Lead Opinion
OPINION
Aftеr the trial court denied his motion to suppress evidence, appellant, Raymond Dominic Brackens, pleaded guilty to the offense of possession of child pornography.
We affirm.
Factual and Procedural Background
In his motion to suppress evidence, appellant asserted that, on July 26, 2006, he took his laptop computer to a Circuit City store for “simple data migration” and provided an external hard drive to effectuate this request. Appellant instructed Circuit City to “backup all music, videos, and photos” under his profile “as well as folder desktop files located on the desktop” and explained that he did not need computer repairs because the computer was under warranty. He asserted that he “was not informed and did not consent to the opening of any files in order to effectuate the transfer of data from the computer hard drive to the external drive,” and, “with a data transfer, there is no need to open
At the hearing on the motion to suppress evidence, Legg testified that on July 30, 2006, he received a work order to perform a “data migration” on appellant’s laptop computer. The work order contained instructions to “back up all music, video, and photos” and desktop files from appellant’s laptop to an external hard drive. Legg, who had not personally spoken with appellant, explained that, to perform the requested data migration, he would have “normally hooked up the external hard drive to the laptop and just copied it over.” However, because “the USB ports on the laptop were non-functional,” he “had to copy it to a DVD” to ultimately load the files “into the store computer which had the external hard drive connected to it.” While performing the data migration as part of his “regular” job, Legg “came across the folder” entitled “My Shared Folder” to download onto the DVD. Legg explained that because the “My Shared Folder” was itself “too large to fit on a DVD,” he had to open the folder and copy every file “individually.” As he was “selecting the files” from the My Shared Folder and “dragging them to the DVD, [he] came across” a file or files with a title that contained references to a “14 year-old’ ” and “Pedo,” which Legg understood be short for pedophile or pedophilia. Legg’s concerns were also based on the fact that the questionable file or files were linked to a program well known for downloading pornography. Legg maintained that in order to carry out the customer’s instructions to back up the music, videos, and photos, he had to open up the My Shared Folder.
Legg further testified that because Circuit City store policy prohibited employees from backing up “anything that might be illegal,” he opened the “14-year old” or “Pedo” file to confirm that it was not illegal. When Legg double clicked on the file, which was not password protected or locked, he saw an image of an adult male having intercourse with an underage female child. Once Legg verified that this file contained illegal data, he stopped what he was doing and informed his manager, Israel Bautista. Legg noted that multiple other files in the My Shared Folder had titles indicating that they also likely contained child pornography.
Legg agreed that it was Circuit City’s standard operating procedure to open files during a data migration only if a file is of questionable content or “could have something illegal in it” and, generally, files are not opened in this process. When asked if Circuit City explained this policy to customers before it accepted their work, Legg noted that Circuit City’s own work orders stated that the customer agreed to “all policies.” Legg opined that although the specific policy described above was not on the work order, it was the customers’ responsibility to make themselves aware of the policies. Legg further agreed that appellant’s signature did not appear in the space for the customer’s signature on the work order form.
After Legg informed his manager of his discovery, someone at the Circuit City store notified the Houston Police Department (“HPD”), and a HPD patrol officer came to the store. The patrol officer first asked Legg to open the file that Legg had
Bautista testified that after Legg had informed him that he had discovered a file containing child pornography on appellant’s laptop, he contacted his service manager and was instructed to notify law enforcement authorities and to quarantine the laptop. When the HPD patrol officer arrived, Bautista and Legg showed the patrol officer where the files were located, аnd then the patrol officer asked them to play one of the video files. Bautista recalled seeing an additional “two to three” of the video files containing child pornography in the officer’s presence. Bautista explained that he, Legg, and the patrol officer saw “quite a few” other file names indicating that they also contained child pornography, but they only viewed “the first few of them.”
When asked about Circuit City’s privacy policies, Bautista stated that Circuit City employees are not allowed to open a file or folder unless specifically instructed by the customer. However, Bautista explained that Legg had not violated the policy bеcause Circuit City also had a policy prohibiting its employees from backing up anything illegal and a technician would have to open a suspect file to confirm that it was not illegal. If Legg had copied the suspect file without confirming that it was not illegal, Legg would have been in violation of Circuit City policy.
