On October 10, 1996, the defendant-appellant, Jesse Kevin Hall (“Hall”), was charged with knowingly possessing three or more visual images containing depictions of minors engaged in sexually explicit conduct, in violation of 18 U.S.C. § 2252(a)(4)(B). Hall’s single-count indictment charged the defendant with transporting the images in interstate commerce by computer. The defendant entered a conditional plea of guilty, reserving the right to appeal the district court’s denial of his motion to suppress evidence against him. Hall appeals the court’s denial of his motion to suppress. We affirm.
I. BACKGROUND
On November 7, 1995, the defendant took the central processing unit (“CPU”) of his personal computer to CDS Office Technolo *991 gies (“CDS”) in Springfield, Illinois, for repairs. The following day, while in the process of repairing Hall’s CPU, Richard M. Goodwin (“Goodwin”), a CDS employee, accessed several of the CPU’s file directories to diagnose the problems with Hall’s CPU. In so doing, Goodwin observed that a number of the files had unusual names; names which implied sexual content. For example, one of the files was titled “Boys 612.” 1 Goodwin viewed this file and found that it contained a video image of two young naked boys engaged in actual or simulated anal sex. Based on their appearance and physical development, Goodwin estimated that the boys were between 10 and 12 years of age. Goodwin examined three or five other files and found that they also contained pornographic images of males in their youth. Goodwin gauged that there were a total of 1,000 video files on the CPU that had names implying child pornography. After Goodwin viewed the files, Hall telephoned CDS to inquire when his computer would be ready and how much the repairs would cost. Goodwin explained that it was likely that the CPU would require a video upgrade and that a CDS salesperson would contact him concerning the price. Goodwin did not reveal that he had viewed any of the pornographic files.
Following his conversation with Hall, Goodwin placed a call to his friend, Trooper Wayne Johnson (“Johnson”) of the Illinois State Police, and told him what he had discovered on the computer. He described two or three of the images to Johnson, including the “Boys 6-12.” Johnson asked Goodwin to copy several of the pornographic files onto a three-and-a-half-inch computer disk (“disk”) in order to preserve the evidence. Goodwin copied the disk as requested and gave it to Johnson later the same day. However, neither Johnson nor any other law enforcement officer ever viewed the disk.
Johnson contacted Lieutenant Terry Wub-ker of the Illinois State Police, who in turn notified the FBI. On November 9, 1995, Goodwin was interviewed briefly by FBI Special Agents Dale Walker (“Walker”) and Thomas Gibbons (“Gibbons”) at the offices of the Illinois State Police. Johnson and two other Illinois State Police officers were present during the interview. Later the same day, Goodwin was interviewed a second time by Walker and Gibbons, and at this time was accompanied by Warren Wilson (“Wilson”) and Bruce Egolf (“Egolf’), CDS employees. During the meeting, the CDS employees agreed to assist the FBI in their investigation of Hall. Accordingly, Goodwin gave the agents Hall’s home address, the location of his employment, and his home telephone number.
Following the meeting, Wilson called Hall to discuss the video upgrade of Hall’s CPU. Hall requested that a new video graphics card be installed. Because the card would have to be ordered, Wilson estimated that the repair of the CPU would not be completed until the following week. Egolf then locked Hall’s CPU in his office at CDS pending the outcome of the investigation. The FBI subpoenaed records from America OnLine (“AOL”) reflecting that Hall subscribed to the service from February 22, 1995, through November 7, 1995. AOL also released Hall’s mailing address, which matched the address Goodwin had given to Walker and Gibbons.
The video upgrade of Hall’s CPU was completed on November 15, 1995. The same day, Walker obtained search warrants: one to search Hall’s residence and another to search Hall’s CPU. The affidavits supporting the search warrants recounted the facts that Goodwin had related to law enforcement, and stated that Johnson had instructed Goodwin to copy and transfer the pornographic files to the disk to preserve the evidence. The affidavits did not rely on the copied files in establishing probable cause. At the request of the FBI, Wilson also agreed to retain the CPU until the following day in order that an expert from FBI headquarters could view the pornographic files.
