Who’s Got Mail? The Fourth Amendment Impact of Pseudonyms

Timothy S. Iversen
Volume 31
,  Issue 3

Introduction

What do online drug dealers and Alexander Hamilton have in common? They use pseudonyms. While Hamilton used the pseudonym Publius in the Federalist Papers to help forge a nation, online drug dealers use pseudonyms to poison citizens. Pseudonyms help mask ownership of illegal drugs during delivery to the customer. And who do those online drug dealers prefer as their business partner for making deliveries? The federal government.

The United States Postal Service (“USPS” or “Postal Service”) is aware of this problem.1U.S. Postal Serv., Off. of Inspector Gen., Use of Postal Service Network to Facilitate Illicit Drug Distribution 1 (2018), https://perma.cc/4S7K-Z7JB. In a sample of online advertisements for illegal drugs, sellers noted their preference for utilizing the Postal Service, touted its reliability, and even offered reshipments for unsuccessful deliveries.2Id. at 10. One “cocaine trafficker claimed to have used the Postal Service to successfully distribute nearly 4,000 shipments, stating that they had a 100 percent delivery success rate.”3Id. Using pseudonyms helps achieve this high success rate by avoiding the scrutiny that might follow from using their real names.

Criminals use pseudonyms regularly to support their criminal activity. In early 2020, Rebecca Morta had more than fifty grams of crystal methamphetamine sent to her father’s residence in Guam through USPS Priority Mail.4United States v. Morta, No. 1:21-cr-00024, 2022 WL 1447021, at *1, *3 (D. Guam May 9, 2022). In 2016, Faruq Rose received over four kilograms of cocaine that was sent to his friend’s house through FedEx.5United States v. Rose, 3 F.4th 722, 725–26 (4th Cir. 2021). The problem is also larger than just drugs. From 2008 to 2012, Darren Stokes, posing as fake trade organizations, solicited thousands of businesses for fraudulent membership dues that were to be delivered to his P.O. Box.6United States v. Stokes, 829 F.3d 47, 49–50 (1st Cir. 2016). The defendants used pseudonyms7When the term “pseudonym” is used throughout this Comment, it refers to situations where “made-up” or fictitious names are used, and situations where names of uninvolved people are used as either sender or addressee. This Comment analyzes several cases that indicate a difference between the two situations without any cognizable legal reason why they should be handled differently. In those cases, this Comment provides a factually accurate description. in all three cases.8See Morta, 2022 WL 1447021, at *3–4; Rose, 3 F.4th at 725; Stokes, 829 F.3d at 49.

Hiding identities, however, can also be used for activities that are legal and beneficial to society. During the formative years of the United States, numerous Founding Fathers used pseudonyms to focus debate on their ideas rather than identities, and people continue that tradition today.9See Jordan E. Taylor, Anonymous Criticism Helped Make America Great, Wash. Post (Sept. 8, 2018, 3:45 AM), https://perma.cc/M4HM-EBML. During President Donald Trump’s administration, Miles Taylor, a chief of staff at the Department of Homeland Security, published articles and books as “Anonymous” to ensure that his claims regarding the president would be analyzed on their merits rather than who he was.10Michael D. Shear, Miles Taylor, A Former Homeland Security Official, Reveals He Was ‘Anonymous’, N.Y. Times (Oct. 28, 2020), https://perma.cc/KUH8-55H4. Other whistleblowers might mail materials to parties who could make beneficial use of them and may need to use pseudonyms to help protect themselves while doing so.11See Paul Farhi, ‘Hello. This Is John Doe’: The Mysterious Message That Launched the Panama Papers, Wash. Post (Apr. 6, 2016, 5:50 PM), https://perma.cc/5MTT-SR34; see also, Office of the Whistleblower, Frequently Asked Questions, U.S. Sec. & Exch. Comm’n (Apr. 6, 2023) https://perma.cc/4NLF-75PR.

When police investigate criminal activities involving mail, the use of a pseudonym can be one sign (among many) that illegal activity is afoot.12See Morta, 2022 WL 1447021, at *1–2. But the impact of pseudonym usage on the Fourth Amendment rights of those involved in mail is different from its evidentiary relevance to the existence of reasonable suspicion or probable cause.13See United States v. Pitts, 322 F.3d 449, 459 n.1 (7th Cir. 2003). Use of pseudonyms on mail can impact Fourth Amendment rights in several ways. One is whether defendants have “standing” to contest the police search of the mail that bore a name other than that by which they are known.14When referring to whether a person has standing, the term also refers to whether an individual’s “personal” reasonable expectation of privacy has been invaded such that he has a cognizable claim that his personal Fourth Amendment rights have been violated. The Supreme Court has previously used the term “standing” for this analysis in cases such as Jones v. United States, 362 U.S. 257, 264–65 (1960), overruled in part by United States v. Salvucci, 448 U.S. 83, 94–95 (1980). The Court later determined that “labeling the inquiry identified in Jones as one of standing” did not “materially aid[]” it, and indicated that what was previously analyzed under “standing” was simply a question of “whether or not the proponent of the motion to suppress has had his own Fourth Amendment rights infringed by the search and seizure which he seeks to challenge.” Rakas v. Illinois, 439 U.S. 128, 133 (1978). Many courts and academics, however, continue to use the term “standing” as shorthand when conducting the same analysis. 1 John Wesley Hall, Jr., Search and Seizure § 4.01, at 4-3 n.4 (5th ed. 2013); e.g., United States v. Smith, 39 F.3d 1143, 1144 (11th Cir. 1994); Julian A. Cook III, Policing in the Era of Permissiveness: Mitigating Misconduct Through Third-Party Standing, 81 Brook. L. Rev. 1121, 1145–46 (2016). In the interest of making this Comment easier to read and write (with apologies to the Supreme Court), I participate in this convention, using “standing” and “personal Fourth Amendment rights” interchangeably. Another is whether using pseudonyms weakens substantive Fourth Amendment rights under the two different methods of determining whether the Fourth Amendment applies in a given situation. Those methods are a property-rights or reasonable expectation of privacy analysis.

Currently, the circuit courts are split on these closely related questions.15Morta, 2022 WL 1447021, at *5–8. The Court of Appeals for the Fourth Circuit held a subjective intent to receive a package sent to someone else’s name, absent any of the traditional property-based indicators of possession or ownership, was insufficient to receive the protections of the Fourth Amendment.16United States v. Rose, 3 F.4th 722, 730 (4th Cir. 2021). The Court of Appeals for the Fifth Circuit held that “individuals may assert a reasonable expectation of privacy in packages addressed to them under fictitious names.”17United States v. Villarreal, 963 F.2d 770, 774 (5th Cir. 1992). Putting a finer point on it, the Court of Appeals for the Seventh Circuit held that using pseudonyms does not eliminate an expectation of privacy in the mail, although it can be used as evidence of abandonment.18Pitts, 322 F.3d at 456–57, 459. Finally, the Court of Appeals for the Eleventh Circuit held that using a pseudonym weakens a person’s expectation of privacy in the mail to the point where the person does not have standing.19Smith, 39 F.3d at 1145. Even though the police knew the intended recipient of the mail before encountering it, the police’s prior knowledge did not affect the Eleventh Circuit’s standing decision.20See id. at 1144.

This Comment proposes the following to answer these questions and resolve this split. For the government to rely on an argument that a defendant does not have standing or a personal expectation of privacy, it must have diligently investigated whether a privacy or property interest in the mail was reasonably identifiable as belonging to a distinct person before the search. If the government proves that its diligent investigation did not identify the defendant as having an interest in the mail, the defendant will not have standing. The formulation of this answer resolves and avoids several problems. First, it ensures the burden is on the government to show someone did not make their ownership or privacy interest reasonably identifiable to the delivering party. Second, it allows for the continued beneficial use of mail with pseudonyms without allowing the government free rein to search that mail. Finally, it respects current Supreme Court precedent prohibiting a defendant from claiming the government has violated other people’s rights in obtaining evidence against that defendant, commonly referred to as “third-party standing.”

Part I reviews some basics of Fourth Amendment search and seizure protections. It examines the reasonable expectation of privacy and property-rights analyses of Fourth Amendment protection. While these different methods of analysis are not as cleanly split in reality, the proposed solution must be defensible under either rationale. Part II then examines the various approaches the federal circuit courts have taken to resolve this issue. The circuit courts have used both privacy- and property-based analyses but have reached different conclusions. Both analyses can be used to argue the Fourth Amendment should or should not apply. Next, Part III analyzes the cases and background law to determine whether a strictly legal answer seems apparent. It then demonstrates how the purely legal answer seems insufficient as it does not protect beneficial uses of pseudonyms. Part IV proposes how the legal framework should be changed to protect the beneficial uses of pseudonyms while respecting precedent. It then examines the proposed solution and tests it on various cases drawn from case law and hypothetical situations. This solution grants more protection than is necessary per current Supreme Court precedent but, by doing so, makes allowances for the weighty interests of the legitimate use of pseudonyms. This Comment concludes with a short acknowledgment of other proposed solutions and their legal and practical insufficiencies.

I.      The Fourth Amendment’s Protection of Mail

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.21U.S. Const. amend. IV.

The Supreme Court did not rule on the Fourth Amendment for nearly 100 years.22See Michael C. Gizzi & R. Craig Curtis, The Fourth Amendment in Flux: The Roberts Court, Crime Control, and Digital Privacy 25 (2016). In 1877, the Court first broached the subject of mail that had been seized for a criminal investigation in Ex parte Jackson,2396 U.S. 727 (1877). when it stated in dicta that there were two categories of mail.24Ex parte Jackson, 96 U.S. at 733. The first category was mail “intended to be kept free from inspection, such as letters, and sealed packages subject to letter postage.”25Id. The second category was mail “open to inspection, such as newspapers, magazines, pamphlets, and other printed matter, purposely left in a condition to be examined.”26Id. Here, the Court noted practical distinctions between the items entrusted to the Postal Service for delivery.27See id. The first category was those items the sender had sealed, and as such, those items were entitled to remain so against Postal Service inspection.28See id. The second was those that, by their physically unsealed condition, were capable of being perused without violating their integrity.29See id.

