Please E-mail suggested additions, comments and/or corrections to Kent@MoreLaw.Com.

Help support the publication of case reports on MoreLaw

Date: 08-25-2011

Case Style: Todd M. Chism v. Washington State

Case Number: 10-35085

Judge: Richard A. Paez

Court: United States Court of Appeals for the Ninth Circuit on appeal from the Eastern District of Washington (Spokane County)

Plaintiff's Attorney: Robert A. Dunn and Susan C. Nelson, Dunn & Black, P.S., Spokane, Washington, for plaintiff-appellants Todd M. Chism and Nicole C. Chism.

Defendant's Attorney: Robert M. McKenna, Attorney General, and Catherine Hendricks, Senior Counsel, Seattle, Washington, for defendantsappellees Rachel E. Gardner and John Sager.

Description: This civil rights action under 42 U.S.C. § 1983 arises from an internet child pornography investigation by Washington State Police (WSP) Officers Rachel Gardner and John Sager (“the officers”). As a result of information the officers acquired, Todd Chism became the focus of their investigation.

Gardner prepared an affidavit in support of a search warrant application, which Sager reviewed. On the basis of that affidavit, a magistrate judge issued a broad search warrant to search Todd Chism’s home and business office. Relying on the same information contained in Gardner’s affidavit, Deputy Prosecuting Attorney Christian Peters obtained from the same magistrate judge a warrant to arrest Todd for violating Washington’s child pornography laws.1 A few days later, several WSP officers executed the search and arrest warrants.2 A WSP detective eventually conducted forensic examinations of the Chisms’ home computer and computers from the Spokane Fire Department, where Todd Chism worked as a firefighter.

The investigation did not reveal any evidence of child pornography, and charges were never filed against Todd Chism.

Several months later, Todd and his wife, Nicole Chism, filed this § 1983 action against the State of Washington, the WSP, Detective Gardner, and Sergeant Sager, alleging— among other things not relevant to this appeal—that the officers violated their Fourth and Fourteenth Amendment rights by securing the search and arrest warrants with an affidavit that deliberately or recklessly contained material omissions and false statements.3 The Chisms and the officers filed cross motions for summary judgment on the issue of qualified immunity as to the constitutional claim. The district court granted the officers’ motion, concluding that the officers’ conduct did not violate a clearly established constitutional right of which a reasonable officer would have known. The Chisms timely appealed.

We reverse the district court’s judgment and remand this case for trial. Viewing the evidence in the light most favorable to the Chisms, we conclude that the Chisms have made a substantial showing of the officers’ deliberate falsehood or reckless disregard for the truth and have established that, but for the dishonesty, the searches and arrest would not have occurred. We also conclude that the officers are not entitled to qualified immunity because the Chisms’ right to not be searched and arrested as a result of judicial deception was clearly established at the time Gardner prepared and submitted her affidavit.

I. BACKGROUND

On July 3, 2007, Washington’s Missing and Exploited Children Task Force (MECTF) received a tip from the National Center for Missing and Exploited Children (NCMEC). The tip advised MECTF that roughly one week earlier, the web-hosting company Yahoo! had archived images of child pornography that were contained on the website http://foelonipwin-cmezixecvom.us/ (the “foel website”).

The tip listed Yahoo! user account qek9pj8z9ec@yahoo.com (the “first user account”) as the “suspect.” The tip stated that Internet Protocol (IP) address 68.113.11.494 was used to open the first user account on May 11, 2007. The tip did not provide the time or date that the child pornographic images were uploaded to the foel website, nor did it provide the IP address from which the child pornographic images were uploaded. Detective Gardner was assigned to investigate this tip.

On July 17, 2007, MECTF received another tip from NCMEC. Similar to the first tip, the July 17 tip indicated that two weeks earlier, Yahoo! archived images of child pornography that were contained on the website http://qemtudawyownufiseip.com (the “qem website”). The tip listed Yahoo! user account qaagwcyI9ab@yahoo.com (the “second user account”) as the “suspect.” The tip stated that IP address 67.160.71.115 was used to open the second user account on June 19, 2007. The tip did not provide the time or date that the child pornographic images were uploaded, nor did it provide the IP address from which the child pornographic images were uploaded. WSP Detective Vic Mauro was assigned to investigate this tip.

