Fourth Amendment was understood to embody a particular concern for government trespass upon the areas (‘persons, houses, papers, and effects’) it enumerates.” Jones, 565 U.S. at 405-06 (footnote omitted). This property-focused approach related to “common-law trespass[.]” Carpenter, 138 S. Ct. at 2213 (cleaned up). Under this test, government action that causes “physical intrusion” on “private property” constitutes a search, such as attaching a GPS device to a person’s car. Jones, 565 U.S. at 404-05. Generally, there is no bright-line rule for determining the reasonableness of a search. See Ohio v. Robinette, 519 U.S. 33, 39 (1996). Instead, courts apply a totality of the circumstances analysis, based on the unique facts and circumstances of each case. See Missouri v. McNeely, 569 U.S. 141, 150 (2013). The nature of the intrusion, whether severe or “negligible[,] is of central relevance to determining reasonableness[.]” Maryland v. King, 569 U.S. 435, 446 (2013); see also Riley, 573 U.S. at 396 (quoting Judge Learned Hand’s observation in United States v. Kirschenblatt, 16 F.2d 202, 203 (2d Cir. 1926), “that it is ‘a totally different thing to search a man’s pockets and use against him what they - 18 - contain, from ransacking his house for everything which may incriminate him’”); Richardson, 481 Md. at 453, 282 A.3d at 115 (“Without understating the problem posed by a general warrant to search someone’s home prior to the digital age, a general warrant to search a computer or a smartphone today magnifies that problem exponentially.”). Another consideration is whether any facts reduced or heightened the defendant’s expectation of privacy. See King, 569 U.S. at 462 (discussing a person’s diminished expectation of privacy as a student at school, an employee on the job, or a person in custody of law enforcement). An additional factor is the governmental interest or need that allegedly justifies the intrusion. See McNeely, 569 U.S. at 152 (concluding that a warrantless blood-alcohol test is unreasonable when the facts show that “police officers can reasonably obtain a warrant before a blood sample can be drawn without significantly undermining the efficacy of the search”). The contours of the privacy protected by the Fourth Amendment are “informed by historical understandings” at the time of its adoption regarding what constituted unreasonable searches or seizures. Carpenter, 138 S. Ct. at 2213-14. The “basic guideposts” for such an analysis, as described by the Supreme Court of the United States, include the amendment’s goals of guarding “the privacies of life against arbitrary power” and “plac[ing] obstacles in the way of a too permeating police surveillance.” Id. at 2214 (cleaned up). The Supreme Court has “kept this attention to Founding-era understandings in mind when applying the Fourth Amendment to innovations in surveillance tools.” Id. “As technology has enhanced the Government’s capacity to encroach upon areas normally guarded from inquisitive eyes,” courts should seek to preserve the “degree of privacy - 19 - against government that existed when the Fourth Amendment was adopted.” Id. (quoting Kyllo v. United States, 533 U.S. 27, 34 (2001)) (internal quotation marks omitted). The Supreme Court has been particularly concerned with “th[e] power of technology to shrink the realm of guaranteed privacy.” Kyllo, 533 U.S. at 34. 1. Consent A search conducted without a warrant is presumed to be unreasonable, but a warrantless search can still be reasonable, such as when “conducted pursuant to valid consent[.]” Jones v. State, 407 Md. 33, 51, 962 A.2d 393, 403 (2008) (citations omitted). The consent must be voluntary, see Robinette, 519 U.S. at 40, and the search must remain within the scope of the consent, see Jimeno, 500 U.S. at 252. Courts examine the scope of consent objectively: “what would the typical reasonable person have understood by the exchange between the officer and the suspect?” Id. at 251 (citations omitted). “The scope of a search is generally defined by its expressed object.” Id. (citing United States v. Ross, 456 U.S. 798 (1982)). One who gives consent for the search of a particular area or items may subsequently narrow the scope of the consent given or withdraw consent entirely. See, e.g., State v. Reum, 313 P.3d 1156, 1164 (Wash. 2013) (en banc) (“A person consenting to a search has the right to restrict or revoke that consent at any time.” (Citations omitted)). If consent is withdrawn, thereafter, the government must have other justification to make the search reasonable. See, e.g., United States v. Williams, 898 F.3d 323, 330 (3d Cir. 2018). That is, if the person withdraws consent before “the search is completed, then the police may not thereafter search in reliance upon the earlier consent.” United States v. Lattimore, 87 F.3d 647, 651 (4th Cir. 1996) (en banc) (citations omitted). In the context - 20 - of the taking, testing, and matching of a DNA sample, this Court has held that consent that is neither limited beforehand nor withdrawn permits the government to use the sample consistent with the reasonable understanding of the consent, including in unrelated investigations. See Varriale, 444 Md. at 423-25, 119 A.3d at 838-39. In Varriale, id. at 425, 119 A.3d at 839, this Court held that, under the circumstances of the case, “the Fourth Amendment [did] not preclude the police from retaining and using a suspect’s DNA profile created from a DNA sample lawfully obtained by consent.” Varriale consented to provide samples for DNA testing in relation to an investigation into a rape. See id. at 404-05, 119 A.3d at 827. After the testing ruled Varriale out as a suspect in the rape, the police uploaded his DNA profile to county and State databanks and compared it to “unidentified DNA profiles developed from crime scene evidence” in other unsolved cases, leading to a match to a profile associated with a burglary. Id. at 406, 119 A.3d at 827-28. When Varriale was prosecuted for that crime, he challenged the use of his DNA as an unauthorized search, but it was not suppressed. See id. at 403-04, 119 A.3d at 826. This Court concluded that the database search was not beyond the scope of Varriale’s consent, because there was no express limitation on his consent, and it was objectively reasonable for the police to retain and compare his DNA profile against the cold case evidence. See id. at 418-19, 119 A.3d at 835. We determined “that DNA profiles are like fingerprints, which police routinely catalog and compare in the course of criminal investigations” and, therefore, when police validly have such an identifying profile in their possession, “[n]o further Fourth Amendment authorization is required” to indefinitely store - 21 - and reuse them to “identify criminals.” Id. at 416, 119 A.3d at 833-34 (citations omitted). In other words, this Court held that, once police lawfully obtain a person’s DNA sample during an investigation, the person no longer has any expectation of privacy in that sample. See id. at 423, 119 A.3d at 838. 