The Postal Service is an independent agency of the executive branch, so the Fourth Amendment applies to its actions when it conducts a search.30See 39 U.S.C. § 201. The Fourth Amendment still governs searches by government employees based on information obtained from third parties, but the reasonableness of the search is more fact-specific. Items delivered by private, non-government organizations are easily inspected by their employees, unlike those delivered by the Postal Service.31See United States v. Jacobsen, 466 U.S. 109, 113–15 (1984). There have been situations, however, where the private, non-government party shipping an item grows suspicious and notifies police before probable cause exists for a search.32See United States v. Villarreal, 963 F.2d 770, 772–73 (5th Cir. 1992). Government agents may legally search an item to the same extent as a third party who has already opened and searched that item and located evidence of criminal activity.33Jacobsen, 466 U.S. at 113–17. Throughout this Comment, two situations are most relevant: (1) the Postal Service is delivering a package, or (2) a third party is shipping a package but notifies police of suspicious activity before opening it.

A.      Generally Applicable Legal Principles

Mail is property.34See 18 U.S.C. § 1708. Mail delivery then can be considered a contract between the sender and the deliverer, with the addressee being a third-party beneficiary.35See United States v. LaFrance, 879 F.2d 1, 7 (1st Cir. 1989); State v. Barnthouse, 380 P.3d 952, 959–60 (Or. 2016). Compliance with the terms of the contract is important as the parties all act in reliance upon that compliance.36See LaFrance, 879 F.2d at 7 (explaining how recipient has an expectancy in receiving the package by the contractually provided time, which would mean false information could cause delays in the ability of a deliverer to accomplish his end of the bargain within the time advertised). The people specifically named on the piece of mail have a possessory right and a right to exclude others from that mail.37See Teal v. Felton, 53 U.S. (1 How.) 284, 292 (1851).

The Postal Service promulgates regulations regarding how it will conduct itself and how the other party to the contract must act for the contract to be successfully completed.38See generally U.S. Postal Serv., Mailing Standards of the United States Postal Service, Domestic Mail Manual (2022) [hereinafter Mailing Standards]. One basic requirement is that the sender must tell the Postal Service to whom he wants the mail delivered.39Id. § 602.1.3(a). The sender must also tell the Postal Service where to send the mail if it cannot be delivered to the addressee.40Id. §§ 602.1.5.1–.1.5.2. The sender and addressees are then capable of controlling what happens to the mail.41Id. § 508.1.1.1. However, all named parties have those same rights to possess and exclude.42See id. (“Mail addressed to several persons may be delivered to any one of them.”). For a person to exercise control over the mail, the Postal Service must confirm his identity.43See id. § 508.1.1.5 (“If the delivery employee does not know the person claiming to be the addressee, delivery employees may withhold from claimants certain mail pending presentation of an acceptable primary form of identification . . . .”). People may designate an authorized agent to receive mail for them, but this authorization must be in writing, and the designee may also need to prove their identity.44See Mailing Standards, supra note 38, §§ 508.1.1.8, 508.1.4.1. The Postal Service may require an addressee to provide identification if it believes people are sending mail to an inaccurate address to avoid identification of the person.4539 U.S.C. § 3004. Use of fictitious names without other specifically identified criminal activity is not illegal.4639 U.S.C. § 3003; 18 U.S.C. § 1342.

Turning to more general principles, the Fourth Amendment’s protections are provided, or applicable, only if the defendant can prove standing.47See Rakas v. Illinois, 439 U.S. 128, 148–50 (1978). Standing in the Fourth Amendment context is different from Article III standing.48See id. at 132 n.2; Nadia B. Soree, The Demise of Fourth Amendment Standing: From Standing Room to Center Orchestra, 8 Nev. L.J. 570, 581–607 (2008) (discussing several differences between Article III standing and Fourth Amendment standing). One formulation of the Fourth Amendment “standing requirement” includes three sub-elements: (1) personal standing, (2) governmental action, and (3) search or seizure.49Phillip A. Hubbart, Making Sense of Search and Seizure Law: A Fourth Amendment Handbook 113 (2d ed. 2015). If the police open and inspect the contents of mail, this will clearly satisfy the second and third elements, but the first must still be analyzed.50See, e.g., United States v. Williams, 349 F. Supp. 3d 1007, 1010, 1012 (D. Haw. 2018). Defendants may claim a violation of the Fourth Amendment only if a government actor violated their personal rights.511 Hall, supra note 14, § 4.01 at 4-5. A defendant may not argue for suppression of evidence if the government actor violated someone else’s rights.52Alderman v. United States, 394 U.S. 165, 174 (1969). When explicitly asked to relax this standard in Rakas v. Illinois,53439 U.S. 128 (1978). the Supreme Court refused.54Id. at 132–33. It stated that passengers in another’s vehicle could not challenge evidence found during a search of the vehicle.55See id. at 129, 132–3. Just because someone is legally present in an area does not mean that person can claim a constitutionally protected privacy interest there.561 Hall, supra note 14, § 4.02[3] at 4-14.

Since standing is part of the substantive analysis of the Fourth Amendment, how the substantive analysis is conducted—whether via property rights or reasonable expectation of privacy—can mean a party may have standing under one analysis but not the other. For that reason, standing is further discussed in Sections B and C.

Some people undermine or fail to protect their interests in privacy or property, leading a court to find they abandoned their interests for Fourth Amendment purposes.57See Hubbart, supra note 49, at 168. Abandonment in the Fourth Amendment context is a fact-intensive inquiry that does not completely follow the property-law concept of abandonment.581 Wayne R. LaFave, Search and Seizure: A Treatise on the Fourth Amendment 910–11 (6th ed. 2020). Fourth Amendment abandonment is broader than property-law abandonment.59Id. at 911 (quoting City of St. Paul v. Vaughn, 237 N.W.2d 365 (Minn. 1975)). Under certain circumstances, a finder may not convert something to the finder’s ownership, but the police may search it.60See id. at 910–11. Many of these cases involve an intentional act by the defendant to fully cease temporary dominion and control over physical objects to decrease the potential of being caught with them.61See id. at 913–15 & nn.58–65 (compiling representative cases).

A line of cases involves a person either leaving or delivering items into the temporary custody of a third party, which requires more fact-intensive analysis. Usually, when explicit instructions or widespread customs dictate the disposition of the items, those instructions or customs can provide a continuing Fourth Amendment interest in the items.62See id. at 918–21 & nn.83–85, 88 (citing cases showing no abandonment, including People v. Laursen, 99 Cal. Rptr. 841 (Ct. App. 1972), aff’d, 501 P.2d 1145 (1972), where the defendant left boxes with a homeowner but told him he would contact him later about what to do; Commonwealth v. Shaffer, 209 A.3d 957 (Pa. 2019), where the defendant delivered a computer for repairs, implying an intent to regain possession; and United States v. Basinski, 226 F.3d 829 (7th Cir. 2000), where the defendant left a locked suitcase with a friend for six months and then told him to destroy it). Disclaimers of ownership, however, such as “[t]hese aren’t my pants,”63‘These Aren’t My Pants:’ Police Find Stolen Merchandise, Suspected Heroin Stuffed in Shoplifting Suspect’s Pants, CBS News Pittsburgh (Jan. 9, 2020, 3:06 PM), https://perma.cc/5986-43JC. can effectively eliminate Fourth Amendment protection for items, even if they were in the defendant’s possession or on his body at the time.64See 1 LaFave, supra note 58, at 921 (summarizing United States v. Colbert, 474 F.2d 174 (5th Cir. 1973), which held that defendants had abandoned property they had been holding by setting the items down when approached and disclaiming ownership of it both before and after an unrelated arrest). Most cases are not so dramatic.

In Hester v. United States,65265 U.S. 57 (1924). the Supreme Court stated that specific actions by defendants can undermine the protections of the Fourth Amendment.66See id. at 58–59. Protections do not apply when people act with their property in a way that undermines their ability to control it.67See id. In this case, the defendant undermined his control by throwing bottles on the ground.68See id. at 58. In Smith v. Ohio,69494 U.S. 541 (1990). however, the Court reached a different result.70See id. at 543–44. Upon confrontation with the police, a defendant tossed a bag he had been holding but then attempted to block the police officer from accessing the bag.71Id. at 542. Since he continued to exercise his right to exclude from his property, the Court held the property was not abandoned.72Id. at 543–44.

The Court had another opportunity to discuss subtle actions in abandonment in Abel v. United States.73362 U.S. 217 (1960). In Abel, the defendant was arrested in his hotel room but was still allowed to clean up and remove his personal belongings before leaving and closing out his bill.74Id. at 223–25. After he completed this checkout procedure, police searched the room without a warrant and located evidence in the trash can.75Id. at 241. By leaving the property in the room, which returned to the complete dominion and control of the hotel, the property was abandoned and could be lawfully seized by police.76Id.

The import of intentional actions by the party who allegedly abandoned control over items was similarly demonstrated in Michigan v. Tyler.77436 U.S. 499 (1978). When a building burned to the ground, fire and police officials searched the structure without a warrant on several occasions.78Id. at 502–03. While the investigation determined the property lessees had committed arson, this fact was unknown when the search began.79See id. Because there was no evidence of an intent to abandon the property when the searches were conducted, the Court held the government could not justify the searches on an abandonment theory.80Id. at 505–06. The Court specifically pointed out that evidence located cannot be used to justify a search conducted to find it. See id. at 505. The Court limited the reach of the opinion to those in which that evidence has not yet been gathered. Id. at 512. Since the Court did not face the question of whether property was abandoned once there was definite knowledge of arson obtained without the search, that possibility remains.