The detectives began their investigations by obtaining warrants to search Yahoo! records associated with the first and second user accounts.5 In agreement with the first NCMEC tip, the Yahoo! records indicated that the foel website was created on May 11, 2007. The information for the first user account listed the name “Mr. Nicole Chism” with birthday May 20, 1966. The information indicated that “Mr. Nicole Chism” lived in Chile and used zip code “ucc16.” The Yahoo! records also showed that the first user logged in to the account on June 18, 2007 from IP address 69.147.83.181, a different IP address than the one used to create the foel website. The billing information associated with the first user account listed Nicole Chism’s name and contained the Chisms’ correct residential address, phone number, and credit card number, which ended in 6907. Finally, the Yahoo! records showed that two months of “domain service” for the foel website had been paid with the Chisms’ credit card.6 The Chisms’ credit card statements confirm that they were twice charged a monthly fee for domain service for the foel website.

The information that Yahoo! provided about the second user account was similar in character. In agreement with the second NCMEC tip, the Yahoo! records indicated that the qem website was created on June 19, 2007. The information for the second user account listed the name “Mr. Nicole Chism” with a birthday of March 11, 1977; indicated that “Mr. Nicole Chism” was from Bolivia; and used zip code “nf897.” The Yahoo! records also showed that the second user logged in twice since opening the account. On July 3, 2007, the second user logged in twice: once from IP address 69.147.83.181 (the IP address from which the first user logged in on June 18, 2007), and once from a different IP address. Yahoo! did not provide any billing information for the second user account, but the Chisms’ credit card statements showed that Yahoo! charged them one hosting fee for the qem website on June 22, 2007.

Detectives Gardner and Mauro also independently obtained warrants to trace the IP addresses used to create the two user accounts and websites. Detective Gardner learned that the IP address used to open the first user account and to create the foel website was traced to Cheryl Corn of Walla Walla, Washington. The IP address used to open the second user account and to create the qem website was traced to Vitina Pleasant of Federal Way, Washington. It appears that neither Gardner nor Mauro traced IP address 69.147.83.181—the IP address from which the first user logged in on June 18, 2007 and the second user logged in on July 3, 2007.

A few months later, Mauro’s assignment was transferred to WSP Detective Shelby Wilcox. After reviewing the information from Yahoo!, Gardner and Wilcox noticed that both user accounts used the name “Mr. Nicole Chism” and both websites had at some point been accessed from the IP address 69.147.83.181. Gardner and Wilcox concluded that the tips might be connected, and Gardner took over the investigation of both tips. Gardner decided to investigate the Chism lead, largely because Nicole’s name was common to both tips.

Gardner first determined that the Chisms’ 6907 card was a Bank of America Visa credit card. Gardner contacted Bank of America in September 2007 and learned from a Bank of America employee that the Chisms had reported a lost credit card in 2006. The 6907 card was a replacement for the lost card. The Bank of America employee, however, informed Gardner that no fraudulent activity had been reported on the 6907 card.7 Gardner eventually obtained credit card statements for the 6907 card and confirmed that the Chisms had paid two charges for the foel website and one charge for the qem website. On the basis of this information, Gardner concluded that there was probable cause to believe that Todd Chism had committed a crime.

In January 2008, Gardner submitted a search warrant application and affidavit to a magistrate judge and obtained a warrant to search the Chisms’ home in Nine Mile Falls, Washington, and Todd Chism’s workplace in Spokane, Washington.

Sager reviewed the affidavit and agreed that probable cause existed. On the same day, Deputy Prosecuting Attorney Christian Peters obtained a warrant to arrest Todd for “[s]ending, bringing into the state depictions of minor engaged in sexually explicit conduct and [p]ossession of depictions of [m]inor engaged in sexually explicit conduct.”