2. Digital Information The Supreme Court has recognized the important distinctions between digital media and the physical targets of searches, observing that smartphones, for example, have “immense storage capacity” and “collect[] in one place many distinct types of information—an address, a note, a prescription, a bank statement, a video—that reveal much more in combination than any isolated record.” Riley, 573 U.S. at 393-94. Searches of computers, cell phones, and the like can reveal the “sum of an individual’s private life” and bear “little resemblance” to searches of containers like bags, which are “limited by physical realities.” Id. at 386, 393-94. Data stored on electronic devices is both qualitatively and quantitatively different from physical analogues because a search of cell phone or computer data “would typically expose to the government far more than the most exhaustive search of a house[.]” See id. at 396 (emphasis in original). A device’s hard drive “not only contains in digital form many sensitive records previously found in the home; it also contains a broad array of private information never found in a home in any form—unless the [device] is.” See id. at 396-97. The remarkable ability of digital information in the modern age to permit “official intrusion” into an individual’s “private sphere” requires “special solicitude” for this information. Carpenter, 138 S. Ct. at 2213, 2219. The unique nature and scope of digital - 22 - information warrants particular limits on the government’s ability to access it, such as determining that cell site location information requires a warrant or other authorization despite it being collected and held by third parties, whereas in other contexts “the Government is typically free to obtain such information from the recipient without triggering Fourth Amendment protections” because a person usually has no reasonable expectation of privacy in information shared with third parties. Id. at 2216, 2223. Riley, 573 U.S. at 378, required the Supreme Court to resolve “whether the police may, without a warrant, search digital information on a cell phone seized from an individual who has been arrested.” The Supreme Court noted the pervasiveness of cell phones and the “vast quantities of personal information” they contain. Id. at 385-86. The Court concluded that the rationales justifying searches incident to arrest—officer safety and preventing evidence destruction—did not justify a search of digital data on an arrestee’s cell phone. See id. at 386. Citing the quantity and quality of information stored on cell phones, the Court determined that the warrantless examination of the digital contents of a phone implicates greater privacy interests than a search of an arrestee. See id. at 386. Thus, the Court held that “a warrant is generally required” before “a search” of a cell phone’s digital contents, even if the cell phone was lawfully “seized incident to arrest.” Id. at 401. In Richardson, 481 Md. at 434, 282 A.3d at 104, this Court reiterated “[t]he privacy concerns implicated by cell phone storage capacity and the pervasiveness of cell phones in daily life” and pointed out that these concerns “do not fade away when police obtain warrants to search cell phones.” The defendant’s abandonment of his backpack provided - 23 - justification for the warrantless search of it, but this Court explained that the government needed separate justification to search the contents of the cell phone found inside. See id. at 435-36, 282 A.3d at 105. We held that the search warrant at issue failed to comply with the particularity requirement of the Fourth Amendment because it lacked any limitations on the authority to search the contents of the phone. See id. at 472, 282 A.3d at 126. Because “[t]he particularity requirement is arguably of even greater importance in the context of computers and smartphones than it is in the physical world,” we concluded that it must be enforced to realize the “meaningful constraints” on government power required under Riley. Richardson, 481 Md. at 452, 282 A.3d at 114-15 (cleaned up). To date, relatively few courts have grappled with the effect of governmental copying of a hard drive from a computer or cell phone on a person’s privacy interest in the information stored therein. Some State high courts have rejected the argument that a defendant does “not have a legitimate expectation of privacy in” a copy of a hard drive from the defendant’s computer because the defendant “did not create, own, or have lawful access to it.” McCavitt, 185 N.E.3d at 1206 (citation omitted); see also People v. Hughes, 958 N.W.2d 98, 115 (Mich. 2020) (holding that search and extraction of data from a cell phone pursuant to a search warrant in a drug trafficking investigation did not permit law enforcement officers to later search the data for evidence of unrelated crimes without a warrant). In contrast, some trial and intermediate appellate courts in other jurisdictions have concluded that a copy of a computer hard drive is analogous to a photocopy of a paper document, which the government may freely examine so long as the copy was lawfully obtained. See, e.g., United States v. Megahed, No. 8:07-cr-342-T23-MAP, 2009 WL - 24 - 722481, *3 (M.D. Fla. Mar. 18, 2009) (unreported order). These courts have relied on opinions like Ponder, 444 F.2d at 818-19, for the proposition that “a valid consent to search . . . carries with it the right to examine and photocopy” and that withdrawal of consent does not limit the government’s ability to examine copies made prior to that withdrawal. See Megahed, 2009 WL 722481, at *3. In McCavitt, 185 N.E.3d at 1198-99, the Illinois State Police seized the defendant’s computer and created a copy of the hard drive under a warrant that the defendant did not challenge. The warrant permitted law enforcement to search for digital evidence of two unrelated crimes. See id. at 1196. The defendant was acquitted of one offense before the second offense was investigated. See id. After the defendant’s acquittal, without seeking a new warrant, a different police department, the Peoria Police Department, acquired a copy of the hard drive, searched it, and uncovered evidence of child pornography, which was not a crime mentioned in the warrant. See id. The defendant was charged and convicted of possession of child pornography. See id. The Supreme Court of Illinois concluded that the defendant’s privacy interest in his computer’s contents extended to the copy of the hard drive made by law enforcement after seizing the computer pursuant to the search warrant. See id. at 1206. The Court was unconvinced by the government’s emphasis on the “defendant’s lack of a formal property interest in the [copy] itself” because the government’s theory disregarded the “defendant’s informal privacy interest in his personal data.” Id. The Court was persuaded by the defendant’s argument that police examination of the copy was the same as an examination of the original, because its “evidentiary value . . . resides in the data itself, not in the - 25 - medium on which it is stored.” Id. According to the Court, the idea that the “defendant lacked an expectation of privacy in the contents of his personal computer because those contents were copied to another medium contravene[d] the requirement of reasonableness[.]” Id. (citation omitted). In concluding that “[t]reating a digital copy as the original recognizes that the key to fourth-amendment reasonableness is the access to data, regardless of whether the data is copied, transferred, or otherwise manipulated[,]” the Supreme Court of Illinois found insight in the opinion of a key legal scholar on the topic. Id. (citing Kerr, Searches and Seizures, supra, 119 Harv. L. Rev. at 564). The Court ultimately held, however, that the defendant’s appeal turned on his privacy interest in light of the warrant and the reasonableness of the examination of the copy after his acquittal and concluded that the examination was reasonable under the circumstances of the case. See id. at 1214. In his law review article, Professor Kerr wrote that “important differences exist between the mechanisms of physical and digital evidence collection[,]” which create a “thorny issue” with respect to the Fourth Amendment’s application to searches of computers and other electronic devices. Kerr, Searches and