STATE of South Dakota, Plaintiff and Appellant, v. Charles Edwin HELLAND, Defendant and Appellee.
No. 23705.
Supreme Court of South Dakota.
Decided Dec. 7, 2005.
2005 SD 121
Considered on Briefs Oct. 3, 2005.
[¶ 13.] There is simply no evidence that the verbal altercation included threats of imminent serious bodily harm or an attempt to engage in such conduct. Instead, R.L.G. simply persisted in angrily shouting that Jensen not talk about him behind his back. There was no indication he took any step or overt act that could be perceived as an attempt to assault Jensen. On the contrary, Jensen testified that R.L.G. did not walk towards her. They just stood together in the doorway and the only time he moved was to leave and “not to hurt [her].” Furthermore, the record indicates that Jensen did not believe that R.L.G. would physically harm her. Jensen specifically testified that she did not think R.L.G. would hit her, he did not threaten her, and she was not afraid for her safety. When asked if R.L.G. could return to her class after this incident, she testified “I don‘t think I feared for my safety” in taking him back. Although actual fear was not necessary, this testimony was clearly relevant in assessing whether an attempt to assault occurred through the tone of the encounter and the posture of the parties.
[¶ 14.] In sum, there is no question that R.L.G. engaged in an inappropriate verbal confrontation with his teacher and he was suspended from school as a result of those actions. However, his conduct did not constitute criminal simple assault because there was no record evidence of an attempt, by physical menace, to place Jensen in fear of serious imminent harm. Neither the evidence nor the trial court‘s findings support a violation of
[¶ 15.] Reversed.
[¶ 16.] GILBERTSON, Chief Justice, and SABERS, KONENKAMP, ZINTER and MEIERHENRY, Justices, participating.
Michael J. Butler, Butler Law Office, P.C., Sioux Falls, South Dakota, Attorney for defendant and appellee.
GILBERTSON, Chief Justice.
[¶ 1.] Charles Edwin Helland (Helland) filed a motion in circuit court to suppress evidence obtained in a search of his computer and office at his employer‘s place of business. The circuit court judge suppressed the evidence, holding the affidavit was misleading because of the omission of material information. We reverse.
FACTS AND PROCEDURE
[¶ 2.] On June 11, 2004, Kevin Elsing, vice-president of Elbo Computing Resources and a computer technician by trade, was called to service Helland‘s computer at his employer‘s place of business. Elsing noticed Helland minimized the computer screen when Elsing entered the office. When Elsing began working on the computer, he was able to see that the screen Helland had minimized was a web page dealing with people‘s first experience
[¶ 3.] Elsing‘s next contact with Helland occurred on November 22, 2004, after receiving an email requesting service on Helland‘s computer. The email stated Helland‘s computer had lost access to the office network, was not printing properly and was not accessing Microsoft Word. Elsing arrived at Helland‘s office the morning of November 23, 2004, and began his work by updating the previously installed antivirus and antispyware software and removing spyware from the system. Elsing removed several spyware files from the system to determine if these files were the cause of the software errors. Elsing then began a scan of the system using a web-based scan engine called housecall.trendmicro.com. The scan was taking a long time to complete, and to speed up the process Elsing decided to delete the contents of the “temporary internet files” folders on Helland‘s computer. Elsing noticed that the deletion was taking a long time and the system did not seem to be deleting the temporary internet files as requested. Elsing then decided to look into the “temporary internet files” folders to see if files were being deleted.
