MEMORANDUM OPINION AND ORDER RE: MAGISTRATE’S REPORT AND RECOMMENDATION, MOTION TO DISMISS, AND CONDITIONAL PLEA
Pending before the Court are Defendant Jonathan Luken’s objections (Doc. 37) to Magistrate John E. Simko’s Report and Recommendation (Doc. 33) denying Defendant’s motion to suppress evidence (Doc. 19), Defendant’s motion to dismiss the Indictment (Doc. 44), and Defendant’s motion to enter a conditional plea to the charge of knowingly possessing computer files that contain images of child pornography (Doc. 39). The Court requested and received briefing regarding case law within the Eighth Circuit relating to deleted child pornography images.
See United States v. Stulock,
FACTUAL AND PROCEDURAL BACKGROUND
After Immigration and Customs Enforcement received information that Defendant, Jonathan Luken, had used credit cards to purchase child pornography in 2002 and 2003, South Dakota law enforcement officials were notified. On July 25, 2006, Agent Boone from the South Dakota Division of Criminal Investigation and two other law enforcement officers met Defendant at his place of employment in North Sioux City, South Dakota, and asked to speak to him and to look at his Gateway 700x computer at his residence in North Sioux City. No Miranda warning was given Defendant, and Defendant agreed to speak to Agent Boone. Defendant advised Agent Boone that he had used his computer several years prior to purchase child pornography, and that he had downloaded the purchased pornography, viewed it and then immediately deleted the purchased pornography. Defendant stated that recently he was only looking at free websites and he was pretty sure that there were no saved images on his computer.
Agent Boone explained to Defendant that a file was never really deleted from the computer, but only the file showing the location of the file was deleted. Agent Boone requested from Defendant his permission to look at Defendant’s computer and to have the computer forensically examined. Agent Boone explained to Defendant that in the forensic process law enforcement would look for files that were deleted or in temporary Internet files and that special software would be used to recover any deleted files. With Defendant’s approval, Agent Boone then secured the tower portion of Defendant’s computer. Defendant signed a consent form which states: “On 7-25-06 I, John Luken, give law enforcement the permission to seize and view my Gateway computer.”
Agent Boone testified that only after speaking with Defendant did he believe there was probable cause for a search warrant. After securing Defendant’s computer Agent Boone then applied for and received a search warrant for the computer from a State Court Judge. The application for the search warrant and the search warrant itself identified the property subject to the search warrant as:
“Contraband, the fruits of crime, or things otherwise criminally possessed,” and “Property designed or intended for use in, or which is or has been used as the means of committing a criminal offense.”
Neither the application for the search warrant nor the search warrant itself checked the property description of “Property that constitutes evidence of the commission of a criminal offense.” The Search Warrant ordered that the Search Warrant be executed within 10 days.
The hard drive of Defendant’s computer was mailed to a lab in Pierre within a couple of days after it was taken from Defendant, but then mailed back to Agent Boone approximately four weeks later because the lab was too far behind. The hard drive was then imaged, or copied byte for byte, and the image was then loaded into a software program called Forensic Tool Kit for analysis. In conducting the forensic analysis Agent Boone observed 200 images which he considered to be child pornography. He then took a random sampling of 41 images from the 200 images. None of these images were found in any of the Temporary Internet Files folders. Instead, these images were found on the thumbs.db file, i.e., thumbs database. Thirty three of the images show a computer file path of “Documents and Settings*Jon*My Documents*My Mu
In an Indictment which was filed on December 13, 2006, Defendant was indicted for one count of possession of child pornography. The Indictment states in part: “On or about between March 20, 2005 and July 25, 2006, at North Sioux City, in Union County, in the District of South Dakota, defendant Jonathan Luken, did knowingly possess computer files that contained images of child pornography. ...”
