Defendant Wesley Joseph Slanina (“Sla-nina”) appeals his conviction for possession of child pornography. Slanina argues that the district court should have suppressed evidence obtained from computer equipment in his office and home, as well as his statements to law enforcement.
I.
Slanina worked as the Fire Marshall for Webster, Texas for nine years. As Fire Marshall, his duties included public safety and fire prevention, fire inspections, review of city plans, enforcement of building codes, and handling of arson related calls. Additionally, he served as the Emergency Management Coordinator, concentrating on hurricanes and explosions. Slanina’s immediate supervisor was Fire Chief Bruce Ure (“Ure”), who answered to the Public Safety Director, Mike Keller (“Kel
Prior to June 1999, Slanina’s desk was located in City Hall, where he had a city-provided computer with Internet access but no connection to the city’s intra-office network. When a new fire station was built, however, Slanina moved into his own office in the new station. He brought with him his old computer, but in the new fire station he had no Internet access or network connection. On Friday, June 11, 1999, Ryan Smith (“Smith”), the Management Information Systems Coordinator, began working to install the city network on the fire station computers. At around 5:00 p.m., Smith entered Slanina’s new office with a grand master key and attempted to continue his work. The computer was turned on, but a screen saver was in place. Smith moved the mouse and discovered that the screen saver was protected by a password. To bypass the screen saver password, Smith restarted the computer. When he rebooted, however, Smith found that Slanina had installed a BIOS password. Without this password, Smith was unable to immediately access the computer’s hard drive and could not install the network on Slanina’s computer.
Slanina had not come to work that Friday, as he was still recuperating from his recent surgery to have his wisdom teeth removed. Smith did not feel comfortable calling Slanina, so Ure himself phoned him. Ure informed Slanina that the computer technician was in his office attempting to install the network, but was unable to do so because of the password. Slanina initially balked, but after Ure indicated that Smith was already working overtime and that the job had to be completed that day, Slanina agreed to call Smith. On the phone with Smith, Slanina sounded nervous and hesitated before giving his password. He wanted to know exactly what Smith would do to his computer, and Smith promised that he was simply installing the network and configuring his computer to the server.
Having received the password, Smith then resumed his work on Slanina’s computer. In order to complete the task, Smith had to walk between Slanina’s office and the server room. Upon returning to the office, Smith unexpectedly encountered Slanina — just ten minutes after they had talked on the phone. Needless to say, Smith was surprised to see Slanina, his jaw still swollen from the surgery. Smith’s suspicions were further aroused when after he left the room, Slanina jumped back on his computer. Finally, when Slanina asked how much longer the network installation process would take, Smith lied, telling him that it would be another “couple of hours.” Smith overstated the time to give himself a chance to see if something was wrong.
When Slanina finally left, Smith saw that the email was running, but minimized
Before contacting Ure, Smith wanted to be certain that Slanina’s computer did have pornographic material on it. He conducted a search for JPEG files, which contain photographic images, and GIF files, which are used for other graphic images. His search located one such file in the Recycle Bin, and Smith restored the file. When he saw that it contained an image of adult pornography, he printed the file and attempted to contact Slanina’s superiors. Neither Ure nor Keller were available, though, and initially Smith was only able to reach the Assistant Fire Chief, Dean Spencer (“Spencer”). By the time Spencer arrived at the station, Smith had spoken to Ure, telling him that he had found child pornography on Slanina’s computer. Ure instructed him to secure the office, so at 7:00 p.m. Smith changed the lock on the door, turned the computer off, and left.
The next day, Smith spoke again to Ure, who by now had contacted Keller at an FBI conference in South Padre Island. Keller told Ure and Smith to remove the computer from the fire station and place it in his office, which was located in the police station. When they went to Slani-na’s office, Smith showed Ure the pornog-raphy
Keller told Slanina that he was not in custody and could leave at any time, but Slanina stayed with them. He admitted to accessing the newsgroups and downloading the pictures of child pornography. Keller explained that they would be contacting the FBI. Slanina promised to comply with the investigation, saying that he wanted to get the process going. Although he was embarrassed, Slanina said that he was relieved that it was finally out in the open. He confessed that he had some more “stuff’ at his home, which Keller understood to mean more pornography. Keller told Slanina that he could either consent to a search of his home computer or they could obtain a search warrant. Wanting to be present when the police came to his home and confronted his family, Slanina consented and accompanied Keller, Ure and Smiley to his house. Once there, Sla-nina spoke with his wife and Keller informed her that her husband was under investigation for child pornography. Sla-nina then led them to his study, where he invited them to take the computer, zip drives and disks. After they gathered the equipment, Keller indicated to Slanina that he should return with them.
