OPINION
Lyman Wagers pleaded guilty to receiving and possessing child pornography. On February 11, 2005 he was sentenced to 180 months in prison. The sentence conformed to the 15-year mandatory minimum for second offenders under 18 U.S.C. § 2252(b)(1). Arguing that the three search warrants leading to evidence incriminating him were not supported by probable cause, he appeals the trial court’s denial of his motion to suppress evidence seized pursuant to the warrants.
See United States v. Wagers,
I
This is Wagers’s second conviction on child pornography charges. He was convicted in 1997 of one count of possession of child pornography and sentenced in the United States District Court for the Eastern District of Kentucky to 366 days in prison, plus three years of supervised release. In the case now before us, Wagers, a 57-year-old erstwhile lawyer and C.P.A., pleaded guilty to one count of conspiracy to receive child pornography, nineteen counts of receiving child pornography, and one count of possession of child pornography. The terms of his guilty plea allowed him to appeal the conviction on the grounds that the search warrants used in the investigation were not supported by probable cause.
A Homeland Security sting operation led to Wagers’s arrest. From March to August 2003, federal agents purchased subscriptions to and visited websites available at redlagoon.com, video2000.com, and *537 darkfeeling.com. While visiting these sites, the agents found images of child pornography. They obtained records from the billing services of these sites. These records revealed that Wagers had purchased subscriptions to redlagoon.com on June 30, 2002; to video2000.com on March 22, 2003 and again on June 3, 2003; and to dark-feeling.com on April 15, 2003. Though the lengths of Wagers’s subscriptions are not clear from the record, based on the prices he paid for his subscriptions, as compared to the prices the agents paid for one-month subscriptions, it appears that each of Wagers’s subscriptions was for between one and two months of membership. This inference has been offered by Wagers and is not contested by the government. The agents who examined the websites did so by purchasing one-month subscriptions on March 26, 2003, August 1, 2003, and July 21, 2003, respectively.
On April 5, 2004, federal agents executed a search warrant at the home of Lyman Wagers (“Mimosa Lane” or “home”). After finding child pornography on Wagers’s home computer, agents swore out another affidavit for his office. On April 7, 2004, agents obtained a separate warrant for his office (“Harrodsburg Rd.” or “office”). The same day, he was arrested for possession of child pornography. The following day, agents obtained a third search warrant, directed to America Online, the company supporting Wagers’s email account (“AOL” or “email”). Wagers’s guilty plea and conviction are based on images found on his home computer, at least some of which, he concedes, were transmitted via his American Online account.
The home and office affidavits were both more than thirty pages long and quite detailed. The AOL affidavit is seven pages and less detailed, but it states that agents had connected Wagers’s AOL email address to his home address and to the purchase of subscription memberships to all of the websites containing offending material. It further states that the affi-ant’s “experience and training” lead him to believe that Wagers uses his AOL account to “order, arrange for the payment of, and arrange for the receipt of child pornography .... ” Id. at 162. The warrants and their supporting affidavits alleged that Wagers had bought subscriptions to websites that were found at a later date to display child pornography. They did not specifically allege that Wagers had viewed the sites or that he had accessed unlawful content on them.
A federal grand jury indicted Wagers on May 6, 2004. He moved to suppress the evidence seized at his home and office. The district court denied the motion without a hearing. Wagers pleaded guilty to all counts, conditioning the plea on his right to appeal the ruling on the motion to suppress.
The district court sentenced Wagers to 180 months in prison on February 11, 2005. The guidelines range was 97 to 121 months, but the sentence conformed to the 15-year mandatory minimum for second offenders required by 18 U.S.C. § 2252(b)(1).
Wagers timely appealed his conviction, challenging the district court’s denial of his motion to suppress.
II
This court reviews a district court’s factual findings supporting its denial of a motion to suppress for clear error. It reviews
de novo
the district court’s determination as to the reasonableness of the search as a question of law.
United States v. Carpenter,
Ill
Wagers’s first major argument is that the affidavits were not supported by probable cause for three reasons:
1) the affidavits supporting the search warrants did not allege that he had owned website memberships at a time when illegal images were mounted on the sites or that he had accessed the sites during the times when illegal images were available;
2) the affidavits do not adequately connect the illicit activity to his home, office, or AOL account; and
3) the affidavit for the home warrant improperly relied on the fact of Wagers’s prior conviction.
In this section, we address each component of this argument in turn. In section IV of this opinion we address the second major argument of Wagers’s appeal.
Wagers notes that the agents’ subscriptions post-dated the expiration of all but possibly one of his own subscriptions. He argues that the affidavits supporting the search warrants merely infer that there were unlawful images on those sites at the time of his earlier subscriptions.