Defendant filed a motion to suppress (Doc. 19) alleging that he was seized and in custody at the time of his July 25, 2006, interview, and that the seizure was not justified by any preexisting probable cause and was therefore unconstitutional under the Fourth Amendment. Defendant also alleged that he should have been, but was not given a Miranda warning or even a complete set of Griffin warnings, and that the affidavit in support of the search warrant was based on information gained from an xmMirandized statement made during an unconstitutional seizure. Defendant further contended that the forensic examination of the hard drive exceeded the time limits imposed by the terms of the search warrant and also exceeded the scope of the search set forth in Defendant’s consent statement. Defendant maintained that under the totality of the circumstances, Defendant’s consent was not voluntary. Doc. 21. Magistrate John E. Simko’s Report and Recommendation rejected all of the above arguments and recommended denial of Defendant’s motion to suppress evidence. Doc. 33. With regard to the aforementioned issues, the Court adopts the reasoning and conclusions in the Report and Recommendation.
In addition to the issues described in the preceding paragraph, Defendant raised an additional issue at the suppression hearing which had not been previously briefed, and then presented this issue in Defendant’s Supplemental Brief Following Suppression Hearing (Doc. 30). In this issue Defendant pointed out that both the search warrant affidavit and the warrant itself had boxes to check indicating whether the search was for “evidence,” “contraband,” or both, and both documents had check-marks in the “contraband” box, but neither had a checkmark in the “evidence” box. Defendant maintained that since the testimony and the exhibits at the suppression hearing showed that none of the approximately 41 images at issue was located in a file which could be accessed on Mr. Luken’s computer monitor without forensic software comparable to that used by Agent Boone, and since Defendant did not possess any such forensic software, that Defendant did not possess contraband and that the search also exceeded the scope of the search warrant in this regard. The Magistrate’s Report and Recommendation, in rejecting this argument, relied upon
United States v. Romm,
In the electronic context, a person can receive and possess child pornography without downloading it, if he or she seeks it out and exercises dominion and control over it. See United States v. Tucker,305 F.3d 1193 , 1204 (10th Cir.2002), ce rt. denied,537 U.S. 1223 ,123 S.Ct. 1335 ,154 L.Ed.2d 1082 (2003) (“Tucker II”). Here, we hold Romm exercised dominion and control over the images in his cache by enlarging them on his screen, and saving them there for five minutes before deleting them. While the images were displayed on Romm’s screen and simultaneously stored to his laptop’s hard drive, he had the ability to copy, print, or email the images to others. Thus, this evidence of control was sufficient for the jury to find that Romm possessed and received the images in his cache.
In Defendant’s Objection 14 to the Magistrate’s Report and Recommendation Defendant maintained that the above case law relied upon by the Magistrate did not involve a situation in which a defendant is ignorant of the fact this his web browser cached unlawful images. Defendant moved the Court to schedule a change of plea hearing following the Court’s ruling on Defendant’s Objections to the Report and Recommendation on Defendant’s suppression motion. Doc. 39. Defendant has entered into a plea agreement which involves a conditional plea to the charge of knowingly possessing computer files that contain images of child pornography. Doc. 40. The Factual Basis Statement for the proposed conditional plea states in part: “On July 25, 2006, at the defendant’s residence in North Sioux City, South Dakota, the defendant Jonathan Luken, knowingly possessed thirty-three (33) images of child pornography that were contained within his computer.”
Defendant has also moved to dismiss the Indictment. Doc. 44. The motion to dismiss states, “In the Eighth Circuit, ‘one cannot be guilty of possession for simply having viewed an image on a website, thereby causing the image to be automatically stored in the browser’s cache, without having purposely saved or downloaded the image.’
United States v. Stulock,
WHETHER EIGHTH CIRCUIT LAW REQUIRES SUPPRESSION OF THE EVIDENCE FOUND ON THE HARD DRIVE OF DEFENDANT’S COMPUTER AND DISMISSAL OF THE INDICTMENT?
In
United States v. Stulock,
In
United States v. Johnson,
Where a defendant lacks knowledge about the cache files, and concomitantly lacks access to and control over those files, it is not proper to charge him with possession and control of the child pornography images located in those files, without some other indication of dominion and control over the images. To do so turns abysmal ignorance into knowledge and a less than valetudinarian grasp into dominion and control.