HPD Officer Barnes testified that he was assigned to investigate the case on July 31, 2006, the day after the HPD patrol officer had visited the Circuit City store. Barnes stated that, upon being assigned the case, he prepared a search warrant, which stated,
On July 26, 2006, defendant brought his computer to Circuit City. This was a laptop computer described as a Compaq Computer Model No: V203US; Serial No: CNF4461126. Circuit City has the computer. Defendant, Raymond Brack-ens, brought the computer in for Circuit City to be fixed. Circuit City found numerous videos labeled “PEDO.” The technician, Mark Leg [sic], stated that what he saw was at least 10 videos of female children ages ranging from 9-11 years old performing oral and vaginal sex with adult males. The file name where the pornographic images were observed were under the defendant’s name. The technician immediately called HPD to come view the computer. A patrol officer came to Circuit City and viewed the pornographic images. After viewing the images, the patrol officer took custody of the computer and put the computer in the HPD property room. The computer is currently in custody of HPD.
After obtaining the warrant, Barnes took appellant’s laptop from the HPD property room to another officer, a computer specialist, who conducted digital forensic analysis of the laptop. The analysis revealed that the laptop contained thirteen video files and two photo files containing child pornography. Eight of the files containing child pornography were accessed on July 30, 2006, the date the first HPD patrol officer visited the Circuit City store. An additional five files containing child pornography had not been accessed on or after that date. Based upon this analysis, Barnes concluded that, on July 30, 2006, the HPD officer who was first called to the Circuit City store had viewed only some of the files containing child pornography that
Kevin Jordan, a computer forensic analyst and appellant’s expert witness, testified that he has never had to open files in performing data migrations. He also stated that Barnes’s testimony regarding the dates that the files in question had been accessed could be accurate “assuming that the file system’s time can be trusted and there is nothing been done to modify the times purposefully.”
At the conclusion of the motion to suppress evidence hearing, the trial court concluded thаt Legg “was not an agent of law enforcement, and that his viewing of the file he testified to was a regular part of copying the data with regard to the data migration.” It found that appellant consented to Legg performing “the data migration” and Legg had to open the files to perform appellant’s work request. The trial court denied appellant’s motion to suppress evidence on the ground that Legg had violated “Texas Penal Code section 33.02[
Standard of Review
We review a ruling on a motion to suppress for an abuse of discretion. Shepherd v. State,
Motion to Suppress Evidence
In four issues, appellant argues that the trial court erred in denying his motion to
The Fourth Amendment of the United States Constitution and article I, section 9 of the Texas Constitution protect against unreasonable searches and seizures. U.S. Const. amend. IV; Tex. Const. art. I, § 19; Villarreal v. State,
In regard to appellant’s first issue, we note that one does not necessarily lose one’s reasonable expectation of privacy in one’s closed computer files by handing one’s computer over to a computer technician. See id. at 937. However, a private party search can destroy an individual’s reasonable expectation оf privacy if the individual’s conduct or activity or the circumstances of the situation significantly lessen the defendant’s reasonable expectation of privacy by creating a reasonably foreseeable risk of intrusion by private parties. Id. In such a situation, any subsequent law enforcement search must be limited in scope to the private party’s legitimate search. Id.
Here, appellant took his laptop computer to a Circuit City store to have a technician back up his video and photographic files onto an external hard drive. Appellant did not place any limitation on his request to back up these files, and the USB ports on the laptop did not function. Legg. testified that in order to fulfill appellant’s request to migrate the data onto an external hard drive, he had to copy the files in appellant’s My Shared Folder onto a DVD to ultimately load the files “into the store computer which had the external hard drive connected to it.” Once he saw the suspect name “Pedo” on one of the files, Legg had to open the file to confirm that it was not illegal. We hold that, under these circumstances, appellant’s request to back up his video and photographs, without any limitation on how to effectuate the request, created a reasonably foreseeable risk of intrusion by Legg.
We overrule appellant’s first issue.
Nevertheless, even though the patrol officer’s search of the additional files was unreasonablе, Officer Barnes subsequently obtained a search warrant based primarily upon Legg’s observations prior to the patrol officer’s instructions to search for additional pornographic files on the laptop. “When a search warrant is issued on the basis of an affidavit containing unlawfully obtained information, the evidence seized under the warrant is admissible only if the warrant clearly could have been issued on the basis of the untainted information in the affidavit.” Pitonyak v. State,
Here, even appellant agreed in the trial court that Officer Barnes had probable cause to obtain a search warrant based upon Legg’s initial observations of his computer files.
