                                            NOTICE

      The text of this opinion can be corrected before the opinion is published in the
      Pacific Reporter. Readers are encouraged to bring typographical or other formal
      errors to the attention of the Clerk of the Appellate Courts:
                            303 K Street, Anchorage, Alaska 99501
                                      Fax: (907) 264-0878
                               E-mail: corrections @ akcourts.us

              IN THE COURT OF APPEALS OF THE STATE OF ALASKA


ERIN A. POHLAND,
                                                     Court of Appeals No. A-12443
                           Appellant,               Trial Court No. 3AN-12-1066 CR

                    v.
                                                             O P I N I O N
STATE OF ALASKA,                                         as amended on rehearing

                           Appellee.                  No. 2632 — February 1, 2019


             Appeal from the District Court, Third Judicial District,
             Anchorage, Jo-Ann Chung, Judge.

             Appearances: Cynthia L. Strout, Anchorage, for the Appellant.
             Michal Stryszak, Assistant Attorney General, Office of Criminal
             Appeals, Anchorage, and Jahna Lindemuth, Attorney General,
             Juneau, for the Appellee.

             Before: Mannheimer, Chief Judge, and Allard and Wollenberg,
             Judges.

             Judge MANNHEIMER.


             Erin A. Pohland, a former assistant attorney general, appeals her conviction
for official misconduct, AS 11.56.850(a). The State alleged that Pohland used her
position as legal advisor to the Alaska Labor Relations Agency to benefit her personal
friend, Skye McRoberts.
              Much of the evidence against Pohland was based on information obtained
during a search of her personal computer. This computer was seized when the state
troopers executed a search warrant for Skye McRoberts’s house — where Pohland was
renting an apartment. The troopers were looking for evidence of McRoberts’s potential
business and financial crimes, but they seized Pohland’s computer under the theory that
McRoberts might have hidden evidence of her crimes in any computer or electronic
storage device located within the house — even Pohland’s personal laptop, which was
found in Pohland’s apartment.
              Pohland contends that the search of her computer violated her rights under
the Fourth Amendment and under the corresponding provision of the Alaska Constitution
(Article I, Section 14). We agree with Pohland that the search of her computer was
unlawful. Even when the police have a warrant to search a house, a personal computer
must be treated differently from other objects or containers in the house. As the United
States Supreme Court explained in Riley v. California, 1 a police search of this kind of
personal digital device “[will] typically expose to the government far more than the most
exhaustive search of a [person’s] house”, because the device “not only contains in digital
form many sensitive records previously found in the home”, but also “a broad array of
private information never found in a home in any form”. 2
              As we explain in this opinion, the troopers did not have probable cause to
believe that Pohland’s personal laptop computer contained evidence of her landlord’s
financial and business crimes. Moreover, rather than confining their search to documents
and spreadsheets (i.e., computer files that were more likely to contain evidence of
financial and business crimes), the troopers obtained much of the evidence against


   1
       573 U.S. __, 134 S.Ct. 2473, 189 L.Ed.2d 430 (2014).

   2
       Riley, 573 U.S. at __, 134 S.Ct. at 2491.


                                            –2–                                      2632

Pohland by combing through thousands of Pohland’s personal text messages. (Pohland
was using her laptop computer as a backup device for the data stored on her smart
phone.)
             For these reasons, we reverse Pohland’s conviction.


       Underlying facts


             Pohland and Skye McRoberts were close friends, and Pohland lived in an
apartment (i.e., a suite of rooms) within McRoberts’s house.
             Pohland was also an assistant attorney general who advised the Alaska
Labor Relations Agency — the agency within the executive branch that dealt with labor
union matters.
             Pohland’s friend McRoberts worked as a union organizer for the Alaska
State Employees Association. The State Employees Association was engaged in an
effort to unionize the employees of the University of Alaska. In connection with this
effort, McRoberts submitted employee “interest” cards to the Labor Relations Agency
— cards purporting to express the interest of various University employees in becoming
members of the union. (Under Alaska law, at least 30 percent of a proposed bargaining
unit must express interest in becoming unionized. 3 )
             The Labor Relations Agency came to suspect that a number of these interest
cards might have been forged, so the Agency contacted Pohland for advice. Based on
the advice that Pohland gave to the Labor Relations Agency, Pohland was charged with
official misconduct.




