Chad Alen Mutschelknaus entered a conditional guilty plea to one count of possession of child pornography. He now appeals the denial of his motions to suppress, challenging both the sufficiency of the search warrant application and the timing of the officers’ forensic analysis of his seized computer. We affirm.
I. BACKGROUND
An investigation into the distribution of child pornography led law enforcement officers to a computer user in Aaska going by the online identity “Aonechee.” A examination of Aonechee’s computer revealed that he had been distributing child pornography through an online photo-sharing program. Aonechee gave law enforcement officers permission to adopt his online identity. Using his identity, officers sent Mutschelknaus a message claiming that Aonechee’s collection of images had been lost after a computer crash. In response, Mutschelknaus sent a total of 236 images, saying that he was “just sending what you sent me at one time.” Nearly all of the images depicted children engaged in sexual acts or in sexually explicit poses.
Officers traced the Internet Protocol address of the computer sending these images to the home of Mutsehelknaus’s girlfriend. They then informed Immigration and Customs Enforcement Special Agent Michael Ael about the exchange, forwarding him a disk with the images Mutschelknaus sent. Special Agent Ael applied for a search warrant for the home of Mut *828 schelknaus’s girlfriend on December 12, 2007. The federal magistrate judge issued the warrant, which required that the search of the home be performed within ten days. The magistrate judge also allowed officers the additional sixty days they requested to examine forensically any computer equipment seized. Federal agents searched the home and seized a computer that same day. When officers later examined the computer, more than ten days later but within the sixty-day time frame, they discovered images of child pornography.
A grand jury indicted Mutschelknaus on one count of distribution of child pornography, 18 U.S.C. § 2252(a)(2) and (b)(1), and one count of possession of child pornography, 18 U.S.C. § 2252(a)(4)(B) and (b)(2). After the district court 1 denied Mutsehelknaus’s two motions to suppress the evidence from the December 12, 2007 search and the subsequent examination of the seized computer, Mutschelknaus entered a conditional guilty plea to the possession of child pornography count. The district court sentenced him to 63 mpnths’ imprisonment.
II. DISCUSSION
On appeal, Mutschelknaus challenges the district court’s denial of both of his motions to suppress. First, he argues that the search warrant application provided insufficient information to permit the magistrate judge to find probable cause to justify the search. In particular, he argues that the application should have included either the images themselves or a more detailed description of the images Mutschelknaus sent to allow a magistrate independently to determine that the images were child pornography. Second, he argues that the sixty-day extension allowed for officers to analyze the seized computer violated Rule 41 of the Federal Rules of Criminal Procedure. “On appeal from the denial of a motion to suppress, we review a district court’s findings of fact for clear error and its legal conclusions— including its probable cause determination — de novo.”
United States v. El-Alamin,
We reject Mutschelknaus’s first argument because the search warrant application contained sufficiently detailed descriptions of the images Mutschelknaus sent to permit the issuing judge to make an independent finding of probable cause. “An affidavit establishes probable cause for a warrant if it ‘sets forth sufficient facts to establish that there is a fair probability that contraband or evidence of criminal activity will be found in the particular place to be searched.’ ”
United States v. Snyder,
The search warrant application described the development of the investigation, including law enforcement officers’ use of the online identity of Aronechee, a person known to distribute child pornography. In this case, the law enforcement officer posing as Aronechee provided Special Agent Arel with copies of the images that Mutschelknaus sent. Special Agent Arel’s application described the images as “appearing] to depict children engaged in sexually explicit acts” and noted that one image included “a young female child performing oral sex on an adult male.” The application also stated that “[n]early every image sent ... depicted children engaged in sexual acts or in sexually explicit poses.” Additionally, the search warrant application included information about Special Agent Arel’s training and experience in investigations of child pornography and exploitation. The information in the application was sufficient to permit a magistrate judge independently to conclude that there was probable cause to believe that evidence of criminal activity would be found at the home.
Mutschelknaus argues that the images described “could have been virtual children or adults depicted as children,” and since such images do not fall within the statutory definition of child pornography, the warrant application did not establish a fair probability of finding evidence of criminal activity. However, Special Agent Arel was trained in child pornography investigations and described the images as involving children.
See United States v. Stults,
Mutschelknaus also argues that the sixty-day extension that the magistrate judge allowed for examining the seized computer violated Rule 41 of the Federal Rules of Criminal Procedure, which requires that warrants be executed within ten days of issuance. The Government argues that Rule 41 does not govern subsequent examinations of seized items and that because the computer was seized within ten days, Rule 41’s requirements were met. Regardless of whether Rule 41 was violated, however, “noncompliance with Rule 41 does not automatically require exclusion of evidence in a federal prosecution. Instead, exclusion is required only if a defendant is prejudiced or if reckless disregard of proper procedure is evident.” United States v. Spencer, 439 *830 F.3d 905, 913 (8th Cir.2006) (internal citations and quotation marks omitted).
Mutschelknaus does not argue that the sixty-day extension prejudiced him. Our recent analysis in
United States v. Brewer
applies with equal force to the facts of Mutschelknaus’s case. “The computer media at issue here were electronically-stored files in the custody of law enforcement. Because of the nature of this evidence, the ... delay in searching the media did not alter the probable cause analysis.”
United States v. Brewer,
III. CONCLUSION
For the foregoing reasons, we affirm the district court’s denial of Mutschelknaus’s motions to suppress.
Notes
. The Honorable Daniel L. Hovland, Chief Judge, United States District Court for the District of North Dakota.