[¶ 4.] Upon opening the “temporary internet files” folders, Elsing found dozens of suggestive and suspicious graphic file names such as “hot boys” and “teen boys.” Elsing opened some of these temporary internet files and found images of young nude males. Elsing noted that one image depicted two boys approximately eight to ten years of age, naked, sitting on the shore of a lake or stream, side by side, hands behind them, with their legs spread. Shocked and in disbelief about what he was seeing, Elsing began opening other files that contained similarly disturbing images. Fearing he was deleting the temporary internet files, Elsing stopped the deletion process and created a new folder called “older” and copied the index.dat3
[¶ 5.] Alarmed by what he saw, Elsing returned to Elbo Computing to discuss the details with his business partner. Elsing felt his discoveries might have triggered the provisions of
[¶ 6.] Later that afternoon, Elsing contacted Marvin D. Thorstenson, a detective with the Minnehaha County Sheriff‘s Office assigned to the Internet Crimes Against Children Task Force. Elsing told Detective Thorstenson about the images of child pornography contained in the temporary internet files and the incest web page incident. Elsing also told Detective Thorstenson that Helland had previously told Elsing that he was a Boy Scout Troop Leader and that he had an older fax machine at the Boy Scout Troop building that was great for printing off still images. Finally, Elsing told Detective Thorstenson that Helland had several floppy disks near the computer work station, a disk drive, and a compact disk burner attached to the computer that would allow files to be transferred from the computer to compact disks. Elsing then returned to Helland‘s office and finished the service call by reloading printer drivers.
[¶ 7.] Detective Thorstenson applied for a search warrant based on this information. In his affidavit, Detective Thorstenson provided a large amount of background information concerning how the internet is used to facilitate crimes against children. The affidavit included a section on collateral evidence that law enforcement officers expect to find during a search of the computer of an individual suspected of possession of child pornography, a section on how a computer serves as a repository of evidence in such cases, another section on the need to remove the computer from the scene in order to search it with sophisticated software programs, and finally a section on the need to seize programs and peripherals to assist in the evaluation of the data contained on the computer. In all, the background material comprised eleven paragraphs of the affidavit, almost three full pages of the five and one-half page document.
[¶ 8.] The remaining pages of the affidavit included a detailed account of the information provided to Detective Thorstenson by Elsing, organized into seven
[¶ 9.] Based on the affidavit, a search warrant was issued by a circuit court judge for evidence of the commission of the crime of possession and distribution of child pornography including contraband, the fruits of crime, or things otherwise criminally possessed, and things designed or intended for use in, or which were used as a means of, committing the offense of possession and distribution of child pornography. The scope of the search was limited to Helland‘s office at his employer‘s place of business for “[a]ll computer systems to include programs used to create the text or capture & modify images, all programs found near the computer system, data files, removable media such as data tape, magneto optical disks or similar storage, passwords and access codes written on pieces of paper near the computer.” The search revealed “a tremendous amount of child pornography” in two different desk drawers in Helland‘s office. Based on the evidence seized, Helland was indicted on twenty counts of Possession of Child Pornography in violation of
[¶ 10.] Helland filed a motion to suppress the evidence and a hearing was held on the matter. The suppression court granted Helland‘s motion, holding that the affidavit in support of the search warrant failed in two respects. First, the suppression court found that the affidavit failed to explain the nature of temporary internet files. Second, the court held that the affidavit failed to set forth the fact that the files observed by Elsing were all temporary internet files. The suppression court held that the affidavit should have specified that temporary internet files may not be user created, but rather may result from actions taken by the computer without the user‘s knowledge. In addition, the suppression court held the affidavit should have stated that the evidence discovered by Elsing consisted exclusively of temporary internet files. The suppression court found Detective Thorstenson recklessly misled the issuing court by omitting the background material on temporary internet files and by failing to state that all files viewed by Elsing were temporary internet files. The suppression court held that once the affidavit was supplemented with the omitted material, there was insufficient probable cause for issuance of the search warrant. As a consequence, the suppression court ordered all evidence seized from Helland‘s office suppressed.
[¶ 11.] The State appeals from the order suppressing the evidence obtained from Helland‘s computer and desk drawer raising three issues:
- Whether the suppression court erred when it held that the issuing court had insufficient probable cause to issue the search warrant.