In the case at hand, however, both Agent Boone and the Defendant’s expert, Sean Fahey, Computer Systems Administrator for the Office of the Federal Public Defender for the Districts of South Dakota and North Dakota, agree that none of the images of child pornography found on Defendant’s computer were found in “Temporary Internet Files,” but rather the files were located in the thumbs database with a computer path of: “Documents and Settings*Jon*My Documents’!:My Music.” With the information available to him at the time of the July 16, 2007, hearing, Sean Fahey could not substantially dispute Agent Boone’s opinion that the only way Defendant could have created a file in a thumbs.db database was to have purposely saved or downloaded an image onto the computer’s hard drive and viewed the image in a thumbnail view.
Even if the Court were to accept Defendant’s limited definition of contraband and the facts were different than what has been presented, the Court cannot ignore that the search warrant also identified as subject to the search, “Property designed or intended for use in, or which is or has been used as the means of committing a criminal offense.” Under the facts of this case the hard drive of Defendant’s computer is consistent with the property identified as subject to search in the Search Warrant. Defendant’s objections to the Magistrate’s Report and Recommendation regarding suppression are thus overruled.
A person who knowingly has ownership, dominion or control over contraband or the place in which contraband is concealed has actual possession of it. A person who, although not in actual possession of a thing, has both the power and the intention at a given time to exercise dominion or control over a thing, either directly or through another person or persons, is then in constructive possession of it. Proof of constructive possession suffices to prove knowing possession.
See
In addition, as the Court stated at the July 16, 2007, hearing, the concerns raised in Defendant’s motion to dismiss are sufficiency of the evidence concerns that generally are not properly raised in a motion to dismiss or prior to trial. See
United States v. Ferro,
WHETHER THE COURT WILL ACCEPT THE CONDITIONAL PLEA AS IT IS NOW PRESENTED?
Rule 11(a)(2) of the Federal Rules of Criminal Procedure provides in part that “[w]ith the consent of the court and the government, a defendant may enter a conditional plea of guilty or nolo contendere, reserving in writing the right to have an appellate court review an adverse determination of a specified pretrial motion.”
3
In this case Defendant has entered into a plea agreement reserving his right to seek appellate review of an adverse decision on his motion to suppress. Doc. 40. The Court is free to reject a conditional plea for any or no reason.
See United States v. Stevens,
Before entering judgment on any plea, the Court must determine that there is a factual basis for the plea. See Fed. R.CRIM.P. 11(b)(3). Although the Indictment establishes the date of the offense as on or about between March 20, 2005, and July 25, 2006, the factual basis for the plea sets forth the date of the offense as July 25, 2006. , The forensic report and the testimony at the July 16, 2007, hearing establish that the “last modified date” or the date on which Defendant took some action other than viewing the images occurred prior to July 25, 2006. The Court is rejecting the conditional plea as it is now presented but is allowing the Defendant until August 30, 2007, to present an amended factual basis statement which conforms to the evidence regarding the dates of knowing possession. Accordingly,
IT IS ORDERED:
1. That the Magistrate’s Report and Recommendation (Doc. 33) denying Defendant’s motion to suppress evidence is adopted for the reasons set forth in this opinion;
2. That Defendant’s Objections (Doc. 37) to the Magistrate’s Report and Recommendation denying Defendant’s motion to suppress evidence are overruled;
3. That Defendant’s Motion to Dismiss Indictment (Doc. 44) is denied;
4. That the Court is at this time denying Defendant’s Motion for Change of Plea (Doc. 39), but that Defendant shall have
5. That the jury trial herein shall commence in Sioux Falls, South Dakota, on Tuesday, September 25, 2007, with counsel to be present for motions in limine at 9:00 A.M., and with the jury to report at 9:30 A.M.; and
6. That the period of delay resulting from the continuance of this case is excluded in computing the time within which the trial of the offense for the Defendant must commence, as the Court finds that the ends of justice served by taking such action outweigh the best interests of the public and the Defendant in a speedy trial. 18 U.S.C. § 3161(h)(Z)(J) and (h)(8)(A).
REPORT and RECOMMENDATION
Pending is Defendant’s Motion to Suppress Evidence (Doc. 19). A hearing was held on Monday, March 26, 2007. Defendant was personally present and represented by his counsel of record, Assistant Federal Public Defender Tim Langley. The Government was represented by Assistant United States Attorney Jeff Clapper. DCI Agent Troy Boone testified at the hearing. Four exhibits were received into evidence. Additionally, both parties have submitted briefs and oral argument was heard at the conclusion of the hearing. Based on a careful consideration of all of the evidence, and counsel’s written and oral arguments, the Court respectfully makes the following:
RECOMMENDATION
It is respectfully recommended that Defendant’s Motion to Suppress be DENIED.
