                                                                       FILED
                                                                    AUGUST 23, 2018
                                                               In the Office of the Clerk of Court
                                                              WA State Court of Appeals, Division III




         IN THE COURT OF APPEALS OF THE STATE OF WASHINGTON
                            DIVISION THREE

 STATE OF WASHINGTON,                         )
                                              )         No. 35099-1-III
                        Respondent,           )
                                              )
        v.                                    )
                                              )
 JAY KARL FRIEDRICH,                          )         PUBLISHED OPINION
                                              )
                        Appellant.            )

      SIDDOWAY, J. — Anyone engaged in “providing an electronic communication

service or a remote computing service” to the public in interstate commerce is required to

report any known child pornography violation to an electronic tip line, where it is made

available to law enforcement. See 18 U.S.C. § 2258A. Jay Friedrich was convicted of

five counts of dealing with or possessing depictions of a minor engaged in sexually

explicit conduct after Microsoft filed such a report, which was investigated by the Walla

Walla County sheriff.

      Mr. Friedrich appeals denial of his motion to suppress the critical evidence against

him. He argues that the information reported by Microsoft and the warrant affidavit’s

generalizations about collectors of child pornography did not provide probable cause for
No. 35099-1-III
State v. Friedrich


a search of his residence and that the affidavit failed to satisfy the particularity required

by the Fourth Amendment to the United States Constitution.

       The totality of information provided by the affidavit, including commonsense

inferences about where and how long child pornography is likely to be retained, provided

probable cause to issue the warrant. For that reason, and because any issue of

overbreadth is avoided by the severability doctrine, we affirm.

                     FACTS AND PROCEDURAL BACKGROUND

       On March 30, 2016, Microsoft reported to the National Center for Missing and

Exploited Children (NCMEC)1 that it became aware that a user of Skype,2 user name

“jkf6418,” uploaded a media file believed to contain a depiction of a minor engaging in

sexually explicit conduct. Clerk’s Papers (CP) at 23. Microsoft’s report indicated that a

search of Skype for the username “jkf6418” yielded three results, all belonging to a “Jay

Friedrich.” Id. The one result identifying “Jay Friedrich[’s]” city of residence identified

it as Walla Walla, Washington. The NCMEC report indicated that a search of the


       1
         NCMEC is a national resource center and clearinghouse that maintains an
electronic tip line, the “CyberTipline,” through which federally-required reports are
transmitted to the appropriate international, federal, and local law enforcement agencies
for investigation. 42 U.S.C. §§ 5771, 5773(b). Providers who fail to comply with the
reporting obligation face substantial penalties. See 18 U.S.C. § 2258A; United States v.
Ackerman, 831 F.3d 1292, 1296-97 (10th Cir. 2016).
       2
       Skype is a telecommunications application for video chats, voice calls, or instant
messaging. See About Skype, SKYPE, https://www.skype.com/en/about [https://perma.cc
/LL58-566K].

                                               2
No. 35099-1-III
State v. Friedrich


username “jkf6418” on Spokeo, a people search website that aggregates data from other

services, also yielded three results. One, a dating profile on an online dating site,

described “jkf6418” as a 51-year-old bisexual single male from Walla Walla and as 6’1”

and of average build.

       After it was determined that the Internet Protocol (IP) address most likely came

from Walla Walla, the information was passed along to the Walla Walla County Sheriff’s

Department and investigation of the report was referred to Detective Eric Knudson on

April 12. Detective Knudson viewed the media file, a picture of what appeared to be an

approximately 9- to 11-year-old girl engaged in “sexually explicit . . . conduct” as

defined by RCW 9.68A.011(4). CP at 24.

       On April 13, Detective Knudson obtained a search warrant to locate the subscriber

information for the IP address, which was registered to Charter Communications.