Whether Detective Thorstenson recklessly made false or misleading statements in his affidavit, or recklessly withheld material information from the affidavit, so as to invalidate the search warrant. - Whether the good faith exception to the exclusionary rule applies when officers reasonably rely upon a search warrant that is later deemed invalid as a result of insufficient probable cause.
STANDARD OF REVIEW
[¶ 12.] Our standard of review for a challenge to the sufficiency of the evidence supporting a search warrant requires us to look “at the totality of the circumstances to decide if there was at least a ‘substantial basis’ for the issuing judge‘s finding of probable cause.” State v. Schwartz, 2004 SD 123, ¶ 21, 689 N.W.2d 430, 436 (quoting State v. Jackson, 2000 SD 113, ¶ 8, 616 N.W.2d 412, 416 (citing Illinois v. Gates, 462 U.S. 213, 238-39, 103 S.Ct. 2317, 2332, 76 L.Ed.2d 527 (1983))). On review, our inquiry is limited to determining whether the information provided to the issuing court in the warrant application was sufficient for the judge to make a “‘common sense’ determination that there was a ‘fair probability’ that the evidence would be found on the person or at the place to be searched.” Jackson, 2000 SD 113, ¶ 8, 616 N.W.2d at 416. On review, we are limited to an examination of the facts as contained within the four corners of the affidavit. Id. ¶ 11, 616 N.W.2d at 416 (quoting State v. Lodermeier, 481 N.W.2d 614, 622 (S.D.1992) (quoting State v. Iverson, 364 N.W.2d 518, 522 (S.D.1985); State v. Smith, 281 N.W.2d 430, 433 (S.D.1979))). Furthermore, we review the issuing court‘s probable cause determination independently of any conclusion reached by the judge in the suppression hearing. Jackson, 2000 SD 113, ¶ 8, 616 N.W.2d at 416 (citing United States v. Hibbard, 963 F.2d 1100, 1101 (8th Cir.1992); United States v. Anderson, 933 F.2d 612, 614 (8th Cir.1991)).
ANALYSIS AND DECISION
[¶ 13.] 1. Whether the suppression court erred when it held that the issuing court had insufficient probable cause to issue the search warrant.
[¶ 14.] The text of the Fourth Amendment provides:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
[¶ 15.] There is no “formulaic solution” for determining the amount of evidence required to form probable cause. Jackson, 2000 SD 113, ¶ 22, 616 N.W.2d at 420 (citing People v. Fino, 14 N.Y.2d 160, 250 N.Y.S.2d 47, 199 N.E.2d 151, 153 (1964)). Rather, “[p]robable cause lies somewhere between mere suspicion and the trial standard of beyond a reasonable doubt.” Heib v. Lehrkamp, 2005 SD 98, ¶ 21, 704 N.W.2d 875, 884 (citing Beck v. Ohio, 379 U.S. 89, 91, 85 S.Ct. 223, 225-26, 13 L.Ed.2d 142 (1964); and Charles H. Whitebread & Christopher Slobogin, Criminal Procedure 3.03 (4th ed 2000)). It is a fluid concept that requires an “assessment of probabilities in particular contexts[,]” and must be evaluated by balancing “the government‘s need to enforce the law with a citizen‘s right to privacy[.]” Jackson, 2000 SD 113, ¶ 22, 616 N.W.2d at 420.
[¶ 16.] We have previously articulated the standard for determining the existence of probable cause sufficient to support the issuance of a search warrant:
There need not be a prima facie showing of legal evidence of a suspected act. The standard of probable cause for the issuance of a search warrant is a showing of probability of criminal activity. [State v. Gerber, 241 N.W.2d 720 (SD 1976); and State v. Haron, 88 S.D. 397, 220 N.W.2d 829 (S.D.1974)]. In addition to the reasonable ground to believe that some violation of the law exists, probable cause for a search warrant necessarily implies that there is a violation in respect to some property located on some premises, or on some person, which can be identified expressly or by reasonable inference from the information given in the affidavit so as to be capable of being particularly described in the warrant. See State v. Hermandson, 84 S.D. 208, 169 N.W.2d 255 (1969). State v. Kaseman, 273 N.W.2d 716, 723 (S.D.1978) (emphasis added).
