527 F.3d 882 | 9th Cir. | 2008
FOR PUBLICATION
UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT U NITED S TATES OF A MERICA , No. 07-10100 Plaintiff-Appellee, D.C. No. v. CR-04-00299-BES F RANCIS E UGENE G IBERSON , OPINION Defendant-Appellant. Appeal from the United States District Court for the District of Nevada Brian E. Sandoval, District Judge, Presiding Argued and Submitted January 15, 2008—San Francisco, California Filed May 30, 2008 Before: J. Clifford Wallace and Mary M. Schroeder, Circuit Judges, and Roger T. Benitez,* District Judge.
Opinion by Judge Wallace *The Honorable Roger T. Benitez, United States District Judge for the Southern District of California, sitting by designation. 6187
COUNSEL
Franny A. Forsman, Federal Public Defender, and Jason F. Carr, Assistant Federal Public Defender, Las Vegas, Nevada, for the appellant. Steven W. Myhre, Acting United States Attorney, Robert L. Ellman, Appellate Chief, and Elizabeth A. Olsen, Assistant United States Attorney, Reno, Nevada, for the appellee.
OPINION
WALLACE, Senior Circuit Judge: Giberson appeals from the district court’s denial of his motion to suppress evidence of child pornography found on his personal computer, which led to his conviction for receipt of child pornography in violation of 18 U.S.C. § 2252(a)(2) and possession of child pornography in violation of 18 U.S.C. § 2252(a)(4)(B). He also appeals from his sentence, arguing the district court erred in sentencing him for both possession and receipt of child pornography. We have jurisdiction under 28 U.S.C. § 1291 and 18 U.S.C. § 3742(a)(1). We affirm his conviction, vacate his sentence, and remand.
I.
On February 24, 2003, a North Las Vegas Police Depart- ment officer stopped Giberson because his license plates had 6191 expired. During the stop, the officer discovered that Giberson had a false Nevada identification (I.D.) card in the name of Charles F. Walsh, III. After learning that Giberson had three outstanding arrest warrants for traffic violations and no valid driver’s license, the officer arrested Giberson. A search inci- dent to the arrest revealed a “Play Cash” card from a casino in Walsh’s name. Giberson told the officer that he used the fake I.D. for work and to avoid paying his child support obli- gation.
United States Health and Human Services (HHS) Agent David Kiesow began an investigation into Giberson’s child support obligations and discovered that, in 1991, a Minnesota state court had ordered Giberson to make monthly payments to his ex-wife for the support of their two children. Ironically, Giberson, who at one point had served as Deputy Commis- sioner of the Minnesota Department of Human Services and had supervised the child support enforcement division, failed to make the required payments and, as of July 2003, was $108,000 behind. Law enforcement efforts to collect Giber- son’s child support arrearage had been unsuccessful.
As a result of this investigation, Agent Kiesow obtained a warrant to search Giberson’s residence in Nevada. The search warrant authorized HHS agents to search for: (1) “records or documents that appear to show ownership of assets or proper- ty”; (2) “records or documents from financial institutions” in Giberson’s name or the names of any known or unknown ali- ases; (3) “records and correspondence relating to identifica- tion cards”; (4) “records, documents or correspondence . . . related to the use or attempted use” of other individual’s iden- tities; (5) “correspondence, records and documents” relating to Giberson’s or his aliases’ earnings and employment; (6) tax records; (7) documents or records showing receipt of income or expenditure of funds; and (8) records referring to Giber- son’s employer. Prior to executing the warrant, Agent Kiesow had no evidence that Giberson owned a computer or used a computer in the commission of his suspected crimes.
On September 11, 2003, the day after they obtained the warrant, HHS agents searched Giberson’s home. In one of the bedrooms, they discovered a personal computer. The com- puter was on a desk and was connected to a printer that was on an adjacent dresser. Next to the printer, on the dresser, the agents found a sheet of what appeared to be fake Nevada I.D. cards. The agents observed that the cards were not high qual- ity and looked like they could have been printed from the adjacent printer. On the desk with the computer, agents found transparencies depicting the Nevada State Seal. In the drawers of the computer desk, on the desk, and on the dresser next to the desk, they found a number of other documents evidencing the production of false I.D.s, including fake Social Security cards and State of New York birth certificates in the name of Charles Walsh III, one of Giberson’s known aliases, and in other names.
Believing that many of the I.D. materials had been printed off of Giberson’s computer, Agent Kiesow contacted an Assistant U.S. Attorney, who advised him to secure the com- puter until the agents could obtain a search warrant for it. Kie- sow then sent the computer to a forensics laboratory in Chicago. There, HHS forensic computer specialist David Rehms made a mirror image of the computer’s hard drive before shipping the computer back to Giberson’s wife in Nevada.