JURISDICTION
Defendant is charged in an Indictment with possession of child pornography in violation of 18 U.S.C. §§ 2252A(a)(5)(B) and 2256(8)(A). The pending Motion to Suppress was referred to the Magistrate Judge pursuant to 28 U.S.C. § 636(b)(1)(B) and Judge Piersol’s Standing Order dated November 29, 2006.
FACTUAL BACKGROUND
South Dakota Division of Criminal Investigation Agent Troy Boone was involved in an investigation of Mr. Luken in July, 2006. TR 11. He had been working the investigation with ICE Agent Jesse Begres. Agent Begres informed Agent Boone Luken had used a credit card to purchase child pornography over the internet a few years earlier. TR 11,13. Boone and Agent Begres, along with a representative of the Union County Sheriffs office visited Mr. Luken’s work place (a casino in North Sioux City) on July 25, 2006 at approximately 11:00 a.m. TR 13. The agents were dressed in plain clothes. Their firearms were not visible. TR 13-14. The entered the casino and asked for Mr. Luken. The hostess showed them to Mr. Luken’s office. TR 14. The office is near the center of the building and is relatively small. The hostess left the agents with Mr. Luken. TR 15. Agent Boone introduced himself and Agent Begres and immediately explained the reason for their visit. TR 15-16.
Agent Boone told Mr. Luken he would like to look at his home computer, and that he would prefer to speak with Luken in a more private setting. TR 16. Boone asked Mr, Luken if he would be willing to discuss the matter with the Agents at his home. Luken agreed. TR 16-17. When Boone explained the Agents wanted to
When everyone arrived at Mr. Luken’s home, they convened outside to visit with Mr. Luken about whether he wanted to explain their presence to his wife before they went in. TR 19-20. They asked if it was o.k. for them to come in with him, and he said yes. TR 20. Agent Boone candidly admitted Mr. Luken did not warmly invite them in for a cup of coffee, but did consent to allow them to follow him into his home. TR 20-21. Agent Boone asked Mr. Luken if he would like to visit in Agent Boone’s car, to avoid having the discussion in the presence of Luken’s wife. TR 21-22. Mr. Lukenagreed. TR22. Agent Boone unlocked the vehicle from the driver’s side; Mr. Luken entered on his own from the passenger’s side. TR 22. Agent Boone told Mr. Luken he did not have to answer any questions, and that he was free to leave. TR 28. Agent Boone did not, however, tell Luken that he had the right to ask the Agents to leave. TR 39. They talked about Mr. Luken’s computer knowledge and use, and the reason for the investigation. TR 23. Mr. Luken told Boone his computer was in the basement and that he had used it to look at child pornography, but that there were no “saved” files on it. TR 24. After Boone explained that deleted files are not truly deleted but are merely transformed into a form which is difficult to find, Luken said there probably would be files found on his computer. TR25. Agent Boone asked permission to look at Luken’s computer and to forensically look for deleted files and temporary internet files. TR 24. Boone requested and received a handwritten consent to search the computer. EX 1. The written consent is very basic and does not explain the computer will be forensically examined. TR 41. Agent Boone explained he wanted to keep the written consent “simple” but insisted he had explained the forensic examination, at least in basic terms, to Mr. Luken before he obtained the written consent. Id. Mr. Luken did not express any limitation on his consent to search the computer. TR 26. Mr. Luken was not advised of his Miranda rights at any time on July 25th. TR 38-39.
In his affidavit in support of search warrant (prepared on July 25) Agent Boone explicitly states “we” obtained Mr. Lukens’ consent to “view and image” the hard drive of the computer. 1 EX 3. In his narrative report (prepared on July 28) Agent Boone states he asked Mr. Luken about his level of computer expertise, and whether he had used passwords or encryption. Luken said he did not. When Boone explained to Luken that even though a file is deleted, it is not truly deleted, Luken then admitted there “probably was” some child pornography on the computer. It was after this explanation that Luken executed the written permission to “seize and view” his computer. EX 2.