On review, this Court limits its inquiry to whether the information contained in the affidavit presented to the issuing court was sufficient for that judge to arrive at a “common sense” conclusion that there was a “fair probability” that a crime had been committed and that the evidence named in the affidavit would be found on the person or at the place to be searched. Jackson, 2000 SD 113, ¶ 8, 616 N.W.2d at 416.
[¶ 17.] When reviewing a challenge to the sufficiency of a search warrant, we will not consider evidence that was not before the issuing court at the time the warrant was issued. Id. ¶ 11 (citing Smith, 281 N.W.2d at 433 (citing Gerber, 90 S.D. 432, 241 N.W.2d 720)). Our examination is limited to the four corners of the affidavit. State v. Raveydts, 2004 SD 134, ¶ 9, 691 N.W.2d 290, 293. “Reviewing courts are not empowered to conduct an after-the-fact de novo probable cause determination; on the contrary, the issuing court‘s legal basis for granting the warrant is examined with ‘great deference.‘” Jackson, 2000 SD 113, ¶ 9, 616 N.W.2d at 416 (citing Gates, 462 U.S. at 236, 103 S.Ct. at 2331, 76 L.Ed.2d at 527). Furthermore, we will draw every reasonable inference possible in support of the issuing court‘s determination of probable cause to support the warrant. State v. Habbena, 372 N.W.2d 450, 456 (S.D.1985) (citing State v. Wellner, 318 N.W.2d 324, 327 (S.D.1982)). This deferential standard “is appropriate to further the Fourth Amendment‘s strong preference for searches conducted pursuant to a warrant.” Jackson, 2000 SD 113, ¶ 9, 616 N.W.2d at 416 (citing Massachusetts v. Upton, 466 U.S. 727, 733, 104 S.Ct. 2085, 2088, 80 L.Ed.2d 721, 727 (1984)).
[¶ 18.] In the instant case, the issuing court was presented with information indicating that Elsing had personally seen dozens of suspicious files with names such as “hot boys” and “teen boys” in the temporary internet file folders on Helland‘s computer. The affidavit also indicated that Elsing had seen several photographic images of nude young males contained in files on the computer, and specifically described one in which two nude eight-or ten-year-old male children were sitting side by side with their legs spread, facing the camera. The affi
[¶ 19.] It is also clear from the affidavit that Elsing told Detective Thorstenson that Helland‘s employer owned the computer in question. The affidavit also states that Elsing personally knew from his work at the employer‘s place of business that this particular computer had been located in Helland‘s office for the previous twelve months, and that it was connected to the internet. The affidavit also noted that Helland‘s computer was attached to a printer, a CD burner and had a disk drive.
[¶ 20.] Helland argued at the suppression hearing that there was nothing in the affidavit for the issuing court to conclude that Helland had caused the images of child pornography to be stored on the temporary internet file folders, and was therefore not in knowing possession of child pornography in violation of
[¶ 21.] At the hearing, the suppression court questioned Elsing as to the nature of temporary internet files and how such files are created on a computer. When Elsing failed to include in his explanation that pop-up ads could generate temporary internet files without any knowledge or action on the part of the user, the suppression court excused Elsing from the witness stand, stating that Elsing had no credibility with the court.
[¶ 22.] During the suppression hearing, Detective Thorstenson was also asked about his knowledge of temporary internet files and how such files may be generated by the computer user or by the actions of pop-up ads. Thorstenson conceded that the files could be created by both methods, and that he did not recall asking Elsing if he had seen user created files containing child pornography on Helland‘s computer. Thorstenson also conceded that determining how the files came to be on the computer would be relevant in determining if Helland had committed the crime of knowing possession of child pornography.