When they got back to the police station, Slanina waited in a conference room while Keller performed some administrative tasks related to the Internal Affairs investigation. Keller then searched the home computer and found more child pornography. Several weeks later, they discovered that the home computer actually belonged to the city. At about 9:00 a.m., Keller told Detective Sergeant Charles Propst (“Propst”) to interview Slanina. He stated that although Slanina was not yet under arrest, they had found child pornography on his computer. Propst led Slanina into an interview room, where Sergeant Shari Burrows (“Burrows”), a Galveston child protective services officer, was present. The interview was taped, and Slanina was reminded again that he was not under arrest and was free to leave at any time. Nevertheless, pursuant to the Galveston County District Attorney’s policy, Burrows provided Slanina with Miranda warnings. Slanina was fully cooperative and, at the end of the interview, signed a written statement. He then returned to Keller’s office and offered to provide whatever help they needed. Finally, Slanina indicated that he wanted to leave, and was told that he could. Two days later, he was fired.
The office and home computer equipment, drives, and disks were turned over to the FBI, which examined active files and recovered deleted files from the hard drives. Each computer had two hard drives. Child pornography was found on each hard drive, and all together these
On February 14, 2000, Slanina was indicted on two counts of possession of child pornography under 18 U.S.C. §§ 2252A(a)(5)(B), 2256. He moved to suppress all statements made by him to law enforcement officers and all evidence obtained from his office computer equipment and home computer equipment. At the conclusion of the suppression hearing, the district court denied the motion, stating:
I find that [at] the time and occasion in question back on June the 11th, 1999, the defendant did not have a reasonable and legitimate expectation of privacy in the city’s computer located at the defendant’s office at the city facilities. This is shown by the defendant’s actions on that date.
I also find that the defendant gave a knowing, voluntary, and intelligent consent to the search and seizure of the city’s computer at the defendant’s residence, along with the disks and zip drives located at the residence.
Finally, I find that the statements and confession given by the defendant to the authorities on June the 14th, 1999, were voluntarily and knowingly given, and that the defendant was not in custody at the time that the statements and confession were given.
As a result of the district court’s ruling, the following evidence was admitted: two CD ROM disks containing a copy of the contents of the office computer; six CD ROM disks containing a copy of the contents of the home computer; an Iomega zip disk recovered from Slanina’s office; two Iomega zip disks from his residence; and a CD ROM disk containing a copy of what was found on the three zip disks. Moreover, at trial the district court admitted into evidence copies of representative samples of images stored on Slanina’s work computer and office zip disk. After a bench trial, the district court found Sla-nina guilty on both counts and sentenced him to thirty-three months in prison, fol-lowe*d by three years of supervised release. The district court also imposed a $200 special assessment and a $2000 fine. Sla-nina timely filed a notice of appeal.
II.
Slanina argues that the district court erred by holding that he did not have a reasonable expectation of privacy. He further contends that Keller’s warrantless search of the office computer equipment violated the Fourth Amendment. Regarding the search of his home computer, he argues that his consent was not voluntary. Finally, assuming arguendo that it was voluntary, Slanina contends that his consent and his subsequent statements to police were nonetheless tainted by the earlier unconstitutional search of his office computer. We now address these issues in turn, reviewing the district court’s factual findings for clear error and its legal conclusions de novo. United States v. Runyan,
A.
The threshold question in our Fourth Amendment analysis is whether Slanina had a “ ‘constitutionally protected reasonable expectation of privacy.’ ” California v. Ciraolo,
Having determined that Slanina did exhibit a subjective expectation of privacy, we now must decide whether this expectation was objectively reasonable. The government notes that other city employees had a grand master key to Slanina’s office. Furthermore, it claims that the city’s need to develop network systems and upgrade equipment required complete computer access, and that Slanina’s installation of the passwords did not change this situation. Finally, it points out that the computer was purchased by the city and that employees knew they were not allowed to use city computers to access and store pornography. Given these circumstances, the government contends, any expectation of privacy was unreasonable. We disagree.
Slanina had a private office at the new fire station, and the ability of a select few of his coworkers to access the office does not mean that the office was “so open to fellow employees or the public that no expectation of privacy is reasonable.” O’Connor v. Ortega,
B.
Having concluded that Slanina had a reasonable expectation of privacy in his office and office computer equipment, we now must decide whether the warrantless search of them violated the Fourth Amendment. The government characterizes Smith and Keller’s search as a reasonable employer search related to an investigation into workplace misconduct, and therefore not subject to the warrant requirement. Slanina, however, contends that the workplace exception does not apply in this case. He argues that once Smith contacted Ure, after finding only the newsgroup titles and the image of adult pornography, he effectively became an agent of the police. Under this theory, the subsequent search of the computer by Keller, in which images of child pornography were first discovered, was not an investigation into work-related misconduct. Rather, it was a criminal investigation performed by the police, and therefore subject to the warrant requirement.
In O’Connor v. Ortega, a plurality of the Supreme Court considered the constitutionality of a state hospital administrator’s search of a doctor’s desk and file cabinets pursuant to an investigation into noncriminal work-related misconduct. Id. at 712-13,
Although O’Connor provides the starting point of our analysis, it does not end our inquiry, as the facts before us are distinguishable on at least two noteworthy points. First, in the present case, although Slanina’s use of the city-provided computer equipment to access and store pornography certainly constituted workplace misconduct, it also violated criminal law. It cannot be said that by the time Keller, a law enforcement officer with expertise in child pornography investigations, searched Slanina’s office computer, there was no criminal dimension to the investigation. The Supreme Court specifically excepted this situation from its holding in O’Connor, declining to “address the appropriate standard when an employee is being investigated for criminal misconduct or breaches of other nonwork-related or regulatory standards.” Id. at 729 n. *,
We approve of the Fourth Circuit’s reasoning in Simons, agreeing that O’Connors goal of ensuring an efficient workplace should not be frustrated simply because the same misconduct that violates a government employer’s policy also happens to be illegal. See also 4 Wayne R. LaFave, Search and Seizure § 10.3 (3d ed. 2002) (noting that cases upholding searches by government employers into criminal, work-related misconduct are fully consistent with the reasoning in O’ConnorT
Again, we look to guidance from other courts, which have answered this question in the affirmative. In several cases, searches by law enforcement personnel into work-related misconduct have been reviewed under the O’Connor standard. For example, in United States v. Fernandes,
Our review of the relevant caselaw from our sister circuits leads us to the inescapable conclusion that Keller’s search of Sla-nina’s office computer equipment, including the hard drives and zip disks, should be reviewed under the O’Connor standard. As an expert in child pornography investigations, Keller undoubtedly appreciated the possibility that the investigation into Slanina’s misuse of city computer equipment might result in evidence of criminal violations. Nevertheless, any evidence of criminal acts was also proof of work-related misconduct. Once Smith and Ure uncovered evidence of work-related misconduct, the city did not lose its interest in being able to fully investigate such misconduct in a regular and efficient manner. The record evidence demonstrates that as of the time of Keller’s search, the probe remained at least partly an investigation into employee misconduct. The subsequent involvement of the City Manager and human resources in the process attests to this characterization. To hold that a warrant is necessary any time a law enforcement official recognizes the possibility that an investigation into work-related misconduct will yield evidence of criminal acts would frustrate the government employer’s interest in “the efficient and proper operation of the workplace.” O’Connor,
Under O’Connor, a search by a government employer must be justified at its inception and reasonably related to the circumstances justifying the interference in the first place. Id. at 726,
C.
Our conclusion that Keller’s warrantless search of Slanina’s office computer equipment was reasonable under O’Con-nor is not by itself sufficient to affirm the district court’s admission of the evidence from the office computer equipment. After Keller’s search, the FBI conducted an exhaustive search of the same equipment, and the evidence obtained from the FBI search was admitted at trial. Because we conclude that the FBI search does not fall under the O’Connor warrant exception, we must determine whether the admission of the evidence violated the Fourth Amendment. To answer the question, we need not venture outside the Fifth Circuit for guidance, as recent precedent from within this circuit provides the answer. In United States v. Runyan,
III.
Because we find no Fourth Amendment violation in the search of the office computer equipment, we need not address Slanina’s argument that the consent to search his home computer and his statements to police were tainted. Accordingly, we now consider Slanina’s argument that he did not voluntarily consent to the search of his home computer. The district court found that Slanina “gave a knowing, voluntary, and intelligent consent to the search and seizure of the city’s computer” at his residence. Voluntariness of consent is a question of fact, which we review for clear error. United States v. Dortch,
(1) the voluntariness of the defendant’s custodial status; (2) the presence of coercive police procedures; (3) the extent and level of defendant’s cooperation with the police; (4) the defendant’s awareness of his right to refuse consent; (5) the defendant’s education and intelli*681 gence; and (6) the defendant’s belief that no incriminating evidence will be found.
Id. No single factor is dispositive. Id. Slanina relies heavily on the fact that he knew that incriminating evidence would be found at his home, which militates against a finding of voluntariness. Moreover, he notes that Keller informed him that a search warrant would be obtained if he did not provide his consent, and that he was under the influence of a painkiller that made him disoriented. Finally, he claims that he was being held in custody despite Keller’s assurances that he was free to leave at any time.
The government points out, however, that Slanina was extremely cooperative during the meeting in Keller’s office and once they arrived at his house. His foremost concern throughout this time was minimizing the disruption to his wife and children. He acknowledged that he was embarrassed about the discovery of the pornography on his office computer, but relieved that it was finally out in the open. Furthermore, he displayed no signs that the painkiller was affecting his judgment or actions. To the contrary, the testimony of those present with him in Keller’s office suggests that he fully realized the enormity of the situation he faced and acted to contain the damage to his family. Given this strong evidence supporting the district court’s conclusion, we cannot say that its finding of voluntariness was clearly erroneous.
IV.
For the foregoing reasons, we conclude that the warrantless search of Slanina’s office computer equipment, including the computer and the zip disk, did not violate the Fourth Amendment. We also hold that the district court’s finding that Slani-na voluntarily consented to the search of his home computer equipment was not clearly erroneous. Accordingly, we AFFIRM the district court’s ruling and Slani-na’s conviction.
Notes
. Slanina also contends that the district court erred in denying his motion to dismiss the indictment on the grounds that the child pornography statute is unconstitutionally vague and overbroad. As Slanina concedes, the Fifth Circuit has already answered this question, upholding the validity of the statute. See United States v. Fox,
. Technically, Smith could have accessed the hard drive without the BIOS password, but this process would have taken several hours. Specifically, he would have had to disconnect the computer's internal battery for some time in order to reset the system.
.A newsgroup is an Internet discussion group focused on a particular topic. Users of the newsgroup share messages and can download files, including images. In addition to these groups, there are automated processes, such as news servers, allowing individuals to automatically receive files on a particular subject.
. It is unclear exactly what images Ure saw. Smith recalls that he showed Ure “what was on the computer, the picture [he] had printed off.”
. A zip disk is a removable, high density 3.5" disk used with small, portable zip drives.
. The government contends that the district court made an "implied factual finding that Slanina had no subjective expectation of privacy!,]” and that this finding should be reviewed for clear error. Gov. Br. 39. We disagree. Instead, we read the district court’s holding literally, i.e., that Slanina "did not have a reasonable and legitimate expectation of privacy in the city’s computer located at [his] office at the city facilities.”
. We recognize the potential conflict between Simons and the Ninth Circuit's decision in United States v. Taketa,
. Recognizing the need to tread lightly in this relatively new area of Fourth Amendment jurisprudence, we stress that our decision is limited to the unique facts before us. Specifically, we note Keller’s dual roles as supervisor and law enforcement officer, as well as the dual nature of Slanina's misdeeds, simultaneously violative of both workplace regulations and criminal law. We have no occasion to consider the constitutionality of a search of a government employee by a law enforcement officer who is not also the employee’s supervisor. Moreover, we do not address the situation where the criminal acts of a government employee do not also violate workplace employment policy.