The warrants were executed five days later. WSP officers arrested, detained, and interrogated Todd; they scoured the Chisms’ home; and they seized the Chisms’ computers. No child pornography was found, and criminal charges were never filed against Todd.

The Chisms sued the State of Washington, the WSP, Detective Gardner, and Sergeant Sager under 42 U.S.C. § 1983, alleging violations of their constitutional rights. Both the Chisms and the officers moved for summary judgment on the issue of qualified immunity, and the district court granted the officers’ motion and denied the Chisms’ motion. The district court then declined to exercise supplemental jurisdiction over the Chisms’ state law claims, pursuant to 28 U.S.C. § 1367(c)(3), and dismissed them. The Chisms appeal the district court’s grant of summary judgment.

II. ANALYSIS

[1] We review de novo a grant of summary judgment on the ground of qualified immunity, and “must determine, viewing the evidence in the light most favorable to the nonmoving party, whether there are any genuine issues of material fact and whether the district court correctly applied the relevant substantive law.” Prison Legal News v. Lehman, 397 F.3d 692, 698 (9th Cir. 2005) The officers are entitled to qualified immunity unless: (1) the Chisms have “ma[de] out a violation of a constitutional right,” and (2) “the right at issue was ‘clearly established’ at the time of [the officers’] alleged misconduct.” Pearson v. Callahan, 555 U.S. 223, 232 (2009) (citing Saucier v. Katz, 533 U.S. 194, 201 (2001)); Bull v. City and Cnty. of San Francisco, 595 F.3d 964, 971 (9th Cir. 2010) (en banc). We may consider the two prongs of the qualified immunity analysis in any order. Pearson, 555 U.S. at 236. We begin with the first prong.

A. Constitutional Violation

[2] The Chisms argue that the officers violated their Fourth Amendment rights through judicial deception.8 For the Chisms’ judicial deception claim to survive summary judgment, the Chisms “must 1) make a substantial showing of [the officers’] deliberate falsehood or reckless disregard for the truth and 2) establish that, but for the dishonesty, the [searches and arrest] would not have occurred.” Liston v. Cnty. of Riverside, 120 F.3d 965, 973 (9th Cir. 1997) (citing Hervey v. Estes, 65 F.3d 784, 788-89 (9th Cir. 1995)) (internal quotation marks omitted).9

[3] We first observe that Gardner’s affidavit contained several false statements and omissions. The first false statement contained in Gardner’s affidavit was her assertion that, “[b]ased on the information received from NCMEC about the images downloaded by Todd M. Chism, it is likely to believe he was using internet service at his residence and/or his business office.” Gardner’s allusion to “images downloaded by Todd M. Chism” is inaccurate. When Gardner drafted the affidavit, she possessed no information that Todd had ever accessed any child pornographic images, let alone the particular images that were uploaded to the qem and foel websites.

Nor did Gardner have any evidence that the images were ever downloaded by anyone. As far as Gardner knew, the only evidence linking Todd to the websites was the fact that the credit card he shared with Nicole was used to pay the hosting fees for the sites. Thus, Gardner’s assertion that Todd downloaded images of child pornography was not a truthful representation of the evidence she had gathered.

[4] The second false statement contained in Gardner’s affidavit was her assertion that the Chisms’ credit card was “used to purchase the images of child pornography from the website.”

This statement was false because the Chisms’ credit card was not used to buy images of child pornography. Rather, the Chisms’ card was used to pay hosting fees for the sites to which illegal images were uploaded at some unknown time, date, and location. Gardner’s statement that the Chisms’ card purchased child pornographic images was therefore patently false.

[5] Gardner’s affidavit also contained several serious omissions.

First, Gardner omitted her discovery that the IP addresses that were used to open the offending Yahoo! user accounts and websites were traced to people other than the Chisms. Second, Gardner omitted the fact that a third IP address—69.147.83.18—was used to log in to both the first and second user accounts on June 18, 2007, and that this IP address was never traced. Third, Gardner omitted the fact that Nicole shared the 6907 credit card account with Todd, even though Nicole’s name—not Todd’s—was associated with the two user accounts. Fourth, Gardner did not report that the user accounts contained nonsensical identifying information.10 Having determined that Gardner’s affidavit contained false statements and omissions, we next consider whether the Chisms have made a substantial showing of the officers’ intentional or reckless disregard for the truth; and, if so, whether their false statements and omissions were material to the probable cause determinations. Liston, 120 F.3d at 973.