On September 29, 2003, Kiesow obtained a second search warrant. The second warrant authorized a search of the mirror image of Giberson’s hard drive for records relating to I.D. cards or the creation of I.D. cards, including driver’s licenses, state seals, and pictures of individuals that might be placed on I.D. cards, as well as records related to Giberson’s assets, property, employment, and income.
The next day, computer specialist Rehms began his search of the mirror image using a law enforcement utility software package called ILOOK. ILOOK pulls computer files based on 6193 file type, and dumps all similar file types into separate folders. For example, ILOOK retrieves all graphics or images files and puts them into one folder. An analyst can then open that folder and view multiple thumbnails (reduced-sized versions) of the images on the computer screen at one time without opening individual files. In this case, after sorting the com- puter files with ILOOK, Rehms used another software pack- age to view the files because it enabled him to view more thumbnails of graphic images on the screen at a time, making his search more efficient.
While Rehms was scanning the thumbnail images for images and photographs related to the production of fake I.D.s, he discovered images he believed to be child pornogra- phy. Rehms immediately stopped his search and telephoned Agent Kiesow, who directed Rehms to stop his search while Kiesow determined the proper course of action. Either later that day or the next day, Kiesow telephoned Rehms and told him to continue searching for the items in the search warrant, but that, if Rehms came across more child pornography, he was to print it out. However, Rehms did not specifically search for child pornography. He continued his search for items related to fake I.D.s, and as he came across images of child pornography, he printed out a sampling. Rehms also found images related to the production of fake I.D.s and seals for the State of Nevada.
Following Rehms’ discovery, Kiesow contacted FBI Spe- cial Agent Andrew Gruninger, who obtained a search warrant to search the mirror image of Giberson’s hard drive. A subse- quent forensic search of the hard drive pursuant to the third warrant revealed more than 700 images of child pornography.
Giberson was indicted on July 21, 2004, and charged with receiving child pornography in violation of 18 U.S.C. § 2252(a)(2) and possessing child pornography in violation of 18 U.S.C. § 2252(a)(4)(B). In November, Giberson filed a motion to suppress evidence, arguing that law enforcement officers exceeded the scope of the first search warrant when they seized his computer, and that they exceeded the scope of the second search warrant when they “searched for” child por- nography on the computer. After an evidentiary hearing, the magistrate judge recommended that the motion be denied. The district court, after receiving objections to the magistrate judge’s recommendation and hearing oral argument, accepted the recommendation and denied Giberson’s motion to sup- press.
Later, Giberson entered conditional guilty pleas to both counts in the indictment. The district court sentenced Giber- son to concurrent terms of sixty months on each of the two counts, to be followed by three years of supervised release on count one, concurrent with a life term of supervision on count two. Giberson appealed, arguing the district court erred in denying his motion to suppress and in failing to merge the counts of conviction at sentencing.
II.
Giberson challenges the seizure of his computer pursuant to the first search warrant and the search of the mirror image of his hard drive pursuant to the second search warrant, arguing the evidence of child pornography obtained from the seizure and subsequent search should have been suppressed. We review the district court’s denial of his motion to suppress de novo and the district court’s underlying factual findings for clear error. United States v. Summers , 268 F.3d 683, 686 (9th Cir. 2001).
A.
[1] The Fourth Amendment provides that “no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” U.S. Const. amend. IV. Generally, in a search made pursuant to a warrant, 6195 only specifically enumerated items may be seized. See United States v. Tamura , 694 F.2d 591, 595 (9th Cir. 1982).
One issue we can put to the side. Giberson’s brief twice states that “[t]he warrant was not specific enough.” His argu- ment, however, seems limited to the claim that the warrant did not specify the computer and the computer was therefore unlawfully seized; he does not suggest that the warrant itself failed to specifically describe items to be seized and was therefore facially invalid. In any event, the warrant was based on probable cause and clearly limited the types of documents and records that were seizable, “objectively describ[ing] the items to be searched and seized with adequate specificity and sufficiently restrict[ing] the discretion of agents executing the search.” See United States v. Adjani , 452 F.3d 1140, 1148 (9th Cir. 2006). The warrant also “described the items to be searched and seized as particularly as could be reasonably expected given the nature of the crime and the evidence [the government] then possessed.” See id. at 1149. Thus, the war- rant was not a “general warrant” and was not facially invalid under United States v. Spilotro , 800 F.2d 959, 963 (9th Cir. 1986).