   3
       See 08 AAC 97.060(c).

                                          –3–                                     2632

             Specifically, the State alleged that Pohland failed to tell the Agency that she
was close friends with McRoberts, that she lived in an apartment within McRoberts’s
home, that she had regularly discussed the unionization effort with McRoberts, and that
she had assisted McRoberts in this effort. The State further alleged that Pohland’s advice
to the Labor Relations Agency was designed to shield her friend McRoberts from any
official investigation into the possibility that McRoberts had forged, or had colluded in
forging, the employee interest cards.


      The seizure and search of Pohland’s computer, and the litigation of the
      suppression motion in the trial court


             In March 2011, the Alaska State Troopers obtained a warrant to search
McRoberts’s house for evidence that she and her husband, Donavahn McRoberts, had
committed forgery and falsification of business records relating to the forged interest
cards. More specifically, the search warrant authorized the troopers to search the house
for various kinds of documents “related to the business and finances” of McRoberts and
her husband, as well as documents related to the solicitation of potential union members
from the University of Alaska.
             When the troopers applied for this search warrant, they knew that Pohland
was good friends with McRoberts, they knew that the Labor Relations Agency had
sought advice from Pohland regardingthe forged interest cards, and they knew that there
were reasons to question the competence of Pohland’s advice to the Labor Relations
Agency.
             In particular, the search warrant affidavit recited that Pohland’s advice to
the Labor Relations Agency “did not follow the guidelines for forged Interest Cards laid
out in a National Labor Relations Manual”. The search warrant affidavit also asserted


                                           –4–                                         2632

that Pohland “failed to advise [the Agency] to contact law enforcement to investigate the
matter”, and that Pohland failed to tell the Labor Relations Agency that she was good
friends with McRoberts and that McRoberts was her landlord.
             However, both the troopers and the prosecutor assigned to the case later
conceded that, when the troopers applied for the warrant, they did not have probable
cause to believe that Pohland was complicit in McRoberts’s crimes.
             The search warrant issued by the district court contained a provision
authorizing the troopers to seize and search any computer or electronic storage media
“capable of concealing documents related to the business and finances associated with
Donavahn McRoberts or Skye McRoberts.”
             During the troopers’ ensuing search of McRoberts’s house, the troopers
identified Pohland’s separate apartment within the house. This area of the house did not
have separate egress to the street, but it was a suite of rooms comprising a bedroom, a
separate kitchen, a separate bathroom, and a clothes washer and dryer.
             While the troopers were searching Pohland’s apartment, they seized a
laptop computer. At the time, the troopers conducting the search presumed that the
laptop belonged to Pohland. A subsequent examination of the laptop’s hard drive
confirmed this assumption. The laptop contained numerous documents belonging to
Pohland, as well as thousands of text messages between Pohland and various people
(backup copies of texts from Pohland’s mobile phone).
             Many of these text messages were exchanged between Pohland and
McRoberts, and some of these text messages appeared to discuss the campaign to
unionize the university workers. These text messages became part of the State’s case
against Pohland when she was later charged with official misconduct for the advice that
she gave to the Labor Relations Agency.



                                          –5–                                       2632

             After Pohland was charged, her attorney asked the district court to suppress
the evidence obtained from the search of Pohland’s laptop.
             Pohland’s attorney argued that Pohland’s apartment was a separate living
space, and that the warrant authorizing a search of McRoberts’s house did not encompass
Pohland’s apartment. In the alternative, the defense attorney argued that the troopers did
not have probable cause to believe that Pohland’s personal laptop contained information
relevant to the crimes that the troopers were investigating (i.e., the crimes allegedly
committed by McRoberts and her husband).
             Following an evidentiary hearing, the district court denied Pohland’s
suppression motion.
             In its ruling, the district court acknowledged that, “generally, if a structure
is divided into more than one occupancy unit, probable cause must exist for each unit
[which is] to be searched.” The district court acknowledged that Pohland “had her own
living space” within McRoberts’s house, and that Pohland paid rent for this apartment.
The court also found that the entrance door into Pohland’s apartment was lockable —
even though that door was not locked when the troopers executed the search warrant.
             However, the district court concluded that Pohland’s apartment within
McRoberts’s house was not so sequestered as to constitute a separate occupancy unit for
Fourth Amendment purposes. The district court reached this conclusion because
Pohland’s apartment did not have its own separate egress to the street, because
McRoberts and Pohland were close friends (i.e., their relationship was not simply
landlord and tenant), and because the court found that McRoberts continued to have
“general access” to Pohland’s apartment “as the landlord and owner of the house”.
             The district court further concluded that, even though the troopers
presumed from the outset that the laptop seized from Pohland’s apartment belonged to
Pohland, and not McRoberts, the troopers nevertheless had probable cause to believe that