To assess how much of an inference was made in issuing the search warrants, it is useful to observe that roughly five months elapsed between the end of Wagers’s subscription to redlagoon.com and the commencement of the agents’ subscription. Approximately one month passed before their subscriptions to darkfeeling.com. And it is possible that only a few days elapsed between the end of Wagers’s second subscription to video2000.com and the government’s. Indeed, if Wagers’s subscription was for two months (which, according to his own briefs uncontested calculation of “between one and two months,” is possible), there would be a short overlap between the end of his second subscription and the government’s subscription. Whether or not there was an actual overlap between subscriptions, an inference based on the difference of a few days-in the case of video2000.com-or of roughly 30 days-in the case of darkfeeling.com-is not very hard to make, even setting aside the perhaps more tenuous inference based on research on redlagoon.com that was five months after Wagers’s known use.
Wagers claims in his brief (Appellant’s Brief, 12) that these three websites contained both legal and illegal images. The government claims this assertion is false. (Appellee’s Brief, 12) Wagers does not offer clear support for his statement in the record. Neither, for that matter, does the United States. The government points only to two printouts in the Joint Appendix submitted to this court, of the homepages of darkfeeling.com and redlagoon.com, both of which announce that
all
models featured on the sites are “14 or younger.” (JA 195-96) These homepage reproductions are highly suggestive but not conclusive. Advertisers have been known to mislead before. Wagers rebuts, moreover, that the affidavits never state that the sites offer exclusively illegal content. Appellant’s Reply Brief, 7. Neither party’s view is definitive. But the district court was correct in concluding that this ques
*539
tion is not dispositive. Probable cause to search for illicit pornography in Wagers’s home, office, and email account existed even without a statement that these three websites contained only illegal images.
See
Wagers argues that the affidavits do not connect the alleged crime to the places searched. For a search warrant to be valid, the place to be searched must be connected to the crime alleged.
E.g., United States v. Laughton,
Second, he notes that his subscriptions to video2000.com and darkfeehng.com were made on a checking card with a billing address of 1608 Harrodsburg Rd. in Lexington. Therefore, he argues, his subscriptions were connected only to his business office, not to his home, even though his home was the subject of the first warrant. However, the affidavit sworn by Homeland Security Special Agent Sean Lichner in support of the April 5, 2005 search warrant of the Mimosa Lane home notes specifically that the investigation into the subscription records of the three websites revealed that a subscriber’s email address “Spike2000IU@aol.com” was connected to 1608 Harrodsburg Rd. and 3813 Mimosa Lane, both in Lexington, Kentucky. The affidavit also avers that two credit card numbers and a phone number associated with the Mimosa Lane address were obtained from the websites’ billing service provider, and that these data were soon connected to the name Lyman Wagers.
In addition, the affidavit avers that the investigation revealed that Wagers used Insight Communications as his home Internet service. 1 Id. at 99. It further avers that an IP address assigned by Insight to Wagers was used to purchase both memberships at video2000.com and the membership at darkfeeling.com. Ibid. Because this IP address was assigned by Insight, and because it appears from the wording of the affidavit that Wagers used Insight at his home but not his office, his home would be well within the ambit of a properly issued search warrant. Even if the home were only one of two locations-home and office-served by Insight, there would be sufficient evidence to support probable cause. Given the specificity of the investigation’s results and the content of the affidavit, the warrant was valid.
Wagers cites
United States v. Savoca,
It is true that, in
United States v. Helton,
Our opinion today is consistent with the views of our sister circuits. The Second and Fifth Circuits, for example, have noted that evidence that a person has visited or subscribed to websites containing child pornography supports the conclusion that he has likely downloaded, kept, and otherwise possessed the material.
United States v. Martin,
As to the third warrant in his case, the one served on AOL, Wagers notes that the affidavit sworn in support of this warrant observes mostly that he subscribed to and visited websites. The only reference to email in the affidavit is the affiant’s stated “belie[f] that Wagers uses the
spike2000Ji.U@aol.com
email account to order, arrange for the payment of, and arrange for the receipt of child pornography.” (JA 162, quoted at Appellant’s Brief, 17) Wagers also used an IP address furnished by AOL to sign up for at least one of his subscriptions. An offender without relatively sophisticated knowledge of transmittal or downloading technology might reasonably be expected to use email to send and receive pornographic images or at least web links to them. Probable cause does require a sufficient nexus between the location to be searched and the evidence sought.