Charter Communications responded to the warrant on April 21, identifying the service

subscriber as Jay Jensen. Detective Knudson learned from a search of police records that

in 2012 Jay Jensen reported finding child pornography on his roommate’s computer. The

report listed Mr. Jensen’s roommate as Jay Friedrich. Mr. Friedrich was not charged as a

result of that report, as the investigation produced insufficient evidence for prosecution.

Detective Knudson nonetheless reviewed the pictures obtained in the investigation and

determined that they were of teenage and preteen girls. Detective Knudson’s research

also revealed that Mr. Friedrich is a registered sex offender.

                                              3
No. 35099-1-III
State v. Friedrich


       Detective Knudson learned from police records that Mr. Friedrich lived in Walla

Walla and was described as 52 years of age, 6’1” in height, and as weighing 155 pounds.

His birthdate was recorded as 04/18/1964, which, along with his initials, jkf, correlated to

the “jkf6418” account (04/18/1964).

       A month after NCMEC received the report from Microsoft, on April 27, Detective

Knudson applied for a warrant to search Mr. Friedrich’s residence. In his 24-page

supporting affidavit, Detective Knudson provided his background and training, the

foregoing information, and information on the typical operational practices of electronic

and internet service providers (collectively “ISPs”). He testified that pursuant to terms of

their user agreements, ISPs “typically monitor their services utilized by subscribers[ t]o

prevent their communication networks from serving as conduits for illicit activity” and

“routinely and systematically attempt to identify suspected child pornography that may

be sent through [the ISP’s] facilities.” CP at 17. He testified that when an image or

video file is believed by an ISP to be child pornography as defined by 18 U.S.C. § 2256,

a “hash value” of the file can be generated by operation of a mathematical algorithm that

is unique to the file—“in essence, the unique fingerprint of that file.” CP at 17. A

database of hash values for files suspected to be child pornography enables ISPs to

automatically detect when files that have been identified as illicit pass through their

system. He testified that reports to NCMEC by ISPs are often made solely on the basis of

detection of a file’s hash value.

                                              4
No. 35099-1-III
State v. Friedrich


       In addition to describing these practices (although in more detail), Detective

Knudson’s affidavit stated that under federal law, an ISP “has a duty to report to NCMEC

any apparent child pornography it discovers ‘as soon as reasonably possible.’” CP at 18

(quoting 18 U.S.C. § 2258A(a)(1)).

       The items that Detective Knudson sought to search for and seize were identified

in two single-spaced pages of an attachment to his affidavit. They consisted of two

categories: “Records, Documents, and Visual Depictions,” and “Digital Evidence.”

CP at 32-33.

       The requested search warrant was issued by District Court Judge Kristian Hedine

on April 27. The last, freestanding provision of its digital evidence section authorized the

seizure of records and things evidencing the use of nine IP addresses that were unrelated

to Microsoft’s report to NCMEC. They were not identified or explained by Detective

Knudson’s affidavit or its attachments.

       In executing the search warrant the next day, law enforcement seized a Hewlett

Packard laptop, a Toshiba laptop, a Micron tower computer, flash drives, compact disks,

and floppy disks—all found in Mr. Friedrich’s bedroom. They seized a Samsung

smartphone from Mr. Friedrich’s person. During an interview with officers, Mr.

Friedrich admitted that the electronics seized were his and that they would contain

images of underage girls. The Hewlett Packard computer and the Samsung smartphone

proved to contain depictions of minors engaged in sexually explicit conduct, including

                                             5
No. 35099-1-III
State v. Friedrich


the image Microsoft reported. The Toshiba laptop and Micron tower computer also

contained such depictions.

       The State eventually charged Mr. Friedrich with one count of second degree

dealing in depictions of a minor engaged in sexually explicit conduct, three counts of first

degree possession of depictions of a minor engaged in sexually explicit conduct, and one

count of second degree possession of depictions of a minor engaged in sexually explicit

conduct, all in violation of RCW 9.68A.050 and .070. For simplicity’s sake hereafter,

and unless indicated otherwise, our references to “child pornography” are to depictions of

minors whose possession or dealings with which violate provisions of chapter 9.68A

RCW or federal law.