                                           –6–                                         2632

Pohland’s laptop contained evidence of McRoberts’s crimes. The district court pointed
out that the entry door to Pohland’s apartment was inside McRoberts’s house, and that
“there was no evidence that ... McRoberts was blocked from access to Pohland’s
apartment.” The court also again pointed out that Pohland and McRoberts were not
simply tenant and landlord; instead, they were close friends.
             The district court acknowledged (based on the investigating trooper’s
testimony, and based on the prosecutor’s express concession) that when the troopers
applied for the search warrant, they did not have probable cause to believe that Pohland
herself had committed any crime. Nevertheless, the district court concluded that the
troopers had probable cause to believe that McRoberts might have concealed evidence
of her own crimes within Pohland’s living area — including hiding this evidence on the
hard drive of Pohland’s laptop computer.
             The court therefore ruled that the search warrant authorized the troopers to
seize and search Pohland’s laptop.


      A preliminary note on the issue of whether the troopers could lawfully
      enter Pohland’s apartment to search for evidence of McRoberts’s crimes


             As we noted in the precedingsection of this opinion, the State concedes that
when the troopers applied for the search warrant, they did not have probable cause to
believe that Pohland was complicit in McRoberts’s crimes, or that Pohland was
knowingly concealingevidence of McRoberts’s crimes. Pohland argues that the troopers
therefore failed to establish probable cause to search her personal apartment within
McRoberts’s house.
             As explained in Professor LaFave’s treatise on search and seizure law, “a
search warrant for an apartment house or hotel or other multiple-occupancy building will


                                           –7–                                      2632

usually be held invalid if it fails to describe the particular subunit to be searched”.
Wayne R. LaFave, Search and Seizure: A Treatise on the Fourth Amendment (5th ed.
2012), § 4.5(b), Vol. 2, pp. 731-32. To prevent the police from searching the subunits
indiscriminately without probable cause, a search warrant for a multiple-occupancy
building must normally be supported by a showing of probable cause as to each unit to
be searched. See the cases cited in LaFave, § 4.5(b), n. 64, Vol. 2, pp. 732-33.
             This multiple-occupancy rule does not apply in situations where a single
residence is occupied by several people or families who share the common living
quarters, even though they each have a separate bedroom. Id., § 4.5(b), Vol. 2, p. 741.
But in Pohland’s case, as we have explained, her apartment was a suite that contained a
separate kitchen, a separate bathroom, and clothes washing appliances.
             Indeed, the search warrant application implicitly acknowledged that
Pohland’s apartment was a separate subunit within McRoberts’s house. The application
explained that McRoberts was Pohland’s landlord, and the application expressly sought
permission to search “any part of the residence ... that may be occupied or considered to
be in the control of Ms. Pohland.”
             The proposed justification for searching Pohland’s apartment was that
McRoberts was Pohland’s landlord, and that Pohland and McRoberts were close friends
— thus suggesting that McRoberts might have gained access to Pohland’s apartment and
hidden evidence of her own crimes there.
             In its decision, the district court ruled that the search of Pohland’s
apartment was lawful because the evidence presented at the later suppression hearing
showed that McRoberts may have had physical access to Pohland’s portion of the house.
In particular, the district court relied on evidence that, even though the main door to
Pohland’s apartment could be locked, it was not locked when the troopers entered the



                                          –8–                                       2632

house to execute the search warrant. From this, the district court concluded that “there
was no evidence that Skye McRoberts was blocked from access to Pohland’s apartment.”
             But it was not Pohland’s burden to show that McRoberts was affirmatively
blocked from access to her apartment. Rather, it was the State’s burden to prove that
McRoberts did, in fact, have access to Pohland’s apartment. Moreover, this showinghad
to be made in the search warrant application itself, not from after-acquired information.
And the critical question was not whether McRoberts was capable of physically entering
Pohland’s apartment. The issue here was whether the search warrant application offered
reason to believe that McRoberts had control over Pohland’s apartment to such a degree
that she would use that apartment to hide evidence of her own wrongdoing.
             Despite our questions about the district court’s ruling on this issue, we
conclude that we need not resolve these questions. As we explain in the next section of
this opinion, even if we assume that the search warrant application established probable
cause for a search of Pohland’s separate apartment, the troopers’ search of Pohland’s
laptop computer was unconstitutional.


