opinion of the Court:
T1 This case arises from an investigation by the Utah Attorney General's Task Force on Internet Crimes Against Children (ICAC). When ICAC agents discovered that child pornography had been downloaded through an IP address belonging to David Maxwell, they went to his home to talk to him about the evidence they had uncovered and about his use of a computer for viewing pornography. The agents eventually asked Maxwell if he would consent to a seizure and search of his computer. Maxwell refused. He also openly adverted to the possibility of destroying his computer. ICAC agents then seized the computer and later secured a warrant to search it. The ensuing search uncovered numerous video and still images of child pornography, and Maxwell was charged with ten counts of sexual exploitation of a minor.
T2 The district court granted Maxwell's motion to suppress the files found on his computer, concluding that there was no exigent cireumstance sustaining a warrantless seizure of Maxwell's computer, that any such exigency was improperly created by ICAC agents, and that seizure of the computer was unreasonable in any event because the agents could have ensured the integrity of the computer by less intrusive means. The State appealed. We accepted certification of the case from the court of appeals in light of the important questions it presents regarding the exigent circumstances standard for warrantless seizures.
13 We reverse. First, an exigent cireum-stance arose out of Maxwell's open acknowl-edgement that he was thinking of destroying his computer. Second, the exigency was not improperly created by the police, as there was no threat to engage in conduct violating the Fourth Amendment. Finally, the decision to seize Maxwell's computer was a reasonable method of preventing the destruction of evidence.
I
T4 The ICAC Task Force actively monitors the internet for evidence of the use of child pornography. It implements methods used throughout the country to identify the Internet Protocol (IP) address of internet users who download child pornography using peer-to-peer (P2P) file-sharing software. Each file shared by a P2P user can be identified by a unique mathematical formula known as the Secure Hash Algorithm, or "SHA-1." When law enforcement agents discover a child pornography file, they calculate the file's SHA-1 value and list it in a national database of known child pornography. ICAC agents are then able to use file-sharing programs to discover the IP addresses of internet users who download known child pornography. This allows ICAC agents to investigate individuals without detection.
T5 In January 2008, ICAC agents discovered that known child pornography was being downloaded to a particular IP address, and subsequently served a subpoena on Qwest Communications in an effort to identify the assignee of the IP address. In response to the subpoena, Qwest disclosed that the IP address was registered to defendant David Maxwell at his apartment in Holladay Utah.
T6 On the evening of March 19, 2008, ICAC agents went to Maxwell's residence and knocked on his door. When Maxwell answered, the agents identified themselves, confirmed Maxwell's identity, and asked if they could come inside and speak with him. Maxwell consented and let them in. Once inside, the agents confirmed that Maxwell lived alone, received internet service through a modem (not a wireless router), and used P2P file-sharing software. The agents then informed Maxwell that they had learned that "inappropriate things" had been downloaded to his IP address. They then questioned Maxwell about his pornography viewing habits.
17 After Maxwell acknowledged that he occasionally viewed pornography on the internet, an agent specifically asked if he had ever used the internet to view child pornography. Maxwell explained that six to ten pornographic images of young teenage females had "come up" on his computer, but that he had deleted them. He also denied ever actively seeking child pornography. One of the agents then explained that any child pornography downloaded onto the com
18 After speaking with Maxwell for approximately twelve minutes, one of the agents stated, "We're going to need to take your computer. OK? You can consent to a search. Would you be willing to consent to a search so we can check that to make sure that there isn't anything on there?" Maxwell responded with concern that he was "in trouble," stating he did not know what he should do and that he did not want child pornography on his computer. He then said, "The way I'm feeling right now is maybe I ought to just destroy my computer, if you're saying it's on there, it's going to be on there." The agent replied that they were going to take the computer based on the evidence they collected and on Maxwell's statements. Before the agent reached the room where the computer was located, Maxwell asked if they had a search warrant. The agent acknowledged that he did not, but explained that he was going to seize the computer "based on probable cause." The agent further explained that absent Maxwell's consent, they would not search or otherwise check the contents of the computer until they obtained a warrant. The agent then seized the computer and gave Maxwell a property receipt.
T9 The following day, an agent prepared an affidavit in support of a search warrant and submitted it to an assistant attorney general for review. One week later, the affidavit was submitted to a magistrate, who issued a warrant to search the contents of the computer. A subsequent search of the computer uncovered seven video files and twenty-seven still images of child pornography. 1 10 Maxwell was charged with ten counts of sexual exploitation of a minor, all second-degree felonies, and subsequently filed a motion to suppress the evidence seized from his computer. Following the suppression hearing, the district court granted his motion, concluding that (1) there was no exigent circumstance because the State had not presented evidence proving that Maxwell could have permanently destroyed his computer; (2) the agents themselves created any exi-geney "at the outset when [they] informed Maxwell that they were aware that inappropriate material had been downloaded to his IP address and that they were with the Internet Crimes Against Children Task Force"; and (8) seizure of the computer was unreasonable because the agents could have ensured the integrity of the computer by less intrusive means.