       Mr. Friedrich moved the court to suppress all of the State’s evidence, arguing that

Detective Knudson’s affidavit supporting his application did not meet the particularity

requirement of the Fourth Amendment. The superior court, the Hon. John Lohrmann,

denied the motion without a hearing. The parties then proceeded to a stipulated facts

trial, with Mr. Friedrich preserving his right to appeal the trial court’s suppression

decision. Mr. Friedrich was convicted on all remaining counts. He appeals.

                                        ANALYSIS

       Mr. Friedrich’s assignments of error present two challenges to the trial court’s

suppression decision. He contends first, that the warrant application failed to provide

facts supporting a determination that what was at least month-old evidence of criminal

                                              6
No. 35099-1-III
State v. Friedrich


activity could still be found at his residence. His second contention is that the search

warrant failed to satisfy the particularity requirement of the Fourth Amendment.

I.     THE DISTRICT COURT COULD REASONABLY CONCLUDE THAT THE EVIDENCE OF
       CRIMINAL ACTIVITY WAS NOT STALE

       Mr. Friedrich does not question that the warrant affidavit provided probable cause

that he engaged in criminal activity at some time. But he cites two aspects of Detective

Knudson’s affidavit that he argues undermine probable cause that evidence of the

criminal activity existed at Mr. Friedrich’s residence at the time the detective applied for

the search warrant. The first is the fact that the March 30, 2016 date of Microsoft’s

report to the CyberTipline was the date Microsoft “became aware that a user uploaded a

media file,” not the date of the upload itself. CP at 23 (emphasis added). The second is

that four weeks had passed between Microsoft’s report and the application for the

warrant, and the detective’s contention that the evidence would still be at the residence

depended on unreliable generalizations about the habits of child pornography collectors.

       The Fourth Amendment to the United States Constitution and article I, section 7 of

the Washington Constitution require that the issuance of a search warrant be based on a

determination of probable cause. Probable cause is established when an affidavit

supporting a search warrant provides sufficient facts for a reasonable person to conclude

there is a probability the defendant is involved in the criminal activity and that evidence




                                              7
No. 35099-1-III
State v. Friedrich


of the crime is at a certain location. State v. Vickers, 148 Wn.2d 91, 108, 59 P.3d 58

(2002).

       Whether a warrant affidavit’s information constitutes probable cause is a question

of law that we review de novo. State v. Neth, 165 Wn.2d 177, 182, 196 P.3d 658 (2008).

Nonetheless, in determining that question of law, “[g]reat deference is accorded the

issuing magistrate’s determination of probable cause.” State v. Cord, 103 Wn.2d 361,

366, 693 P.2d 81 (1985). If the propriety of issuing the warrant is debatable, the

deference due the magistrate’s decision will tip the balance in favor of upholding the

warrant. State v. Jackson, 102 Wn.2d 432, 446, 688 P.2d 136 (1984). In light of the

deference owed the magistrate’s decision, the question on review is whether the

magistrate could draw the connection, not whether he should do so.

       In reviewing a magistrate’s determination of probable cause, we—like the

magistrate—should not view the affidavit “in a hypertechnical manner.” State v. Riley,

34 Wn. App. 529, 531, 663 P.2d 145 (1983). “[A] magistrate is entitled to draw

reasonable inferences from the facts and circumstances set forth in the supporting

affidavit,” with the result that “[r]easonableness is the key and common sense must be the

ultimate yardstick.” Id. “Doubts concerning the existence of probable cause are

generally resolved in favor of issuing the search warrant.” Vickers, 148 Wn.2d at 108-09.