[¶ 23.] In its findings of fact and conclusions of law, the suppression court included a lengthy explanation of temporary internet files and how such files can be created through active conduct on the part of a computer user as well as by pop-up ads. The suppression court concluded as a matter of law that the affidavit should have included an explanation of temporary internet files, and should have stated in each reference to “files,” that the files in question were “temporary internet files,” because “any reasonable person would have known that an explanation of temporary internet files was necessary to thoroughly inform the issuing court.” The suppression court theorized that without the information concerning pop-up ads, the issuing court could not determine whether the child pornography images were placed on Helland‘s computer by his own actions or by the computer‘s own independent reactions to pop-up ads. Finally, the suppression court held that where the images were found on the computer and how the images came to be on the computer were
[¶ 24.] We have never required an affidavit in support of a search warrant to state with particularity how contraband materials such as child pornography came to be at the location to be searched in order to support a finding of probable cause. That level of particularity does not apply to the search of a place where contraband or fruits or instrumentalities of a crime are believed to be located. See Zurcher v. Stanford Daily, 436 U.S. 547, 555, 98 S.Ct. 1970, 1976, 56 L.Ed.2d 525 (1978).6 The standard for a search warrant does not require such particularity with regard to who obtained the contraband, because “[s]earch warrants are not directed at persons; they authorize the search of ‘places’ and the seizure of ‘things,’ and as a constitutional matter they need not even name the person from whom the things will be seized.” Id. (citing United States v. Kahn, 415 U.S. 143, 155, n.15, 94 S.Ct. 977, 984, n.15, 39 L.Ed.2d 225, n.15 (1974)). Therefore, who placed the child pornography into the temporary internet files on Helland‘s computer, and how they were placed there are issues immaterial to a finding of probable cause.
[¶ 25.] How the child pornography came to be on Helland‘s computer is relevant to determining whether Helland was in knowing possession in violation of
[¶ 26.] The information in the affidavit made it clear that dozens of pornographic images of children were found in the temporary internet files on Helland‘s computer, a fact Helland does not dispute.8 It was reasonable for the issuing court to infer from the existence of these images that someone had committed the crime of possession or distribution of child pornography. However, at the point in time that the issuing court approved the search warrant it was not necessary for it to have legal evidence establishing how the images came to be on the computer or whose actions had caused the images to be on Helland‘s computer. The issuing court had all the facts that it needed to establish that it was “fairly probable” that someone had committed the crime of possession of child pornography, thus satisfying the first inquiry under the probable cause standard for issuing a search warrant.
[¶ 27.] It was also reasonable for the issuing court to conclude there was a “fair probability” based on the dozens of suspicious file names in the temporary internet file folders and the images viewed by Elsing that those same images would still be located in the computer‘s temporary internet files and be discovered during the search. Finally, it was reasonable for the issuing court to infer that additional images of child pornography might be contained on the computer or on disks, CDs or in printed form in the office, as Helland‘s computer was attached to a printer, a CD burner and had a disk drive that were available to further manipulate, view, store or print out the images.
[¶ 28.] The suppression court erred when it considered evidence not contained in the affidavit to conclude there was insufficient probable cause to issue the warrant. The suppression court entered into its findings of fact and conclusions of law a substantial amount of information on the nature of temporary internet files that was not before the issuing court. The suppression court also erred when it elevated the issuing court‘s evidentiary standard by requiring that the affidavit contain facts that indicated how the images of child pornography came to be on the computer.
[¶ 29.] All the issuing court and suppression court needed to consider was whether the presence of dozens of images of child pornography in the temporary internet file folders on Helland‘s computer, as attested to in the affidavit, constituted
[¶ 30.] 2. Whether Detective Thorstenson recklessly made false or misleading statements in his affidavit, or recklessly withheld material information from the affidavit, so as to invalidate the search warrant.