111 After the State filed its appeal from the district court's order granting Maxwell's motion to suppress, the United States Supreme Court issued its opinion in Kentucky v. King, — U.S. —,
II
" 12 The State challenges all three grounds for the district court's suppression of the files seized from Maxwell's computer, while Maxwell defends and amplifies the bases for suppression. We agree with the State and reverse. In so doing, we clarify the law on the standard for establishing an exigent ciream-stance, on the situations where a police-created exigency runs afoul of the Fourth Amendment, and on the reasonableness of seizing property instead of monitoring its owner. We also reject an alternative ground for af-firmance, based on state constitutional law, offered by Maxwell.
A
$18 The Fourth Amendment to the United States Constitution guarantees "[the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures." U.S. Const. amend. IV. Physical entry into the home is the "chief evil against which the wording of the Fourth Amendment is directed." United States v. U.S. Dist. Court,
115 Maxwell contends that exigent cireumstances never arose during his ICAC interview because the agents were not "sufficiently certain" that Maxwell would destroy his computer if the agents left it with him. Under Maxwell's theory, which was adopted by the district court, Maxwell's statement, "maybe I ought to just destroy my computer," was insufficient to create a reasonable belief that Maxwell would successfully destroy the computer during the time it took to obtain a search warrant. The district court concluded that the State had failed to provide specific evidence indicating "how difficult it would have been for Maxwell to permanently destroy the evidence and how difficult it would be to recover images where a person has deleted them or attempted to destroy them."
116 This mischaracterizes the State's evidentiary burden and the nature of reasonable belief under the Fourth Amendment. To prove exigent circumstances, the State need demonstrate only that ICAC agents had a reasonable suspicion that evidence would be destroyed if the agents delayed long enough to obtain a warrant.
1 17 It is easy enough to imagine practical, everyday methods of damaging a computer in a way that would likely render the data on its hard drive irretrievable. Presumably a blowtorch or a power drill could do the trick. Although a computer expert could have provided the court with scientific information regarding hard-drive destruction techniques, it was not unreasonable for ICAC agents to believe that Maxwell could destroy his hard drive. Moreover, Maxwell not only had an obvious incentive to destroy his computer; he explicitly threatened to do so. Thus, the State has amply demonstrated that ICAC officers could have reasonably believed that a
B
118 Maxwell alternatively contends that the warrantless seizure remains unjustified because the ICAC agents impermissibly created the exigency that arose when Maxwell threatened to destroy his computer. Until recently, the standard for ferreting out impermissibly created police exigency was unsettled. See Kentucky v. King, — U.S. —,
19 The United State Supreme Court definitively resolved this conflict last term, holding that "warrantless [action] to prevent the destruction of evidence is reasonable and thus allowed" so long as "the police did not create the exigency by engaging or threatening to engage in conduct that violates the Fourth Amendment." King,
120 The district court decided Maxwell's motion to suppress without the benefit of King, as King was handed down well after the suppression hearing in this case. In granting Maxwell's motion, the court applied a standard expressly repudiated in King, concluding that if there was an exigency, "it was created at the outset when the agents informed Maxwell that they were aware that inappropriate material had been downloaded to his IP address and that they were with the Internet Crimes against Children Task Force."
1 21 The police statements credited by the district court do not approach a threatened violation of Maxwell's Fourth Amendment rights. For that reason, they do not satisfy the test established in King and are not a viable basis for affirming the district court's ruling.
122 In recognition of that fact, Maxwell offers an alternative ground for affirmance. He contends that if there was an exigency, it resulted when the agents demanded the war-rantless seizure of his computer, which, he argues, constituted a threatened violation of his Fourth Amendment rights. We disagree.
1 23 We see no basis for an inference that the agent was threatening to violate the Fourth Amendment. His exact words were: "We're going to need to take your computer. OK? You can consent to a search. Would you be willing to consent to a search so we can check that to make sure that there isn't
{24 We will not lightly presume that law enforcement is inclined to flout the constitutional limits on its authority. In this case, moreover, the relevant context suggests that the ICAC agent's assertion was entirely consistent with the Fourth Amendment. Given the express request for Maxwell's consent, the statement that the agent would "need to take [the] computer" is reasonably understood to envision a seizure of the computer upon consent.