Seizures, supra, 119 Harv. L. Rev. at 532-33. Professor Kerr proposed that, for Fourth Amendment purposes, “a search of data stored on a hard drive occurs when that data, or information about that data, is exposed to human observation.” Id. at 548. Under this approach, every “observable retrieval of information stored on a computer hard drive, no matter how minor, should be considered a distinct Fourth Amendment search[,]” which requires authorization from a warrant or an exception to the warrant requirement. Id. This emphasis on data, rather than - 26 - the hard drive as physical property, led Professor Kerr to the conclusion that “the same Fourth Amendment rules that apply to searching a suspect’s computer should also apply to searching the government’s [] copy.” Id. According to Professor Kerr, treating the digital original and the copy as the same is consistent with the circumstance that generating a copy is normally a requisite step before searching the data stored in a hard drive, that “[a]ll computer data is a copy[,]” and that “the key is access to the data.” Id. at 564. On the other side of the ledger, in Megahed, 2009 WL 722481, *1, the United States District Court for the Middle District of Florida declined to suppress the internet history uncovered on a copy that the government had made of the hard drive of a computer seized from the Megahed family residence. The defendant’s father had consented to the seizure and search of the computer, but later the defendant and his parents withdrew the consent. See id. at *1, *3. Although the Court held the suppression motion was untimely and moot, it also addressed the merits and reasoned that the defendant had no “reasonable expectation of privacy in the mirror image copy that the FBI had obtained already with [the defendant’s father’s] consent and had begun already to search.” Id. In reaching this conclusion, the Court relied on Ponder, 444 F.2d at 818, and Mason v. Pulliam, 557 F.2d 426, 429 (5th Cir. 1977), cases in which the Fifth Circuit concluded that, when the government has obtained consent to seize and search paper documents, it may photocopy them, and if the defendant withdraws consent, the government may retain and continue to examine any - 27 - copies made while the consent was operative. See Megahed, 2009 WL 722481, at *3.10 In United States v. Thomas, No. 8:13-cr-462-T-33-TBM, 2014 U.S. Dist. LEXIS 33443, at *1-2, *17 (M.D. Fla. Feb. 14, 2014) (unreported report and recommendation), a case cited by the State, the defendant sought to suppress evidence gathered by law enforcement from a computer that he shared with his wife, which officers accessed for a brief period with his wife’s consent. Initially, the defendant also consented, but then withdrew his consent. See id. at *17. During approximately 50 minutes of access, police viewed (and photographed) websites that the defendant had allegedly visited on the computer, which included images of “child erotica” and links that officers considered “indicative of child pornography.” Id. at *3-4, *18 (footnote omitted). Law enforcement also scanned the computer with a “forensic preview tool for searching live active files [that] allows the user to scan the computer’s registry including internet history, and to scan for images of child pornography or child erotica.” Id. at *10. Once the defendant withdrew his consent, the police stopped the scan and later secured a warrant to further search the computer based on examination of the results of the initial scan. See id. at *12-14. The additional search pursuant to the warrant revealed images of child pornography, which the defendant sought to suppress. See id. at *14-15. The United States District Court for the Middle District of Florida did not suppress the evidence, reasoning that “revocation of consent does not require the suppression of 10 Decisions of the Fifth Circuit prior to the creation of the Eleventh Circuit are binding precedent for the Eleventh Circuit’s courts. See Bonner v. City of Prichard, Ala., 661 F.2d 1206, 1209 (11th Cir. 1981) (en banc). - 28 - evidence already lawfully obtained.” Id. at *18 (citing Megahed, 2009 WL 722481, at *3). The Court agreed with the government’s position that “a valid consent to search carries with it the right to examine and photocopy.” Id. at *20 (citing Ponder, 444 F.2d at 818). Because “the initial search . . . was supported by valid consent,” the Court concluded that the police were “free to copy the data obtained by use of the” forensic tool “for further review without the necessity of obtaining a warrant to authorize such.” Id. at *19-20. On appeal, the defendant contended that his wife “did not have the authority to consent to a forensic search of the [] computer,” and that the lack of consent made the search unlawful, as well as everything that flowed from it, including the warrant. See Thomas, 818 F.3d at 1239 (emphasis in original). The Eleventh Circuit disagreed, holding that the wife had the authority to consent and that, in getting the warrant, the police “relied on information obtained before Thomas even objected and attempted to revoke” that consent. Id. at 1241 (emphasis in original) (citation omitted). The Eleventh Circuit did not address the District Court’s treatment of the forensic scan results as akin to a photocopy, but concluded that the warrant was valid because “the only information” utilized “in obtaining the search warrant was data collected prior to Thomas’s objection.” Id. at 1242. D. Application of Above Principles to This Case After careful examination of relevant authority, we hold that Mr. McDonnell had a reasonable expectation of privacy in the digital data stored on his laptop, and, as such, in the data stored on USACIDC’s copy of his laptop’s hard drive. Mr. McDonnell’s reasonable expectation of privacy was not eliminated by the making of a copy of his hard - 29 - drive because the data was not searched or exposed prior to his revocation of consent.11 Central to this holding is our conclusion that Mr. McDonnell’s privacy interest is in the data on his hard drive, not just the particular computer or apparatus on which the data is stored (his original or USACIDC’s copy). To accept the State’s stance—i.e., that Mr. McDonnell irrevocably lost all privacy interest in the data on his hard drive when he allowed USACIDC to copy it—would be to permit a limitless search through vast quantities and a varied array of personal data that the Supreme Court of the United States has characterized as consisting of more information than would be found in an exhaustive search of a person’s home. See Riley, 573 U.S. at 396. Absent a warrant supported by probable cause or an exception to the warrant requirement, the Fourth Amendment does not permit such an unfettered governmental intrusion of a person’s “private sphere[.]” Carpenter, 138 S. Ct. at 2213, 2221 (citation omitted). Like the Supreme Court of Illinois, we focus on the data as the significant factor here, not the fact that USACIDC lawfully made a replica of Mr. McDonnell’s hard drive. See McCavitt, 185 N.E.3d at 1206. We agree that Mr. McDonnell has a privacy interest in the data itself. “The evidentiary value of data resides in the data itself, not in the medium on which it is stored.” Id. This conclusion flows logically from our explanation in Richardson that the defendant’s abandonment of his cell phone made its seizure lawful, but did not permit the government, without a particularized warrant, to search the data stored on it. See Richardson, 481 Md. at 435-36, 282 A.3d at 105. So, too, here: Mr. McDonnell’s Neither the voluntariness of Mr. McDonnell’s consent nor the validity of his withdrawal of it is disputed. 