Abandonment, like standing, can be analyzed differently based on a property approach or reasonable expectation of privacy approach.81See Thomas K. Clancy, The Fourth Amendment: Its History and Interpretation 239–40 (3d ed. 2017). It can also be examined either objectively or through the purported intent of the potential abandoner.82See id. at 240. Since courts can find abandonment in more situations than those where the property is abandoned,83See 1 LaFave, supra note 58, at 911 (quoting City of St. Paul v. Vaughn, 237 N.W.2d 365 (Minn. 1975)). the reasonable expectation of privacy approach appears more likely to give an accurate answer to abandonment questions. Similarly, while intent has been considered in many cases, it is mainly the intent as manifested to the police at the time of the incident, making it a more objective test no matter how explicitly it is stated.84See United States v. Basinski, 226 F.3d 829, 836–37 (7th Cir. 2000) (calling the test objective, and the defendant’s continued directions regarding the property were known to the police). Regardless of the search doctrine, when done without a warrant, what is found by the search cannot justify the search after the fact.85See Kyllo v. United States, 533 U.S. 27, 39 (2001); United States v. Jacobsen, 466 U.S. 109, 114–15 (1984); Tyler, 436 U.S. at 505–06; United States v. LaFrance, 879 F.2d 1, 7 (1st Cir. 1989).

The last general principle to be discussed involves the background for the tension involved when claiming Fourth Amendment protections by making incriminating statements that the Fifth Amendment would usually protect. When a person places his name on a package or claims an interest in it in response to police questioning, these actions or statements can be used as evidence, and the Fifth Amendment could be implicated.

In Simmons v. United States,86390 U.S. 377 (1968). the Supreme Court addressed the dilemma defendants faced in situations where they wished to claim their Fourth Amendment rights had been violated. A defendant claimed standing to contest a search and testified at a suppression hearing on the subject.87Id. at 381. After losing the motion to suppress, the government introduced his hearing testimony during the trial.88Id. The Court found it “intolerable that one constitutional right should have to be surrendered to assert another.”89Id. at 394. The Court’s analysis prompted this statement that the only evidence that could support the defendant’s claim of an ownership or privacy interest in the evidence was the defendant’s own words.90See Simmons, 390 U.S. at 391. Since there was no other evidence, the defendant’s testimony was “an integral part of his Fourth Amendment exclusion claim.”91Id. The Court acknowledged that, facially, there was merit to the contention that this testimony was not contemplated by the Fifth Amendment right against compelled self-incrimination.92Id. at 393–94 (stating “[a]s an abstract matter, this may well be true,” in reference to appellate court reasoning that permitting testimony from a motion to suppress to be presented at trial was not a violation of the Fifth Amendment). The appellate court reasoning was, “there is no violation of the Fifth Amendment’s Self-Incrimination Clause because the testimony was voluntary.” Id. at 393. The Court countered, “testimony is not always involuntary as a matter of law simply because it is given to obtain a benefit.” Id. at 394. Despite this, the Court indicated it was improper to place defendants in the position where they have to choose to claim the protections of the Fourth Amendment or to maintain the protections of the Fifth Amendment.93Id. at 394. In situations where general government regulations, laws, or orders are being enforced, the rights against self-incrimination are weakened.94This may include laws and regulations requiring accurate information on pieces of mail. In Baltimore City Department of Social Services v. Bouknight, Social Services removed a child from an abusive mother before permitting her to regain court-supervised custody of the child. 493 U.S. 549, 551 (1990). Once the mother had the child back, however, she refused to comply with court orders regarding supervision or make him available for examination. Id. at 552–53. Upon being jailed for contempt, the mother claimed that being forced to produce her child would violate her rights against self-incrimination. Id. at 553. The Supreme Court disagreed, reciting many previous cases where compelled speech was held not violative of the Fifth Amendment when the speech or actions were not being compelled for the main purpose of criminal enforcement. Id. at 554–55. In this case, the Court stated that the lower court compelling production of the child was something the state had a strong regulatory interest in, which had been submitted to by the mother. Id. at 559. Since the government used this non-criminal statutory scheme to attempt to carry out its responsibility to care for the children in its legal custody, the order to produce the child did not violate the mother’s rights against self-incrimination. Id. at 561. Bouknight’s son, Maurice Miles, was never found. Ann Lolordo, Where’s Maurice?, Baltimore Sun (Sept. 30, 2001, 5:37 PM), https://perma.cc/8JTT-UTRA. Bouknight spent seven years in jail for continuing contempt rather than reveal her son’s whereabouts. Id. While Bouknight claimed years later that Maurice was still alive, she continued to refuse to corroborate that information. See id.

 B.      Fourth Amendment Rights Based on a Reasonable Expectation of Privacy

The “reasonable expectation of privacy” test stems from Justice John Harlan’s concurrence in Katz v. United States.95389 U.S. 347, 360–61 (1967) (Harlan, J., concurring). The test has two parts. The first is whether a person has “exhibited an actual (subjective) expectation of privacy.”96Id. at 361. The second is whether “the expectation [is] one that society is prepared to recognize as ‘reasonable.’”97Id. However, this test has been criticized for being circular or self-reinforcing and difficult to predict.98João Marinotti, Escaping Circularity: The Fourth Amendment and Property Law, 81 Md. L. Rev. 641, 643 (2022). However, Marinotti also claims basic property law concepts are also circular, meaning the new approach the Supreme Court is taking towards Fourth Amendment protections would be circular. See id. at 661. Marinotti argues that a new approach to understanding property law using outside sources is best suited to avoid the circularity problem and ground the Fourth Amendment in something more concrete. See id. at 647. Justice Sandra Day O’Connor put it well when she stated, “We have no talisman that determines in all cases those privacy expectations that society is prepared to accept as reasonable.”99O’Connor v. Ortega, 480 U.S. 709, 715 (1987) (plurality opinion). It has also led to shifts in what is considered reasonable as time, society, and the Court changes.100Compare United States v. Miller, 425 U.S. 435, 443 (1976) (holding that private financial information about a person held by a bank is not protected by the Fourth Amendment), with Carpenter v. United States, 138 S. Ct. 2206, 2216–17 (2018) (holding that private location information about a person held by a cell phone company is protected by the Fourth Amendment). Despite all this, the “reasonable expectation of privacy” test remains a primary way of analyzing Fourth Amendment protection.101See Marinotti, supra note 98, at 645.

One attempt to better explain this test added a new first element, which stated “the reasonable expectation of privacy standard exists in concurrence with the question of whether the area involved is a constitutionally protected area.”1021 Hall, supra note 14, § 3.08 at 3-34. Professor Thomas Clancy agrees this was part of Justice Harlan’s opinion103Clancy, supra note 81, at 118. but noted about the actual majority, “Katz sought to extinguish inquiry into constitutionally protected areas.”104Id. at 117. Professor Wayne LaFave notes that even calling this a test is a misnomer; it is unclear, but so was what came before it.1051 LaFave, supra note 58, at 597. However, LaFave’s point is Katz “unquestionably expand[ed] the coverage of the Fourth Amendment . . . despite . . . it [being] impossible to state with precision the degree of this expansion.”106Id. at 599.

Regardless of this frustration and the resurgence of property law to determine Fourth Amendment interests, reasonable expectations of privacy live on in some way.107See Carpenter v. United States, 138 S. Ct. 2206, 2213–14, 2220 (2018) (applying Katz to find that the government could not obtain cell site location data without a search warrant despite the third-party doctrine). But see Riley v. California, 573 U.S. 373, 403 (2014) (holding that warrantless searches of cell phones violated the Fourth Amendment without mentioning Katz or “reasonable expectations of privacy”). Part of its allure may be the partial grounding in the text of the Constitution in being measured by what is “reasonable.”108Orin S. Kerr, Four Models of Fourth Amendment Protection, 60 Stan. L. Rev. 503, 525 (2007). In what form it lives is difficult to say, but Professor Orin Kerr believes four decision models can represent the various forms.109Id. at 506. Those models are the (1) probabilistic, (2) private facts, (3) positive law, and (4) policy models.110Id. Multiple models may apply in certain situations, so the results might differ depending on which model a court uses.111See id. at 508–24, 535 (describing the models and situations in which they are successful and unsuccessful, and indicating belief that under the private facts model, the rule from Illinois v. Caballes, 543 U.S. 405 (2005), that “the Fourth Amendment does not regulate dog sniffs”); Florida v. Jardines, 569 U.S. 1, 9 (2013) (holding that dog sniffs are regulated by the Fourth Amendment when conducted on the curtilage of the home, meaning that the positive law model likely took hold for this situation rather than the private facts model). Professor Matthew Tokson analyzed all Supreme Court cases determining a reasonable expectation of privacy decided since Katz.112See Matthew Tokson, The Emerging Principles of Fourth Amendment Privacy, 88 Geo. Wash. L. Rev. 1, 6, 13 (2020). In it, he developed a model of decision making that assessed and compared the intimacy of the information sought, the amount of information sought, and the cost to police in seeking the information.113Id. at 15–30. The model works well to explain Fourth Amendment cases.114Id. at 32 n.189 (At times, the model correctly accounted for the decision in 94% of cases.).

When it comes to packages, Kerr notes there is no model applied for one reason: “The rule is simple: when a government agent opens a suspect’s sealed package or other container, opening the container is a ‘search’ regardless of what is inside the box.”115Kerr, supra note 108, at 515. While this is clear, what is less clear is the effects of various actions on whether society will consider a specific expectation of privacy reasonable, even involving searches of packages.

As indicated previously, “standing” is a determination about whether the defendant’s personal substantive rights were violated rather than someone else’s.116See Hubbart, supra note 49, at 115. “[A] person is only aggrieved by a violation of his expectation of privacy and not merely by the introduction of evidence against him.”1171 Hall, supra note 14, § 4.02[3] at 4-13 (emphasis added). According to LaFave, the critical formulation of standing under the reasonable expectation of privacy analysis is in Mancusi v. DeForte.118392 U.S. 364 (1968). See 1 LaFave, supra note 58, at 163. In Mancusi, the Court described standing as where a person had “a reasonable expectation of freedom from governmental intrusion.”119Mancusi, 392 U.S. at 368. In and of itself, this seems to be as descriptive as the reasonable expectation of privacy it acts as a gatekeeper to. When analyzing standing without the underlying reference to property rights, the situations may end up difficult to predict.