125 Maxwell speculates that the officer may have intended to take the computer regardless of consent, as evidenced by the fact that consent ultimately was not given and the computer was seized anyway. But the question is not the officer's subjective intent; it is whether the circumstances, "viewed objectively," sustain the conclusion that the officer was threatening to violate the Fourth Amendment. King,
126 This is another contextual basis for rejecting the notion that the agent was threatening a Fourth Amendment violation. In context, his "need" to take the computer can reasonably be understood as dependent on either Maxwell's consent or the eventuality of an exigent cireumstance. We interpret the agent's statement in that way and thus reverse the district court's conclusion that the exigent cireumstance in this case was improperly created by law enforcement.
C
1 27 Maxwell also contends that even if an exigency justified a warrantless seizure, the seizure was unreasonable because the ICAC officers should have used "less intrusive" means to achieve their law-enforcement objectives. Because the agents seized the computer rather than securing the premises, Maxwell argues that they made no attempt to "reconcile their law enforcement needs with the demands of [his] personal privacy." Illinois v. McArthur,
{28 The district court agreed, concluding that even assuming a valid exigency, the seizure was still unjustified because the agents could have responded with less intrusive action by stationing agents in Maxwells home to ensure the security of the evidence while others obtained a warrant. We disagree and hold that the officers' warrantless seizure was a reasonable response to Max-wells claim that he thought he should destroy his computer.
129 Maxwell is right to note that the Fourth Amendment requires the scope or extent of the seizure to be reasonably commensurate with the exigency.
1 30 The ICAC agents' actions easily satisfy this standard. By choosing to seize the computer rather than remain on site, the agents avoided subjecting Maxwell to an extended intrusion into his home. Had the agents elected to secure the premises, they would have had to remain in Maxwell's home or seize Maxwell himself and remove him from his home. Those intrusions of the home or the person would be significantly greater than mere seizure of Maxwell's computer. By impounding the computer rather than securing the premises, the agents reconciled their law enforcement needs while avoiding a significant intrusion of Maxwell's person and privacy. Their actions were accordingly reasonable, and we reverse the district court's contrary conclusion. -
D
1[ 31 As an alternative basis for upholding the decision below, Maxwell asks us to adopt as Utah constitutional law one of the more stringent standards addressed and rejected in King. Citing article I, section 14 of the Utah Constitution, Maxwell notes that we are not bound by King in interpreting our state constitution and urges that we reject the King standard in favor of alternatives that he deems preferable on policy grounds.
132 This argument misconstrues the role of this court on matters of state constitutional law. It is certainly true that we are not bound to conform our construction of the Utah Constitution to the interpretation given to parallel federal provisions by the U.S. Supreme Court. The prerogative to interpret the Utah Constitution is ours, and we do so without any responsibility to follow the lead of the nation's highest court on matters of federal constitutional law. But the final say on such matters is not a license for Judicial policymaking. We are a court, not a constitutional convention, and our decisions must be based on an interpretation of the language and meaning of the provisions of the constitution. The Utah Constitution is a binding text for our interpretation, not a vessel to be filled with our views on wise public policy.
1 33 We reject Maxwell's argument on the ground that it fails to provide any basis for our construction of article I, section 14 of the Utah Constitution. We remain open, as always, to briefing and argument on state constitutional issues, but we will not blithely assume that the Utah Constitution dictates a result different from that of its federal counterpart. And we will not recognize such a difference without a proper basis in the text, meaning, or history of the governing document.
III
1 34 We reject all of the grounds embraced by the district court for suppressing the files seized from Maxwell's computer. We also reject the alternative basis for suppression asserted by Maxwell under the Utah Constitution. Accordingly, we reverse and remand for further proceedings consistent with this opinion.
Notes
. See Schmerber v. California,
. Cf. Whren v. United States,
. Maxwell also argues for the first time on appeal that ICAC did not "diligently pursue[] a warrant to search the contents of the computer as soon as possible." According to Maxwell, the agents waited eight days after the initial seizure to present a warrant to a magistrate, and this prolonged warrantless seizure was unreasonable. We decline to address this issue because it was raised for the first time on appeal and thus not preserved.
. See Illinois v. McArthur,
. Cf. J. Story, Commentaries on tus Constrrurion or Tae Unitenp States § 406 (1833) ("Nothing but the text itself was adopted by the people. And it would certainly be a most extravagant doctrine to give to any commentary then made, and & fortiori, to any commentary since made, under a very different posture of feeling and opinion, an authority which should operate as an absolute limit upon the text, or should supersede its natural and just interpretation.").