11 - 30 - consent made the creation and retention of the copy of his hard drive lawful, but after withdrawal of his consent, USACIDC needed additional authority to search the data on the copy. For the duration of Mr. McDonnell’s consent, USACIDC had the authority to examine the data; once the consent was withdrawn, the authority to examine went with it. Likewise, Riley, 573 U.S. at 386, dictates that law enforcement’s justification for a search of the data stored on an electronic device must be assessed independently from the justification for seizure of the device. Therefore, copying the same data to a different device that law enforcement officers have legal authority to possess makes no difference in the Fourth Amendment analysis.12 Because making a copy of a hard drive is usually the first step in performing a forensic analysis, if making a copy itself divested a person of a reasonable expectation of privacy in the data, people would lose all expectation of privacy in the entirety of the data on any device the moment the government made a copy of the device’s hard drive. That would permit precisely the kind of unlimited rummaging through a person’s private domain that the Fourth Amendment was designed to prohibit. See Riley, 573 U.S. at 386. The legitimate subjective and objective reasonable expectation of privacy that people have in their electronically stored data should not be so easily defeated. Focusing on the data in 12 The logistics of digital storage also support this conclusion because data saved on a computer is automatically copied multiple times in the course of using a computer. See Kerr, Searches and Seizures, supra, 119 Harv. L. Rev. at 562. In addition, digital information is often deliberately or automatically copied to remote servers to be stored “in the cloud.” Riley, 573 U.S. at 397 (“Cell phone users often may not know whether particular information is stored on the device or in the cloud, and it generally makes little difference.” (Citation omitted)). Yet, the owners of such data, regardless of where it is copied and stored, have a reasonable expectation of privacy in the information. - 31 - question rather than on the possession of an apparatus containing a copy of the data “recognizes that the key to fourth-amendment reasonableness is the access to data, regardless of whether the data is copied, transferred, or otherwise manipulated.” McCavitt, 185 N.E.3d at 1206 (citing Kerr, Searches and Seizures, supra, 119 Harv. L. Rev. at 564). Obviously, in this case, if any data had been revealed prior to the revocation of Mr. McDonnell’s consent, that data would have lost any reasonable expectation of privacy that was previously attached to it. That is because, as to that data, Mr. McDonnell’s privacy interest would have been eliminated. And lawfully so, because USACIDC had the authority, while Mr. McDonnell’s consent was in effect, to search and examine his data. In such a scenario, the cat could not be put back into the bag. As to data that was not exposed before the withdrawal of consent, however, Mr. McDonnell retained an expectation of privacy. By way of analogy, if Mr. McDonnell had stood on a street corner and offered passersby the opportunity to read his diary, but no one took him up on it, his reasonable expectation of privacy would not be lost. The threat of an invasion of privacy is not an invasion at all. See Karo, 468 U.S. at 712. In this way, the creation of the copy was akin to the placement of the tracking device in Karo, id.,13 because with the making of the copy, USACIDC created only the “potential for an invasion 13 In Karo, 468 U.S. at 712, the Supreme Court held: The mere transfer to Karo of a can containing an unmonitored beeper infringed no privacy interest. It conveyed no information that Karo wished to keep private, for it conveyed no information at all. To be sure, it created a potential for an invasion of privacy, but we have never held that potential, as opposed to actual, invasions of privacy constitute searches for purposes of the Fourth Amendment. - 32 - of privacy” rather than an actual invasion of the subjective and objective expectation of privacy in Mr. McDonnell’s data. It would be objectively reasonable to believe that data could be exposed to law enforcement through an owner’s consent to copy a laptop’s hard drive and could lose its private nature if examined—but, absent an enforceable waiver to the contrary, if law enforcement had not already become privy to the data, upon withdrawal of consent to access the data, the data remains private, i.e., the owner retains a reasonable expectation of privacy in the data by withdrawal of consent. 1. The Consent Form The quintessential test or criterion for determining the applicability of the Fourth Amendment’s protection is one of “reasonableness.” Riley, 573 U.S. at 381 (cleaned up). In the absence of a warrant, a search is reasonable only where it falls within an exception to the warrant requirement. See id. at 382. It is well settled that “[a]n individual may waive [] Fourth Amendment rights by giving voluntary and intelligent consent to a warrantless search of his person, property, or premises.” United States v. Cormier, 220 F.3d 1103, 1112 (9th Cir. 2000) (cleaned up). In this case, we must assess the reasonableness of the search of data on the copy of the hard drive in light of the content of the consent form. The terms of the consent form guide our assessment of the reasonableness of the search. Per the terms of the consent form, Mr. McDonnell authorized a Special Agent or other person designated by USACIDC to conduct a complete search of all “digital media including cell[ ]phones, thum[b ]drive[s], hard disk drives, laptops & any other media relevant to this investigation.” (Capitalization omitted). According to the language of the form, among other things, Mr. McDonnell relinquished his constitutional right to privacy - 33 - in his electronic devices and all of the information stored on them, and “authorize[d] USACIDC to make and keep a copy of any information stored on [his] devices.” The form stated that Mr. McDonnell understood that any copy made by USACIDC would be the property of USACIDC and that he would have no privacy or possessory interest in the copy. Critically, a sentence at the bottom of the form stated without qualification: “I understand that I may withdraw my consent at any time.” Using the reasonableness approach discussed by the Supreme Court of the United States in Riley and Carpenter, and used by this Court in Varriale for that matter, we conclude that it was not reasonable for USACIDC to examine the data on the copy of Mr. McDonnell’s hard drive after he withdrew his consent and that the examination was a search. It would have been objectively reasonable for Mr. McDonnell, or anyone else, to believe that the final sentence of the form advising of the ability to withdraw consent at any time applied to all of the language in the form, i.e., that the withdrawal of consent applied to all of the matters agreed or consented to earlier in the form. See Riley, 573 U.S. at 386 (determining that it would be unreasonable to apply the search incident to arrest exception to permit a warrantless search of a cell phone because the rationale for the exception’s application to physical objects did not extend to the digital contents of a cell phone); Carpenter, 138 S. Ct. at 2217-20 (determining that it would be unreasonable to apply the third-party doctrine to permit a warrantless search of 127 days’ worth of cell site location records because society does not expect law enforcement to secretly track an individual’s every movement without a warrant); Varriale, 444 Md. at 418-19, 