                                             8
No. 35099-1-III
State v. Friedrich


       Timeliness of Microsoft’s detection and report

       A passage of time between an observation of criminal activity and the presentation

of a search warrant affidavit may be so prolonged that it is no longer probable that a

search will reveal criminal activity or evidence; i.e., the information may be stale. State

v. Lyons, 174 Wn.2d 354, 360-61, 275 P.3d 314 (2012). But “the information is not stale

for purposes of probable cause if the facts and circumstances in the affidavit support a

commonsense determination that there is continuing and contemporaneous possession of

the property intended to be seized.” State v. Maddox, 152 Wn.2d 499, 506, 98 P.3d 1199

(2004).

       Detective Knudson’s affidavit stated that Microsoft’s report indicated that it

“became aware” of Mr. Friedrich’s upload on March 30. CP at 23. It also informed the

magistrate that ISPs such as Microsoft typically monitor their services to prevent their

communication networks from serving as conduits for illicit activity, including to

systematically attempt to identify suspected child pornography. He described the

generation of hash values for pornographic files that enable ISPs to automatically detect

the passage of some pornographic files through their system. Detective Knudson also

cited federal law under which an ISP “has a duty to report to NCMEC any apparent child

pornography it discovers ‘as soon as reasonably possible.’” CP at 18 (quoting 18 U.S.C.

§ 2258A(a)(1)). Mr. Friedrich concedes that “[p]resumably, Microsoft complied with

this requirement.” Br. of Appellant at 15 n.11.

                                             9
No. 35099-1-III
State v. Friedrich


       Industry practices exist, can often be determined by outsiders to the industry, and

the practices described by Detective Knudson’s affidavit are matters of which a detective

with training in investigating child pornography cases could be expected to be aware.

The district court judge was entitled to rely on the detective’s knowledge of industry

practice. That information and the federal reporting requirement support the magistrate’s

commonsense conclusion that Microsoft’s detection and reporting would be prompt.

       Likelihood that evidence of criminal activity would be located at Mr. Friedrich’s
       residence

       To establish the likelihood that evidence of criminal activity would still be located

at Mr. Friedrich’s residence, Detective Knudson’s affidavit relied in part on the fact that

digitized information will remain on a computer not only until deleted, but even

thereafter, which Mr. Friedrich does not dispute.

       Detective Knudson’s affidavit also included generalizations about what collectors

of child pornography generally do, which, according to the deputy, includes “prefer[ing]

not to be without their child pornography for any prolonged time period,” often

maintaining photographs or videos “in computer files or external digital storage devices,”

and maintaining pornographic materials “in the privacy and security of their home or in

some other secure location, such as a private office.” CP at 14-15. Mr. Friedrich

challenges these generalizations as support for a determination of probable cause, citing

State v. Thein, 138 Wn.2d 133, 977 P.2d 582 (1999).



                                             10
No. 35099-1-III
State v. Friedrich


       In Thein, our Supreme Court held that an officer’s asserted understanding of the

common habits of drug dealers was insufficient to establish probable cause to search the

defendant’s residence. The warrant affidavit in Thein presented specific facts providing

probable cause that the defendant was a drug dealer, but only generalizations in support

of the officer’s belief that evidence of his criminal activity could be found at his

residence. The court concluded that the generalized statements “in [Thein’s] case were,

standing alone, insufficient to establish probable cause to search [his] residence.” Id. at

148. Although allowing that “common sense and experience inform the inferences

reasonably to be drawn from the facts,” the Court determined that the type of “broad

generalizations” presented by the warrant affidavit for Thein’s residence “do not alone

establish probable cause.” Id. at 148-49.

       The Court added a cautionary note, “emphasiz[ing] that the existence of probable

cause is to be evaluated on a case-by-case basis” and in each case, “‘the facts stated, the

inferences to be drawn, and the specificity required must fall within the ambit of

reasonableness.’” Id. at 149 (quoting State v. Helmka, 86 Wn.2d 91, 93, 542 P.2d 115

(1975)). More recently, our Supreme Court observed in Maddox that “[i]n evaluating

whether the facts underlying a search warrant are stale, the court looks at the totality of

circumstances,” including “the nature and scope of the suspected criminal activity.” 152

Wn.2d at 506.