Permission to be alone in someone else’s apartment for less than a day if the person gives you a key may be sufficient to grant standing.120See Jones v. United States, 362 U.S. 257, 265 (1960), overruled in part by United States v. Salvucci, 448 U.S. 83, 94–95 (1980); Minnesota v. Olson, 495 U.S. 91, 99–100 (1990). Alternatively, placing drugs in a friend’s purse that is subsequently searched is not sufficient to grant standing.121Rawlings v. Kentucky, 448 U.S. 98, 104 (1980). Neither is being involved in a criminal conspiracy with a driver who is subjected to an illegal stop and gets his car searched with 560 pounds of cocaine in the trunk.122See United States v. Padilla, 508 U.S. 77, 78–82 (1993) (per curiam). Even if a defendant owns a bag, if he denies possession of it while it bears the name of another person, he will not have standing.123See United States v. Easley, 911 F.3d 1074, 1083 (10th Cir. 2018).

In summary, standing under the reasonable expectation of privacy analysis seems to be a question of whether individuals claim or exercise enough control over an area in which they are legally present. If a person is legally present and has sufficient ability to order his affairs in that location without expecting interference from other parties, there should be standing under the reasonable expectation of privacy analysis.

C.      Fourth Amendment Rights Based on Property Rights

According to the Supreme Court, whether a search is also a common-law trespass was the original method of determining whether the Fourth Amendment was applicable.124United States v. Jones, 565 U.S. 400, 405 (2012). In Olmstead v. United States,125277 U.S. 438 (1928). the Court held wiretapping phone lines outside a residence or the curtilage could not violate the Fourth Amendment.126Id. at 465–66. Whether the Court historically considered the boundary that clear is debated.127Orin Kerr, for example, wrote that despite his earlier belief in this supposed common knowledge, it was inaccurate. He conducted a survey of Fourth Amendment cases that supported his claims. Orin S. Kerr, The Curious History of Fourth Amendment Searches, 2012 Sup. Ct. Rev. 67, 68, 76–86 (2012). For the purposes here, the property-rights analysis is framed specifically to deal with the pre-Katz cases and the recent resurgence of property-based analyses.128See Kerr, supra note 127, at 76–86 (compiling and analyzing cases); Collins v. Virginia, 138 S. Ct. 1663, 1673, 1675 (2018) (holding that an examination of a motorcycle parked within the curtilage of a house violated the Fourth Amendment); Jones, 565 U.S. at 404 (holding that attaching a GPS transmitter to a vehicle violated the Fourth Amendment based on the trespass to the vehicle); Florida v. Jardines, 569 U.S. 1, 11–12 (2013) (holding that warrantless use of a trained dog to detect the smell of illegal drugs within the curtilage of a house is a violation of the Fourth Amendment); Kyllo v. United States, 533 U.S. 27, 40 (2001) (holding that using a thermal imaging camera to detect heat patterns emanating from a house, revealing information about the interior, is a violation of the Fourth Amendment).

One formulation of a search in the property-rights sense is defeating a legal or physical barrier to discover the evidentiary items it protected. A legal barrier could be a law prohibiting police access to certain records without a warrant, and a physical barrier could be anything from a curtain in a window to an actual wall preventing sight of or access to what’s inside. Avoiding the barrier is a different issue, in that if the barrier has inherent limitations that can be avoided, then the court finds the items were in plain view.129See Florida v. Riley, 488 U.S. 445, 449–51 (1989) (plurality opinion) (deciding where marijuana was being grown on property in such a way where it could not be seen from off the property, a helicopter flight at 400 feet was not an improper way to observe the grow operation, despite the operation being conducted on completely fenced in property inside a greenhouse structure with a partially completed roof). The fact that something might be a barrier in one context, like a property boundary line for a trespass, does not mean it automatically functions as a barrier in the Fourth Amendment context.130See Oliver v. United States, 466 U.S. 170, 183–84 (1984). A person who crosses a property boundary might subject himself to suit, but a police officer may sometimes cross that same line to observe evidence without violating the Fourth Amendment.131See id. at 178–80; see also Olmstead, 277 U.S. at 465 (referencing Hester v. United States, 265 U.S. 57 (1924)) (“While there was a trespass, there was no search of person, house, papers or effects.”).

What is more relevant for this analysis of property rights is the keeper of the barrier. For someone to claim his Fourth Amendment rights were violated, he must show that his barrier was defeated.132See Rakas v. Illinois, 439 U.S. 128, 133–34 (1978). He was the one who was able to rely on that barrier to keep out anyone who did not have authorization, and as long as the barrier was lawful, it would function.133See Byrd v. United States, 138 S. Ct. 1518, 1531 (2018). To borrow the rough concept from property law, the one who has standing for Fourth Amendment violations in this analysis is the one who properly has a right to exclude.134See Clancy, supra note 81, at 145–47 (using a gatekeeper analogy for the Fourth Amendment itself rather than the person claiming its protection). But not everyone has the right to exclude the government from everywhere one might wish it not to go.135See Rakas, 439 U.S. at 133–34. The Supreme Court previously ruled that when people were charged with crimes based on possessing items of evidence or contraband, they had standing to contest the search.136See Jones v. United States, 362 U.S. 257, 263–64 (1960), overruled in part by United States v. Salvucci, 448 U.S. 83, 94–95 (1980). This was overruled, however, in United States v. Salvucci,137448 U.S. 83 (1980). returning standing to a question of whether a person’s own Fourth Amendment rights had been violated.138Id. at 85.

Automatic standing in cases of possession had been supported by the logic that if a prosecutor believed the defendant possessed the evidence enough to charge him with it, the prosecutor should not be permitted to contradict themselves by also saying the defendant had not possessed the evidence enough to contest how the government came into possession of it.139See Jones, 362 U.S. at 263 (stating that it was improper to allow the prosecution of possession of narcotics to proceed with evidence admitted based on the contention that the defendant “did not have possession of the narcotics at that time”); Clancy, supra note 81, at 180. The Court later found through experience that there were legitimate cases in which possession at the time of the search was not enough to justify Fourth Amendment protection, but there was enough evidence of “possession” at other times for the physical evidence to be relevant.140See Salvucci, 448 U.S. at 91–92. Salvucci did not learn from this loss at the Supreme Court. He was federally charged again in 2012 with conspiring to rob a check-cashing business. See Press Release, FBI, Three Men Charged with Conspiring to Rob a Norwood Check-Cashing Business (Jan. 25, 2012), https://perma.cc/2MJT-463A.

People who personally maintain their Fourth Amendment right-to-exclude barrier can also take actions that let their barrier down. One common manifestation of voluntary action is consent to search.141See Clancy, supra note 81, at 609. Abandonment can be considered another way people let their property-rights barriers down.142See Hester v. United States, 265 U.S. 57, 58 (1924). Finally, there are situations in which a person may share the control of her barrier with another.143See United States v. Matlock, 415 U.S. 164, 166–69 (1974) (holding that when a man robbed a bank and hid evidence in the room he shared with the woman he was living with, her consent to search the room was valid). In all of these situations, the identity of the main barrier keeper may be known, but the barrier keeper’s actions either make a search acceptable or allow for the search despite potential intentions to keep the barrier up. Especially since the barrier keeper can be countermanded by someone who shares the control of the barrier,144See id. at 169–70; Fernandez v. California, 571 U.S. 292, 296, 307 (2014) (holding that even if one occupant of a house declines to consent to a search, if he is arrested and removed from the scene before another occupant of the house consents to a search, that consent is valid against both). his maintenance of it is important, and actions contrary to it will not permit him to still complain of the result if the barrier is undermined.145See California v. Greenwood, 486 U.S. 35, 40–41 (1988) (holding that trash placed at the curb is not protected by the Fourth Amendment in part because “respondents placed their refuse at the curb for the express purpose of conveying it to a third party” (emphasis added)).

These principles are difficult to apply when all parties are known during a search. Once the evidence has been given to the federal government in a sealed package with false names on it, the principles become even harder to apply.

II.      Federal Appellate Cases Involving Pseudonyms on Mail

Federal appellate courts have addressed the Fourth Amendment impacts of names on mail that were not those of the “true” sender or addressee. The Supreme Court was presented with a pseudonymous recipient of contraband in Walter v. United States,146447 U.S. 649 (1980). but the parties did not argue about the impact this had on the analysis before the Court.147See id. at 651 n.1. Interestingly enough, the district court that originally tried the case denied Walter and Sanders’ motion to suppress the evidence based on their lack of standing due to the pseudonyms used for both the sender and addressee. United States v. Sanders, 592 F.2d 788, 791 (5th Cir. 1979). On review, the Court of Appeals for the Fifth Circuit noted Rakas and conducted a full analysis of the Fourth Amendment claims raised therein without reconsidering whether those claims were specific to the defendants involved. Id. at 791–94.

Partially supporting the claims mentioned regarding the success rates of deliveries of drugs through the mail, there is not a wealth of federal appellate cases to examine. The cases that follow have several factors that led to their inclusion. In those cases, the defendants challenged the search and seizure of items delivered by a third party. Those items had names on them for senders or addressees that ranged from being a part of the defendant’s real name, a fictitious name unrelated to anyone involved in the case, or a name of another party that was not the defendant seeking exclusion of the evidence. All these cases are after Katz, and most are older than the 2012 case, United States v. Jones,148565 U.S. 400 (2012) (holding installation of a GPS transmitter on a car was unconstitutional without a warrant because it was a trespass). which marked a resurgence in the property-based analysis. Because of this, there is a heavy bias towards the reasonable expectation of privacy analysis, although several courts still conduct some level of property-based analysis as well.