At 8 a.m. on November 16, 1995, the first warrant, allowing law enforcement officers to search Hall’s CPU, was served at CDS. FBI *992 Special Agent Michael Randolph (“Randolph”) confirmed that the CPU in question contained child pornography. At approximately 9 a.m., Hall arrived at CDS and picked up his CPU. He left the store and was confronted by FBI agents as he approached his car. The agents seized the CPU, and advised Hall that he was not under arrest, and that he was free to leave if he so desired. Hall was advised that the FBI’s investigation into the illegal transmission and receipt of child pornography had revealed that Hall was in possession of various pornographic items. Hall admitted that he had obtained child pornography through his AOL account, and signed a written consent form which allowed the agents to search his residence and his computer. At Hall’s residence, the agents seized 42 disks, three of which contained child pornography. After an inventory review and inspection of the CPU and disks, 403 files were found to contain visual depictions of minors engaged in explicit sexual conduct. Many of the pornographic files contained in the CPU depicted prepubescent minors, or minors under the age of 12. ■
On October 10, 1996, Hall was indicted for knowingly possessing images, transported in interstate commerce, which contained visual depictions of minors engaged in sexually explicit conduct in violation of 18 U.S.C. § 2252(a)(4)(B). The statute provides:
(a) Any person who-
(4) either (B) knowingly possesses 3 or moré books, magazines, periodicals, films, video tapes, or other matter which contain any visual depiction that has been mailed, or has been shipped or transported in interstate or foreign commerce, or which was produced using materials which have been mailed or so shipped or transported, by any means including by computer, if-
(i) the producing of such visual depiction involves the use of a minor engaging in sexually explicit conduct; and
(ii) such visual depiction is of such conduct;
shall be punished as provided in subsection (b) of this section.
18 U.S.C. § 2252. On December 3, 1996, Hall filed a motion with the district court to suppress the Government’s evidence of child pornography. Hall contended that the Government’s search warrants were invalid since they were supported by an insufficient amount of evidence to establish probable cause and were based on discoveries made by an agent of the Government. At the suppression hearing on December 23, 1996, HalTs motion was denied. The district court found that: (1) Goodwin’s actions leading to the discovery of the material on Hall’s CPU constituted a private search; (2) there were separate warrants to search the CPU and Hall’s residence; (3) there was probable cause to issue the warrants; and (4) the CPU was not unreasonably detained. Hall entered a conditional plea of guilty, reserving the right to appeal the denial of his motion to suppress evidence. At sentencing, Hall objected to various presentence report (“PSR”) findings. These included the imposition of two separate two-level enhancements under U.S.S.G. §§ 2G2.4(b)(l) and (b)(2) for possession of material involving a prepubescent minor and possession of ten or more items containing a depiction involving the sexual exploitation of a minor. The district court, after overruling HalTs objections, found him guilty of possessing child pornography and sentenced him to 15 months imprisonment, three years supervised release, and a $50 special assessment fee. Hall appeals the district court’s denial of his motion to suppress evidence and his sentence enhancements.
II. ISSUES
On appeal, Hall contends that the district court erroneously denied his motion to suppress evidence. Specifically, Hall claims that: (1) the evidence was discovered in violation of the Fourth Amendment by an agent of the Government; (2) his Fourth Amendment rights were violated when the content of his computer files were released to the police without his consent; (3) insufficient probable cause existed for the search warrants; (4) the warrants violated his First Amendment rights because they gave law enforcement the authority to search and seize non-obscene material; and (5) the unlawful warrants invalidated his subsequent *993 consent to the search of his residence and his computer. Hall also contends that the district judge erred in increasing his base sentence level by two levels, arguing that visual depictions on a computer do not constitute pornographic “matter” as defined under 18 U.S.C. § 2252(a)(4)(B) and are not considered as “items” or “material” for purposes of the sentencing guidelines.