We overrule appellant’s second issue.
In his fourth issue, appellant specifically argues that because Legg violated Texas Penal Code section 33.02 in opening the “Pedo” file, all of the files should be excluded from evidence. See Tex.Code Crim. Proc. Ann. art. 38.32(a). Article 38.23(a) provides that “[n]o evidence obtained by an officer or other person in violation of any provisions of the Constitution or laws of the Stаte of Texas, or of the Constitution or laws of the United States of America, shall be admitted in evidence against the accused on the trial of any criminal case.” Id. (emphasis added). Section 33.02 of the Texas Penal Code prohibits a person from knowingly accessing a computer without the “effective consent” of the owner. See Tex. Penal Code Ann. § 33.02(a) (Vernon 2003). Appellant asserts that Legg was not authorized to view any files on his laptop.
However, as noted above, appellant did not place any limitations on his request to back up his computer files. In order to fulfill appellant’s request, Legg had to copy appellant’s files onto a DVD to ultimаtely load the files “into the store computer which had the external hard drive connected to it.” Once he saw the suspect “Pedo” file, Legg had to open it to confirm that it was not illegal. The testimony from Legg and Bautista supports an implied finding that appellant’s computer files were accessed in the course of carrying out appellant’s work order. Accordingly, we hold that the trial court did not err in concluding that Legg did not violate section 33.02.
We overrule appellant’s fourth issue.
We hold that the trial court did not err in denying appellant’s motion to suppress evidence.
Conclusion
We affirm the judgment of the trial court.
Justice KEYES, concurring.
Notes
. See Tex. Penal Code Ann § 43.26 (Vernon 2003).
. Tex.Code Crim. Proc. Ann. art. 38.23 (Vernon 2005).
. Testimony revealed that the files accessed on July 30, 2006 included those titled (1) “16Y slut, reelkiddy, one word, prn kiddy.mgpe”; (2) "Izzy2.mp”; (3) “kiddy-baby, mpeg”; (4) "Kiddy Vanessa 12 years, 36.-mpeg”; (5) "Pedo 10-YO pussy.mpg”; (6) “Pedo-Vicky-doudu.mpeg”; (7) "Pedo Mff— suck.mpg”; and (8) "vicky string bikini, p the., 11 year-old mpg.” The additional video files were titled (1) "Lolita sex 0002 little preteen”; (2) "Lolita Network Camille”; (3) "pedo underage 12.mpeg”; (4) "Porn — Japanese Lolita Rape”; and (5) "R ampersand Y gold preteen suck.”
. Tex. Penal Code Ann. § 33.02 (Vernon Supp. 2008).
. Appellant and the State do not directly address whether the trial court’s oral findings should be considered explicit findings. Both appear to ask us to consider the trial court’s implied findings.
. See Zaratti v. State, No. 01-04-01019-CR,
. The State, citing Rogers v. State,
. Appellant challenges Legg’s actual viewing of the original video on separate state grounds that we address below.
. Having so held, we need not address appellant's third issue, in which he argues that the trial court abused its discretion in finding that the "computer technician had the authority to consent to the search of appellant's computer.”
Concurrence Opinion
concurring.
I join the majority’s opinion except to the extent the majority holds that Legg’s opening, at the direction of police, files he had previously uncovered in thе “My Shared Documents” folder on appellant’s computer was “per se unreasonable under the Fourth Amendment and under article I, section 9 of the Texas Constitution” and therefore constitutional error. See Op. at 838. I agree with the majority that Legg was not acting as a state actor and did not violate appellant’s expectation of privacy under the Fourth Amendment when he initially opened the “My Shared Documents” folder in the course of performing appellant’s requested computer data transfer, discovered a number of files with labels indicating they contained child pornography, and opened one of them.