1. Intentional or Reckless Deception

[6] As a first element of their judicial deception claim, the Chisms must demonstrate that the officers acted deliberately or with reckless disregard for the truth in preparing the affidavit.

Id. at 973. Because the Chisms appeal from a grant of summary judgment, they need only make a “substantial showing” of the officers’ deliberate or reckless false statements and omissions. Id. “Clear proof of deliberat[ion] or reckless[ness] is not required” at the summary judgment stage. United States v. Stanert, 762 F.2d 775, 781 (9th Cir.), amended by 769 F.2d 1410 (9th Cir. 1985). If the Chisms make such a substantial showing, then “the question of intent or recklessness is a factual determination” that must be made by the trier of fact. Liston, 120 F.3d at 974 (internal quotation marks omitted).

Viewing the evidence in the light most favorable to the Chisms, we conclude that the Chisms have made a substantial showing that the officers’ deception was intentional or reckless. The most commonsense evidence that the officers acted with at least a reckless disregard for the truth is that the omissions and false statements contained in the affidavit were all facts that were within Gardner’s personal knowledge. For example, Gardner’s false reference to “images downloaded by Todd Chism” was a statement that Gardner knew to be false when she drafted her affidavit.

[7] The declaration Gardner filed in the district court similarly demonstrates that she knew that the IP addresses used to register the user accounts and websites were traced to other people, and that she knew that the identifying information for the Yahoo! accounts was nonsensical. The fact that the affidavit did not report important factual information that was within the officers’ knowledge at the time Gardner prepared her affidavit would allow a reasonable factfinder to conclude that the officers acted with at least a reckless disregard for the truth. See Butler v. Elle, 281 F.3d 1014, 1025-26 (9th Cir. 2002) (per curiam); Stanert, 762 F.2d at 781; see also Liston, 120 F.3d at 975 (“Given the importance of the [omitted information] to the probable cause analysis . . . a jury could reasonably conclude that [the affiant’s] failure to mention [that information] in his affidavit amounted to at least reckless disregard for the truth.”).

[8] A reasonable factfinder could also find that the officers acted recklessly or intentionally because the false statements and omissions contained in the affidavit all bolster the case for probable cause, which suggests that the mistakes were not the product of mere negligence. It is conspicuous that, cumulatively, the omissions purged the affidavit of any reference to the possibility that someone other than Todd Chism was responsible for the offending websites. Corn and Pleasant were the people to whom the offending IP addresses were traced, yet this information was omitted from the affidavit. Nicole Chism’s credit card information was used to pay the hosting fees, yet the fact that Nicole was an authorized user of the credit card was omitted from the affidavit. All of the information in each Yahoo! profile was nonsensical, yet this information was omitted from the affidavit. In short, the net effect of Gardner’s omissions was to obscure the prospect that someone other than Todd Chism might have registered the websites and uploaded images of child pornography. We have no difficulty deciding that a reasonable factfinder, viewing the evidence in the light most favorable to the Chisms, could conclude that Gardner’s omissions reflected an affiant “reporting less than the total story . . . [to] manipulate the inferences a magistrate will draw.” Stanert, 762 F.2d at 781. Accordingly, we hold that the Chisms made a substantial showing of the officers’ reckless or intentional disregard for the truth.