A.      Reasonable Expectations of Privacy and Standing

One of the earliest federal appellate court cases to address the use of a pseudonym on mail was United States v. Richards.149638 F.2d 765 (5th Cir. 1981). During its analysis, the Court of Appeals for the Fifth Circuit framed the question of standing as whether the person “has a privacy interest in the area searched.”150Id. at 769. In the case, Richards opened a P.O. Box in a company’s name while presenting a fake ID.151Id. at 767. Heroin was then mailed to that P.O. Box addressed to that company.152Id. The court indicated that since the company “in effect, was Richards,” and the package was still sealed, Richards had a subjective expectation of privacy.153See id. at 770. The history of sealed mail being protected from government searches appeared to suffice for the analysis of whether the expectation of privacy was reasonable.154See id. The dissent in Richards dissented only because the majority did not go far enough in protecting the mail in question.155See Richards, 638 F.2d at 774–76 (Godbold, J., dissenting). The dissent indicated how taking practical privacy-protecting precautions strengthens legal protection of that privacy, although without mentioning the use of the pseudonym.156See id. at 774–75.

The next case demonstrates some complications of names on mail that do not match the intended recipient. In United States v. Givens,157733 F.2d 339 (4th Cir. 1984). Givens ordered cocaine sent to a person with the real name of Starks, but Givens would pick up the package instead of Starks.158See id. at 340. Police intercepted the cocaine before recovery by Givens and subsequently made it available to her in a controlled delivery.159Id. The Court of Appeals for the Fourth Circuit stated that, without a doubt, if the package had been addressed to Givens, she would have had a reasonable expectation of privacy.160Id. at 341. The court acknowledged throughout the analysis that Givens was the intended recipient of the cocaine but noted that all the precautions taken to hide it were mooted by the name of another party on the envelope.161Id. at 342. While standing was never explicitly mentioned, the comments about who else had the reasonable expectation of privacy make this a case of Givens not having standing.162See id. at 341.

As a coda in the analysis, the Givens court noted the theory that the intended recipient could claim a reasonable expectation of privacy in a parcel with the name of another person on it “lacks any principled stopping point.”163Givens, 733 F.2d at 342. But the court also indicated a possible distinction if the package had been “addressed . . . to some entity, real or fictitious, which is their alter ego,” rather than to other real people.164See id. at 341. As this was not the case, the court did not elaborate or provide what legal distinction there might be between alter egos and other real people.165See id.

Further confounding the issue by considering the purpose of using pseudonyms is United States v. Lewis.166738 F.2d 916 (8th Cir. 1984). In Lewis, police investigating fraudulent activity were led to a mailbox receiving property ordered with stolen credit card numbers.167Id. at 918. The mailbox was marked for a property that didn’t exist and bore the name of a person, Woods, who was unknown to the neighborhood.168Id. The officer then searched the mailbox, which he knew had previously received fraudulently obtained merchandise, and opened mail addressed to Woods without a warrant.169Id. The information obtained from that search and other sources led to a search warrant and the arrest of Lewis for the fraudulent activity.170See id. at 919.

Since the Court of Appeals for the Eighth Circuit did not have to rule on this issue, the majority noted in a footnote that it would “have no difficulty in concluding that Lewis lacked a legitimate expectation of privacy” in the mailbox and mail, so he would have no standing.171Id. at 919 n.2. The court pointed out there was no house or resident with the addressee’s name at that address and that Lewis had no reasonable expectation of privacy in the mail addressed to Woods.172Lewis, 738 F.2d at 919 n.2. Beyond the standing inquiry, the court noted the combination of the fake name, fake address, and using the mailbox “only to receive fraudulently obtained mailings does not merit an expectation of privacy that society is prepared to recognize as reasonable.”173Id. The concurrence wrote separately to disagree with this footnote but actually conducted a property analysis,174Id. at 924–25 (McMillian, J., concurring); see infra notes 238–41 and accompanying text. which is considered later.

In United States v. Villarreal,175963 F.2d 770 (5th Cir. 1992). the Court of Appeals for the Fifth Circuit returned to the subject of pseudonyms but permitted two defendants to claim a reasonable expectation of privacy in the container searched.176Id. at 774–75. Villarreal and Gonzales prepared to pick up drums of marijuana shipped using the name Roland Martin as both the consignor and consignee.177See id. at 772–73. Police searched the drums when the shipping company perceived a discrepancy between the expected weight of the purported contents and the real weight.178Id. The officers made no attempt to identify or contact Roland Martin before doing so.179Id. Once the officers located the marijuana, they facilitated a controlled delivery, and people hired by Villarreal and Gonzales picked up the drums before Villarreal and Gonzalez were arrested.180Id. at 773. Villarreal possessed the shipping receipt for the drum, but one of the associates hired to pick up the drum noted Gonzalez had been identified to him as Roland Martin.181Villarreal, 963 F.2d at 774.

The court acknowledged Martin was a fictitious person, but since his presence was a cover for either Villarreal or Gonzales, they could still assert a reasonable expectation of privacy for Martin.182Id. at 774–75. The court was untroubled by its inability to determine which of the defendants Martin stood for.183See id. Since Villarreal and Gonzales conspired together to ship and receive the items, they both had standing for a reasonable expectation of privacy as Martin.184See id.

Even pseudonyms that contain a portion of a person’s real name can weaken an expectation of privacy. In United States v. Daniel,185982 F.2d 146 (5th Cir. 1993). methamphetamine was shipped to Ricky Lynn Daniel by way of “Lynn Neal c/o Dottie’s Hair Design.”186Id. at 148. Despite being a year after Villarreal and with a closer pseudonym, the Court of Appeals for the Fifth Circuit stated Daniel did not have a reasonable expectation of privacy.187See id. at 149. It indicated that no deference was due to Daniel’s theory because Daniel and “Lynn” were different people.188Id. Even accepting the government’s contention that Daniel and “Lynn” were the same undermined the expectation of privacy due to the criminal scheme the pseudonym was being used for.189Id. (citing United States v. Lewis, 738 F.2d 916, 919 n.2 (8th Cir. 1984)).

In United States v. Smith,19039 F.3d 1143 (11th Cir. 1994). police investigated Smith, who had a third party mail him LSD.191Id. at 1144. Officers investigated a specific envelope with Smith’s address on it, but it had been crossed out and was delivered to the name and address of the third party also on the envelope.192Id. Despite the government’s knowledge that the drugs were intended for Smith—and his address having been visible on the envelope—the court held Smith had no reasonable expectation of privacy.193Id. at 1145. Smith’s “equivocal testimony regarding his ownership interest in the letter” furthered the result.194Id. Smith’s claims that he had only authorized the third party to receive and give the mail to him were insufficient.195See id. at 1144–45.

The Court of Appeals for the Seventh Circuit conducted one of the most thorough analyses of pseudonyms on mail from both the privacy and property perspectives in United States v. Pitts.196322 F.3d 449 (7th Cir. 2003). There, Pitts mailed cocaine in a tuna can to Alexander.197Id. at 451, 453. Pitts used a different address than his own as the return address but sent the fishy package to Alexander’s real address, where Alexander lived alone.198Id. at 451. The names used as sender and addressee were James Reed, Sr., and James Reed, Jr., respectively.199Id. As police investigated the package, they made contact with the resident of the home at the return address, who had no knowledge of the mailing or James Reed, Sr.200Id. at 452. The officers made contact with Alexander over the phone, who identified himself as another known alias during the conversation.201Id. While speaking, Alexander disclaimed knowledge of the package and refused delivery.202Pitts, 322 F.3d at 452–53. After the conversation, officers obtained and executed a search warrant on the can, locating the drugs.203See id. at 453.

The majority opinion determined the search was constitutional based on abandonment, which it examined under property rights.204See id. at 454–56. The concurrence argued neither Pitts nor Alexander had standing to contest the search in the first place.205See id. at 459 (Evans, J., concurring). The main legal point was since Fourth Amendment rights are personal and cannot be asserted vicariously, neither defendant could assert the rights of James Reed, Sr. or Jr.206See id. at 460. Because the defendants intended to hide their connection to these pseudonyms, they could not use them in the same way others who have announced their connection to their pseudonyms could.207See id. at 460–61.

The majority’s response to this argument assumed people have a right to send mail using false names.208See Pitts, 322 F.3d at 459 n.1 (majority opinion). It justified this right by indicating that not protecting mail sent with false names would undermine the rights of those who use anonymity for legally innocuous or justifiable reasons.209See id. at 458. It then proposed two possible undesirable constructions of removing Fourth Amendment protections on mail using pseudonyms.210See id. at 458–59. The first was that since drug dealers use pseudonyms, no one else can use pseudonyms without surrendering their reasonable expectation of privacy, analogizing this to cell phones and hotel rooms.211Id. at 458. The second was police justifying searches of mail bearing pseudonyms based on the drugs found afterward, mirroring contentions made in Lewis.212See id. at 458–59. In conclusion, the court noted, “There is nothing inherently wrong with a desire to remain anonymous when sending or receiving a package,” so the expectation of privacy in mail bearing pseudonyms is one that society would recognize as reasonable.213Id. at 459.

The Court of Appeals for the Ninth Circuit has not ruled on standing when mail bears pseudonyms. In United States v. Lozano,214623 F.3d 1055 (9th Cir. 2010). the majority proceeded straight to the reasonability of the search while the concurrence indicated the use of pseudonyms eliminated standing under both property and privacy analyses.215Id. at 1060; id. at 1063–64 (O’Scannlain, J., concurring). The two main points used to support the concurrence’s reasoning were (1) a lack of societal understandings supporting an expectation of privacy and (2) assertions of dominion over mail not addressed to a party for wrongful purposes are illegitimate.216Id. at 1063 (O’Scannlain, J., concurring). Societal understandings of privacy grant privacy to the named party on the mail, and that privacy is not extended to unnamed parties. Nor is a privacy interest in mail protected when parties expose their privacy to interference by putting someone else’s name on mail as having that controlling interest.217See id. The concurrence analogized a pseudonym to a burglar’s expectation of privacy in a summer cabin being illegitimate due to the wrongfulness of their presence.218Id. Finally, the argument that the other name on the mail was an alias was dismissed since there was no previously established connection between the party and the party’s alias.219Id. at 1064.

