Lead Opinion
Patrick J. Carey was charged with one count of possessing a computer hard drive that contained three or more images of child pornography produced with materials shipped in interstate commerce. See 18 U.S.C. § 2252A(a)(5)(B) (1996).
I.
Mr. Carey had been under investigation for some time for possible sale and possession of cocaine. Controlled buys had been made from him at his residence, and six weeks after the last purchase, police obtained a warrant to arrest him. During the course of the arrest, officers observed in plain view a “bong,” a device for smoking marijuana, and what appeared to be marijuana in defendant’s apartment.
Alerted by thése items, a police officer asked Mr. Carey to consent to a search of his apartment. The officer said he would get a search warrant if Mr. Carey refused permission. After considerable discussion with the officer, Mr. Carey verbally consented to the search and later signed a formal written consent at the police station. Because he was concerned that officers would “trash” his apartment during the search, Mr. Carey gave them instructions on how to find drug related items.
The written consent to search authorized Sergeant William Reece “to have conducted a complete search of the premises and property located at 3225 Canterbury # 10, Manhattan, KS 66503.” It further provided, “I do freely and voluntarily consent and agree that any property under my control ... may be removed by the officers ... if said property shall be essential in the proof of the commission of any crime in violation of the Laws of the United States.... ” Armed with this consent, the officers returned to the apartment that night and discovered quantities of cocaine, marijuana, and hallucinogenic mushrooms. They also discovered and took two computers, which they believed would either be subject to forfeiture or evidence of drug dealing.
The computers were taken to the police station and a warrant was obtained by the officers allowing them to search the files on the computers for “names, telephone numbers, ledger receipts, addresses, and other documentary evidence pertaining to the sale and distribution of controlled substances.” Detective Lewis and a computer technician searched the contents of the computers, first viewing the directories of both computers’ hard drives. They then downloaded onto floppy disks and printed the directories. Included in the directories were numerous files with sexually suggestive titles and the label “JPG.”
Undaunted, Detective Lewis continued to explore the directories and encountered some files he “was not familiar with.” Unable to view these files on the computer he was using, he downloaded them to a disk which he placed into another computer. He then was “immediately” able to view what he later described as a “JPG file.” Upon opening this file, he discovered it contained child pornography.
Detective Lewis downloaded approximately two hundred forty-four JPG or image files. These files were transferred to nineteen disks, only portions of which were viewed to determine that they contained child pornography. Although none of the disks was viewed in its entirety, Detective Lewis looked at “about five to seven” files-on each disk. Then, after viewing the contents of the nineteen disks in that fashion, he returned to the computers to pursue his original task of looking for evidence of drug transactions.
Mr. Carey moved to suppress the computer files containing child pornography. During the hearing on the motion, Detective Lewis stated although the discovery of the JPG files was completely inadvertent, when he saw the first picture containing child pornography, he developed probable cause to believe the same kind of material was present on the other image files. When asked why, therefore, he did not obtain a warrant to search the remaining image files for child pornography, he stated, “that question did arise, [a]nd my captain took care of that through the county attorney’s office.” No warrant was obtained, but the officer nonetheless continued his search because he believed he “had to search these files as well as any other files contained [in the computer].”
Upon further questioning by the government, Detective Lewis retrenched and stated until he opened each file, he really did not know its contents. Thus, he said, he did not believe he was restricted by the search warrant from opening each JPG file. Yet, after viewing a copy of the hard disk directory, the detective admitted there was a “phalanx” of JPG files listed on the directory of the hard drive.
At the close of the hearing, the district court ruled from the bench. Without any findings, the court denied the motion, say: ing: “[a]t this point, the Court feels that the ... Defendant’s Motion to Suppress ... would be—should be denied. And that will be the order of the Court, realizing that they are close questions.” No subsequent written order containing findings of fact or conclusions of law was filed.
II.
We review the denial of a motion to suppress for clear error. See United States v. Griffin,
Mr. Carey argues the search of the computers transformed the warrant into a “general warrant” and resulted in a gener-' al and illegal search of the computers and
The essential inquiry when faced with challenges under the Fourth Amendment is whether the search or seizure was reasonable—reasonableness is analyzed in light of what was reasonable at the time of the Fourth Amendment’s adoption.... It is axiomatic that the 4th Amendment was adopted as a directed response to the evils of the general warrants in England and the writs of assistance in the Colonies.
O’Rourke v. City of Norman,
Mr. Carey argues that examined against history and case law, the search constituted general rummaging in “flagrant disregard” for the terms of the warrant and in violation of the Fourth Amendment. United States v. Foster,
The government responds that the plain view doctrine authorized the police search. See Coolidge v. New Hampshire,
(1) the officer was lawfully in a position from which to view the object seized in plain view; (2) the object’s incriminating character was immediately apparent— i.e., the officer had probable cause to believe the object was contraband or evidence of a crime; and (3) the officer had a lawful right of access to the object itself.