       Detective Knudson’s generalizations about what possessors of child pornography

                                             11
No. 35099-1-III
State v. Friedrich


“generally do” warrant critical examination for the reasons given in Thein. But unlike the

generalizations about drug dealers in Thein, Detective Knudson’s generalizations about

possessors of child pornography fall within the ambit of reasonableness, and similar

generalizations have survived critical examination in a number of courts. In a relatively

early case involving a warrant to search for digital evidence of child pornography at a

user’s residence, the federal appellate court for the Tenth Circuit Court of Appeals

endorsed a view that possessors of child pornography are likely to hoard materials and

maintain them for significant periods of time, explaining that the view

       “is supported by common sense and the cases. Since the materials are
       illegal to distribute and possess, initial collection is difficult. Having
       succeeded in obtaining images, collectors are unlikely to destroy them.
       Because of their illegality and the imprimatur of severe social stigma such
       images carry, collectors will want to secret them in secure places, like a
       private residence.”

United States v. Riccardi, 405 F.3d 852, 861 (10th Cir. 2005) (quoting United States v.

Lamb, 945 F. Supp. 441, 460 (N.D.N.Y. 1996)).

       The Tenth Circuit abided by that view five years later, despite an intervening

increase in internet access to child pornography that made it easier to anonymously

collect and possess it. In United States v. Burkhart, the court explained:

       [C]hild pornography is still illegal to distribute and possess, and still
       carries severe social stigma, whether the possessor receives it by regular
       mail, email, or over the Internet. The illegality and social stigma may
       also complicate resale or disposal. Moreover, acquiring pornography is
       rarely free. Given the nature of the evidence to be seized, the Internet
       context may mitigate against staleness: information that a person received

                                            12
No. 35099-1-III
State v. Friedrich


       electronic images of child pornography is less likely than information about
       drugs, for example, to go stale because the electronic images are not subject
       to spoilage or consumption.

602 F.3d 1202, 1207 (10th Cir. 2010) (citing United States v. Frechette, 583 F.3d 374,

378 (6th Cir. 2009)). Burkhart points out that at the time of its filing, it was one of five

federal circuit courts that had endorsed the observation that possessors of child

pornography are likely to hoard it. Id.3 This court also found that “boilerplate”

inferences in a warrant affidavit provided probable cause that evidence of child

pornography could be found at a suspect’s residence months after detecting his use. State

v. Garbaccio, 151 Wn. App. 716, 729, 214 P.3d 168 (2009), relying on United States v.

Lacy, 119 F.3d 742, 746 (9th Cir. 1997).

       Probable cause requires more than suspicion or conjecture, but it does not require

certainty. State v. Chenoweth, 160 Wn.2d 454, 476, 158 P.3d 595 (2007). Because

common sense and experience supports the generalizations presented by Detective

Knudson, the district court could reasonably find a fair probability that possessors of

child pornography are likely to retain the material for a considerable period of time in a

secure location, such as the possessor’s home.




       3
         In addition to the Sixth Circuit decision in Frechette, Burkhart cited United
States v. McArthur, 573 F.3d 608, 613-14 (8th Cir. 2009); United States v. Falso, 544
F.3d 110, 132 (2d Cir. 2008); and United States v. Watzman, 486 F.3d 1004, 1008 (7th
Cir. 2007).

                                              13
No. 35099-1-III
State v. Friedrich


II.    THE SEARCH WARRANT SATISFIED THE CONSTITUTIONAL PARTICULARITY
       REQUIREMENT IN MOST RESPECTS, AND THE ITEMS SEIZED FALL WITHIN ITS
       LEGITIMATE SCOPE

       Mr. Friedrich’s remaining argument is that the search warrant was vague,

overbroad, and sought materials presumptively protected by the First Amendment to the

United States Constitution.

