UNITED STATES of America, Plaintiff-Appellee,
v.
Francis Eugene GIBERSON, Defendant-Appellant.
United States Court of Appeals, Ninth Circuit.
*883 Franny A. Forsman, Federal Public Defender, and Jason F. Carr, Assistant Federal Public Defender, Las Vegas, NV, for the appellant.
Steven W. Myhre, Acting United States Attorney, Robert L. Ellman, Appellate Chief, and Elizabeth A. Olsen, Assistant United States Attorney, Reno, NV, for the appellee.
Before: J. CLIFFORD WALLACE and MARY M. SCHROEDER, Circuit Judges, and ROGER T. BENITEZ,[*] District Judge.
*884 WALLACE, Senior Circuit Judge:
Giberson appeals from the district court's denial of his motion to suppress evidence of child pornography found on his personal computer, which led to his conviction for receipt of child pornography in violation of 18 U.S.C. § 2252(a)(2) and possession of child pornography in violation of 18 U.S.C. § 2252(a)(4)(B). He also appeals from his sentence, arguing the district court erred in sentencing him for both possession and receipt of child pornography. We have jurisdiction under 28 U.S.C. § 1291 and 18 U.S.C. § 3742(a)(1). We affirm his conviction, vacate his sentence, and remand.
I.
On February 24, 2003, a North Las Vegas Police Department officer stopped Giberson because his license plates had expired. During the stop, the officer discovered that Giberson had a false Nevada identification (I.D.) card in the name of Charles F. Walsh, III. After learning that Giberson had three outstanding arrest warrants for traffic violations and no valid driver's license, the officer arrested Giberson. A search incident to the arrest revealed a "Play Cash" card from a casino in Walsh's name. Giberson told the officer that he used the fake I.D. for work and to avoid paying his child support obligation.
United States Health and Human Services (HHS) Agent David Kiesow began an investigation into Giberson's child support obligations and discovered that, in 1991, a Minnesota state court had ordered Giberson to make monthly payments to his ex-wife for the support of their two children. Ironically, Giberson, who at one point had served as Deputy Commissioner of the Minnesota Department of Human Services and had supervised the child support enforcement division, failed to make the required payments and, as of July 2003, was $108,000 behind. Law enforcement efforts to collect Giberson's child support arrearage had been unsuccessful.
As a result of this investigation, Agent Kiesow obtained a warrant to search Giberson's residence in Nevada. The search warrant authorized HHS agents to search for: (1)"records or documents that appear to show ownership of assets or property"; (2) "records or documents from financial institutions" in Giberson's name or the names of any known or unknown aliases; (3) "records and correspondence relating to identification cards"; (4) "records, documents or correspondence ... related to the use or attempted use" of other individual's identities; (5) "correspondence, records and documents" relating to Giberson's or his aliases' earnings and employment; (6) tax records; (7) documents or records showing receipt of income or expenditure of funds; and (8) records referring to Giberson's employer. Prior to executing the warrant, Agent Kiesow had no evidence that Giberson owned a computer or used a computer in the commission of his suspected crimes.
On September 11, 2003, the day after they obtained the warrant, HHS agents searched Giberson's home. In one of the bedrooms, they discovered a personal computer. The computer was on a desk and was connected to a printer that was on an adjacent dresser. Next to the printer, on the dresser, the agents found a sheet of what appeared to be fake Nevada I.D. cards. The agents observed that the cards were not high quality and looked like they could have been printed from the adjacent printer. On the desk with the computer, agents found transparencies depicting the *885 Nevada State Seal. In the drawers of the computer desk, on the desk, and on the dresser next to the desk, they found a number of other documents evidencing the production of false I.D.s, including fake Social Security cards and State of New York birth certificates in the name of Charles Walsh III, one of Giberson's known aliases, and in other names.