United States v. Soussi,
According to the government, “a computer search such as the one undertaken in this case is tantamount to looking for documents in a file cabinet, pursuant to a valid search warrant, and instead finding child pornography.” Just as if officers has seized pornographic photographs from a file cabinet, seizure of the pornographic computer images was permissible because officers had a valid warrant, the pornographic images were in plain view, and the incriminating nature was readily apparent as the photographs depicted children under the age of twelve engaged in sexual acts. The warrant authorized the officer to search any file because “any file might well have contained information relating to drug crimes and the fact that some files might have appeared to have been graphics files would not necessarily preclude them from containing such information.” See Erickson v. Commissioner of Internal Revenue,
The Supreme Court has instructed, “the plain view doctrine may not be used to extend a general exploratory search from one object to another until something incriminating at last emerges.” Coolidge,
In his own words, however, his suspicions changed immediately upon opening the first JPG file. After viewing the contents of the first file, he then had “probable cause” to believe the remaining JPG files contained similar erotic material. Thus, because of the officer’s own admission, it is plainly evident each time he opened a subsequent JPG file, he expected to find child pornography and not material related to drugs. Armed with this knowledge, he still continued to open every JPG file to confirm his expectations. Under these circumstances, we cannot say the contents of each of those files were inadvertently discovered. Moreover, Detective Lewis made clear as he opened each of the JPG files he was not looking for evidence of drug trafficking. He had temporarily abandoned that search to look for more child pornography, and only “went back” to searehing for drug-related documents after conducting a five hour search of the child pornography files.
We infer from his testimony Detective Lewis knew he was expanding the scope of his search when he sought to open the JPG files. Moreover, at that point, he was in the same position as the officers had been when they first wanted to search the contents of the computers for drug related evidence. They were aware they had to obtain a search warrant and did so. These circumstances suggest Detective Lewis knew clearly he was acting without judicial authority when he abandoned his search for evidence of drug dealing.
Although the question of what constitutes “plain view” in the context of computer files is intriguing and appears to be an issue of first impression for this court, and many others, we do not need to reach it here. Judging this case only by its own facts, we conclude the items seized were not authorized by the warrant. Further, they were in closed files and thus not in plain view.
We do note the recent decision in United States v. Turner,
We cannot accept the government’s contention that the sexually suggestive image which suddenly came into “plain view” on the computer screen rendered [the defendant]^ computer files “fair game” under a consensual search simply because the [neighbor’s] assault had a sexual component.... The critical consideration in this regard is that the detectives never announced, before [the defendant] gave his consent, that they were investigating a sexual assault or attempted rape.
Id.
As in Turner, the government argues here the consent Mr. Carey gave to the search of his apartment carried over to the contents of his computer files. We disagree. The arresting officer sought permission to search only the “premises and property located at 3225 Canterbury # 10.” Thus, the scope of the consensual search was confined to the apartment itself. The seizure of the computer was permitted by Mr. Carey’s consent “that any property under my control ... may be removed by the officers ... if said property shall be essential in the proof of the commission of any crime.... ” This agreement, by its own terms, did not permit the officer to open the files contained in the computer, a fact he obviously recognized because he obtained a proper warrant to search for drug related evidence before he began opening files.
The warrant constrained the officer to search for items it listed. See United States v. Reyes,
At oral argument the government suggested this situation is similar to an officer having a warrant to search a file cabinet containing many drawers. Although each drawer is labeled, he had to open a drawer to find out whether the label was misleading and the drawer contained the objects of the search. While the scenario is likely,
Further, because this case involves images stored in a computer, the file cabinet analogy may be inadequate. “Since electronic storage is likely to contain a greater quantity and variety of information than any previous storage method, computers make tempting targets in searches for incriminating information.” Raphael Winick, Searches and Seizures of Computers and Computer Data, 8 Harv. J.L. & Tech. 75, 104 (1994). Relying on analogies to closed containers or file cabinets may lead courts to “oversimplify a complex area of Fourth Amendment doctrines and ignore the realities of massive modern computer storage.” Id. Alternatively, courts can acknowledge computers often contain “intermingled documents.” See United States v. Tamura,
Because in Mr. Carey’s case, officers had removed the computers from his control, there was no “exigent circumstance or practical reason to permit officers to rummage through all of the stored data regardless of its relevance or its rela
III.