United States v. McLevain,
Wagers’s final argument on the warrant’s sufficiency is that the affidavit for the home warrant “relies heavily upon the fact that Wagers had a previous child pornography conviction.” (Appellant’s Brief, 15) Though the affidavit supporting that warrant does take note of his prior offense over less than two full pages, the document is 32 pages long, plus four pages of attachments, and the discussion of his prior offense is not the preponderant support for the application for the warrant. Implying that a prior conviction cannot properly raise an inference of later criminal activity, even for an identical or nearly identical offense, Wagers argues that an “individual’s criminal history ... is not the appropriate focus for a search warrant affidavit.” Appellant’s Brief, 16. Wagers’s only citation of law for this proposition is
Mays v. City of Dayton,
IV
Wagers’s secondary point is that the Internet is an “ever-changing global method of communication” that “heighten[s]” the “importance of the probable *542 cause requirement.” (Appellant’s Brief, 8) Some websites contain both lawful images and unlawful images. He argues that the Internet presents too many opportunities for search warrants to be issued where innocent activity and criminal activity may be easily confused or accidentally mixed (e.g., by visiting websites containing legal and illegal images). His argument here seems to be that the Internet is a new and different entity, and that such an entity should be analyzed cautiously by law enforcement and courts. A lurking point, though Wagers never states it explicitly (most likely because he was caught red-handed with at least six hundred graphic and disturbing images of children having- or being forced to have-sex), is that the Internet may present too many opportunities for a search warrant to be issued where innocent activity (viewing lawful pornography) and criminal activity (viewing unlawful pornography) may be easily confused or accidentally mixed, as by visiting websites that may contain lawful and unlawful pornography. His contention implies rejection of the common law’s capacity to handle significant innovation and novelty. 2
The tools available to us are adequate to the task of helping us understand the risks posed to Fourth Amendment rights by the type of law enforcement we see in the appeal before us. As it applies to the facts of Wagers’s case, the Internet does not present a murky new innovation without adequate analogs in the pre-“wired” world. In essence, Wagers’s Internet argument is just a variation of the “simply in the wrong place at the wrong time” refrain. This type of argument is not infrequently put forward in other contexts, for example by persons attacking search warrants based, in part, on their presence in a shady part of town, near the scene of a murder, or any number of locales or factors that could also have an innocent explanation. Indeed, it is a commonplace part of judging attacks on convictions as well as warrants (with their lower standard of proof), that the law can properly judge evidence that could be consistent with innocence as well as guilt, and that our system can make a valid determination as to which obtains in a particular fact pattern. It is well established in this court that “the probable cause requirement does not require that every contrary hypothesis be excluded.”
United, States v. Alfano,
To press his argument that the Internet poses novel risks to constitutional law enforcement, Wagers relies heavily on the Ninth Circuit’s recent decision in
United States v. Gourde,
His reliance on
Gourde
is flawed for three compelling reasons. First, Gourde appears to have had no prior convictions for child pornography. Wagers does. Following questioning pursuant to his 1997 arrest, the FBI learned that Wagers had transmitted “many more than [four]” images via his AOL “internet connection” (though it is unclear whether this transmittal refers to “email” or just his means of “surfing”) in the years preceding that arrest.
3
Second, the affidavit supporting the search warrant in
Gourde
expressly noted that the website visited in that case, Lolitgurls.com, featured images of “adult pornography, child pornography, and child erotica.” (Affidavit of David J. Moriguchi, filed January 29, 2003, page 3) The affidavits supporting the search warrants in our case note only that the websites visited by Wagers featured illegal images. They are silent on whether these sites also included legal pornography. Third, the
Gourde
ruling was substantially overturned en banc.
United States v. Gourde,
V
Because the district court properly denied Wagers’s motion to suppress evidence, we AFFIRM his conviction.
Notes
. The affidavit notes that Wagers uses Insight as the Internet provider for his home. It also notes that Insight had his office address for billing purposes. However, it appears from the wording of the affidavit that Wagers did not use Insight at his office, but only at his home.
. This capacity has, at times, been considered perfect.
See
Joseph H. Beale,
A Treatise on the Conflict of Laws
§ 3.2, 4.12 (1935) (describing the common law as a seamless web of interlocking principles which, properly applied, can fully accommodate intelligent analysis of a case arising from commerce with any lechnological invention, including, illustratively, the streetcars of mid-nineteenth century Boston, which Chief Justice Lemuel Shaw deftly analyzed using existing common law analysis in
Commonwealth v. Temple,
. For precision and completeness, it bears noting that the defendant admitted to having "transmitted many more than that number,” where "that number” equaled "four.”