After the conversation in Agent Boone’s car and obtaining the written consent,
Agent Boone spoke with Mr. Lukens several times after July 25, 2006, but Luken never revoked his consent to search the computer. TR 28. Agent Boone removed the hard drive and sent it to Pierre for examination within a few days of when it was seized from Mr. Luken. TR 74. The lab in Pierre returned the computer, however, because of an extreme backlog. TR 75. The computer was forensically examined by Agent Boone with forensic software when he returned from a training program in Georgia at the end of August, 2006. TR 28-29. Approximately forty-one incriminating images were found on the computer. TR 67. The images found were “thumbs.db” database files-the originals of which had been deleted from the hard drive. TR 70-71. It would not have been possible to detect them without the aid of special software, which Mr. Luken did not possess. TR 71-72. The evidence on the hard drive did not change from the time it was seized from Mr. Lukens’ home to the time it was examined. TR 30.
DISCUSSION
Burden of Proof
As a general rule, the burden of proof is on the defendant who seeks to suppress evidence,
United States v. Phillips,
Whether Mr. Luken Was Unconstitutionally Seized/In Custody
Defendant asserts all statements he made to law enforcement officials on July 25, 2006 and all evidence which was gathered as a result of the consent he gave on that date should be suppressed because (1) he was unconstitutionally seized in violation of the Fourth Amendment; and (2) he was in custody and was not advised of his Miranda rights. Therefore, Defendant asserts, all information (including Defendant’s statements and his written consent to search his computer) gleaned by the law enforcement officers on July 25th is fruit of the poisonous tree and must be suppressed.
“The Fourth Amendment’s requirement that searches and seizures be founded on an objective justification governs all seizures of the person, including seizures that involve only a brief detention short of traditional arrest.”
United States v. Mendenhall,
In applying the principles articulated above, it is important to remember the purpose of the Fourth Amendment is “not to eliminate all contact between the police and citizenry, but to prevent arbi
Luken also asserts that his statements to Agent Boone should be inadmissible because they were given in violation of
Miranda.
“Law enforcement officials must administer
Miranda
warnings whenever they interrogate persons in their custody.”
United States v. Brave Heart,
For many years, the Eighth Circuit relied on the various indicia of custody defined in
United States v. Griffin,
Mr. Luken was not in custody at any time on July 25, 2006. When the agents arrived at his workplace, they were in plain clothes and an unmarked ear. They introduced themselves, explained why they were there, and asked if Luken would be willing to discuss the matter in a more private setting. Luken agreed. The agents asked if Luken would be willing to reconvene at his home to discuss the matter further, and allowed him to drive there in his own vehicle. The agents left Luken
Validity of the Search
Agent Boone obtained written consent and a search warrant from a State Magistrate Judge before he forensieally examined Defendant Luken’s computer. Nevertheless, Luken asserts the search is invalid for several reasons.
Consent to Search The Computer
Mr. Luken signed a very basic written consent to search his computer on July 25, 2005. See EX 1. The written consent states, “I, Jon Luken give law enforcement the permission to seize & view my Gateway computer.” Luken claims this written consent was not voluntarily given, and is insufficient to allow a forensic examination of the computer’s hard drive.
Voluntariness
A consent to search is valid if the “totality of the circumstances demonstrates that the consent was voluntary.”
United States v. Chaidez,
It is recalled from Mr. Luken’s initial appearance that he is thirty-four years old. He has two years of college education. At the time of his interview with Agent Boone, it was 11:00 a.m., he was at work, and there is no evidence he was intoxicated or under the influence of drugs. Mr. Luken had not been informed of his Miranda rights and had no significant prior experience with the criminal justice system. There was no specific evidence presented regarding the length of the interview. There was no indication that Mr. Luken was threatened or physically intimidated by any of the three law enforcement officers who were present. There were no promises or misrepresentations made to Mr. Luken. Mr. Luken was not in custody or under arrest when he gave consent for the search, and he was in the driveway of his own home (albeit in Agent Boone’s unlocked vehicle). Significantly, in the month that elapsed after Mr. Luken gave consent until the computer was actually forensically examined, Mr. Luken spoke to Agent Boone several times about other matters relating to the case, but never revoked his consent. Taking all these factors into consideration, I find that Mr. Luken’s consent was voluntarily given.