      Why we conclude that the search of Pohland’s laptop computer was
      unconstitutional


             In its brief to this Court, the State argues that the search of Pohland’s laptop
computer was justified under the principle that a search warrant for a residence generally
authorizes the police to search personal effects found within the residence (so long as
those containers are capable of concealing the evidence described in the warrant). See
generally LaFave, § 4.10(b), Vol. 2, p. 946.




                                           –9–                                          2632

             The State’s argument rests on the premise that Pohland’s laptop computer
should be viewed as just another personal effect or closed container located in
McRoberts’s house. For the reasons we are about to explain, we reject this premise.
             Portable computingdevices — laptop computers, tablets, and smart phones
— are distinguishing features of modern life. These devices have changed the way we
communicate, and they have changed the way we create and store documents, personal
communications and correspondence, photographs, and business records.
             The contents of a person’s laptop, tablet, or smart phone will often offer a
compendium of that person’s family and social life, their private and business interests,
their recreational activities, and their intimate thoughts. And this digital technology is
now practically ubiquitous. According to the Pew Research Center, over 90 percent of
Americans own a cell phone, and the rate of computer ownership among adults is
roughly 75 percent. 4
             The prevalence of these digital devices has caused courts to re-think the
contours of the Fourth Amendment’s prohibition against unreasonable searches and
seizures. As the United States Supreme Court noted in Riley v. California, 573 U.S. __,
134 S.Ct. 2473, 189 L.Ed.2d 430 (2014), a police search of this kind of digital device
“[will] typically expose to the government far more than the most exhaustive search of
a [person’s] house”, because the device “not only contains in digital form many sensitive
records previously found in the home”, but also “a broad array of private information
never found in a home in any form”. Riley, 573 U.S. at __, 134 S.Ct. at 2491.
             Although Riley itself dealt with the search of a cell phone, other courts have
recognized that the rationale of Riley applies equally to computers and equivalent devices



   4
       See “Technology Device Ownership: 2015” (Oct. 29, 2015), available at:

   http://www.pewinternet.org/2015/10/29/technology-device-ownership-2015.


                                          – 10 –                                      2632

for storing electronic data. See United States v. Turner, 839 F.3d 429, 434 (5th Cir.
2016); United States v. Horton, 863 F.3d 1041, 1047 (8th Cir. 2017), cert. denied 138
S.Ct. 1440, 200 L.Ed.2d 721 (2018).
             As illustrated by the lengthy discussion that Professor LaFave devotes to
this issue — see LaFave (5th ed. 2012), § 4.10(d), Vol. 2, pp. 962-971, and the
accompanying pocket part (2017), pp. 113-15 — courts have grappled with two related
questions: First, what kind of probable cause must a court demand when the police seek
authorization to search a personal computer or other digital device? And second, what
level of particularity must a court demand when the court issues such a warrant?
             Turning to the question of what kind of probable cause was needed to
support the seizure and search of Pohland’s laptop computer, we note that the search
warrant in this case was issued to allow the troopers to search for evidence of crimes
committed by McRoberts — the suspected crimes of forgery and falsification of business
records. The troopers did not assert that Pohland was complicit in McRoberts’s forgeries
and falsifications of business records. Rather, the troopers’ justification for searching
Pohland’s apartment at all was that McRoberts might have concealed evidence of her
own wrongdoing inside Pohland’s living space.
             The warrant authorized the troopers to search for documents “related to the
business and finances” of Skye McRoberts and her husband Donavahn. And because
business and financial documents nowadays often take digital form, the warrant
contained a provision that authorized the troopers to seize and search all the “computers
and electronic storage media” within the house for such evidence.
             (Technically, the warrant contained a clause that limited this search to only
the computers and storage media that were “capable of concealing documents related to
the business and finances associated with Donavahn McRoberts or Skye McRoberts”.
But as a practical matter, this was an authorization to search every computer and digital