[¶ 31.] The suppression court concluded Detective Thorstenson recklessly withheld material information from the affidavit that amounted to misleading statements. The suppression court based its conclusion on Thorstenson‘s 1) failure to specify that the evidence discovered by Elsing consisted exclusively of temporary internet files, and 2) failure to include a description of temporary internet files that informed the issuing court that “temporary internet files may not be user created, but rather may result from actions taken by the computer without the user‘s knowledge.” The suppression court did not find that Detective Thorstenson recklessly made false statements.
[¶ 32.] An affidavit that is purported to contain recklessly and intentionally misleading information or material omissions is reviewed under the two-part analysis in Franks v. Delaware, 438 U.S. 154, 98 S.Ct. 2674, 57 L.Ed.2d 667 (1978). State v. Brings Plenty, 459 N.W.2d 390, 401 (S.D.1990) (citing Habbena, 372 N.W.2d 450). “First, the defendant must show by a preponderance of the evidence that a statement knowingly and intentionally, or with reckless disregard for the truth, was [omitted] by the affiant in the warrant affidavit. Second, the allegedly [omitted] statement must be necessary to the finding of probable cause.” Id. (citing Habbena, 372 N.W.2d at 456). Omissions will only be considered misrepresentation for purposes of the analysis, when the omissions cast doubt on the existence of probable cause. Id. (citing United States v. Dennis, 625 F.2d 782, 791 (8th Cir.1980)). However, we do not read a warrant affidavit in a hypertechnical manner. Habbena, 372 N.W.2d at 456 (citing United States v. Ventresca, 380 U.S. 102, 85 S.Ct. 741, 13 L.Ed.2d 684 (1965)); State v. Kaseman, 273 N.W.2d 716 (S.D.1978); Gerber, 90 S.D. 432, 241 N.W.2d 720; Haron, 88 S.D. 397, 220 N.W.2d 829; and State v. Kietzke, 85 S.D. 502, 186 N.W.2d 551 (1971)). Instead, “we read each affidavit as a whole and interpret each in a common sense and realistic manner.” Id.
[¶ 33.] Helland argues that Detective Thorstenson knowingly and intentionally, or with reckless disregard for the truth, omitted the words “temporary internet” before the word “file” from paragraphs eleven (11) and thirteen (13) of the affidavit when describing the files containing images of child pornography as discovered by Elsing. The suppression court agreed that the omission was knowing and intentional.
[¶ 34.] However, our reading of the affidavit as a whole indicates that the references to “temporary internet files” in paragraphs nine (9), ten (10) and twelve (12), make it clear that the entire affidavit is describing the contents and names of tem
[¶ 35.] Therefore, we conclude that Helland has failed to satisfy the first prong of the analysis as there is no evidence that an omission exists. Even if we were to conclude that an omission was committed by Thorstenson and proceed to the second prong of the Franks v. Delaware test, there is no evidence in the affidavit or in the suppression hearing transcript to support a finding that the omission was done recklessly or intentionally to mislead the issuing court.
[¶ 36.] Helland has failed to satisfy the Franks v. Delaware test for recklessly and intentionally misleading information or material omissions in an affidavit. There was no material omission in the affidavit. Therefore, there cannot be any reckless or intentional conduct on the part of Detective Thorstenson that prejudiced Helland.
[¶ 37.] Based on our holdings in Issues 1 and 2, there is no need to address the good faith exception to the exclusionary rule in Issue 3. We reverse.
[¶ 38.] SABERS, KONENKAMP and ZINTER, Justices, concur.
[¶ 39.] MEIERHENRY, Justice, concurs in result.
MEIERHENRY, Justice (concurring in result).
[¶ 40.] I concur in result. The proper review of this case is the two part analysis of Franks v. Delaware, 438 U.S. 154, 98 S.Ct. 2674, 57 L.Ed.2d 667 (1978). First, the defendant must show “that the police omitted facts with the intent to make, or in reckless disregard of whether they thereby made, the affidavit misleading[.]” U.S. v. Jacobs, 986 F.2d 1231, 1234 (8th Cir.1993) (citing U.S. v. Reivich, 793 F.2d 957, 961 (8th Cir.1986)). Second, the defendant must further show “that the affidavit if supplemented by the omitted information would not have been sufficient to support a finding of probable cause.” Id. (citing Reivich, 793 F.2d at 961).