In United States v. Stokes,220829 F.3d 47 (1st Cir. 2016). the Court of Appeals for the First Circuit considered mail containing something other than drugs. There, Stokes sent faxes to businesses throughout the country posing as trade associations and asking the businesses to mail their dues to several addresses he controlled.221Id. at 49. Postal inspectors seized some of the mail containing checks addressed to the trade associations Stokes posed as and requested permission from the senders to open it, which they granted.222Id. at 49–50. Stokes argued he had standing to object to searches of mail coming to all his residential and non-residential addresses.223Id. at 52–53. The court noted difficulty in finding a person’s privacy interest in mail without his name on it, even when a person claims “a privacy interest in ‘my mail coming to me.’”224Id. at 53. Regarding his addresses, there was no support for his argument that an address alone can justify a privacy interest, especially without evidence of whether anyone else had access to the property of the addresses or not.225Id.

As these cases demonstrate, even the most common method of determining the applicability of the Fourth Amendment’s protections cannot reliably predict whether a court will provide protection to mail bearing pseudonyms.

B.      Property-Based Interests, Standing, and Abandonment

Several cases above also analyzed property rights to determine Fourth Amendment protections. As several of them demonstrates, when a court finds the Fourth Amendment does not apply, it will usually be through the abandonment of the property.

In Richards, examined above, the defendant conceded the legality of a first search that identified heroin in mail addressed to his fake company at a P.O. Box opened with a fake ID.226United States v. Richards, 638 F.2d 765, 767–69 (5th Cir. 1981). Before the contested second search, though, Richards obtained the package with the heroin and left the post office while under constant surveillance.227Id. at 768. When confronted, he corrected the officers who called him by the name of the fake ID used to open the P.O. Box.228Id. Upon questioning, Richards disavowed ownership of the box but claimed he was picking it up for someone else.229Id.

After finding Richards had a reasonable expectation of privacy, the court acknowledged the usefulness of property law in determining Fourth Amendment protection.230See id. at 770. While noting Richards’s disavowal of ownership relates to abandonment of property, it did not eliminate the protection granted due to the totality of the circumstances.231See id. at 770 & n.1. The court’s language makes it unclear whether the property-based analysis by itself would have ensured standing. The only two factors specifically examined in the property-based analysis were the lawful possessory interest and the disavowal of ownership.232Richards, 638 F.2d at 770. In the footnote, the court agreed that lawful possessory interest alone would not have been sufficient to grant protection to Richards and that the disavowal undermines the protection.233See id. at 770 n.1. From this, it appears the court believed that these facts, divorced from the knowledge that Richards was indeed the renter of the P.O. Box and true owner of the heroin, would have resulted in a finding of abandonment.

When the Court of Appeals for the Fourth Circuit considered property rights in the previously mentioned Givens case, its analysis was clear. The court assumed Givens had a possessory interest in the cocaine that was hidden in a cassette tape and mailed in an envelope to Starks.234See United States v. Givens, 733 F.2d 339, 342 (4th Cir. 1984). However, that possessory interest did not extend to the container, so Givens had no right to exclude others from where her cocaine was hidden without her name on the envelope.235See id. The court analogized Givens’s claim over the envelope addressed to Starks to two Supreme Court cases in which defendants contested searches of areas they did not own that contained evidence they did own.236Id. (citing Rakas v. Illinois, 439 U.S. 128, 148–49 (1978) (expectation privacy in the trunk of another’s car) and Rawlings v. Kentucky, 448 U.S. 98, 104–06 (1980) (expectation of privacy in another’s purse)). Because Givens “effectively relinquished control over the area in which the drugs they claim an interest in were secreted,” she was not entitled to Fourth Amendment protection.237See id.

The concurrence in Lewis in the Court of Appeals for the Eighth Circuit, written solely to disagree with the majority’s standing analysis, indicated an appropriate property analysis showed the mailbox was protected.238See United States v. Lewis, 738 F.2d 916, 924 (8th Cir. 1984) (McMillian, J., concurring). Judge Theodore McMillian noted that, despite the fake name and address displayed on the mailbox, “it was undisputed that the mailbox belonged to [Lewis].”239Id. He further distinguished it from the “burglar in a summer cabin” analogy used by the Supreme Court and the majority, noting that Lewis understood “that access to his mailbox would be limited,” so it should be protected.240See id. at 924–25. One point of contention between the majority and Judge McMillian was the nature of the activity. The majority indicated that the known fraudulent activity involving the mailbox undermined Fourth Amendment protection, while Judge McMillian approached the analysis by indicating that the identity of items pursued does not change the analysis of whether the area is protected.241See id. at 924–25 (quoting United States v. Jacobsen, 466 U.S. 109, 139 (1984) (Brennan, J., dissenting)).

In the Court of Appeals for the Fifth Circuit’s Villarreal case, two defendants were granted a reasonable expectation of privacy under one pseudonym.242United States v. Villarreal, 963 F.2d 770, 774–75 (5th Cir. 1992). However, the government argued the defendants abandoned the drums of marijuana.243Id. at 775. The drums had been shipped under a complete pseudonym, and the defendants did not pick up the drugs themselves but had others do it for them before taking possession.244Id. The court found that since there was no denial of a possessory interest in the drums, the fact that the defendants utilized other people and fake information to facilitate their possession meant the property was not abandoned.245See id. The main point from the abandoned property perspective, though, seemed to be that the defendants “retained possession of the receipt for the drums, which was the only indication of ownership available.”246See id.

The Court of Appeals for the Seventh Circuit’s analysis in Pitts relied heavily on the facts but explained clearly how abandonment had been demonstrated. The court acknowledged that Pitts, as the sender, claimed to have maintained control over the delivery of the package by retaining the tracking number.247United States v. Pitts, 322 F.3d 449, 456 (7th Cir. 2003). Several facts undermined this control, however. First, manifestations of intent matter.248Id. Pitts undermined his ability to control the package by placing another person’s address on it, permitting the person at that address to disclaim it themselves.249See id. at 451, 455. By putting someone else’s name on the package as the sender, Pitts ensured he would be unable to retrieve it without an ID that showed he was James Reed, Sr.250See id. at 456–57. Second, Alexander, the intended recipient, had disavowed any knowledge or ownership interest in the package when he declined delivery, so he could not claim later that he still actually wanted it.251See id. at 456. These factors led the court to declare this “a case of classic abandonment.”252Id. at 457.

Most recently, in United States v. Rose,2533 F.4th 722 (4th Cir. 2021). the Court of Appeals for the Fourth Circuit examined a case where Rose arranged for cocaine to be delivered to a friend’s house under the name of the friend’s dead brother.254Id. at 725. Rose had successfully done this multiple times and paid his friend to allow the deliveries to his house without interfering.255Id. The court framed its analysis as a privacy analysis but primarily used property concepts to support it.256See id. at 727–30. It focused on the reasonableness of the expectation of privacy but indicated that what made an expectation reasonable was “evidence objectively establishing his ownership, possession, or control of the property at issue.”257See id. at 727 (first citing United States v. Castellanos, 716 F.3d 828, 834 (4th Cir. 2013); and then citing United States v. Stokes, 829 F.3d 47, 53 (1st Cir. 2016)). The court determined Rose had no reasonable expectation of privacy because, despite his status as the intended recipient, nothing he had done showed that, at the time of the search, he was the one who exercised dominion over the property.258See id. at 729. All information on the property pointed to his friend’s dead brother rather than Rose.259Rose, 3 F.4th at 729. The court made clear that subjective interests in privacy, by themselves, were insufficient and that the ownership or possessory interest must be objectively identifiable at the time of the search.260See id. at 730.

III.      Analysis of Pseudonyms on Mail and the Fourth Amendment

As demonstrated by the various approaches taken by the circuit courts of appeals, pseudonyms on mail create many complications in Fourth Amendment law. The initial question of whether mail should be examined using the reasonable expectation of privacy or property analyses is difficult enough. The dissent in Rose demonstrated this difficulty by arguing for a privacy-based rather than the majority’s property-based approach.261See id. at 733–34 (Gregory, C.J., dissenting). Once either analysis begins, several Supreme Court precedents point in different directions, and the rationale behind these decisions creates further problems.

Answering whether a privacy- or property-based analysis is a better approach for mail is beyond the scope of this Comment. Instead, the proposed solution is analyzed under both. Before doing so, however, this Section attempts to harmonize the various analyses done in this area and determine whether the law supports a specific answer.

A.      Impact of Pseudonyms on Standing with a Reasonable Expectation of Privacy Analysis

Pseudonyms impact standing under a privacy analysis more so than under a property analysis. Since people using the mail with pseudonyms will always have a subjective expectation that their mail will be private, the issue is whether that expectation is one that society is prepared to accept as reasonable. The arguments for both stances are compelling but also have weaknesses. However, the standing analysis returns to weaken a defendant’s claim even more because there is no external source of law validating the defendant’s privacy expectations without the concept of ownership.262See Marinotti, supra note 98, at 652.

Multiple courts noted how society expects mail to be private, and there is no doubt about this claim. However, courts inadvertently point out part of the issue with society expecting mail to be private.263See, e.g., United States v. Smith, 39 F.3d 1143, 1144 (11th Cir. 1994) (citing California v. Ciraolo, 476 U.S. 207, 211 (1986)). In Richards and Villarreal, the courts acknowledged mail has historically been treated as private.264United States v. Richards, 638 F.2d 765, 770 (5th Cir. 1981); United States v. Villarreal, 963 F.2d 770, 774 (5th Cir. 1992). While true, it demonstrates part of the problem raised by the circularity of the reasonable expectation of privacy analysis.265See Marinotti, supra note 98, at 643. It conflates what people have come to expect from the government with what society is prepared to accept as reasonable.266See id. The government has respected privacy in mail, so society reasonably expects it. However, this leads to the possibility that if the Postal Service were to do what the Office of the Inspector General recommended and start advertising practices decreasing privacy in mail,267See U.S. Postal Serv., supra note 1, at 28. people would stop expecting it to be private, and the argument could then be made that any expectations of privacy in mail would be unreasonable.