Giberson does argue that, because the first search warrant did not specify that the officers could search or seize a com- puter, the seizure of his computer exceeded the scope of the warrant. The question, then, is whether a warrant that describes particular documents authorizes the seizure of a computer where, as here, the searching agents reasonably believed that documents specified in the warrant would be found stored in the computer.
[2] We have long held that a search warrant authorizing the seizure of materials also authorizes the search of objects that could contain those materials. In United States v. Gomez-Soto , officers were conducting a search pursuant to a warrant autho- rizing the seizure of “[b]ooks, papers, records, receipts, docu- ments, notations, diaries, journals or ledgers” related to the defendant’s unlawful business dealings. 723 F.2d 649, 652 fn.** (9th Cir. 1984). During the search, officers found a locked briefcase and a microcassette tape. Id. After the defen- dant refused to open the briefcase, the officers cut it open and seized its contents, which included cocaine. Id. The microcas- sette tape contained incriminating statements about the defen- dant. Id.
The defendant challenged the search, arguing that the search and seizure of the briefcase, the microcassette, and their contents were not permitted because they were not par- ticularly described in the warrant. Id. at 654. We rejected that argument, reasoning:
The search and seizure of both the microcassette and the briefcase were proper. It is axiomatic that if a warrant sufficiently describes the premises to be searched, this will justify a search of the personal effects therein belonging to the person occupying the premises if those effects might contain the items described in the warrant.
Id. Because the briefcase would be a logical container for many of the items described in the warrant, and the microcas- sette tape is “by its very nature a device for recording infor- mation . . . which come[s] clearly within the specific authority of the warrant,” we held that the “failure of the warrant to anticipate the precise container in which the material sought might be found” was not fatal. Id. at 655.
Later, in United States v. Reyes , we reaffirmed this princi- ple, holding that a search warrant authorizing the seizure of drug trafficking records, ledgers, or writings related to drug trafficking also permitted agents to seize a cassette tape. 798 F.2d 380, 383 (9th Cir. 1986). We recognized that, “in the age of modern technology and commercial availability of various forms of items, the warrant could not be expected to describe with exactitude the precise form the records would take,” and 6197 that, “the seizure of a specific item characteristic of a generic class of items [items that record information] defined in the warrant did not constitute an impermissible general search.” Id.
[3] Computers, like briefcases and cassette tapes, can be repositories for documents and records. We have not yet had occasion to determine, in an opinion, whether computers are an exception to the general principle that a warrant authoriz- ing the seizure of particular documents also authorizes the search of a container likely to contain those documents. We hold that, in this case, where there was ample evidence that the documents authorized in the warrant could be found on Giberson’s computer, the officers did not exceed the scope of the warrant when they seized the computer.
Giberson does not deny that it was reasonable in this case for the agents to believe that the documents specified in the warrant might be found on his computer. Rather, he argues that the analogy between a computer and other “containers” is not appropriate because computers are somehow entitled to heightened protection, and are searchable only when specified in the warrant. We observe at the outset that Fourth Amend- ment exceptions and distinctions based solely on a type of technology are “unwise[ ] and inconsistent with the Fourth Amendment.” See Kyllo v. United States , 533 U.S. 27, 41 (2001) (Stevens, J., dissenting). Technology changes. To be acceptable, Giberson’s argument must be based on a principle that is not technology-specific. Though Giberson offers sev- eral rationales for treating computers differently from storage mediums such as filing cabinets and briefcases, none is per- suasive.
[4] Giberson’s principal argument is that computers are able to store “massive quantities of intangible, digitally stored information,” distinguishing them from ordinary storage con- tainers. But neither the quantity of information, nor the form in which it is stored, is legally relevant in the Fourth Amend- ment context. While it is true that computers can store a large amount of material, there is no reason why officers should be permitted to search a room full of filing cabinets or even a person’s library for documents listed in a warrant but should not be able to search a computer. Giberson’s purported excep- tion would also create problems in analyzing devices with similar storage capacities. If we permit cassette tapes to be searched, then do we permit CDs, even though they hold more information? If we do not permit computers to be searched, what about a USB flash drive or other external storage device? Giberson’s purported exception provides no answers to these questions.
Similarly, attempting to limit Fourth Amendment searches based on the format of stored information would be arbitrary. We have already held that microcassettes, which store data differently from traditional paper, are seizable in a search for “records.” See Gomez-Soto , 723 F.2d at 652. There is no rea- son why material stored digitally on a computer should not also be searchable. Once again, Giberson’s purported excep- tion generates more questions than answers: If we permit a person’s Day-Timer to be searched, what about one’s Black- Berry? The format of a record or document should not be dis- positive to a Fourth Amendment inquiry.