                                         – 11 –                                      2632

storage device in the house — because all such devices are “capable” of concealing
business and financial documents.)
             Putting all of this together, the troopers’ rationale for searching Pohland’s
laptop computer was not because Pohland was suspected of being an accomplice to
McRoberts’s crimes, but rather because (1) McRoberts was suspected of business and
financial wrongdoing, and (2) evidence pertaining to such crimes often takes the form
of digital documents, spreadsheets, etc., and (3) McRoberts had physical access to
Pohland’s living space, and thus (4) McRoberts might have hidden digital evidence of
her own crimes on the hard drive of Pohland’s laptop.
             This kind of speculation did not constitute probable cause to believe that
the evidence the troopers were seeking — i.e., documents pertaining to the business and
finances of McRoberts and her husband — would be found on Pohland’s laptop.
             In their search warrant application, the troopers offered no explanation of
why they thought that McRoberts could gain access to the hard drive of Pohland’s laptop
computer, even if McRoberts had physical access to Pohland’s living space. The fact
that Pohland’s laptop was physically located in a rented apartment within McRoberts’s
house, and the fact that McRoberts was Pohland’s landlord and close friend, does not
give rise to the inference that McRoberts had access to the contents of the hard drive in
Pohland’s laptop. Laptop computers are normally equipped with security mechanisms
that allow an owner to restrict access to the contents of the laptop by a password or by
a similar identification mechanism, such as a fingerprint.
             Nor did the troopers offer any explanation of why, even if McRoberts
somehow gained access to the laptop’s hard drive, McRoberts would choose to hide her
business and financial documents on a laptop computer owned by Pohland — a readily
portable device that was generally outside McRoberts’s immediate control.



                                          – 12 –                                     2632

              The State cites the Ninth Circuit’s decision in United States v. Adjani, 452
F.3d 1140 (9th Cir. 2006), for the proposition that a search warrant can validly
encompass computers and digital storage devices belonging to a third person who shares
a house with the target of the investigation. But the facts of Adjani differ materially from
the facts of Pohland’s case.
              In Adjani, the government was investigating a computer-based crime
(extortion by threatening disclosure of a confidential database), and the government’s
search warrant affidavit expressly asserted that Adjani’s girlfriend was involved in the
extortion scheme, either as a witting accomplice or at least as an innocent agent who had
been duped into performing acts that furthered the scheme. See Adjani, 452 F.3d at
1146-47 & n.4. The Ninth Circuit concluded that, in these circumstances, there was
probable cause to believe that evidence of Adjani’s computer-based crime could be
found on his girlfriend’s computer. Ibid.
              In contrast, the search warrant application in Pohland’s case did not assert
that McRoberts had committed a computer-based crime, nor did it assert that Pohland
was actively participating in McRoberts’s criminal scheme. And as we have explained,
the mere fact that Pohland’s laptop was physically located in an apartment within
McRoberts’s house did not give rise to the inference that McRoberts could access the
contents of the laptop’s hard drive, nor did it give rise to the inference that McRoberts
was likely to hide evidence of her own crimes on a computer that was controlled by
Pohland.
              Accordingly, we hold that the search warrant application did not establish
probable cause to seize and search Pohland’s laptop computer.
              In addition, the troopers did not confine their search of Pohland’s computer
to the materials specified in the search warrant. As we have explained, the warrant
authorized the troopers to search for digital business and financial records —

                                           – 13 –                                      2632

specifically, digital records related to the business and finances of McRoberts and her
husband — to the extent that these records were evidence of McRoberts’s suspected
crimes of forgery and falsification of business records.
              Because a modern personal computing device stores and indexes a huge
array of information about the private affairs and communications of its owner, all in one
place, an authorization to search any and all computing devices and electronic storage
devices can easily become the sort of general warrant that the Fourth Amendment was
designed to guard against. This is a situation where “the greatest care in [drafting a
search warrant’s] description is required”, since the likelihood “of [the] seizure of
innocent articles by mistake is the most substantial.” 5 Accordingly, courts have insisted
that warrants for a digital storage device provide a reasonably specific description of the
material that the police can search for within the device. 6
              In Pohland’s case, as we have already explained, the search warrant
authorized the troopers to seize and search all the computers and digital storage devices