119 A.3d at 835 (determining that it was reasonable for the State to retain and compare a defendant’s - 34 - DNA sample to samples from cold cases under the totality of the circumstances of the consent to the taking of the sample). In this case, it would not be reasonable, under the totality of the circumstances, to interpret the consent form to mean that the withdrawal of consent applied only to certain language on the form and not to the entire document. The State focuses on language on the form stating “I understand that any copy made by USACIDC will become the property of USACIDC and that I will have no privacy or possessory interest in the copy.” The State refers to this language as a disclaimer and argues that the language could not be rendered ineffective by Mr. McDonnell’s withdrawal of consent. We disagree. No language in the form states or even suggests that the acknowledgement of having no privacy or possessory interest in any copy made by USACIDC is irrevocable and not subject to withdrawal of consent at any time as provided by the language at the bottom of the consent form. The language setting forth the alleged disclaimer is contained in the fifth paragraph of the seven-paragraph form and is in no way distinguished from the other language of the form. It is included in the same paragraph in which Mr. McDonnell relinquished his right to privacy in his laptop itself, and, as the State agrees, the withdrawal of consent precluded further examination of the laptop. The paragraph is stylistically identical to every other paragraph in the document. In no way does the purported disclaimer stand out. Neither its express terms nor its appearance would suggest to a reasonable person that the last sentence of the fifth paragraph of a sevenparagraph document should be treated differently than the other language of the form with respect to the withdrawal of consent, as the State contends. - 35 - The language in the consent form did not convey that Mr. McDonnell relinquished for all time a privacy and possessory interest in the data on his laptop. Instead, the language sought to establish that Mr. McDonnell had no privacy or possessory interest in the copy of his data made by USACIDC based on the copy being property of USACIDC. But that cannot be. The copying of the data, without the data being examined, did not vitiate Mr. McDonnell’s privacy interest in the data itself. As explained, a person has an independent privacy interest in the data on a laptop or hard drive, no matter where the data may be stored. See McCavitt, 185 N.E.3d at 1206. Due to the personal content and farreaching consequences of allowing access to such data, the data on a laptop, like the digital information on a cell phone, warrants its own discrete privacy interest. See Riley, 573 U.S. at 386; Richardson, 481 Md. at 434, 452, 282 A.3d at 104, 115. Under the terms of the consent form, Mr. McDonnell never agreed to permanently relinquish a privacy interest in his data, and, as discussed above, the consent form, on its face, provided an unqualified right to withdraw consent at any time. This necessarily included the right to withdraw consent to a search of the data.14 14 On brief and at oral argument, counsel for Mr. McDonnell asserted that even if the disclaimer had been written to accomplish what the State claimed it did, Mr. McDonnell retained a constitutional right to withdraw consent. This contention has significant rational force, as a person has a constitutional right to not consent in the first instance, and, as Mr. McDonnell points out, at least one court in another jurisdiction has so held. See United States v. McWeeney, 454 F.3d 1030, 1035 (9th Cir. 2006) (concluding defendants “had a constitutional right to modify or withdraw their general consent at any[ ]time”). Nothing in this opinion should be construed to mean that clauses in consent forms purporting to irrevocably waive the right to consent are enforceable. However, because the language in the consent form did not purport to irrevocably waive Mr. McDonnell’s privacy or possessory interest in his data, we need not address the issue to resolve this case. See - 36 - The State argues that Mr. “McDonnell’s reading would treat the disclaimer as meaningless[,]” but the State’s treatment of the consent form’s language regarding the copy would render a different portion of the document meaningless: Mr. McDonnell’s right to withdraw consent “at any time.” Mr. McDonnell’s agreement that USACIDC could search his hard drive at any time was limited by his right to withdraw consent at any time. Based on the language of the consent form, it would not be reasonable to believe that, by consenting to the government’s searching the laptop and making of a copy of its hard drive, a person could not withdraw consent before the search occurred and prevent the government from examining anything that had not yet been searched.15 When Mr. McDonnell revoked his consent to the search of the laptop, he retained a reasonable expectation of privacy in any data that had not been exposed. Because Robinson v. State, 404 Md. 208, 217, 946 A.2d 456, 461 (2008) (“[I]t is this Court’s established policy to decide a constitutional issue only when necessary.” (Citations omitted)). 15 As an alternate basis for affirming the Appellate Court’s decision, Mr. McDonnell argues that he “enjoys a protectable property interest in his digitally-stored personal information, which was not extinguished by his transient consent or the agents’ making of a forensic copy.” (Emphasis omitted). Mr. McDonnell contends that the reasonable expectation of privacy analysis from Katz did not displace “property-based conceptions of Fourth Amendment rights.” (Citations omitted). Due to our decision under the Katz reasonable expectation of privacy analysis, however, we need not reach the issue. In addition, in a reply brief, the State contends that Mr. McDonnell’s “propertybased rationale” for the alleged Fourth Amendment violation is not properly before this Court because he did not raise the argument before the circuit court. We agree with the State that Mr. McDonnell raised only the reasonable expectation of privacy analysis before the circuit court. The record reflects that Mr. McDonnell did not raise the property-based theory of unlawful search before the circuit court, nor did that court address such an approach in denying the motion to suppress. Likewise, Mr. McDonnell failed to present the argument to the Appellate Court of Maryland, and that Court relied solely on the reasonable expectation of privacy analysis in its decision. See McDonnell, 256 Md. App. at 296, 286 A.3d at 120. - 37 - USACIDC did not search or examine any of his data prior to the withdrawal of consent, Mr. McDonnell continued to retain a privacy interest in the entirety of his data on his laptop’s hard drive and the copy thereof. Lacking Mr. McDonnell’s consent, USACIDC needed another justification for the examination of the data on the copy of the hard drive, such as a warrant. But because USACIDC did not obtain a warrant or have any other justification for the search, the search of the data on the copy of the hard drive was unlawful and the evidence obtained as a result of the search should have been suppressed. Government action in consent searches is restrained in two ways: by limits placed on the scope of consent, see Varriale, 444 Md. at 412, 119 A.3d at 831, and withdrawal of the consent, see Williams, 898 F.3d at 330. Here, Mr. McDonnell provided his consent for USACIDC to seize, search, and copy his hard drive, limited by the scope of the investigation. Anything uncovered in the course of that consent would have been lawfully in USACIDC’s