[5] Giberson’s purported rule creates a brightline exception to the Fourth Amendment that provides no principles by which to evaluate whether a search is reasonable. The Supreme Court has consistently eschewed such brightline rules. See Ohio v. Robinette , 519 U.S. 33, 39 (1996). Here, the only principle upon which we can anchor this analysis is the one already articulated by this court: that to search a con- tainer, it must be reasonable to expect that the items enumer- ated in the search warrant could be found therein. If it is reasonable to believe that a computer contains items enumer- ated in the warrant, officers may search it. Here, numerous documents related to the production of fake I.D.s were found in and around Giberson’s computer and were arguably created 6199 on and printed from it. It was therefore reasonable for officers to believe that the items they were authorized to seize would be found in the computer, and they acted within the scope of the warrant when they secured the computer.
Giberson offers two other bases upon which to distinguish computers from other objects in the Fourth Amendment con- text. First, he argues that computers have a great potential for the intermingling of relevant and irrelevant (and personal and private) material. Indeed, a court has recognized that “[b]ecause computers can hold so much information touching on many different areas of a person’s life, there is a greater potential for the ‘intermingling’ of documents and a conse- quent invasion of privacy when police execute a search for evidence on a computer.” United States v. Walser , 275 F.3d 981, 986 (10th Cir. 2001). However, we have already rejected this reasoning in Adjani , when we pointed out that “[t]he fear that agents searching a computer may come across . . . per- sonal information cannot alone serve as the basis for exclud- ing evidence of criminal acts.” 452 F.3d at 1152 n.9. While officers ought to exercise caution when executing the search of a computer, just as they ought to when sifting through doc- uments that may contain personal information, the potential intermingling of materials does not justify an exception or heightened procedural protections for computers beyond the Fourth Amendment’s reasonableness requirement.
Second, Giberson suggests that because computers store material protected by the First Amendment, they should be subject to heightened protection. But, as this court observed in United States v. Weber , 923 F.2d 1338, 1343 n.6 (9th Cir. 1990), the Supreme Court has already rejected the proposition that a stricter probable cause standard should apply when the First Amendment is implicated. See also New York v. P.J. Video, Inc. , 475 U.S. 868, 875 (1986). We therefore reject Giberson’s First Amendment argument.
[6] In the circumstances underlying this appeal, it was rea- sonable for the officers to believe that seizable items were stored on Giberson’s computer, and to secure the computer and obtain a specific warrant and search it. Their failure to anticipate that the items would be stored on a computer and to specify computer files in the warrant was not unreasonable because they had no reason to believe that Giberson owned a computer. See United States v. Hill , 459 F.3d 966, 973 (9th Cir. 2006) (“A warrant describing a category of items is not invalid if a more specific description is impossible”). Their actions were particularly appropriate because the agents merely secured the computer while they waited to get a sec- ond warrant that would specifically authorize searching the computer’s files. The seizure of the computer was therefore reasonable.
The government argues, and the district court agreed, that the seizure of the computer was also justified by the plain view exception to the warrant requirement. Because we decide that the seizure was authorized by the warrant itself, it is unnecessary to decide whether the plain view doctrine or any other exception to the warrant requirement applies here.
B.
Giberson also argues that the evidence obtained from the search of his computer should have been suppressed because the government did not sufficiently limit its search to relevant documents. The second warrant authorized the government to search Giberson’s computer for records relating to I.D. cards or the creation of those cards, including driver’s licenses, state identification cards, state seals, and photographs that could be used for fake I.D.s. Giberson argues that computer specialist Rehms should have limited his search to files likely to contain those documents, and vaguely asserts that Rehms could have done so by looking at the computer’s directories instead of sorting files through ILOOK.
Giberson’s argument is foreclosed by Hill . There, the defendant argued that a search of his computer files should 6201 have been limited to files likely to be associated with those identified in the search warrant. Hill , 459 F.3d at 977. We rejected that argument, reasoning that the defendant’s meth- odology was unreasonable, because:
Computer records are extremely susceptible to tam- pering, hiding, or destruction, whether deliberate or inadvertent. Images can be hidden in all manner of files, even word processing documents and spread- sheets. Criminals will do all they can to conceal con- traband, including the simple expedient of changing the names and extensions of files to disguise their content from the casual observer.
