Brent Ray Brooks was indicted for receipt of child pornography in violation of 18 U.S.C. § 2252A(a)(2)(A), possession of child pornography in violation of 18 U.S.C. § 2252A(5)(B), and distribution of child pornography in violation of 18 U.S.C. § 2252A(a)(1). He entered a conditional plea of guilty to the charge of possession of child pornography and preserved his right to appeal the district court’s denial of *1248 his motion to suppress evidence found on his computer.
In his appeal, Brooks argues (1) that officers exceeded the scope of his consent when they searched his computer by means other than those explained to him in the course of obtaining consent; and (2) that the warrant for the computer search was not adequately specific. We take jurisdiction pursuant to 28 U.S.C. § 1291 and affirm.
I. BACKGROUND
On August 26, 2003, Utah County law enforcеment officers responded to a report of an unattended child at Brooks’s house. When they arrived, they detected the odor of marijuana inside the residence. Thereafter, they obtained a search warrant (the “first warrant”) authorizing a search for items associated with marijuana use. During their search the following day they found a substantial amount of what apрeared to be child pornography in one of Brooks’s garbage cans. After this discovery, officers obtained another warrant on August 27, 2003 (the “second warrant”) authorizing a search of Brooks’s home, including any computer equipment, for child pornography. They also contacted Special Agent Brian Snyder, an FBI agent with experience in child pornography and child exploitation investigations, to assist with their search. Law enforcement executed the warrant on the same day.
Since the pornographic images found in Brooks’s garbage appeared to have been printed from a computer printer, officers “assume[d] that there [was] possibly more child pornography on the [home] computer[.]” ROA, Vol. IV at 11. Accordingly, upon his arrival Agent Snyder requested permission from Brooks to search Brooks’s computer. Snyder explained to Brooks that the search would involve inserting a “pre-search” disk into his computer. Although the record is unclear as to precisely how the disk functioned, it apparently contained a program that searched for image files and displayed the images in a thumbnail format so a viewer could easily ascertain whether the images included child pornography. Agent Snyder further explained to Brooks that the disk would not search for text files, but would search for and display only image files.
Brooks told Snyder that he had “nothing to hide” and agreed to sign a search consent form. The form stated that Brooks (1) had been аsked by the FBI to authorize a “complete search” including a “pre-search for child pornography” of his computer tower; (2) had been advised of his right to refuse consent; (3) gave his consent voluntarily; and (4) authorized agents to take any items they determined were related to their investigation. ROA, Vol. IV, Exhibit F.
After obtaining Brooks’s consent to search the computer, Snyder went to the computer and inserted the pre-search disk. The computer was already turned on. For reasons the record does not make clear, the disk did not function on the computer. Thus, Agent Snyder decided to attempt a manual search for image files through the computer’s “file search” function. He was unable to complete the manual review, however, because Brooks’s computer prompted him to enter a password. Snyder therefore returned to Brooks and asked him for the password to the computer, which Brooks told him was the same as the log-on password. After this conversation Agent Snyder went back to Brooks’s computer and completed the process of a manual image file searсh.
Snyder located several images of adolescent male boys engaged in sexual activity. He did not view or open any text files. After Snyder viewed the images, officers shut down the computer and seized it. They subsequently obtained a third war *1249 rant authorizing a search of three computers, twelve compact disks, and seven diskettes located at Brooks’s residencе. This forensic search was carried out at a police laboratory.
Brooks later moved to suppress the pornographic images found during (1) Snyder’s manual search, and (2) the laboratory’s forensic search. The district court denied the motion. Brooks then entered a conditional guilty plea on May 3, 2004, and on October 14, 2004, the United States District Court for the District of Utah sentenced him to 88 months in prison and 156 months of supervised release. Pursuant to the conditional plea, Brooks filed this appeal.
II. DISCUSSION
Brooks argues on appeal (A) that officers exceeded the scope of his consent when they searched his computer by means other than those explained to him in the course of obtaining written consent; and (B) that the warrant for the computer search was not adequately specific.
A. Scope of the Search
We uphold the factual findings of a district court made in connection with a motion to suppress unless those findings are clearly erroneous,
United States v. Williams,
It is well settled thаt voluntary consent can obviate the warrant requirement of the Fourth Amendment.
See Schneckloth v. Bustamonte,
As a preliminary matter, the record shows that Brooks never explicitly argued to the district court that the officers’ search exceeded his consent. His only argument to the district court was that his consent to the home search wаs not knowingly and voluntarily given. Accordingly, since Brooks failed to raise the issue below, we review for plain error.
See United States v. Walser,
First, the scope of Snyder’s search did not, in fact, exceed the permission Brooks granted in his written consent. In the *1250 consent form, Brooks agreed to the following: a “complete search” of the “CPU tower ... belonging to Brent Brooks to conduct a pre-search for child pornography.” ROA, Vol. I, Exhibit F. While the officers intended to use a computer tool to assist the search, the actual manual search did nothing more than what Brooks had authorized. The terminology in the consent form regarding a “pre-search” is somewhat confusing. What is not confusing is the fact, as determined by the district court, that Brooks undеrstood his computer was to be searched for pornographic images and voluntarily consented to such a search.
Second, in the face of this written authorization, Brooks argues that his conversations with Agent Snyder implicitly limited the scope of the search. On this record, however, Snyder’s actual search does not appear to exceed the scope of the disk search he orally described to Brooks. As counsel explained at oral argument, the pre-search disk searches the computer hard drive for image files, then displays them for review. An officer must then review those images for pornographic material. What Agent Snyder did manually was the functional equivalent of employing the pre-search disk—he ran a search for image files, them viewed them to determine whether they contained child pornography. We see no discernable difference between the search to which Brooks says he consented and the search that actually occurred, and Brooks has not provided us a reason to believe otherwise.