Further, by putting the names of people on the mail other than the actual parties, the probability of someone else interacting with the mail in a way that interferes with the privacy interest of the original parties significantly increases.268See Kerr, supra note 108, at 508–12. Since the original parties intentionally perform this act, they cripple their privacy interests in that mail.

When the question is framed as, “should drug dealers or scammers be allowed privacy in their mail when they put fake names on it?” very few non-drug dealers or scammers would reflexively answer, “yes!” Using information obtained after the search to justify the search, however, is improper.269See Kyllo v. United States, 533 U.S. 27, 39 (2001); United States v. Jacobsen, 466 U.S. 109, 114–15 (1984); Michigan v. Tyler, 436 U.S. 499, 505–06 (1978); United States v. LaFrance, 879 F.2d 1, 7 (1st Cir. 1989). Even if the information is “known” about the illegal activity before the search, as the majority in Lewis seemed to indicate,270See United States v. Lewis, 738 F.2d 916, 919 n.2 (8th Cir. 1984). there is the question of whether that specific piece of mail is involved in illegal activity.

In a privacy analysis, standing is where pseudonyms truly cause problems. Without an independently grounded right in the mail,271See United States v. Jones, 565 U.S. 400, 407–08 (2012) (quoting Minnesota v. Carter, 525 U.S. 83, 88 (1998)). the claim is simply, “I have an interest in keeping that mail private.” But when the party claiming this right is not named on the mail, there is no basis outside Fourth Amendment law to support the claim. It then directly conflicts with the prohibition on third-party standing. When a party has no evidence for his claim of privacy in mail bearing another person’s name other than an after-the-search statement in court, it is difficult to see how this is not an end-run around the prohibition on third-party standing claims. For this reason, despite the reasonableness (or not) of the expectation of privacy, the privacy analysis does not provide the pseudonymous sender standing to assert Fourth Amendment protections.

B.      Impact of Pseudonyms on Standing and Abandonment with a Property Analysis

Using pseudonyms on mail significantly impacts Fourth Amendment rights under the property analysis because of the claim-communication aspects of property. Because mailing labels involve communications, transfer of ownership, and shifting possessory rights via a third party, accurate names are important. When names presented on a label do not correspond to the real name of the parties, it attenuates their claim on the property. While one can argue in favor of facilitating anonymity in communications, the arguments are not based in criminal search-and-seizure law or independently in property law.

Complicating the matter is someone’s choice to use a name other than his own on mail does not eliminate that person’s claim to the property. The person has his claim but clouded his title in it. In Stokes, the defendant posed as various trade associations.272United States v. Stokes, 829 F.3d 47, 49 (1st Cir. 2016). The government obtained consent to search some of the envelopes from the senders,273Id. at 50. but it is unclear what would have happened had they sought consent to search from the trade associations instead. The evidence available to postal inspectors seemed to indicate the sender of the mail intended to have it delivered to the trade association, whether the address was accurate or not.274See id. at 49. For that reason, it seems the trade association had a better claim to the mail than Stokes.

While Stokes chose to impersonate trade associations to ensure his scheme was more effective, there is also the situation in Pitts, when the mail was sent “from” a real address belonging to another person but with a fake name.275United States v. Pitts, 322 F.3d 449, 451 (7th Cir. 2003). Change the facts just slightly and imagine Pitts had sent the mail intending to use a fake name but accidentally chose the real name of a person associated with that address. On the face of the mail, it appears to be the same situation as in Stokes. A real person is identified even though the sender intended to “identify” someone who didn’t exist. Did the sender “accidentally” transfer his interests to control the mail to the person who was not supposed to exist? It does not seem that a person’s claim that the Fourth Amendment protects his property rights in mail sent using fake information should depend on whether he was diligent enough to ensure the fake name was fake enough.

For these reasons, a person cannot claim standing based solely on a subjective intent to control the mail despite the false labeling. Slightly less clear, but still reasonable, is that using any fictitious name on the mail significantly weakens the ownership interest to the point where the defendant no longer has standing to contest what happened to the mail. As previously indicated, recipients must identify themselves to the delivering party to claim the parcel.276Mailing Standards, supra note 38, § 508.1.1.5. Without presenting a fake ID to demonstrate ownership, that claim will fail. The property was purposefully delivered into a legal gray area where the unnamed parties do not have rightful authority to remove it. This is clearer abandonment than leaving something out in public where it can be picked up again later.

The prohibition against third-party standing further weakens the property-based claim to Fourth Amendment protection. The Supreme Court has been clear that parties cannot claim the protection of the Fourth Amendment unless their own substantive rights were violated.277E.g., Rakas v. Illinois, 439 U.S. 128, 133–34 (1978). The names on the mail are the best, and usually only, external evidence of whose Fourth Amendment rights are at issue. Permitting an unnamed party to claim ownership of the mail departs from the Supreme Court’s guidance. It violates the requirement that standing be granted only to those whose own rights were infringed.

Permitting these claims would also lead to the question of how far objective evidence of the ownership or possessory interest can be contradicted through testimony and in what other circumstances. Instead of the “these aren’t my pants” excuse, what about a “those were my pants” claim? Could a defendant find himself in a situation where he claims an ownership interest in the pants actively worn by another party when evidence detrimental to both is located therein? While this could be phrased as a matter of degree, part of the reason the Supreme Court has declined to permit third-party standing in the first place is the undesirability of dealing with a large number of potential claims. Objective evidence remains the best way to adjudicate these claims. The people named on the mail are the ones who may claim the Fourth Amendment’s protection.

The next question, though, is when is the appropriate time to conduct the property analysis. Under this analysis, the appropriate time to determine whether the actual sender or intended recipient’s property claim was clearly established enough is at the time of the search. While defendants claim the property is theirs to try to defeat the government’s search of the property, this allows for contradictory claims to be made when it is convenient. Defendants disavow ownership of mail to avoid responsibility for what is inside until they need to claim ownership to prevent the admissibility of what is inside. The Fourth and Fifth Amendments should not facilitate this. For this reason, the claim ought to continue being analyzed using evidence known at the time of the search.

The other reason for conducting the analysis using the information available at the time of the search is that it requires both the government and defendants to play on an even playing field. Several judges argued in the federal circuit court cases that providing Fourth Amendment protection to people sending drugs or other contraband through the mail was socially undesirable.278See discussion supra Section III.A. Therefore, people didn’t have the right to Fourth Amendment protection in mail carrying drugs if the label bore pseudonyms. However, this leads to justifying searches based on finding contraband after the fact. The government should not be allowed to use evidence from a search to justify the initial search. Similarly, defendants should not be allowed to alter their claims regarding their interests in something just because it was searched. For these reasons, under a property-based analysis, defendants who utilize pseudonyms cloud their interest in the property to the point that they do not have standing to contest the searches and have abandoned the property.

Still, there are beneficial uses of pseudonyms. The analysis above indicates there is little room in search-and-seizure law to determine whether the purpose of the pseudonym was useful or not. This issue seems to underlie some of the decisions the Court of Appeals for the Fifth Circuit presented, indicating that people still have standing and expectations of privacy in mail that doesn’t bear their names.279See, e.g., United States v. Villarreal, 963 F.2d 770, 774 (5th Cir. 1992). Although the concern is appropriate, the solution of granting standing in situations that do not warrant it is not. The legal analysis can be adjusted to remain protective of the interests of parties using pseudonyms for beneficial purposes while remaining faithful to precedent.

IV.      Investigating Reasonably Traceable Privacy or Ownership Interests

Before the government can rely on an argument that the Fourth Amendment does not protect the mail in question due to pseudonym usage, the government must demonstrate one thing: that before the search, it must have diligently investigated whether the privacy or property interest in the mail was reasonably identifiable as belonging to a distinct person. By requiring this, people can reassert their Fourth Amendment rights in the property in question or abandon them as they decide. Either the sender or recipient can claim those rights, but both need to abandon them for a completely legitimate search where the evidence will be admissible against both parties. This feature is where the property protections of requiring police to investigate before the search works to help protect beneficial uses of pseudonyms.

There is no perfect solution to the issue of trying to protect societally beneficial uses of pseudonyms while encouraging investigations of those that are criminal in nature. There are three different iterations of pseudonym usage, all unprotected under the current framework. The solution this Comment proposes can solve two, but issues remain with the third. When parties are involved in the third, it is unwise for them to send information via government channels in the first place. The solution is tested against several fact patterns, and some potential problems are examined.

 A.      Fourth Amendment Protections Remain if the Defendant’s Interests Are Reasonably Traceable and the Property Is Not Abandoned

An examination of some of the fact patterns from previous cases and some hypothetical situations assist in fleshing the solution out. Several of the real cases show how an investigation ought to be conducted while others are demonstrations of what not to do under any analysis.

The most clearly demonstrated pre-search investigation is found in the Pitts fact pattern. There, the government contacted the resident of the address Pitts used as the return address, and the resident had no knowledge of or ownership interest in the mail.280See Pitts, 322 F.3d at 451. Pitts made himself untraceable via the mail, so he could not be identified through a diligent investigation.281See id. at 456–57. The government then contacted Alexander who, instead of claiming the property and retaining his Fourth Amendment rights, disclaimed and abandoned it.282Id. at 452–53, 456. In this circumstance, the property was deemed abandoned by both, and they were precluded from challenging the search.283See id. at 459.

In Villarreal, however, the government did not investigate the ownership of the barrels before searching them.284Villarreal, 963 F.2d at 772–73. In that case, the fictitious name of the person who was supposed to pick the drums up was on the containers.285Id. While Villarreal and Gonzales separated themselves from the property by several layers,286See id. at 773, 777. it was still incumbent upon the government to conduct the investigation into who had claims to the barrels before searching them. Had they tried contacting the named owner by phone beforehand, they may have been able to receive statements that would have indicated abandonment or that the person had taken such other actions as completely removed their personal expectation of privacy in the drums.