   5
       LaFave, § 4.6(a), Vol. 2, p. 774.
   6
        See United States v. Russian, 848 F.3d 1239, 1245-46 (10th Cir. 2017) (holding that
a search warrant for a smart phone was insufficient because it failed to specify the particular
material being sought); State v. Henderson, 854 N.W.2d 616, 632-34 (Neb. 2014)
(invalidating a warrant for the search of a cell phone because the warrant failed to limit the
search to the content that was related to the probable cause); State v. Castagnola, 46 N.E.3d
638, 657-58 (Ohio 2015) (holding that a search warrant application must be clear as to what
the police are seeking on a computing device, and striking down a warrant that permitted the
police to examine every record and document on the defendant’s computer to find any
evidence of the defendant’s alleged crimes); Buckham v. State, 185 A.3d 1, 18-19 (Del.
2018) (striking down a warrant that authorized the police to search “any and all store[d] data
contained within the internal memory” of the defendant’s smart phone for evidence of a
shooting: “warrants issued to search electronic devices call for particular sensitivity” in light
of the “enormous potential for privacy violations” posed by unconstrained searches of these
devices).

                                             – 14 –                                         2632

in McRoberts’s house for digital business and financial records — more specifically,
records related to the business and finances of McRoberts and her husband — to the
extent that these business and financial records were evidence of McRoberts’s suspected
crimes of forgery and falsification of business records. 7
              But when the troopers searched Pohland’s laptop, they did not restrict their
search to business and finance documents that Skye McRoberts might have hidden on
Pohland’s computer. Instead, the troopers conducted a comprehensive examination of
the contents of Pohland’s laptop — including Pohland’s backup of the text messages
from her mobile phone. The troopers examined thousands of these text messages,
looking for any communication between Pohland and McRoberts, and some of the most
important evidence against Pohland was discovered among these text messages.
              By searching through these text messages, the troopers exceeded the
boundaries of any search that the warrant might reasonably have authorized, given the
warrant’s description of what could be seized.

   7
      The search warrant in this case authorized the seizure of the following documents and
records:
   •	 “bank statements, cancelled checks, and other records for bank accounts, investment
      accounts, CDs, IRAs, 401Ks, or other accounts”

   •	 “income tax records ... and any correspondence from the IRS”
   •	 “loan information from any source”

   •	 “business documents including mailing receipts, invoices, payment records, accounts
      receivable, employee payments, business expenses, and any other documentation of
      Grizzly Mail and Print Service or [any other] mail and print service ...operated by
      Donavahn McRoberts [or two other named persons] and/or Skye McRoberts”
   •	 “correspondence regarding collection of debts owed by Skye McRoberts or Donavahn
      McRoberts”
   •	 “documents for use in soliciting interest from potential bargaining union members”

                                           – 15 –	                                    2632

             For these reasons, we conclude that the search of Pohland’s laptop
computer violated the Fourth Amendment to the United States Constitution and Article I,
Section 14 of the Alaska Constitution. The evidence against Pohland obtained as a result
of that search must be suppressed.


      Conclusion


             The judgement of the district court is REVERSED.




                                         – 16 –                                    2632

       In the Court of Appeals of the State of Alaska



Erin Pohland,                                 )
                                              )     Court of Appeals No. A-12443
                        Appellant,            )
            v.                                )                  Order
                                              )
State of Alaska,                              )
                                              )
                        Appellee.             )    Date of Order: January 30, 2019
                                              )
Trial Court Case # 3AN-12-01066CR



       Before:     Chief Judge Mannheimer, Judge Allard, and Judge Wollenberg.


       Upon consideration of the petition for rehearing filed by the State of Alaska, IT
IS ORDERED:
                This Court’s earlier decision in this case, Pohland v. State, Opinion No.
2624, issued on November 23, 2018, is WITHDRAWN and is SUPERSEDED by
Opinion No. 2632, to be issued on February 1, 2019.
                Entered at the direction of the Court.
                                                  Clerk of the Appellate Courts

                                                                 /s/

                                                  Beth A. Pechota, Deputy Clerk
cc:	   Court of Appeals Judges
       Judge Jo-Ann Chung
       Trial Court Appeals Clerk - Anchorage

Distribution:
       Cynthia L Strout                                  Michal Stryszak
       Attorney at Law                                   Office of Criminal Appeals
       PO Box 221090                                     1031 W . 4th Ave, Suite 200
       Anchorage AK 99502                                Anchorage AK 99501