possession. But once he withdrew his consent, a right he always had and which the consent form that he signed confirmed, USACIDC’s authority to search ended. USACIDC could keep the copy, as Mr. McDonnell had consented to its creation; he could not un-ring that bell. However, because USACIDC had not examined the data on the copy of the hard drive in any way while Mr. McDonnell’s consent was in effect, it could not claim the right to search his data under the authority of his consent after his consent was withdrawn. This case involves the undifferentiated copying of the entirety of a hard drive before the examination of any data on it, which distinguishes it from those in which recipients consensually share with government actors emails or text messages, or law enforcement - 38 - gains access through other means to items with readily visible content. See United States v. Barber, 184 F. Supp. 3d 1013, 1016 (D. Kan. 2016); State v. Carle, 337 P.3d 904, 910 (Or. Ct. App. 2014).16 In this case, the copying process exposed none of the data on the laptop’s hard drive and the process did not differentiate between data that might have implicated child pornography and data that did not. Prior to his withdrawal of consent, USACIDC had not yet intruded upon Mr. McDonnell’s privacy interest in the data on the copy of the hard drive; that bell was never rung, and upon the withdrawal of his consent, Mr. McDonnell retained a reasonable expectation of privacy in the data. 2. Consent and Digital or Electronic Data As with a warrant for a search of electronic data, respect for the limits of consent “is arguably of even greater importance in the context of computers and smartphones than it is in the physical world, given the[ir] ability . . . to store ‘millions of pages of text, thousands of pictures, or hundreds of videos[.]’” Richardson, 481 Md. at 452, 282 A.3d at 115 (quoting Riley, 573 U.S. at 394).17 The difference between a photocopy of a paper For similar reasons, the State’s argument that different iterations of data can have different reasonable expectations of privacy does not hold up when no data was examined or revealed before or during the copying of the laptop’s hard drive, unlike the viewing of a physical copy of a digital photo. Because different facts could support the loss of a reasonable expectation of privacy in data on a hard drive, there may, of course, be other circumstances under which a forensic copy of a hard drive may not maintain the same Fourth Amendment protections as an original. 17 As noted by amici, the American Civil Liberties Union and the ACLU of Maryland, electronic storage capacities have grown dramatically since Riley, as forecast by the Supreme Court. See Riley, 573 U.S. at 394. The maximum storage capacity of a cell phone todays is more than 15 times what it was when Riley was decided. Compare id. (describing the “top-selling smart[]phone” as having a storage capacity of “up to 64 gigabytes”); with Apple Inc., iPhone 14 Pro, https://www.apple.com/iphone-14-pro/specs 16 - 39 - document and a copy of a hard drive is obvious in this context, and therefore we do not find that analogy persuasive, despite the decisions of courts in other jurisdictions cited by the State. With paper documents, law enforcement officers may first search the documents, i.e., review the data contained in them, and then seize only the relevant ones (and likely copy them). However, the differences between papers and digital data, including the need to maintain the integrity of the digital evidence, the vast quantity of digital data or information involved, and the time necessary to conduct the search, require a different approach for hard drives. First, the laptop or computer is seized and the hard drive copied, and then, the search is conducted. So, whereas paper copies may have already been examined “to determine whether they are, in fact, among those papers authorized to be seized[,]” Andresen v. Maryland, 427 U.S. 463, 482 n.11 (1976), copying a hard drive does not expose any information about its contents to the government. To the extent that there are cases such as Ponder from other jurisdictions that permit law enforcement officers after consent has been withdrawn to examine copies where papers have been bulk copied or copied without having been reviewed, this Court has not addressed the issue and adopted that approach. It may well be that if, or when, the issue is before us, this Court will conclude that, as with digital data, where law enforcement officers [https://perma.cc/KUW9-6AKG] (listing smartphones with available capacity of one terabyte). A terabyte is equivalent to 1,000 gigabytes, which can store more than 83.3 million pages of text. See Univ. of Alaska Anchorage, How many files can I store? (July 13, 2022), https://service.alaska.edu/TDClient/36/Portal/KB/ArticleDet?ID=95 [https:// perma.cc/4KE7-PVYA]. Contemporary laptops have even greater storage space. See, e.g., Apple Inc., Which Mac is right for you?, https://www.apple.com/mac [https://perma.cc/ B9BA-HE4J] (listing laptops with available capacity of 8 terabytes). - 40 - have not reviewed or examined paper copies before a withdrawal of consent, the examination of the copies would be precluded if consent is withdrawn. But, even if, for argument’s sake, we were to apply the reasoning of cases like Ponder and its progeny, and the information in a thousand-page paper document was not entirely examined by the government prior to or in the course of photocopying the pages, such a copy would not begin to approximate a copy of a hard drive, which allows “[t]he sum of an individual’s private life [to] be reconstructed[.]” Riley, 573 U.S. at 394. A copy of a paper document does not give access to the “many distinct types of information” found in a copy of a hard drive, which can reveal much more than any isolated record. Id.18 A copy of a hard drive, the search of which “would typically expose to the government far more than the most exhaustive search of a house[,]” has as much in common with a 18 For comparison, in the cases cited by the State for the proposition that consent includes the right to copy and thereafter examine the copies, the paper documents that were copied while consent was operative were far less voluminous than the amount of digital data that may be contained on a copy of a hard drive. In Ponder, 444 F.2d at 818 n.3, documents that the government copied consisted of a ‘Receipts Book’ which was photocopied, admitted in evidence, and its contents used against Ponder; and numerous deposit records shown on check stubs giving names of those who paid him and amounts of settlements on claims of clients, not introduced in evidence, but which were used as sources for leads. Approximately “600 pieces of documentary evidence” were in evidence per the Fifth Circuit, which did not distinguish between those that were contested copies and those that were not. See id. at 818. In Ward, 576 F.2d at 244, the defendant consensually gave an agent of the Internal Revenue Service four boxes of records, which were not copied in their entirety until after he withdrew consent five days later. Despite the obvious privacy interest of the defendant in such financial documents, it cannot be said that accessing data on a hard drive would be an equivalent and, therefore, permissible level of intrusion into a person’s personal or private affairs. - 41 - photocopy of paper documents as “a flight to the moon” has in common with “a ride on horseback[.]” Riley, 573 U.S. at 393, 396 (emphasis in original).19 With respect to digital information or data on a hard drive, and perhaps even photocopies for that matter, withdrawal of consent after copying