We must conclude Detective Lewis exceeded the scope of the warrant in this case. His seizure of the evidence upon which the charge of conviction was based was a consequence of an unconstitutional general search, and the district court erred by refusing to suppress it. Having reached that conclusion, however, we are quick to note these results are predicated only upon the particular facts of this case, and a search of computer files based on different facts might produce a different result.
Although other errors have been raised, we do not reach them because of our conclusion the seizure of evidence was beyond the scope of the warrant. We specifically do not reach the issue of whether Mr. Carey voluntarily consented to the search of his apartment. The district court made no findings on this question, and we are not wont to opine on what would be an immaterial point in this appeal.
REVERSED and REMANDED for further proceedings in accordance with this opinion.
Notes
. As amended in 1998, the statute now applies to any person who knowingly possesses a computer disk "that contains an image of child pornography” produced with materials shipped in interstate commerce. See 18 U.S.C. § 2252A(a)(5)(B) (1998). Because Mr. Carey was charged on August 6, 1997, the 1996 version of the statute applies in this case.
. Detective Lewis later testified at the time he discovered the first JPG or image file, he did not know what it was nor had he ever experienced an occasion in which the label "JPG” was used by drug dealers to disguise text files. He stated, however, image files could contain evidence pertinent to a drug investigation such as pictures of "a hydroponic growth system and how it's set up to operate."
. We note the JPG files shown on Detective Lewis’ directory printout featured sexually suggestive or obscene names, many including the word "teen” or "young." The detective testified drug dealers often obscure or disguise evidence of their drug activity.
. Given the officer's testimony that he inadvertently discovered the first image during his search for documents relating to drug activity, our holding is confined to the subsequent opening of numerous files the officer knew, or at least expected, would contain images of child pornography.
. See also United States v. Maxwell,
. United States v. Tamura,
. The government contends Mr. Carey would have been "equally guilty had he possessed this material in the form of a book, a magazine, or a film.’’ And in United States v. Reyes,
.See Raphael Winick, Searches and Seizures . of Computers and Computer Data, 8 Harv. J.L. & Tech. 75, 108 (1994) ("Computer programs store information in a wide variety of formats. For example, most financial spreadsheets store information in a completely different , format than do word processing programs. Similarly, an investigator reasonably familiar with computers should be able to distinguish database programs, electronic mail files, telephone lists and stored visual or audio files from each other. Where a search warrant seeks only financial records, law enforcement officers should not be allowed to search through telephone lists or word processing files absent a showing of some reason to believe that these files contain the financial records sought. Where relying on the type of computer files fails to narrow the scope of the search sufficiently, the magistrate should review the search methods proposed by the investigating officers."); see also Tamura,
. Cf. United States v. Hargus,
. Cf. United States v. Hall,
Concurrence Opinion
concurring.
I join in the court’s opinion, but write separately to emphasize that the questions presented in this case are extremely close calls and, in my opinion, are totally fact driven.
First, absent Detective Lewis’ testimony, I would not suppress the evidence. “The plain view doctrine may not be used to extend a general exploratory search from one object to another until something incriminating at last emerges.” Coolidge v. New Hampshire,
In contrast, if the record showed that Detective Lewis had merely continued his search for drug-related evidence and, in doing so, continued to come across evidence of child pornography, I think a different result would be required. That is not what happened here, however.
Second, while agreeing with the majority that Defendant’s consent to the search of his apartment did not carry over to his computer hard drive, I write separately to explain why I think the scope of Defendant’s consent is limited to evidence of drug-related activity. The scope of a consensual search is “generally defined by its expressed object.” Florida v. Jimeno,
The waiver signed by Defendant granted the officers permission to search the “premises and property located at 3255 Canterbury # 10” and authorized the officers to remove any property “if said property shall be essential in the proof of the commission of any crime....” The officer testified that after he arrested Defendant, he told him that “based on what I had just observed in his apartment that I was going to apply for a search warrant.” The officer had just found, in plain view, a bong typically used for smoking marijuana and a small quantity of what appeared to be marijuana. The officer then explained to Defendant that he could consent to a search instead of the officer obtaining a warrant. Defendant told the officer he was unsure. En route to the police station, Defendant asked several questions about the search. Upon arrival at the station, Defendant indicated that he wished to consent. He also told the officer where he would find additional drugs, a scale, a firearm and cash. In addition, Defendant told him where he would find a pornographic videotape. The officer responded that he “couldn’t care less about his pornographic videotapes” and “that wasn’t of concern to me.”
In light of the officer’s conversations with Defendant, a reasonable person would conclude that the statements by the officer limited the scope of the request to drugs and drug-related items in the apartment. See Elliott,
Lead Opinion
ORDER ON PETITION FOR REHEARING
April 30, 1999.
This matter is before the court on the government’s petition for rehearing by the panel. Because the government contends we failed to properly follow Horton v. California,