Believing that many of the I.D. materials had been printed off of Giberson's computer, Agent Kiesow contacted an Assistant U.S. Attorney, who advised him to secure the computer until the agents could obtain a search warrant for it. Kiesow then sent the computer to a forensics laboratory in Chicago. There, HHS forensic computer specialist David Rehms made a mirror image of the computer's hard drive before shipping the computer back to Giberson's wife in Nevada.
On September 29, 2003, Kiesow obtained a second search warrant. The second warrant authorized a search of the mirror image of Giberson's hard drive for records relating to I.D. cards or the creation of I.D. cards, including driver's licenses, state seals, and pictures of individuals that might be placed on I.D. cards, as well as records related to Giberson's assets, property, employment, and income.
The next day, computer specialist Rehms began his search of the mirror image using a law enforcement utility software package called ILOOK. ILOOK pulls computer files based on file type, and dumps all similar file types into separate folders. For example, ILOOK retrieves all graphics or images files and puts them into one folder. An analyst can then open that folder and view multiple thumbnails (reduced-sized versions) of the images on the computer screen at one time without opening individual files. In this case, after sorting the computer files with ILOOK, Rehms used another software package to view the files because it enabled him to view more thumbnails of graphic images on the screen at a time, making his search more efficient.
While Rehms was scanning the thumbnail images for images and photographs related to the production of fake I.D.s, he discovered images he believed to be child pornography. Rehms immediately stopped his search and telephoned Agent Kiesow, who directed Rehms to stop his search while Kiesow determined the proper course of action. Either later that day or the next day, Kiesow telephoned Rehms and told him to continue searching for the items in the search warrant, but that, if Rehms came across more child pornography, he was to print it out. However, Rehms did not specifically search for child pornography. He continued his search for items related to fake I.D.s, and as he came across images of child pornography, he printed out a sampling. Rehms also found images related to the production of fake I.D.s and seals for the State of Nevada.
Following Rehms' discovery, Kiesow contacted FBI Special Agent Andrew Gruninger, who obtained a search warrant to search the mirror image of Giberson's hard drive. A subsequent forensic search of the hard drive pursuant to the third warrant revealed more than 700 images of child pornography.
Giberson was indicted on July 21, 2004, and charged with receiving child pornography in violation of 18 U.S.C. § 2252(a)(2) and possessing child pornography in violation of 18 U.S.C. § 2252(a)(4)(B). In November, Giberson filed a motion to suppress evidence, arguing that law enforcement officers exceeded the scope of the first search warrant when they seized his computer, and that they exceeded the scope of the second search warrant when they "searched for" child pornography on the computer. After *886 an evidentiary hearing, the magistrate judge recommended that the motion be denied. The district court, after receiving objections to the magistrate judge's recommendation and hearing oral argument, accepted the recommendation and denied Giberson's motion to suppress.
Later, Giberson entered conditional guilty pleas to both counts in the indictment. The district court sentenced Giberson to concurrent terms of sixty months on each of the two counts, to be followed by three years of supervised release on count one, concurrent with a life term of supervision on count two. Giberson appealed, arguing the district court erred in denying his motion to suppress and in failing to merge the counts of conviction at sentencing.
II.
Giberson challenges the seizure of his computer pursuant to the first search warrant and the search of the mirror image of his hard drive pursuant to the second search warrant, arguing the evidence of child pornography obtained from the seizure and subsequent search should have been suppressed. We review the district court's denial of his motion to suppress de novo and the district court's underlying factual findings for clear error. United States v. Summers,
A.
The Fourth Amendment provides that "no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." U.S. Const. amend. IV. Generally, in a search made pursuant to a warrant, only specifically enumerated items may be seized. See United States v. Tamura,
One issue we can put to the side. Giberson's brief twice states that "[t]he warrant was not specific enough." His argument, however, seems limited to the claim that the warrant did not specify the computer and the computer was therefore unlawfully seized; he does not suggest that the warrant itself failed to specifically describe items to be seized and was therefore facially invalid. In any event, the warrant was based on probable cause and clearly limited the types of documents and records that were seizable, "objectively describ[ing] the items to be searched and seized with adequate specificity and sufficiently restrict[ing] the discretion of agents executing the search." See United States v. Adjani,
Giberson does argue that, because the first search warrant did not specify that the officers could search or seize a computer, the seizure of his computer exceeded the scope of the warrant. The question, then, is whether a warrant that describes particular documents authorizes the seizure of a computer where, as here, the searching agents reasonably believed that documents specified in the warrant would be found stored in the computer.