       Among the requirements of the Fourth Amendment is that no warrant shall issue

without “particularly describing the place to be searched, and the persons or things to be

seized.” U.S. CONST. AMEND. IV (emphasis added); State v. Riley, 121 Wn.2d 22,

28 n.1, 846 P.2d 1365 (1993). “The purposes of the search warrant particularity

requirement are the prevention of general searches, prevention of the seizure of objects

on the mistaken assumption that they fall within the issuing magistrate’s authorization,

and prevention of the issuance of warrants on loose, vague, or doubtful bases of fact.”

State v. Perrone, 119 Wn.2d 538, 545, 834 P.2d 611 (1992) (citing, among other

authority, Marron v. United States, 275 U.S. 192, 48 S. Ct. 74, 72 L. Ed. 231 (1927)).

       The first two purposes are related. The first prevents the sort of general,

exploratory rummaging in a person’s belongings of the sort “‘abhorred by the

colonists.’” Id. (quoting Coolidge v. New Hampshire, 403 U.S. 443, 467, 91 S. Ct. 2022,

29 L. Ed. 2d 564 (1971)). The second ensures that what is to be seized is determined by a

neutral magistrate, eliminating the danger of unlimited discretion in the executing officer.

Id. at 546. As to these related purposes, “a description is valid if it is as specific as the

                                               14
No. 35099-1-III
State v. Friedrich


circumstances and the nature of the activity under investigation permits.” Perrone, 119

Wn.2d at 547.

       A greater degree of particularity is required when a search warrant authorizes a

search for items protected by the First Amendment. Id. at 547. Describing the history of

this heightened requirement in 1965, the U.S. Supreme Court stated that “[T]he most

scrupulous exactitude” applies “when the ‘things [to be seized]’ are books, and the basis

for their seizure is the ideas which they contain.” Stanford v. Texas, 379 U.S. 476, 485,

85 S. Ct. 506, 13 L. Ed. 2d 431 (cited by Perrone, 119 Wn.2d at 547-48).

       The third purpose of the particularity requirement ties it to the requirement of

probable cause. Imprecision in the description of the items to be seized that can be traced

to “loose, vague, or doubtful bases of fact” increases the likelihood that probable cause

has not been established. Perrone, 119 Wn.2d at 548. As to all three purposes,

“[w]hether a search warrant contains a sufficiently particularized description is reviewed

de novo.” Id. at 549.

       The first infirmity alleged by Mr. Friedrich for his particularity challenge is the

search warrant’s use of the unqualified term “child pornography” in one instance, in

describing items to be seized. Use of the unqualified term proved fatal to the search

warrant at issue in Perrone, in which the warrant affidavit repeatedly used the term to

describe items to be seized, and our Supreme Court held that the term was “not

sufficiently particular to satisfy the Fourth Amendment.” 119 Wn.2d at 553. The court

                                             15
No. 35099-1-III
State v. Friedrich


reasoned that authorizing law enforcement to seize anything it thinks constitutes “child

pornography” allows for too much discretion and is not “scrupulous exactitude.” Id.

(internal quotation marks omitted). The court suggested that a warrant affiant could

avoid the particularity problem by using statutory definitions found in RCW 9.68A.011.4

Id. at 553-54. More recently, the Court reiterated that if a search warrant limiting items

to be seized “used the language of RCW 9.68A.011 to describe materials sought, the

warrant would likely be sufficiently particular,” but that merely identifying the crime

under investigation as a violation of RCW 9.68A.070 did not satisfy the particularity

requirement. State v. Besola, 184 Wn.2d 605, 614, 359 P.3d 799 (2015).