but before analysis is like interruption of a consented-to search of a home by withdrawal of consent—police would have to promptly leave the home and seek a warrant, or other authorization, in order to further search.20 The copying of Mr. McDonnell’s hard drive was a precursor to a search, or perhaps a step in preparation, but it was not the search. An inexact comparison could be made to police securing a house, with the owner’s consent, as precursor to a consent search. If the person were to withdraw consent after the securing but before the search, the search of the house would not occur and the owner would have lost a reasonable expectation of privacy only to the extent of what the officers may have observed before the consent was withdrawn. The advancement of technology that allows the digital equivalent 19 As such, we decline to adopt the reasoning of courts in other jurisdictions that a forensic copy of a hard drive is akin to a photocopy of a paper document that, if made while consent was effective, can still be examined after consent is withdrawn. See, e.g., Lutcza, 76 M.J. at 702; Campbell, 76 M.J. at 658; Megahed, 2009 WL 722481, at *3; Thomas, 2014 U.S. Dist. LEXIS 33443, at *20. 20 In some of the cases relied on by the State for the proposition that a copy of a hard drive is no different from a photocopy of a paper document, law enforcement officials had already begun to examine data on the hard drives in question prior to the revocation of consent. See Thomas, 2014 U.S. Dist. LEXIS 33443 at *4, *9-10, *18 (during approximately 50 minutes of consensual access to the defendant’s computer, police viewed and photographed websites on the computer that the defendant had allegedly visited and scanned the hard drive for images of child pornography or erotica); Lutcza, 76 M.J. at 702 n.2 (“We recognize that in Megahed, unlike the instant case, the investigators began the actual review of the copied data prior to the revocation of consent.”). This factual distinction further dilutes those opinions’ persuasive value here. - 42 - of making a copy of a person’s home and all its contents, see Riley, 573 U.S. at 396, should not permit invasion of a privacy interest that otherwise would be prohibited, see Kyllo, 533 U.S. at 34. In this case, there is no indication in the record that law enforcement could not have sought a warrant to search the copy, once consent was withdrawn. The copying of the hard drive effectively preserved the evidence, just as police may secure a location while obtaining a warrant. See Illinois v. McArthur, 531 U.S. 326, 332 (2001). In this case, the fact that weeks passed between the completion of the copying and the start of the examination of the data shows that time was not of the essence. This contributes to the unreasonableness of the search after Mr. McDonnell withdrew his consent. See McNeely, 569 U.S. at 152 (“[W]here police officers can reasonably obtain a warrant before a blood sample can be drawn without significantly undermining the efficacy of the search, the Fourth Amendment mandates that they do so.” (Citation omitted)). Additional support for our conclusion comes from the Supreme Court’s discussion in Carpenter, 138 S. Ct. at 2219, differentiating between physical and digital information in the context of another exception to the warrant requirement, the third-party doctrine. In Carpenter, id. at 2216, the Supreme Court stated that it has held that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” (Cleaned up). The Supreme Court explained, though, that given the unique nature of cell phone location records, the fact that the information was held by a third party did not alone overcome the user’s claim to Fourth Amendment protection. See id. at 2217. Likewise, the “qualitatively different” nature of “detailed, encyclopedic, and - 43 - effortlessly compiled” digital information merits a different analysis than that applied to physical records. Id. at 2216-17. Similar to a person’s retention of a reasonable expectation of privacy in the unique and unprecedented information held in cell site location records, despite the data’s collection by cell phone companies, see id. at 2223, a person maintains a reasonable expectation of privacy in the information stored on a hard drive even when the government creates a copy. Just as the cell site location information’s creation “for commercial” purposes did “not negate Carpenter’s anticipation of privacy in his physical location[,]” id. at 2217, the creation of the copy, without more, did not negate Mr. McDonnell’s expectation of privacy in the data in his hard drive. Like the detailed records of a person’s movements in Carpenter, the data at issue here contains unique information of unprecedented comprehensiveness and breadth, including information that was previously unknowable, and deserves “special solicitude[.]” See id. at 2219. The State’s argument that the copy of the hard drive is like abandoned property is even less persuasive because a warrantless search of an electronic device lawfully within the government’s custody is unreasonable, unless the government has authority to search the data specifically. See Riley, 573 U.S. at 386; Richardson, 481 Md. at 435-36, 282 A.3d at 105. Put simply, our case law and that of the Supreme Court of the United States leads to the conclusion that Mr. McDonnell had a reasonable expectation of privacy in his data, regardless of whether the data was stored on his laptop’s hard drive or a copy of the hard drive, and, with the withdrawal of his consent, he maintained a reasonable expectation of privacy in the data, as it had not yet been examined. - 44 - 3. Varriale Just as we decline the State’s invitation to treat copies of digital data as equivalent to copies of paper documents, we do not see cases involving consented-to blood and DNA sampling as controlling here. Although this Court has held that it may be objectively reasonable for police to indefinitely retain a DNA profile created with consent and use it in subsequent investigations, see Varriale, 444 Md. at 415-16, 119 A.3d at 833, the same cannot be said of a copy of a person’s laptop hard drive. Moreover, this Court has not determined that it is objectively reasonable for law enforcement to retain and use a consented-to blood or DNA sample after consent has been withdrawn. Varriale did not involve an attempt by the defendant to withdraw consent to the testing or use of a previously consented-to sample. Rather, in Varriale, id. at 403, 119 A.3d at 826, the State used a DNA profile obtained from the consented-to sample in a different investigation than the one in which consent had been given for testing. This Court held that, given that there was no express limitation on the consent, the use of the DNA profile did not exceed the scope of consent and it was objectively reasonable for the police to retain and compare the DNA profile against evidence in another case. See id. at 418-19, 119 A.3d at 835. We likened the retention and use of the DNA profile to fingerprints, which law enforcement agencies “routinely catalog and compare[.]” Id. at 416, 119 A.3d at 833 (citations omitted). Unlike a DNA profile that is held exclusively for identification purposes, a copy of a hard drive is not “like fingerprints,” and police do not “routinely catalog and compare” copies of hard drives “in the course of criminal investigations.” Id. at 416, 119 A.3d at 833 (citations omitted). A copy of a person’s hard drive contains vast troves of personal data - 45 - that go far beyond serving to identify the owner, which has been the focus of this Court and others when assessing the use of DNA samples or similar evidence, like fingerprints. See