United States v. Morta287No. 1:21-cr-00024, 2022 WL 1447021 (D. Guam May 9, 2022). demonstrates a proper investigation. Rebecca Morta agreed to receive methamphetamine, which was shipped under the name “Mark Mota,” with the address where she was staying.288Id. at *2–3, *10. The sender was listed as a real woman’s name and address, but when she was contacted via phone, she had no knowledge of the package.289Id. at *2. Investigators contacted Rebecca’s father at his house who confirmed that no “Mota” lived there, but his grandson, Mark Morta San Agustin did.290Id. Rebecca’s father then consented to a search of the parcel by the postal inspectors.291Id. at *2–3. Rebecca later claimed she had an ownership and possessory interest in the parcel from living at the destination address and having an ownership interest in the contents, but the court held this was insufficient to grant her Fourth Amendment standing for the parcel.292See id. at *9–10. For this reason, the court did not need to rule on the sufficiency of the consent to search the package granted by the owner of the residence to which it was addressed.293See Morta, 2022 WL 1447021, at *10 (foregoing analysis of the consent to search by instead concluding that lack of a reasonable expectation of privacy is sufficient to deny defendant’s motion to suppress evidence).

Which investigative actions are diligent enough needs to be a case-by-case evaluation. However, failure to attempt to contact identifiable parties via phone or visiting the sending and receiving addresses would be difficult to justify as diligent. How much further those investigations would need to go after that would depend on how those contacts go. As the purpose of these investigations is to determine who the mail belongs to, if a party claims a Fifth Amendment right against self-incrimination, that claim cannot simultaneously translate into an affirmative claim to an ownership or privacy interest under the Fourth Amendment.

In situations involving socially beneficial uses of pseudonyms, requiring a pre-search investigation allows the parties the chance to claim their interest in the mail. Understandably, if either the sender or recipient feels the need to use a pseudonym, they may still be unwilling to claim responsibility for the package’s contents. In these situations, as long as one named party remains identifiable and can be contacted, that party can retain a claim to privacy, protecting the package. An example is a whistleblower who decides to mail something to a journalist. The whistleblower may desire to use a pseudonym, but the journalist would need to be identifiable to ensure the mailing gets to him. If the package becomes entangled in an investigation, attempts to contact the whistleblower will either be unsuccessful or result in some disclaimer of knowledge. The journalist, on the other hand, as a named party, would likely be contacted successfully and could claim his interest in the parcel, retaining Fourth Amendment protections.

Alternatively, the delivery of fan mail to pseudonymous authors is another situation. Generally, a fan may seem likely to use his real name when sending fan mail, but the author seeks her privacy. During an investigation, an attempt to reach the recipient of the mail would be unsuccessful, or if the true author is contacted, she may disclaim her interest in the mail. However, once the fan is contacted, he could claim his interest, preserving the protection of the Fourth Amendment for both parties.

A required pre-search investigation cannot solve the problem of a beneficial use of pseudonyms with both the sender and recipient not using their real information. Both parties still have a desire to keep their anonymity, so they would likely refuse to acknowledge their interest in the mail. The twin denials could lead to a permissible abandonment search being conducted, with no recourse by the owners of the mail. However, if legal information is of such sensitivity that neither party wishes their involvement to be known to the government, sending it through the government’s system might not be the wisest idea. In this way, full knowledge of the effects of pseudonyms on mail would allow parties who have that need to make appropriate carrier decisions for their sensitive communications.

B.      Criticisms and Responses

Several concerns can be raised regarding the proposed scheme. They all have some validity. The first is whether it is appropriate to mandate that people make incriminating statements to restore their Fourth Amendment protections in the mail. Another is whether it is appropriate in the current legal analytical framework to require this pre-search investigation. A final one is concerns about Postal Service regulations and their interactions with undeliverable mail.

First, and most serious, is the interplay between the Fourth and Fifth Amendments when analyzing pseudonymous mail. When people manifest a strong enough connection to property, the Fourth Amendment will protect them by prohibiting unreasonable government searches and seizures.294See, e.g., Byrd v. United States, 138 S. Ct. 1518, 1528 (2018). The Fifth Amendment prohibits coerced incriminating statements.295See, e.g., Chavez v. Martinez, 538 U.S. 760, 767 (2003) (citing Brown v. Mississippi, 297 U.S. 278, 286 (1936)).

Requiring people to claim their Fourth Amendment interests in mail with a pseudonym on it does not coerce them into making incriminating statements in violation of the Fifth Amendment. As indicated previously, once parties choose to place pseudonyms on their mail, the default legal analysis indicates that intended, but unnamed, recipients do not have a reasonable expectation of privacy in that mail. What the pre-search investigation requirement does is allow the people involved to decide how to proceed. The people involved generally desire their name not be included on the mailing to prevent them from being associated with the results of a search. They have specifically taken steps to undermine their own interests. If asked during the pre-search investigation if mail belongs to them, they have two choices: (1) permit circumstances to continue under the already-undermined Fourth Amendment interests, or (2) revitalize their undermined interests through making incriminating statements. While it is valid that the government should not force people to choose between which amendment they wish the protection of, there is a counterpoint. The government is not responsible to protect people from the legal consequences of their actions undermining their protection. The furthest the Court has gone is requiring that some people be reminded of what their rights are in certain situations.296See Miranda v. Arizona, 384 U.S. 436, 444 (1966) (requiring police officers to inform people in custodial interrogation of certain constitutional rights before any potentially incriminating statements can be used against them during prosecution).

A second concern is whether requiring a pre-search investigation into ownership interests of the mail is permissible under current law. Since one of the main ways the protection of the mail is undermined is through the abandonment analysis, courts should already require officers to establish facts that justify proceeding under an abandonment theory prior to the search. As previously indicated, this is not a drastic change. The clarity it would provide to officers and the courts would benefit investigators because they would know what steps they need to take to ensure a legally defensible search.

The third concern mentioned, as indicated in Stokes, is whether the U.S. Code and Postal Service regulations have different answers to this question.297See United States v. Stokes, 829 F.3d 47, 50–51 & n.5 (1st Cir. 2016). Sealed letters are protected against being opened by 39 U.S.C. § 404. It states, “No letter . . . shall be opened except under authority of a search warrant . . . or by an officer or employee of the Postal Service for the sole purpose of determining an address at which the letter can be delivered.”29839 U.S.C. § 404(c).

Several interpretations of this code section are possible. The first reads this code section to authorize the Postal Service to follow normal dead mail procedures, whatever those procedures are. The second reading could claim that the Postal Service may not criminally investigate the contents of mail opened without a search warrant, as that goes beyond the “sole purpose” authorized by the statute. Another reading, although least likely considering the weight of Postal Service policy and other U.S. Code sections against it,299See, e.g., 39 U.S.C. §§ 3003(a), 3004; 18 U.S.C. § 1342; U.S. Postal Serv., Postal Operations Manual, Issue 9 §§ 611.1–611.3 (April 30, 2022). would be that this section implicitly overrules any requirement that mail be delivered to a specific addressee rather than the address itself. This reading would imply that, if a valid address exists on a piece of mail, it must be delivered.

Regardless of the interpretation, the problem identified in Stokes remains. A defendant who cannot challenge a search based on standing cannot reach the merits no matter what those merits are.300See Stokes, 829 F.3d at 50–51 & n.5. Whether a defendant who does not have standing to challenge the potential statutory violation in the criminal proceeding would have standing for a separate suit seeking declaratory or injunctive relief is beyond the scope of this Comment. If the government complies with the diligent investigation recommendation given herein, it would significantly decrease the chances of a litigant having standing for the same reasons it would decrease the chances in the criminal proceedings themselves.

Once a litigant reaches the merits though, whether the court agrees with the government’s actions appears very likely to depend on the facts of the case and the interpretation of the code section the judge adopts. The permutations are too varied for predictive analysis in this Comment.

Conclusion

Pseudonyms on mail for either the sender or addressee results in the removal of Fourth Amendment protections from that mail. This proposed change, however, permits continued protection of societally beneficial pseudonym usage while providing clarity for those conducting investigations. This clarity and relatively bright line is important under any proposal. One proposal argues that the exclusionary rule is flexible enough to allow for searches of mail for more serious drug crimes while disallowing searches for less serious ones, especially if the alternative is removing protections for mail using pseudonyms.301See Katharine Stewart, Note, The Fourth Amendment, Dark Web Drug Dealers, and the Opioid Crisis, 70 Fla. L. Rev. 1097, 1112–13, 1124–26 (2018). However, that proposal acknowledges this could potentially incentivize police misconduct and creates line-drawing problems between the serious drug dealer and the person shipping drugs to himself after a vacation to a location where they are legal.302See id. at 1124–26. While the difficulty in drawing these lines is reason enough to pause before relying on the exclusionary rule to handle drug distribution, incentivizing violations of the Fourth Amendment, even for seemingly small things, is a slippery slope.

There are also compelling arguments for expanding Fourth Amendment protections, especially through permitting third-party standing,303E.g., Cook III, supra note 14, at 1155. rather than contracting them, so any solution that potentially encourages warrantless searches should have a pre-search evidentiary basis. It does not appear that any arguments have been made that pseudonyms on mail should be protected as expressive speech under the First Amendment. It is unclear that just the use of the pseudonyms on the mail would be protected. What may be more open to a First Amendment challenge is the impact on speech contained within mail that is selected for police action based on the pseudonyms on the exterior of the mail.

The USPS Office of the Inspector General recommended the Postal Service ask Congress to weaken search protections on all packages sent through the mail and institute “a public awareness campaign designed to reduce the public’s expectation of privacy in packages sent through the mail.”304U.S. Postal Serv., supra note 1, at 28. This drastic change would reach far beyond the proposed solution here. While that alternative may be likely to be more effective immediately, effectiveness should not be the only measure of whether an option should be selected. Something needs to be done, but it needs to be done within the law and not an attempt to change the nation’s view—held since the Founding—of the Postal Service.

Share this article

Twitter
Facebook
LinkedIn