       The search warrant in this case consistently qualified the “Records, Documents,

and Visual Depictions” to be searched for and seized as ones containing, or pertaining or

relating to, “visual depictions of minors engaged in sexually explicit conduct, as defined

in RCW 9.68A.011 and Title 18, United States Code, Section 2256.” CP at 32. All items

to be searched and seized were also qualified by introductory language that they be

“records, documents, and items that constitute evidence, contraband, fruits, and/or

instrumentalities of violations of RCW 9.68A.050, dealing in depictions of minor [sic]

engaged in sexually explicit conduct.” CP at 35. The unqualified term “child




       4
       Chapter 9.68A RCW covers sexual exploitation of children, and section
9.68A.011 is its definitions provision.

                                            16
No. 35099-1-III
State v. Friedrich


pornography” appears only once, in authorizing seizure of materials “that show the actual

user(s) of the computers or digital devices during any time period in which the device

was used to upload, download, store, receive, possess or view child pornography.”

CP at 37. Given the introductory language and the consistent use of statutory definitions

elsewhere, Mr. Friedrich’s attack is hypertechnical. The search warrant in this case does

not present the infirmity presented by the search warrant in Perrone.

       Additional and related infirmities alleged by Mr. Friedrich are the breadth of the

media to be seized, which includes, e.g., books, magazines, photographs, motion picture

films and videos; and the warrant’s extension to every digital device found in the

residence that is “capable of storing and/or processing data in digital form,” as well as

“related communications devices,” examples of which are provided. CP at 36. He

argues that the breadth of both categories authorizes the seizure of items unrelated to the

suspected crime, which was a single instance of uploading a digital image. Finally, he

points to the fact that the search warrant authorized seizure of records and things

evidencing the use of nine IP addresses having no apparent relation to Detective

Knudson’s evidence.

       The State responds that the particularity requirement tolerates ambiguity when the

description is as complete as can be reasonably expected, and that the complaint about

the breadth of devices whose seizure was authorized fails to consider that “[t]he only way

police will know whether digital evidence contains child pornography is by seizing the

                                             17
No. 35099-1-III
State v. Friedrich


device and then submitting it to . . . expert examination. This cannot be ascertained at the

time of seizure.” Br. of Resp’t at 19-20.

       The State does not defend the provision of the search warrant dealing with the nine

unexplained IP addresses, lending credence to Mr. Friedrich’s surmise that it was

carryover language from an earlier search warrant. We set aside that provision for now,

and address it in our concluding discussion of the severability doctrine.

       As to the breadth of the types of media to be seized, “courts evaluating alleged

particularity violations have distinguished between property that is inherently innocuous

and property that is inherently illegal.” State v. Chambers, 88 Wn. App. 640, 644, 945

P.2d 1172 (1997) (internal quotation marks omitted). “A lesser degree of precision may

satisfy the particularity requirement when a warrant authorizes the search for contraband

or inherently illicit property.” Id. Child pornography is not protected by the First

Amendment. New York v. Ferber, 458 U.S. 747, 102 S. Ct. 3348, 73 L. Ed. 2d 1113

(1982). The search warrant authorized a search for and seizure of only media containing

statutorily-defined child pornography. It was not overbroad as to media whose content

could be assessed during the search.

       The breadth of digital devices to be seized presents a different issue because, as

the State points out, whether they contained child pornography could not be assessed

while executing the warrant at the residence. If a magistrate reasonably finds it probable

that an individual has engaged in criminal dealings with child pornography, and digital

                                            18
No. 35099-1-III
State v. Friedrich


evidence of those dealings is likely to be found in devices located in his or her home, the

most reasonable approach would appear to be to authorize seizure of all reasonably

suspect devices, but with a particularized protocol for searching the devices following the

seizure. See, e.g., United States v. Comprehensive Drug Testing, Inc., 621 F.3d 1162,

1177 (9th Cir. 2010) (per curiam) (en banc) (recognizing “the reality that over-seizing is

an inherent part of the electronic search process”), abrogated in part on other grounds by

Hamer v. Neigh. Hous. Serv. Of Chi.,          U.S.   , 138 S. Ct. 13, 16-17, 199 L. Ed. 2d

249 (2017); id. at 1178-80 (Kozinski, C.J., concurring) (providing guidance on what

magistrates should consider in issuing a warrant to examine an electronic storage medium

to search for certain incriminating files).