Legg opened the file labeled “14-year old” to confirm that it contained child pornography because the file was “linked to a program that is very well known for downloading pornographic material.” He discovered the image of an adult male in sexual congress with an underage female. Legg immediately closed the image and alerted his supervisor, Israel Bautista. Bautista contacted his supervisor, who instructed Bautista to contact the Houston Police Department (“HPD”). Bautista called the police and quarantined the computer in the store’s cash office. An HPD police officer came to Circuit City within twenty minutes of Bautista’s call. After arriving on the scene, the officer requested that Legg retrieve the computer and open the file containing the child pornography that he had previously opened. After the police officer viewed the original image, he asked Legg to open additional files in the same folder with the titles (1) “16Y slut, reelkiddy, one word, prn kiddy.mgpe”; (2) “Izzy2.mp”; (3) “kiddy-baby.mpeg”; (4) “Kiddy Vanessa 12 years, 36.mpeg”; (5) “Pedo 10-YO pussy.mpg”; (6) “Pedo-Vieky-doudu.mpeg”; (7) “Pedo Mff — suck, mpg”; and (8) “vicky string bikini, p the., 11 year-old mpg.” Legg then left the room and Bautista and the officer viewed eight of the nine additional images. The police officer seized the computer and placed it in the HPD property room.
HPD officer John Barnes was assigned the investigation on July 30, 2006. He made out an affidavit to the magistrate judge as follows:
On July 26, 2006, defendant brought his computer to Circuit City. This was a laptop computer described as a Compaq Computer Model No: V203US; Serial No: CNF4461126. Circuity [sic ] City has the computer. Defendant, Raymond Brackens, brought the computer in for Circuity [sic ] City to be fixed. Circuit City found numerous videos labeled “PEDO.” The technician, Mark Leg [sic], stated that what he saw was at least 10 videos of female children ages ranging from 9-11 years old performing oral and vaginal sex with adult males. The file names where the pornographic images were observed were under the defendant’s name. The technician immediately called HPD to come view the computer. A patrol officer came to Circuit City and viewed the pornographic images. After viewing the images, the patrol officer took custody of the computer and put the computer in the HPD property room. The computer is currently in [the] custody of HPD.
Both the United States and Texas Constitutions protect an individual’s legitimate expectation of privacy in the individual’s home and personal effects from unreasonable government intrusion. U.S. Const. amend. IV; Tex. Const. art. I, § 9; see also Villarreal v. State,
Neither the Fourth Amendment nor the Texas Constitution, however, requires the exclusion of evidence obtained by a private party’s search. Cobb v. State,
However, even if a private party does act as a governmental agent, a defendant has standing to complain that evidence was obtained by unreasonable governmental intrusion in violation of the Fourth amendment and the Texas Constitution and is therefore inadmissible only if he has a legitimate expectation of privacy in the place invaded. Paige,
The protection afforded closed personal computer files and hard drives has been likened to the protection afforded by the Fourth Amendment to a person’s closed containers and closed personal effects. See Barth,
The question here, therefore, is whether appellant had a reasonable expectation оf privacy against a governmental search of the contents of the folder labeled “My Shared Documents” once Legg had lawfully opened the folder during the course of the data migration requested by appellant and discovered a number of files with names indicative of child pornography. I would hold that he did not.
The opening of the folder resulted in Legg’s discovery of illegal pornography in plain view in the form of numerous video files labeled “PEDO,” including the file labeled “14 year-old girl,” which he opened. See Andreas,
I would hold that once the police had Legg open the folder labeled “My Shared Documents” and the “14-year-old” file and saw the additional files with titles indicative of pornography in plain view in the opened folder, they had probable cause to believe the folder labeled “My Shared Folder” contained pornographic material and that they did not exceed the scope of the original lawful search by directing Legg to open the six additional files in the folder opened without a search warrant. Thus, I would hold that the police-directed warrantless search of the computer files in the folder labeled “My Shared Folder” was not a search of files in which appellant had a legitimate expectation of privacy and was not an illegal “search” under the Fourth Amendment or its Texas counterpart. See Andreas,
Like the majority, I would affirm the judgment of the trial court.
. Legg did not recall the exact name of the file he initially opened in the “My Shared Documents” folder at the time of the suppression hearing over a year later. The files he discovered during that initial search and was asked to open by the police before a search warrant was obtained included (1) ”16Y slut, reelkiddy, one word, prn kiddy.mgpe;” (2) “Izzy2.mp;” (3) "kiddy-baby.mpeg;” (4) "Kiddy Vanessa 12 years, 36.mpeg;” (5) "Pedo 10-
. The majority agrees that the police had probable cause to obtain a search warrant