III. DISCUSSION
A. The Court’á Denial of the Motion to Suppress Evidence
Initially, the defendant contends that the district judge erred in denying his motion to suppress evidence. This Court reviews the district judge’s factual findings on a motion to suppress evidence under the clearly erroneous standard.
See United States v. Talkington,
1. The Evidence Was Discovered by Private Search
The defendant claims that the evidence that provided probable cause for the issuance of the search warrants was discovered by Goodwin acting as an agent of the Government. Hall contends that Goodwin’s search was unreasonable because he did not have a warrant to search Hall’s CPU. Although individuals have a right under the Fourth Amendment of the United States Constitution to be free from unreasonable searches and seizures by the Government,
private searches
are not subject to constitutional restrictions.
See generally United States v. Feffer,
Goodwin’s search of Hall’s CPU, which involved the viewing of several of Hall’s computer files, was made pursuant to the maintenance work Goodwin had performed in his capacity as a technician for CDS. The Government had no knowledge that Goodwin was going to repair Hall’s computer and thus, did not instruct Goodwin to inspect the files. Goodwin did not contact the Government until after the evidence was discovered. The search was initiated by Goodwin, and was completed in the normal course of CDS’s business, with the sole purpose of testing Hall’s CPU. Therefore, the Fourth Amendment is inapplicable both to Goodwin’s search, and to his later description of the pornographic evidence to law enforcement officials.
The Government conceded that the copying of the files by Goodwin, at Trooper Johnson’s request, constituted a warrantless search. However, the copied disk was never reviewed by law enforcement, nor was it used as a basis of reasonable suspicion in the affidavit supporting the search warrants. The Government contends that the “issuance of the search warrants for the defendant’s CPU and residence, however, was independent of any instruction by Johnson.” The Government in its argument embraces the Supreme Court’s reasoning in
Nix v. Williams'.
“[t]he independent source doctrine allows admission of evidence that has been discovered by means wholly independent of any constitutional violation.”
2. Detention of the CPU Was Nom-Govem-mental and Not Unreasonable
Hall next contends that CDS detained the CPU at the Government’s direction for an unreasonable period of time. CDS detained the CPU for one extra day while the FBI obtained search warrants for Hall’s home and his computer files. The district judge found the CPU had not been detained unreasonably by CDS: “Defendant asked CDS to repair, improve, or upgrade the video capacity on his computer. Both Goodwin and Warren Wilson ... stated that it normally took approximately four days for the [new graphics] card to arrive and to be installed.”
This Court has previously held that a limited detention of evidence, even by the Government, is not unreasonable if based on reasonable suspicion.
See United States v. Mayomi,
Where law enforcement authorities have probable cause to believe that a container holds contraband or evidence of a crime, but have not secured a warrant, the Court has interpreted the [Fourth] Amendment to permit seizure of the property, pending issuance of a warrant to examine its contents, if the exigencies of the circumstances demand it or some other recognized exception to the warrant requirement is present.
Id.
*995
The defendant’s reliance on
Walter v. United States,
3. Probable Cause Existed for the Warrants
Contrary to the district judge’s ruling, the defendant next contends that there was insufficient probable cause to support the search warrants. The affidavit in support of the search warrants cited Goodwin’s estimate that the CPU contained approximately 1,000 files with names indicative of child pornography. Goodwin also stated that he viewed three to five files that depicted minors engaged in sexual activity, and described at least two of those depictions to Trooper Johnson. The affidavit also contained expert information addressing the common practices of child pornographers. Specifically, the affidavit stated that pornographers tend to maintain their collections of material for long periods, usually at home. In order for sufficient probable cause to exist to support law enforcement’s suspicion that a crime has been committed, evidence in police affidavits must show a “fair probability that contraband or evidence of a crime” will be found in the location identified in the search warrant.