2. Materiality of the False Statements and Omissions

[9] Our inquiry does not end with the Chisms’ substantial showing that the affidavit contained reckless or deliberate false statements and omissions. To make out their judicial deception claim, the Chisms must also establish that the false statements and omissions were material to the magistrate judge’s probable cause determination. Our inquiry into whether the false statements and omissions were material is a purely legal question, which we analyze de novo. See Butler, 281 F.3d at 1024. The false statements and omissions contained in Gardner’s affidavit were material if “the affidavit, once corrected and supplemented,” would not have provided a magistrate judge with a substantial basis for finding probable cause. Stanert, 762 F.2d at 782. We conclude that a corrected version of Gardner’s affidavit would not have provided the magistrate with a substantial basis for finding probable cause.

i. Materiality as to the Search Warrants

[10] While there is no “numerically precise degree of certainty corresponding to probable cause, . . . it is clear that only the probability, and not a prima facie showing, of criminal activity is the standard of probable cause.” Illinois v. Gates, 462 U.S. 213, 235 (1983) (citing Spinelli v. United States, 393 U.S. 410, 419 (1969)) (internal quotation marks omitted). The Supreme Court has declined to articulate a “neat set of legal rules” for evaluating probable cause, id. at 232, and instead has instructed magistrate judges to determine probable cause by considering the “totality-of-the-circumstances,” id. at 230. In issuing a search warrant, the magistrate judge simply must determine whether there is a “fair probability” that evidence of a crime will be found. Id. at 238, 246.

[11] Our probable cause analysis is guided by United States v. Gourde, 440 F.3d 1065 (9th Cir. 2006) (en banc), a recent case involving the search of a criminal defendant’s computer for images of child pornography. In Gourde, we held that three key pieces of evidence, considered together, were sufficient to establish probable cause to believe Gourde’s computer contained images of child pornography:

(1) that the accessed website “was a child pornography site whose primary content was in the form of images”; (2) that as a subscriber to the website, “Gourde had access and wanted access to these illegal images”; and (3) that “[h]aving paid for multi-month access to a child pornography site,” and owing to the “long memory of computers,” Gourde’s computer was likely to contain evidence of a crime. Id. at 1070-71. In other words, we looked for evidence in the affidavit: (1) that a crime was committed; (2) that it was Gourde who committed the crime; and (3) that evidence of the crime would be found in the place to be searched. In light of this “triad of solid facts,” we concluded that “the reasonable inference that Gourde had received or downloaded [child pornographic] images easily meets the ‘fair probability’ test.” Id. at 1071.

We use this framework to determine whether Gardner’s affidavit would have supported probable cause if it had presented a truthful description of the evidence she collected during her investigation of Todd Chism.

[12] Like the website at issue in Gourde, the parties do not dispute that the qem and foel websites here contained images of child pornography. Therefore, Gardner’s affidavit meets the first prong of the Gourde inquiry: it presents evidence that a crime was committed. We also assume without deciding that Gardner’s affidavit satisfied the third prong of the Gourde framework by presenting evidence that a computer used to upload child pornographic images would contain evidence of a crime.11 The remaining prong of the Gourde inquiry requires us to consider whether a truthful version of Gardner’s affidavit would have provided a “fair probability” that Todd Chism committed a crime.

[13] A truthful version of Gardner’s affidavit would have indicated that the sole evidence connecting Todd Chism to the child pornographic images was the fact that the credit card he shared with Nicole was charged three times for hosting the websites that contained child pornographic images. This connection is a far cry from the facts presented in the affidavit, which stated that Todd “downloaded” and “purchase[d]” child pornography.12 A supplemented version of Gardner’s affidavit also would have informed the magistrate judge that the IP addresses used to register the websites were traced to people other than the Chisms, and that the Yahoo! user accounts associated with the websites contained nonsensical identifying information. In considering all of the information available to the officers, we do not think it sufficient to establish a fair probability that evidence of a crime would be found at the Chisms’ home or Todd Chism’s office.