[¶ 41.] The main concern of the trial court was the omission of “explanatory information regarding the nature of the temporary internet files.” The trial court determined that “[a]ny reasonable person would have known that an explanation of temporary internet files was necessary to thoroughly inform the issuing judge.” The intentionally omitted material, according to the trial court, was “that a temporary internet file may be computer generated without the user knowing that such a file is being created.” Further, “no statement in the Affidavit indicates that pop-up windows may also generate temporary internet files without any action by the user.” Additionally, the trial court found that “without that explanatory information, the statements referring to ‘some files’ and ‘other files’ were misleading.” The trial court found the omission to be recklessly misleading.
[¶ 42.] In the affidavit, the officer explains that the technician first noticed the files while performing a diagnostic scan of defendant‘s computer. The officer includes the following information:
9. . . . [The technician] observed that the scan was taking a very long time and that it was in the temporary internet files for a very long time.
10. [The technician] decided at this point to delete the contents of the temporary internet files. [He] searched for the “content.ie5” folder and began deleting the files. [He] noted that this process
seemed to be taking forever, and it didn‘t seem to him to be deleting the files. [He] then started looking into the folders to see if the contents were being deleted and noted suspicious file names, using words like “hot boys“, “teens“, etc and [he] did open some of these files at this time. 11. . . . upon opening some files he discovered that there were images of young males, depicted in a nude state, with some being clothed. [He] recalls one such image of two boys, guessing them to be 8 to 10 years of age, naked, sitting on the shore of a lake or stream, sitting side by side, hands behind them, with their legs spread.
12. . . . [he] could not believe what he was seeing on the defendant‘s computer and in this state of disbelief, did start opening other folders and images, observing similar images, as described in paragraph 11. [He] realized at this point that the system was still deleting the temporary internet files, so he stopped it from doing so.
The affidavit consistently refers to the suspicious files as temporary internet files. It does not appear from the four corners of the affidavit that the officer was attempting to mislead the court about the nature of the suspicious files being anything other than temporary internet files. Nevertheless, an explanation of how content gets placed into temporary internet files would have been helpful to the court‘s determination of probable cause. “Any reasonable person would have known that this was the kind of thing the judge would wish to know.” Jacobs, 986 F.2d at 1235. Although an affidavit need not be hypertechnical, information on the workings of the technology may be important for a judge to know, especially when the crime is committed by the use of that technology. Common sense tells us that the affiant needs to provide enough technical information for the judge to assess whether criminal activity is a probability. Consequently, the crucial omission was the officer‘s failure to explain the nature of temporary internet files to the judge.
[¶ 43.] Under the second part of the analysis, the defendant must show that the omitted information, if added to the affidavit, would defeat a probable cause showing. Here, addition of the information would have informed the issuing court that the alleged child pornography in the temporary internet files may not have been viewed by the defendant and may have been stored in the temporary internet files without the defendant‘s knowledge. However, adding this information does not defeat a finding of probable cause.
[¶ 44.] The standard of probable cause required for the issuance of a search warrant is a showing of “probability of criminal activity.” State v. Kaseman, 273 N.W.2d 716, 723 (S.D.1978) (citing Gerber, 90 S.D. 432, 241 N.W.2d 720 (1976); State v. Haron, 88 S.D. 397, 220 N.W.2d 829 (1974)). In determining probability, it is not necessary that there be a “prima facie showing of legal evidence of a suspected act.” Id. Under this standard, with the added information, there was still a probability of criminal activity, i.e., that there was a probability that someone purposely retrieved the pictures from the internet and viewed them without saving them to a user created file. Consequently, the defendant has failed to meet the second part of the analysis. I would reverse for these reasons.