Illinois v. Gates,
J. The Warrants Were Written with Sufficient Particularity
Hall maintains that the two search warrants were issued in violation of the First Amendment of the United States Constitution because they granted authority for law enforcement agents to search and seize non-obscene material, beyond the scope of the two or three depictions that Goodwin initially reported to law enforcement. Attachment A to the affidavit supporting the search warrants authorized the agents to seize
[h]ardware, computer disks, disk drives, internal modems, tape drives, disk application programs, data disks, system disk operating systems ... which may be, or are used to visually depict child pornography, child erotica, information pertaining to the sexual interest in child pornography, sexual activity with children or the distribution, possession or receipt of child pornography, child erotica or information pertaining to *996 an interest in child pornography or child erotica____
[computerized or other materials and photographs depicting sexual conduct, whether between adults or between adults and minors.
The defendant argues that the warrants
didn’t limit seizure of items that were used to depict child pornography; they authorized seizures of items that “may” be used to depict child pornography. They also didn’t limit the seizure of disks or other items depicting child pornography, but they authorized the seizure of any pornography, adult or child, legal or illegal.
The Government contends that because this issue was not raised before the district court, it is forfeited. We agree.
See United States v. Perez,
To determine whether a specific warrant meets the particularity requirement, a court must inquire whether an executing officer reading the description in the warrant would reasonably know what items are to be seized. See
United States v. Layne,
A warrant that generally describes items to be seized as those that were “obscene, lewd, lascivious or indecent” was “too general to support the seizure of material that was at the time of the seizure, arguably protected by the First Amendment.”
United States v. Hale,
In the case under consideration, we hold that the search warrants were written with sufficient particularity because the items listed on the warrants were qualified by phrases that emphasized that the items sought were
*997
those related to child pornography.
2
This included such phrases as “child pornography,” “minors engaged in sexually explicit conduct,” and “sexual conduct between adults ... and minors.” Police officers executing the warrants were not unguided and free to rummage through Hall’s property.
See Andresen,
5. Lawful Warrants Did Not Invalidate Hall’s Consent
Finally, the defendant contends that his motion to suppress the evidence should have been granted by the trial judge because the allegedly unlawful search vrarrants, lacking in probable cause and based on an improper Government search, invalidated the defendant’s subsequent consent in allowing law enforcement to search his residence and his computer. However, as discussed above, the warrants were lawful, and thus, Hall’s subsequent consent was not invalidated. The Government argues that because Hall did not raise this issue before the district court, the matter is waived. As discussed earlier, we held in
United States v. Perez
that matters not raised in trial court proceedings are deemed forfeited and subject to review only for plain error.
See
During oral argument, the defendant also argued that, for the purposes of 18 U.S.C. § 2252(a)(4)(B), he did not “knowingly possess” the child pornography discovered on the CPU and disks. Hall contends that the computer files containing the pornography were transferred to his computer without his knowledge, and that he did not wish to possess the files. The defendant equates his situation to that in which one views images on a television screen; the nature of the images that appear on the screen is not controlled by the viewer. We hold, however, that the defendant’s television analogy is incomplete in that one does not possess the images he views on a television screen. Hall had every opportunity to delete any computer files that he did not wish to retain. Since the defendant himself downloaded the files into the computer’s memory, we hold that Hall’s argument is without merit and fail to understand how he can argue that he did not knowingly possess the files. Furthermore, since the defendant did not raise this issue before the district judge or in his brief, we will not further consider it at this point. See id.
B. The Sentence Enhancements
The defendant next argues that the sentence enhancements leveled by the district judge were improper. A defendant’s sentence will be affirmed unless, after reviewing the evidence, it is found that the application of the sentencing guidelines to the facts was clearly erroneous.