id. at 416, 119 A.3d at 834; see also King, 569 U.S. at 461. To be sure, there is an appealing simplicity to treating the seizure and copying of a hard drive within the framework of cases viewing “the collection and testing of blood” or other bodily fluids as “a single event for [F]ourth [A]mendment purposes[.]” People v. Woodard, 909 N.W.2d 299, 306 (Mich. Ct. App. 2017) (cleaned up). Both involve invasion of “an individual’s most personal and deep-rooted expectations of privacy[,]” McNeely, 569 U.S. at 148 (cleaned up), and the outcome of a blood sample test is just as incomprehensible or unknown prior to testing as the data on a copy of a hard drive is prior to searching. But the similarity stops there. Government examination of a copy of a hard drive would potentially violate far more of a person’s “private sphere” than the testing of a blood sample. Carpenter, 138 S. Ct. at 2213 (citation omitted). As with a DNA sample held and analyzed for the purpose of identification, a blood test could reveal only so much or a limited sphere of information about a person’s “privacies of life.” Id. at 2214 (cleaned up). Most commonly, a blood sample is used to identify a person, via DNA, or to detect the presence of alcohol or other substances in a person’s system, although other important information could also be revealed by certain tests if authorized, such as medical - 46 - conditions.21 See Vernonia Sch. Dist. 47J v. Acton, 515 U.S. 646, 658 (1995) (concluding that a “significant” factor in the reasonableness of compulsory drug testing of student athletes was “that the tests at issue here look only for drugs, and not for whether the student is, for example, epileptic, pregnant, or diabetic” (citation omitted)). That this Court held, in Varriale, 444 Md. at 418-19, 119 A.3d at 835, that the use of the results of a consentedto DNA sample for an identification match in an unrelated case was reasonable, where there was no express limitation on the consent, does not by analogy make the examination of data on a copy of a hard drive reasonable, after the owner withdraws consent.22 4. Public Policy and Consent Searches Undeniably, there are significant governmental interests in conducting consent searches generally and consent searches of computer hard drives containing digital Although the examination of Mr. McDonnell’s data here sought only to locate images or data related to child pornography, this was not the kind of binary search that would give only a positive or negative result (e.g., an identification match or lack thereof, or the presence or absence of alcohol). Instead, law enforcement would need to examine and assess each piece of data to see if it did in fact constitute or relate to child pornography. In the process, such a search could reveal a significant amount of innocuous information that would invade Mr. McDonnell’s privacy in a way that a test for a DNA match or alcohol could not. 22 The better analogy, though still imperfect, is between a hard drive lawfully copied but unexamined and cases involving the government’s ability to examine the contents of packages lawfully obtained. The government’s lawful possession of a package of undeveloped film does not permit examination of the film without a warrant or warrant exception, see Walter, 447 U.S. at 651-52, 654 (plurality op.), whereas the government can freely examine the contents of a package that has already been inspected by Federal Express employees before the package was provided to the government, because the government would “learn nothing that had not previously been learned during the private search[,]” United States v. Jacobsen, 466 U.S. 109, 111, 120 (1984) (footnote omitted). The previously uninspected data on the copy of Mr. McDonnell’s hard drive is like an undeveloped roll of film, not a package’s already-examined contents. 21 - 47 - information in particular. Allowing officers to search based on a person’s consent promotes the important social goal of cooperation between law enforcement and the public. See United States v. Drayton, 536 U.S. 194, 207 (2002). Further, a consent search “may result in considerably less inconvenience for the subject of the search” and may “be the only means of obtaining important and reliable evidence.” Schneckloth v. Bustamonte, 412 U.S. 218, 227-28 (1973) (footnote omitted). But allowing the State to examine the data on a copy of a person’s hard drive after a person has withdrawn consent would permit severe intrusions into one of the single most comprehensive repositories of a person’s private information. On the other hand, requiring law enforcement officers to get a warrant in this situation would increase the likelihood that people may consent to a search of a laptop or computer, as a person would not fear that the copying of a hard drive as part of the search would result in unfettered governmental access to their data in the future. Nor would the requirement of a warrant to search data where consent is withdrawn after copying of a hard drive necessarily cause inconvenience to law enforcement officers or impede investigations. To the contrary, it would incentivize law enforcement to act more expediently after obtaining consent to search the contents of a hard drive, i.e., such a requirement would minimize delay. E. Conclusion The unique nature of digital information presents new challenges for the application of the Fourth Amendment’s requirements concerning concepts such as the particularity of warrants, reasonableness of searches, and withdrawal of consent. See Richardson, 481 Md. - 48 - at 452-53, 282 A.3d at 115. Modern computers, cell phones, and other devices contain vast and varied types of personal information yet lack the inherent physical boundaries of other searchable items, such as backpacks or cars, thus requiring courts to find new ways to address the potential intrusion into privacy interests by unauthorized searches. See Riley, 573 U.S. at 393-97; Kerr, Searches and Seizures, supra, 119 Harv. L. Rev. at 556. In this case, we hold that Mr. McDonnell had a reasonable expectation of privacy in his digital data, regardless of whether the data was electronically stored on his laptop’s hard drive or USACIDC’s copy of the hard drive, made with his consent. USACIDC’s creation of a copy of the laptop’s hard drive with his consent, in order to search it, did not annul Mr. McDonnell’s reasonable expectation of privacy in the data, given that the examination of the data did not occur while the consent was effective. In light of Mr. McDonnell’s withdrawal of consent, USACIDC’s examination of the data on the copy was a search and was unreasonable in the absence of a warrant supported by probable cause or an exception to the warrant requirement. JUDGMENT OF THE APPELLATE COURT OF MARYLAND AFFIRMED. ANNE ARUNDEL COUNTY TO PAY COSTS. - 49 -
Primary Holding

The Court of Appeals affirmed the judgment of the appellate court reversing the decision of the circuit circuit court that examination of data contained on Defendant's hard drive was not a search in violation of the Fourth Amendment, holding that the government violated Defendant's Fourth Amendment rights in this case.


Disclaimer: Justia Annotations is a forum for attorneys to summarize, comment on, and analyze case law published on our site. Justia makes no guarantees or warranties that the annotations are accurate or reflect the current state of law, and no annotation is intended to be, nor should it be construed as, legal advice. Contacting Justia or any attorney through this site, via web form, email, or otherwise, does not create an attorney-client relationship.

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.