Scope of Consent
Alternatively, Mr. Luken asserts that the written consent “formed no independent basis to justify the forensic examination of the hard drive because such a forensic evaluation exceeded] the scope of the ‘consent’ given by [him].” Defendant’s Brief (Doc. 21), p. 15. The relevant question here is “what would the typical reasonable person have understood by the exchange between the officer and the suspect?”
Florida v. Jimeno,
The Warrant to Search the Computer
Mr. Luken asserts the Government’s search is not validated by the warrant for
The Ten Day Time Limitation
The warrant to search Mr. Luken’s computer provides that it shall be executed within ten days of the date it was signed. EX 4. The warrant was signed on July 25, 2006. Agent Boone testified that within a few days of obtaining the search warrant, he removed the hard drive and sent it to Pierre for examination. TR 74. In his opinion, once the hard drive had been removed and sent to Pierre, the search had been executed. TR 76. The forensic examination was not completed until the end of August, when Agent Boone returned from his training session in Georgia.
Assuming the ten day limitation applies to the time in which the computer should have been forensically examined rather than simply seized and sent away for examination, the question becomes whether the search is invalid because it was performed approximately three weeks late. This issue is one which has been previously addressed by this Court.
(See
Report and Recommendation.
United States v. Bamberg,
CR 05-40012). The ten day requirement contained in the warrant executed by the state court Magistrate Judge was a South Dakota statutory requirement.
See
SDCL 23A-35-4. In a federal prosecution, however, “we evaluate a challenge to a search conducted by state authorities under federal Fourth Amendment standards.”
United States v. Bieri,
The Eighth Circuit has explained that
Generally, search warrants must be executed within ten days of being issued. This Court has stated that search warrants are to be executed promptly. Timeliness of execution should not be determined by means of a mechanical test with regard to the number of days from issuance, nor whether any cause for the delay was per se reasonable or unreasonable. Rather it should be functionally measured in terms of whether probable cause still existed at the time the warrant was executed. ... [0]ur review is limited to determining whether the officers were reasonable in their belief that probable cause still existed at the time the warrant was executed.
In determining whether probable cause dissipated over time, a court must evaluate the nature of the criminal activity and the kind of property for which authorization to search is sought....
United States v. Simpkins,
The federal equivalent of SDCL 23 A-35-4 is found in Fed.R.Crim.P. 41(e)(2)(A) (formerly Rule 41(c)). In the context of a nighttime search which violated the provisions of Rule 41(c), the Eighth Circuit has noted “suppression is not automatic if Rule 41(c)(1) is violated. Instead, we consider whether the defendant is prejudiced or reckless disregard of proper procedure is evident.”
United States v. Berry,
The case law on the subject is sparse, because it is a relatively new area of the law. Some guidance is offered, however, by other District Court decisions.
See e.g. United States v. Grimmett,
The court, however, does not find the failure to search the computer’s hard drive and computer disks within the 96-hour period violative of the Fourth Amendment ... [T]he Court need only consider if the defendant’s Fourth Amendment rights were violated, not whether state law was violated.... This is because the exclusionary rule is only concerned with deterring federal Constitutional violations.... The conduct of law enforcement officers in executing a search warrant is governed by the Fourth Amendment’s mandate of reasonableness. The Fourth Amendment does not provide a specific time in which a computer may be subjected to a government forensic examination after it has been seized pursuant to a search warrant. The court finds that the Fourth Amendment requires only that the subsequent search of the computer be made within a reasonable time. The court believes that it is reasonable to conduct a search of a computer off-site, after the return of the warrant.
See also United States v. Syphers,
Permission to Search for “Contraband” versus “Evidence”
Finally, Mr. Luken asserts the forensic evaluation of his computer was not permitted by the terms of the search warrant because the warrant (and the supporting affidavit) authorized a search for “contraband” but not “evidence” and the thumbnail images found on the hard drive constitute “evidence” but not “contraband.”