Id. at 978 (internal quotation marks and citation omitted); see also Adjani , 452 F.3d at 1150 (“Computer files are easy to disguise or rename, and were we to limit the warrant to such a specific search protocol, much evidence could escape dis- covery simply because of [the defendant’s] labeling of the files documenting [his] criminal activity. The government should not be required to trust the suspect’s self-labeling when executing a warrant”).
[7] This argument applies with equal force to Giberson’s case. The records for which the government was authorized to search, including images of the Nevada State Seal and pho- tographs that might be used to create fake I.D.s, could have been graphics files. There was no reasonable way to sort rele- vant and irrelevant graphics files because the fake I.D. files and the pornography files were innocuously labeled. It would be unreasonable to require the government to limit its search to directories called, for example, “Fake I.D. Documents,” and Giberson does not claim that there was such a folder.
[8] We acknowledge that “[n]ew technology may become readily accessible . . . to enable more efficient or pinpointed searches of computer data,” and that, “[i]f so, we may be cal- led upon to reexamine the technological rationales that under- pin our Fourth Amendment jurisprudence in this technology- sensitive area of the law.” Hill , 459 F.3d at 979 (emphasis added). However, in this case, based on the technology avail- able to him for searching Giberson’s computer, Rehms’ search was reasonable; the pornographic material he inadver- tently discovered while searching for the documents enumer- ated in the warrant was properly used as a basis for the third warrant authorizing the search for child pornography.
Our holding is not inconsistent with United States v. Carey , 172 F.3d 1268 (10th Cir. 1999). There, the Tenth Circuit sup- pressed evidence found when an officer, who was supposed to be searching a computer for drug-related documents, stum- bled upon child pornography and began to search for more. Id . at 1276. Based on the officer’s own testimony, the court found that the child pornography was not “inadvertently dis- covered” because the officer had temporarily abandoned the search authorized by the warrant in order to look for child pornography, contravening the limitations of the search war- rant. Id. at 1273. The court was careful to state that the result in the case (suppression of the evidence) was “predicated only upon the particular facts of this case, and a search of computer files based on different facts might produce a different result.” Id. at 1276 (footnote omitted). A concurring opinion stated that “if the record showed that [the officer] had merely contin- ued his search for drug-related evidence and, in doing so, con- tinued to come across evidence of child pornography, . . . a different result would be required.” Id. at 1277 (Baldock, B., concurring).
[9] As the district court concluded, this case “is vastly dif- ferent from Carey .” Rehms was authorized to look at images and photographs; after discovering the pornographic images, Rehms continued with his search for evidence of fake I.D. documents and only inadvertently came across more child pornography. The government only searched for pornographic files after obtaining the third search warrant authorizing it to do so, and the search was therefore reasonable. 6203
C.
The government acted reasonably at all stages in its investi- gation into Giberson’s production of fake I.D.s and, later, his possession of child pornography. The seizure of the computer was justified because the computer was reasonably believed to contain items enumerated in the first search warrant. The search of the computer was conducted pursuant to a valid sec- ond search warrant and proceeded in a reasonable manner. Pornography was not searched for until authorized by the third warrant. We affirm the district court’s denial of Giber- son’s motion to suppress.
III.
Giberson contends that the district court erred when it sen- tenced him for both receipt and possession of child pornogra- phy, arguing that the sentencing is multiplicitous. He failed to object in the district court, and we review for plain error. See United States v. Smith , 424 F.3d 992, 999-1000 (9th Cir. 2005).
[10] By a divided panel, and subsequent to Giberson’s sen- tencing, we recently held, on plain error review, that entering judgment against a defendant who had pled guilty to both the receipt and possession of child pornography was multiplicit- ous and violated the Fifth Amendment’s prohibition against double jeopardy. United States v. Davenport , ___ F.3d ___, 2008 WL 732491 (9th Cir. 2008). In Davenport , we accepted the argument, similar to the one Giberson makes, that “the offense of possessing child pornography is a lesser included offense of the receipt of child pornography,” and that convic- tion and punishment for both is therefore constitutionally impermissible. Id. at *6. We held that, though the defendant’s sentences (like Giberson’s) were to run concurrently, “[t]he district court’s error was plain, and it affected [the defen- dant’s] substantial rights by imposing on him the potential collateral consequences of an additional conviction.” Id . We concluded that “because the prohibition against double jeop- ardy is a cornerstone of our system of constitutional criminal procedure, this error threatens the fairness, integrity, and pub- lic reputation of our judicial proceedings,” and vacated the defendant’s sentence. Id. Davenport is materially indistin- guishable from this case, and we therefore vacate Giberson’s sentence and remand to the district court for resentencing.
CONVICTION AFFIRMED; SENTENCE VACATED AND REMANDED.