We have long held that a search warrant authorizing the seizure of materials also authorizes the search of objects that could contain those materials. In United States v. Gomez-Soto, officers were conducting a search pursuant to a warrant authorizing the seizure of "[b]ooks, papers, records, *887 receipts, documents, notations, diaries, journals or ledgers" related to the defendant's unlawful business dealings.
The defendant challenged the search, arguing that the search and seizure of the briefcase, the microcassette, and their contents were not permitted because they were not particularly described in the warrant. Id. at 654. We rejected that argument, reasoning:
The search and seizure of both the microcassette and the briefcase were proper. It is axiomatic that if a warrant sufficiently describes the premises to be searched, this will justify a search of the personal effects therein belonging to the person occupying the premises if those effects might contain the items described in the warrant.
Id. Because the briefcase would be a logical container for many of the items described in the warrant, and the microcassette tape is "by its very nature a device for recording information ... which come[s] clearly within the specific authority of the warrant," we held that the "failure of the warrant to anticipate the precise container in which the material sought might be found" was not fatal. Id. at 655.
Later, in United States v. Reyes, we reaffirmed this principle, holding that a search warrant authorizing the seizure of drug trafficking records, ledgers, or writings related to drug trafficking also permitted agents to seize a cassette tape.
Computers, like briefcases and cassette tapes, can be repositories for documents and records. We have not yet had occasion to determine, in an opinion, whether computers are an exception to the general principle that a warrant authorizing the seizure of particular documents also authorizes the search of a container likely to contain those documents. We hold that, in this case, where there was ample evidence that the documents authorized in the warrant could be found on Giberson's computer, the officers did not exceed the scope of the warrant when they seized the computer.
Giberson does not deny that it was reasonable in this case for the agents to believe that the documents specified in the warrant might be found on his computer. Rather, he argues that the analogy between a computer and other "containers" is not appropriate because computers are somehow entitled to heightened protection, and are searchable only when specified in the warrant. We observe at the outset that Fourth Amendment exceptions and distinctions based solely on a type of technology are "unwise[ ] and inconsistent with the Fourth Amendment." See Kyllo v. United States,
*888 Giberson's principal argument is that computers are able to store "massive quantities of intangible, digitally stored information," distinguishing them from ordinary storage containers. But neither the quantity of information, nor the form in which it is stored, is legally relevant in the Fourth Amendment context. While it is true that computers can store a large amount of material, there is no reason why officers should be permitted to search a room full of filing cabinets or even a person's library for documents listed in a warrant but should not be able to search a computer. Giberson's purported exception would also create problems in analyzing devices with similar storage capacities. If we permit cassette tapes to be searched, then do we permit CDs, even though they hold more information? If we do not permit computers to be searched, what about a USB flash drive or other external storage device? Giberson's purported exception provides no answers to these questions.
Similarly, attempting to limit Fourth Amendment searches based on the format of stored information would be arbitrary. We have already held that microcassettes, which store data differently from traditional paper, are seizable in a search for "records." See Gomez-Soto,
Giberson's purported rule creates a brightline exception to the Fourth Amendment that provides no principles by which to evaluate whether a search is reasonable. The Supreme Court has consistently eschewed such brightline rules. See Ohio v. Robinette,
Giberson offers two other bases upon which to distinguish computers from other objects in the Fourth Amendment context. First, he argues that computers have a great potential for the intermingling of relevant and irrelevant (and personal and private) material. Indeed, a court has recognized that "[b]ecause computers can hold so much information touching on many different areas of a person's life, there is a greater potential for the `intermingling' of documents and a consequent invasion of privacy when police execute a search for evidence on a computer." United States v. Walser,
Second, Giberson suggests that because computers store material protected by the First Amendment, they should be subject to heightened protection. But, as this court observed in United States v. Weber,
In the circumstances underlying this appeal, it was reasonable for the officers to believe that seizable items were stored on Giberson's computer, and to secure the computer and obtain a specific warrant and search it. Their failure to anticipate that the items would be stored on a computer and to specify computer files in the warrant was not unreasonable because they had no reason to believe that Giberson owned a computer. See United States v. Hill,
The government argues, and the district court agreed, that the seizure of the computer was also justified by the plain view exception to the warrant requirement. Because we decide that the seizure was authorized by the warrant itself, it is unnecessary to decide whether the plain view doctrine or any other exception to the warrant requirement applies here.