See United States v. Herrera,
Under U.S.S.G. § 2G2.4(b)(2), a base level offense may be increased two levels if “the offense involved possessing ten or more books, magazines, periodicals, films, video tápes, or other items, containing a visual depiction involving the sexual exploitation of a minor____” (emphasis added). Hall concedes that he possessed more than 10 visual depictions, but maintains that a visual depiction is not an “item.” Gather, he argues that the only “items” he possessed were the three individual disks, which he claims should not subject him to the sentence enhancement dictated in this provision. Furthermore, under U.S.S.G. § 2G2.4(b)(l), a base level offense can be increased an additional two levels if “the material involved a prepubes-eent minor or a minor under the age of twelve years____” (emphasis added). Simi-
*998
lar to his argument concerning § 2G2.4(b)(2), Hall contends that the only
“material,”
as defined under § 2G2.4(b)(l), which he possessed were the three individual disks, and that these did not contain depictions of children under the age of 12. He also argues that his computer cannot be considered to be “matter” in the statute under which he was charged, 18 U.S.C. § 2252(a)(4)(B),
3
but is instead a “container,” and that visual depictions are not recognized to be
“matter*’
under that statute. However, the Tenth Circuit has previously rejected the contention that a computer is only a “container” for files.
See Davis v. Gracey,
Even accepting Hall’s logic that the computer was only the “container” of the matter for the purposes of the statute, we must determine whether the files stored within the computer, which contained the depictions, may be considered “matter,” “items” or “material.” Because the Internet has only recently been commonly used to transport and transfer visual images, this issue has not been specifically addressed by this Court. However, other courts have explicitly found computer files to be “matter which contains depictions” under 18 U.S.C. § 2252(a)(4)(B). For example, in
United States v. Lamb,
scanned or transferred to a computer by a number of technological means, including digital cameras, flatbed scanners, and video capture cards. The images are converted into ... image file formats____ These files can then be transmitted over a modem to other computers. Another program known as a viewer is required to display the image files as actual pictures on the monitor____
Id.
Although “visual depiction” is explained in the definition section of the statute as that which includes “undeveloped film and videotape,” the
Lamb
court observed that the definition does not exclude other media, specifically photographs.
See id.
The court reasoned that “the explicit reference to media of a type that requires additional steps and equipment before the images they contain can be viewed supports the proposition that Congress intended to sweep the type of transmission at issue here within the ambit of the statute.”
Id.
The court acknowledged that computer data stored on disk is not, in and of itself, a “visual depiction,” because a computer must first translate the visual image from the computer data. However, a videotape image, similar to a computer image, is recorded magnetically on a reel of plastic tape, and can be viewed only with the aid of a videotape player and television.
See id.
Since 18 U.S.C. § 2252(a)(4)(B) specifically provides that videotape images are “matters,” the court ruled that Congress intended computer images to be included within the definition of “matters” as well. We concur with the court’s analysis. Furthermore, in
United States v. Goossens,
In the case under consideration, the district court’s application of the sentencing guidelines was not clearly erroneous. The judge found that 393 computer files consisting of child pornography represented more than “10 ... other items [ ] containing a visual depiction involving a minor.” In our opinion, Hall’s pornographic “items” consisted of 403 individual computer files, separately stored on the computer. The district *999 court properly increased the base level offense by two levels under § 2G2.4(b)(2) because computer files are the equivalent of “items.” In addition, the district judge did not commit clear error in finding that the computer files containing images of prepubescent minors were “other matter[s]” or “materials” under 18 U.S.C. § 2252(a)(4)(B) and U.S.S.G. § 2G2.4(b)(l). Although the statute does not define “other matter” or “materials,” plain meaning suggests a prohibition of three or more of anything containing a visual depiction transported in interstate commerce. In this case, the “other matter” or “materials” are the 403 individually-named computer files Hall received in interstate commerce via AOL. Because the material involved a “prepubescent minor or a minor under the age of twelve years,” U.S.S.G. § 2G2.4(b)(l), the district court properly increased the base level offense by two levels.
IV. CONCLUSION
The district court did not commit error in denying the defendant’s motion to suppress evidence. Hall knowingly downloaded 403 computer files containing child pornography from the Internet. Although the initial information supporting the search of Hall’s CPU came as a result of Goodwin’s private search of Hall’s computer, Hall subsequently consented to the Government’s search of his home and his computer. Furthermore, the court did not err in imposing sentence enhancements pursuant to the sentencing guidelines.
AFFIRMED.