[14] We find it particularly significant that the IP addresses from which the qem and foel websites were created were traced to internet subscribers hundreds of miles away from the Chisms’ home in Nine Mile Falls, Washington. We have explained that a computer that is connected to the internet can be uniquely identified by its IP number, much like a land-line phone can be uniquely identified by its phone number. See Forrester, 512 F.3d at 510 n.5. Moreover, we have repeatedly recognized the utility of using IP address information to investigate child pornography offenders. See United States v. Craighead, 539 F.3d 1073, 1080-81 (9th Cir. 2008) (holding that probable cause existed where the IP address from which child pornographic images were shared was traced to the defendant); United States v. Hay, 231 F.3d 630, 634-35 (9th Cir. 2000) (holding that an affidavit demonstrated probable cause where the agent carefully detailed how the IP address associated with the child pornographic images was connected to the defendant). Our sister circuits take the same approach.

See, e.g., United States v. Vosburgh, 602 F.3d 512, 526-27 (3d Cir. 2010) (“[S]everal Courts of Appeals have held that evidence that the user of a computer employing a particular IP address possessed or transmitted child pornography can support a search warrant for the physical premises linked to that IP address.”) (footnote omitted); United States v. Stults, 575 F.3d 834, 843-44 (8th Cir. 2009); United States v. Perrine, 518 F.3d 1196, 1205-06 (10th Cir. 2008); United States v. Perez, 484 F.3d 735, 738-40 (5th Cir. 2007); United States v. Wagers, 452 F.3d 534, 539 (6th Cir. 2006)); Hay, 231 F.3d at 635-36; see also United States v. Bynum, 604 F.3d 161, 165 (4th Cir. 2010).

[15] Here, the IP address associated with child pornographic images led to locations different from the locations to be searched, and the affidavit did not establish a physical link between the illegal images and the locations to be searched.13 Several inferences would have to be drawn in order to conclude that Todd violated Washington’s laws against child pornography. First, one would have to infer that Todd had used his wife’s name rather than his own to pay the hosting fees for the sites. One would also have to infer that Todd devised a way to access the foel and qem websites with a forged IP address. Finally, one would have to infer from the previous two inferences that Todd was the person who uploaded the child pornographic images from his computer to the websites at an unknown time, date, and location. This convoluted string of inferences reduces the possibility that child pornography would be found at Todd Chism’s home and office to far below a “fair probability.” See United States v. Weber, 923 F.2d 1338, 1345 (9th Cir. 1990) (explaining that “with each succeeding inference, the last reached is less and less likely to be true.”).14

Our conclusion also finds support in the WSP’s training materials, which explain:

Much, if not all, of the cyber-evidence (the E-mail addresses and IP addresses used) will lead you to an innocent person. That’s why simply identifying which account was used to commit a crime does not provide you with probable cause to get a search or arrest warrant for the name and address on that account. You’ll need to do more investigating to determine if there is a link between the account holder (or other members of the household) with the criminal activity that was committed with that account.

The affidavit submitted by Marcus Lawson, the president of a computer forensic company that examined Todd Chism’s computers similarly admonishes:

[T]o have any success as an Internet criminal, regardless of whether one was a thief, a hacker or a child pornography collector, it would be incumbent to use other people’s identities to do so. . . . It is primarily for this reason that relying only on information provided by the user of a credit card that is associated with criminal activity is inherently unreliable. (emphasis added).

[16] We are mindful that “[a] letter-perfect affidavit is not essential.” United States v. Esparza, 546 F.2d 841, 844 (9th Cir. 1976). In this case, however, we do not believe that a reasonable magistrate judge would have issued the search warrant if she had been apprised of an accurate version of the evidence. We therefore hold that the affidavit’s false statements and omissions were material to the probable cause determination for the search warrants.

ii. Materiality as to Todd Chism’s Arrest

[17] Unlike the search warrants—which were supported by Gardner’s affidavit—the warrant for Todd’s arrest was supported by a Certification of Probable Cause (CPC) from Peters, a state prosecutor. In the CPC, Peters cited Gardner’s investigation as the source of his information.

[18] Like Gardner’s affidavit, Peters’ CPC contained material false statements and omissions. For example, like Gardner’s affidavit, Peters’ CPC stated that the Chisms’ card was used to “purchase the images of child pornography,” which is a false statement. Also like Gardner’s affidavit, Peters’ CPC omitted critical information, including the fact that the IP addresses used to create the Yahoo! user accounts and websites were traced to Corn and Pleasant. Peters similarly withheld the fact that the two Yahoo! user accounts contained nonsensical identifying information for the Chisms, and that Nicole shared the 6907 credit card with Todd. These false statements and omissions were material as to Todd Chism’s arrest for the reasons discussed above.