Brooks counters thesе facts by arguing that our precedent requires a narrow construction of the scope of consent.
See, e.g., United States v. Elliott,
Unlike the plaintiff in Elliott, who could show the actual search differed substantially from the proffered search, Brooks is unable to supply a reason why Snyder’s manual search process exceeded the permission granted. Snyder stayed well within the boundaries of the search that had been authorized, searching only for image files. His manual search was no more invasive than the automated one he described to Brooks; Snyder viewed no text files, opened no additional electronic folders, and completed no searches that the disk would not have completed. Once Snyder viewed several images and confirmed thе presence of pornography, he turned off the computer. After examining the record, we cannot conclude Snyder’s search differed substantially from the search that would have transpired had he used the pre-search disk; Snyder simply entered certain commands manually instead of allowing this work to be done by a pre-programmed disk. Accordingly, these cirсumstances can hardly be compared to the situation in Elliott, where, after explicitly stating they would not do so, officers opened zipped bags and searched them.
Our conclusion is bolstered by the circumstances surrounding this search. In this case, officers scrupulously sought warrants every step of the way and were *1251 careful not to overstep the boundaries of Brooks’s initial consent to conduct the pre-search. Even before Snyder began the pre-search, officers were already in the process of seeking a warrant to seize Brooks’s computers. More importantly, Snyder viewed only a few images on Brooks’s computer before turning off the computer, seeking the advice of counsel, and then obtaining the forensic search warrant from a neutral magistrate for the completion of the search.
Accordingly, we conclude the search was within the scope of Brooks’s consent, and the district court did not commit plain error in denying Brooks’s motion to suppress on this ground.
B. The Computer Search Warrant
The Fourth Amendment requires that a search warrant “describe the things to be seized with sufficient partiсularity to prevent a general exploratory rummaging in a person’s belongings.”
United States v. Campos, 221
F.3d 1143, 1147 (10th Cir.2000). In considering whether the warrants at issue describe the items to be seized with sufficient particularity, we accept the district court’s factual findings unless clearly erroneous. However, the district court’s ultimate determination of sufficient particularity is reviewed de novo.
United States v. Leary,
“The manifest purposе of [the] particularity requirement was to prevent general searches. By limiting the authorization to search the specific areas ... the requirement ensures that the search will be carefully tailored to its justifications, and will not take on the character of the wide-ranging exploratory searches the Framers intended to prohibit.”
United States v. Riccardi,
Brooks argues that the third warrаnt, which authorized a laboratory search of his computer equipment, was not sufficiently particular for two reasons. First, he argues it failed to describe a specific search methodology for use on the computer. Second, he claims it allowed investigators to search for and view text files that may not have included pornographic images.
Search Methodology.
At the оutset, we disagree with Brooks that the government was required to describe its specific search methodology. This court has never required warrants to contain a particularized computer search strategy. We have simply held that officers must describe with particularity the
objects of their search.
Recognizing the difficulties inherent in computer searches, in some circumstances, we have suggested that “law enforcement must engage in the intermediate step of sorting various types of documents and then only search the ones specified in a warrant.”
United States v. Carey,
The question of whеther the nature of computer forensic searches lends itself to predetermined search protocols is a diffi
*1252
cult one. Given the numerous ways information is stored on a computer, openly and surreptiously, a search can be as much an art as a science.
See Carey,
We thus find in the circumstances here that the warrant need not have included a search protocol to satisfy the particularity requirement of the Fourth Amendment.
Scope of Warrant. We now turn to Brooks’s second overbreadth argument. The warrant authorized officers to search two computers and a number of disks “for evidence of child pornography,” including
“photographs, pictures, computer generated pictures or images, depicting partially nude or nude images of prepubescent males and or females engaged in sex acts,” ... as well as “correspondence, including printed or handwritten letters, electronic text files, emails and instant messages[.]”
ROA, Vol. I at 62; Aplt. Br. Attach. B. While the warrant does not explicitly instruct officers to look solely for those text files containing child pornography, in context—and certainly in the view of the officers conducting the search—the restrictions placed upon searches for image files also apply to the other types of files. In оther words, although the language of the warrant may, on first glance, authorize a broad, unchanneled search through Brooks’s document files, as a whole, its language more naturally instructs officers to search those files only for evidence related to child pornography. In this light, the warrant should be—and was—read by officers to implicitly place the same restriction (ie., to locate child pornography) on the scope of the entire search.
Brooks, however, argues that our cases have required “a more particularized inquiry” than the warrant here describes.
See Riccardi,
Here, in contrast, we аre faced with a warrant that authorized officers to search through computer files for particular items specifically related to child pornography. The warrant language is properly read to place the very same subject matter restriction on the authorization to search Brooks’s text files as it clearly placed on searches of his image files. Moreover, Brooks has made no showing that officers improperly viewed text files, or expanded the scope of the search for materials other than child pornography. While the warrant could have been more artfully written, we are satisfied on these facts that it falls within the particularity requirement of the Fourth Amendment.
III. CONCLUSION
Accordingly, we AFFIRM the district court’s judgment.
Notes
. An interesting article on the challenges in this area can be found in Orin Kerr, Searches and Seizures in a Digital World, 119 Harv. L.Rev. (forthcoming 2006), available at http:// ssm.com/ abstract=697541.