B.
Giberson also argues that the evidence obtained from the search of his computer should have been suppressed because the government did not sufficiently limit its search to relevant documents. The second warrant authorized the government to search Giberson's computer for records relating to I.D. cards or the creation of those cards, including driver's licenses, state identification cards, state seals, and photographs that could be used for fake I.D.s. Giberson argues that computer specialist Rehms should have limited his search to files likely to contain those documents, and vaguely asserts that Rehms could have done so by looking at the computer's directories instead of sorting files through ILOOK.
Giberson's argument is foreclosed by Hill. There, the defendant argued that a search of his computer files should have been limited to files likely to be associated with those identified in the search warrant. Hill,
Computer records are extremely susceptible to tampering, hiding, or destruction, whether deliberate or inadvertent. Images can be hidden in all manner of files, even word processing documents and spreadsheets. Criminals will do all they can to conceal contraband, including the simple expedient of changing the names and extensions of files to disguise their content from the casual observer.
Id. at 978 (internal quotation marks and citation omitted); see also Adjani,
This argument applies with equal force to Giberson's case. The records for which the government was authorized to search, including images of the Nevada State Seal and photographs that might be used to create fake I.D.s, could have been graphics files. There was no reasonable way to sort relevant and irrelevant graphics files because the fake I.D. files and the pornography files were innocuously labeled. It would be unreasonable to require the government to limit its search to directories called, for example, "Fake I.D. Documents," and Giberson does not claim that there was such a folder.
We acknowledge that "[n]ew technology may become readily accessible ... to enable more efficient or pinpointed searches of computer data," and that, "[i]f so, we may be called upon to reexamine the technological rationales that underpin our Fourth Amendment jurisprudence in this technology-sensitive area of the law." Hill,
Our holding is not inconsistent with United States v. Carey,
As the district court concluded, this case "is vastly different from Carey." Rehms was authorized to look at images and photographs; after discovering the pornographic images, Rehms continued with his search for evidence of fake I.D. documents and only inadvertently came across more child pornography. The government only searched for pornographic files after obtaining the third search warrant authorizing it to do so, and the search was therefore reasonable.
C.
The government acted reasonably at all stages in its investigation into Giberson's production of fake I.D.s and, later, his possession of child pornography. The seizure of the computer was justified because the computer was reasonably believed to contain items enumerated in the first *891 search warrant. The search of the computer was conducted pursuant to a valid second search warrant and proceeded in a reasonable manner. Pornography was not searched for until authorized by the third warrant. We affirm the district court's denial of Giberson's motion to suppress.
III.
Giberson contends that the district court erred when it sentenced him for both receipt and possession of child pornography, arguing that the sentencing is multiplicitous. He failed to object in the district court, and we review for plain error. See United States v. Smith,
By a divided panel, and subsequent to Giberson's sentencing, we recently held, on plain error review, that entering judgment against a defendant who had pled guilty to both the receipt and possession of child pornography was multiplicitous and violated the Fifth Amendment's prohibition against double jeopardy. United States v. Davenport,
CONVICTION AFFIRMED; SENTENCE VACATED AND REMANDED.
NOTES
Notes
[*] The Honorable Roger T. Benitez, United States District Judge for the Southern District of California, sitting by designation.