The top half of the affidavit in support of the warrant (EX 3) requested a warrant to search (1) computer software including but not limited to hard disks and floppy disks containing computer programs, including but not limited to software data flies, electronic mail files, software programs and files to receive or transmit photographs; and (2) Data contained on the hard drive within a Gateway computer bearing serial number 0026390265, to include images depicting minors engaged in sexually explicit conduct or exploitation of a minor, e mails containing transactions or communications pertaining to but not limited to purchasing
The lower half of the affidavit requested the warrant be issued to search the Gateway computer for (1) contraband, the fruits of a crime, or things otherwise criminally possessed; and (2) property designed or intended for use in, or which is or has been used as the means of committing a criminal offense.
The State Court Magistrate Judge issued the warrant, and found there was probable cause to believe that (1) contraband, the fruits of a crime, or things otherwise criminally possessed; and (2) property designed or intended for use in or which has been used as the means of committing a criminal offense would be found in the Gateway computer. The Judge ordered Boone to search the Gateway computer for: (1) computer software including but not limited to hard disks and floppy disks containing computer programs, including but not limited to software data files, electronic mail flies, software programs, and flies to receive or transmit photographs; and (2) data contained on the hard drive within the Gateway computer bearing serial number 0026390265, to include images depicting minors engaged in sexually explicit conduct or exploitation of a minor, videos and video clips of minors engaged in sexually explicit conduct or exploitation of a minor, e mails containing transactions or communications pertaining to but not limited to purchasing or obtaining data depicting minors engaged in sexually explicit conduct or exploitation of a minor.
Luken asserts the thumbnail images found on the hard drive were not contraband, but merely evidence of previous possession of contraband. Therefore, he argues, the search exceeded the scope of the warrant. The argument fails for a couple of reasons.
First, Luken’s argument is based upon the premise that because he was unaware of and/or unable to easily access the thumbnail images which remained on his computer hard drive, they were not “contraband” because he did not “possess” them and by implication, he did not violate the statute with which he is charged (18 U.S.C. § 2252A(a)5(B) and 18 U.S.C. § 2256(8)(A) — a question which is beyond the scope of this motion). This unique argument has never been addressed by the Eighth Circuit, but two Circuits which have addressed it have rejected it.
See United States v. Romm,
Second, the warrant authorized the forensic examination for the files found on the hard drive regardless of whether the blank for “evidence” was checked. The warrant explicitly authorized Agent Boone to search for property “designed or intended for use in, or which as been used as the means of committing a criminal offense,” and for “data contained on the hard drive ... within a Gateway computer bearing the serial number 0026390265 to include images depicting minors engaged in sexually explicit conduct or exploitation of a minor ...” The warrant, therefore, did not “fail altogether” to identify the things to be seized.
Groh v. Ramirez,
CONCLUSION
Mr. Luken’s encounter with law enforcement officials on July 25, 2006 did not rise to the level of a Fourth Amendment sei
NOTICE TO PARTIES
The parties have ten (10) days after service of this Report and Recommendation to file written objections pursuant to 28 U.S.C. § 636(b)(1), unless an extension of time for good cause is obtained. Failure to file timely objections will result in the waiver of the right to appeal questions of fact. Objections must be timely and specific in order to require de novo review by the District Court.
Thompson v.
Nix,
Nash v. Black,
Notes
. Webopedia Computer Dictionary defines a thumbnail as "a miniature display of a page to be printed,” which allows the user "to view the layout of many pages on the screen at once.”
. The Court notes that at the March 26, 2007, suppression hearing, Agent Boone testified that there was no indication of file-sharing software in this case. Suppression Transcript, p. 63.
. Rule 11(a)(2) further provides: “A defendant who prevails on appeal may then withdraw the plea.”
. On cross examination, Boone explained the "we" in his affidavit referred to Agent Begres and himself, while his narrative report only referred to his own conversations with Mr. Luken.
. Boone admitted after determined cross-examination that he did not believe he had probable cause for the search before his interview with Mr. Luken. TR 48.
. During the hearing, counsel inquired whether Boone ever informed Lulcen that he (Luken) could tell the Boone to leave. Boone did not so advise Luken, but such an admonition would not have made much sense at the time, because the two men were sitting in Boone’s vehicle.