       The severability doctrine spares us the task of drawing lines about over-seizing

electronic information in this case, because the evidence that was seized and used to

convict Mr. Friedrich was seized pursuant to provisions of the warrant that were

particularized and supported by probable cause.5 Under the severability doctrine, which

“has been applied [even] where First Amendment considerations exist,” “‘infirmity of

part of a warrant requires the suppression of evidence seized pursuant to that part of the

warrant’ but does not require suppression of anything seized pursuant to valid parts of the

warrant.” Perrone, 119 Wn.2d at 556 (quoting United States v. Fitzgerald, 724 F.2d 633,


       5
       The evidence relied on by the State was found on the Hewlett Packard computer,
the Samsung smartphone, the Toshiba computer, and the Micron computer.

                                               19
No. 35099-1-III
State v. Friedrich


warrant." Perrone, 119 Wn.2d at 556 (quoting United States v. Fitzgerald, 724 F.2d 633,

637 (8th Cir. 1983)). Although the doctrine does not apply to unconstitutional general

warrants or where the valid portion of the warrant is "a relatively insignificant part of an

otherwise invalid search," id. at 556-57 (internal quotation marks omitted), neither of

those exceptions to the doctrine apply here.

       The warrant was not too vague and did not authorize the seizure of items protected

by the First Amendment. Its extension to nine unrelated IP addresses and any other

debatable overbreadth did not taint its valid and severable authorization to seize the three

computers and one smartphone relied on as evidence against Mr. Friedrich.

       Mr. Friedrich asks us to exercise our discretion to waive costs on appeal if the

State substantially prevails, which it has. We decline to exercise our discretion to waive

costs, but this does not prejudice Mr. Friedrich's right to oppose an award of costs under

RAP 14.2.

       Affirmed.


                                                      d}~0~.~-
                                                    Siddoway, J.

WE CONCUR:




l ~ ... .,~ ... c.1..- gtM. \1
Lawrence-Berrey, CJ.


                                               20
                                      No. 35099-1-111

       FEARING,   J. (concurring)-The majority writes, on page 8 of its opinion:

               Whether a warrant affidavit's information constitutes probable cause
       is a question of law that we review de novo. State v. Neth, 165 Wn.2d 177,
       182, 196 P.3d 658 (2008). Nonetheless, in determining that question of
       law, "[g]reat deference is accorded the issuing magistrate's det~rmination
       of probable cause." State v. Cord, 103 Wn.2d 361, 366, 693 P.2d 81
       ( 1985). If the propriety of issuing the warrant is debatable, the deference
       due the magistrate's decision will tip the balance in favor of upholding the
       warrant. State v. Jackson, 102 Wn.2d 432, 446, 688 P.2d 136 (1984). In
       light of the deference owed the magistrate's decision, the question on
       review is whether the magistrate could draw the connection, not whether he
       should do so.

       I question the consistency of the first sentence in this excerpt from the remaining

sentences. A de novo review may conflict with granting the magistrate deference, let

alone great deference. Perhaps the appeals court should grant deference only to the

extent the magistrate needed to determine the reliability of information submitted in

support of the application for a search warrant and not to the extent of deciding whether

that information supported probable cause. I also question whether a reviewing court

should grant the magistrate deference when the magistrate issues the search warrant

without any input from the defendant.
No. 35099-1-111
State v. Friedrich (concurrence)


      In another case, a court may need to resolve the discrepancy between the principle

of de novo review and the rule of granting the magistrate deference. The majority and I

need not undertake any resolution of this incongruity in this appeal, because under either

standard of review, we may affirm the issuance of the warrant to search Jay Friedrich's

residence.




                                          Fe~\([,




                                             2