[19] That the CPC supporting probable cause was submitted by Peters—not Gardner—is inconsequential. In fact, the officers do not dispute that they might be held responsible for damages stemming from Todd’s arrest even though the warrant for this arrest was supported by Peters’ CPC rather than Gardner’s affidavit. Moreover, we have held that a “deliberate or reckless omission by a government official who is not the affiant can be the basis for a [suppression claim under Franks v. Delaware, 438 U.S. 154 (1978)].” United States v. DeLeon, 979 F.2d 761, 764 (9th Cir. 1992). Because Franks suppression claims and judicial deception claims under § 1983 involve the same constitutional right, we do not see any reason to distinguish DeLeon from this case. Hervey, 65 F.3d at 789 (“The showing necessary to get to a jury in a section 1983 action is the same as the showing necessary to get an evidentiary hearing under Franks.”). Therefore, we hold that the Chisms have made out a judicial deception claim for Todd’s arrest.

B. Qualified Immunity

[20] Qualified immunity shields the officers from liability “insofar as their conduct d[id] not violate clearly established statutory or constitutional rights of which a reasonable person would have known.” Harlow v. Fitzgerald, 457 U.S. 800, 818 (1982). Although there are genuine triable issues of fact as to the merits of the Chisms’ judicial deception claim, our discussion in the previous section demonstrates that the Chisms have made an adequate showing that there was a constitutional violation. Therefore, we must consider whether the Chisms’ constitutional rights were clearly established at the time that Gardner submitted her affidavit.

[21] In determining whether the Chisms’ constitutional rights were clearly established at the time of the officers’ conduct, we ask whether the contours of the Chisms’ rights were so clear that “every ‘reasonable official would have understood that what he is doing violates that right.’ ” Ashcroft v. al-Kidd, 131 S. Ct. 2074, 2083 (2011) (quoting Anderson v. Creighton, 483 U.S. 635, 640 (1987)). Although “[w]e do not require a case directly on point, [ ] existing precedent must have placed the statutory or constitutional question beyond debate.” Id.

[22] Our analysis of this prong is brief because we have already held that governmental employees are not entitled to qualified immunity on judicial deception claims. In Branch v. Tunnell, 937 F.2d 1382 (9th Cir. 1991) (overruled on other grounds by Galbraith v. City and Cnty. of Santa Clara, 307 F.3d 1119 (9th Cir. 2002)), we explained that if an officer submitted an affidavit that contained statements he knew to be false or would have known were false had he not recklessly disregarded the truth and no accurate information sufficient to constitute probable cause attended the false statements, . . . he cannot be said to have acted in a reasonable manner, and the shield of qualified immunity is lost.

Id. at 1387 (quoting Olson v. Tyler, 771 F.2d 277, 281 (7th Cir. 1985)) (internal quotation marks omitted). We have consistently applied the rule that summary judgment on the ground of qualified immunity is not appropriate once a plaintiff has made out a judicial deception claim.15 See, e.g., Liston, 120 F.3d at 972; Hervey, 65 F.3d at 788. In light of Branch, Liston, and Hervey, we conclude that “every ‘reasonable official would have understood’ ” that the Chisms had a constitutional right to not be searched and arrested as a result of judicial deception. al-Kidd, 131 S. Ct. at 2083. We therefore hold that the officers are not entitled to qualified immunity.

* * *

See: http://www.ca9.uscourts.gov/datastore/opinions/2011/08/25/10-35085.pdf

Outcome: For the foregoing reasons, we reverse the district court’s grant of summary judgment to the officers. REVERSED AND REMANDED.

Plaintiff's Experts:

Defendant's Experts:

Comments:



Find a Lawyer

Subject:
City:
State:
 

Find a Case

Subject:
County:
State: