OPINION
Brent Terry entered a conditional guilty plea to one count of possession of images of minors engaged in sexually explicit conduct, in violation of 18 U.S.C. § 2252(a)(4)(B), reserving his right to appeal the district court’s denial of his motion to suppress. Terry argues that the search warrant permitting federal agents to search his home was not grounded upon probable cause, and that the search therefore violated the Fourth Amendment. For the following reasons, we affirm the judgment of the district court.
I
The facts of this case are undisputed. In the early morning hours of October 14, 2004, Internet service provider AOL (formerly known as America Online) intercepted two e-mail messages containing a known child pornography image. These messages were sent from the e-mail address “skippie4u@aol.com” to an unknown recipient (or recipients) at 2:35 a.m. and again at 2:36 a.m. The following day, AOL *647 forwarded the image, along with the screen name, e-mail address, and zip code of the user, to the National Center for Missing and Exploited Children (NCMEC), which in turn forwarded the information to Immigration and Customs Enforcement (ICE) officers. Upon issuance of a summons, AOL provided ICE more information on the “skippie4u” screen name, which revealed that “skip-pie4u” was one of three screen names assigned to a master AOL account registered to Roy Terry, who lived at 10 Township Avenue in Cincinnati, Ohio. Defendant Brent Terry (Roy’s son) was the registered user of the “skippie4u” screen name. ICE confirmed through the Postal Service that both Roy and Brent Terry received mail at 10 Township Avenue.
Based on this information, ICE obtained a search warrant for the Township Avenue address and executed it on March 21, 2005. The record does not reveal what, if anything, was searched and/or seized from the Township Avenue residence. It appears, however, that ICE was most interested in Brent Terry, not his father, because the email account used to send the image was registered specifically to the younger Terry. During the search, ICE reported that Roy Terry
was interviewed at which time he stated that he has an Internet account through America Online (AOL), which is utilized, by himself, Brenda TERRY and Brent TERRY. Roy TERRY stated that Brent TERRY lives at 16 Walnut St. Cincinnati, OH and has access to the aforementioned AOL account from that address. Roy TERRY also stated that Brent TERRY has a computer that he uses at that address to access the account. Furthermore, Roy TERRY informed [ICE] that Brent TERRY utilizes the screen name Skippie 4U when accessing the aforementioned AOL account from his address 16 Walnut St. Cincinnati, OH.
Application and Affidavit for Search Warrant at 8 (capitalization in original). Roy also told ICE that Brent had lived at the Walnut Street address, which he rented from Roy, for approximately one and a half years. Thus, he was living in the Walnut Street residence at the time his email account was used to send the illegal image.
ICE then obtained the search warrant for 16 Walnut Street that is the subject of this appeal. That warrant was executed on the same day, and agents recovered a laptop computer, three hard drives, and various external media from the residence, which were found to contain a total of 123 images and eight videos of minors engaged in sexually explicit conduct. Terry later moved to suppress this evidence, which motion the district court denied. Thereafter Terry entered a conditional guilty plea pursuant to Federal Rule of Criminal Procedure 11(a)(2) and appealed the denial of his suppression motion to this court.
II
“When reviewing the denial of a motion to suppress, we review the district court’s findings of fact for clear error and its conclusions of law
de novo.” United States v. Foster,
In deciding whether to issue a search warrant, the Fourth Amendment requires “the issuing magistrate ... simply to make a practical, common-sense decision whether, given all the circumstances set forth in the affidavit before him ... there is a fair probability that contraband or evidence of a crime will be found in a particular place.”
Gates,
Terry asserts that there was an insufficient nexus to connect the intercepted child pornography image to his home computer, arguing that the AOL e-mail account used to send the illicit image could have been accessed from any computer with an Internet connection. We certainly agree that to establish probable cause to support a search warrant, there must be some nexus between the illegal activity suspected and the property to be searched.
See United States v. McPhearson,
The government’s affidavit established that (1) the AOL e-mail account belonging to the “skippie4u” screen name sent two e-mail messages at approximately 2:30 a.m. containing a known child pornography image; (2) Brent Terry was the registered user of the “skippie4u” screen name; (3) Brent Terry lived at 16 Walnut Street at the time the e-mail messages were sent; and (4) Brent Terry had a computer at that address through which he accessed the “skippie4u” e-mail account used to send the messages. It requires no great leap of logic to conclude that the computer in Terry’s home was probably used to send the intercepted messages. Given that the probable cause standard deals with “the factual and practical considerations of everyday life on which reasonable and prudent men, not legal technicians, act,”
Gates,
In a similar case, this court upheld probable cause to search a home where the defendant had purchased subscriptions to known child pornography websites, but where it was unknown precisely which computer he had used to access those sites.
See United States v. Wagers,
Terry attempts to distinguish Wagers on the ground that, unlike in Wafers, there was no IP information either to tie his computer to the e-mail messages, or even to limit the possible number of computers
that could have been used to send the message. But the
Wagers
opinion did not hold that IP information was an indispensable prerequisite to obtaining a search warrant in a case involving Internet-based child pornography, only that such information contributed to the totality of the probable-cause determination. Indeed,
Wagers
favorably cited several cases that arguably involved even less evidence of probable cause than is presented here.
See id.
at 540, 543 (citing
United States v. Gourde,
We are somewhat troubled by the fact that the
content
of the incriminating e-mail messages was apparently not preserved.
3
It is thus impossible to know the context in which the image was sent; Terry argues that he may have merely been replying to some unsolicited child pornography spam to request that no further such images be sent to him. Although this is theoretically possible,
4
it is not enough for Terry simply to speculate about hypothetical “false-positive” scenarios. He presented no evidence at the suppression hearing about the actual occurrence of such “spam-rejection” transmission of child porn, either in his case or in society generally. Since a probable cause finding does not require a preponderance of the evidence, in order to undermine the magistrate’s finding, the likelihood of an innocent explanation must (at the very least) be
greater
than the likelihood of a guilty one. For example, this court has indicated that— given studies demonstrating that a sizable percentage of United States currency in circulation is tainted with a detectable level of cocaine residue — a canine alert to currency, standing alone, will likely not establish probable cause in a forfeiture action.
United States v. $5,000.00 in U.S. Currency,
Ill
For the foregoing reasons, we AFFIRM the judgment of the district court.
Notes
. Though not central to our analysis on this point, the fact that the images were sent at approximately 2:30 in the morning further reduces the likelihood that a computer other than the one in Terry’s home was used.
. We do not believe that the passage of five months between the sending of the intercepted e-mail messages and the execution of the warrant changes the probable cause calculus much, if at all. Images typically persist in some form on a computer hard drive even after the images have been deleted and, as ICE stated in its affidavit, such evidence can often be recovered by forensic examiners.
See United States v. Lacy,
. The record does not reveal whether this failure was the fault of AOL, the NCMEC, or ICE.
. Whether an image that is received via an email message is also included in an outgoing reply would depend on various factors, including the e-mail client settings, whether the image was included within the body of the incoming message or as an attachment, the operation of any filtering software, etc.
. More recent case law has called this assumption into question.
See United States v. Funds in Amount of Thirty Thousand Six Hundred Seventy Dollars,
