After police detectives discovered several nude photographs in his personal computer files, defendant Daniel Turner was indicted for possessing child pornography in violation of 18 U.S.C. § 2252. Thereafter, the district court suppressed the photographs and the government brought this interlocutory appeal. See id. § 3731. We affirm the district court ruling, albeit on different grounds.
I
BACKGROUND 1
At 2:00 a.m. on July 28, 1997, 26-year-old Megan Thomas was awakened in her bedroom by a masked intruder wielding a knife. During the ensuing struggle Thomas cut her hands when she grabbed the knife. The intruder fled. Turner, who lived in the apartment next door to Thomas, notified the Bangor police. When police detectives arrived at the scene, Turner told them that while seated upstairs at his computer he had observed the intruder fleeing the Thomas apartment, then telephoned the police.
The next morning, Bangor Police Detectives Reagan and Gould returned to the crime scene for further investigation, and noticed that window screens on both the Thomas and Turner apartments were ajar and the sill on the Turner apartment was smeared with blood. The detectives awakened Turner, told him about these discoveries, and expressed their concern that the intruder might have entered Turner’s apartment as well. Turner responded by handing the detectives a knife which he claimed to have found near his kitchen sink, but did not remember having placed there. The knife fit *86 the description Thomas had given the police earlier.
The detectives then obtained verbal consent to “look around” Turner’s apartment. At that point Turner was not considered a suspect in the Thomas assault. Turner accompanied the detectives on their initial tour of his apartment, during which they found additional blood stains on the stairway walls leading to the second floor, and on a trash can lid in the computer room on the second floor. When asked about these discoveries, Turner could provide no explanation.
The detectives then began to suspect that Turner was the assailant. At their request, Turner signed a written consent to search “the premises,” “his vehicle,” and “personal property.” Before doing so, he was expressly told that the officers would search for “any signs the suspect had been inside [the apartment],” “any signs a suspect had left behind, or anything of that sort,” and “evidence of the assault itself.”
While a detective remained on the first floor with Turner, other officers began their 90-minute search of the second floor. In the closet of the second-floor computer room, Detective Gould found several videotapes which apparently contained sexually explicit material. Then, while removing boxes from the closet and stacking them on or near the computer station, Gould noticed that Turner’s computer monitor screen suddenly turned on, and the Windows “desktop” disclosed a photograph of a nude woman with “light-colored hair,” which Gould concluded was “similar” to Ms. Thomas’ hair color based on descriptions Gould had been given.
At that point Gould seated himself at the computer and engaged the “mouse” to access the “Documents” index from the Windows 95 task bar, which itemized titles of files most recently accessed by Turner. Gould noticed several indexed files with the suffix “.jpg,” denoting a file containing a photograph. After clicking on these file names, he located photographs of nude blonde women in bondage. Further into the “Documents” listing, he noted several text files bearing titles which suggested rape and/or bondage. After calling the district attorney’s office for guidance, Gould copied the adult-pornography files onto a floppy disk.
Gould then searched the computer hard drive for other incriminating files. Opening the “My Computer” icon and a folder labeled “G-Images,” he noted several files with names such as “young” and “young with breasts.” Upon opening one such file, he viewed what he believed to be child pornography, then closed down and seized the computer. It was at this point that Turner first came upstairs and discovered that his computer files had been subjected to search.
After Turner was charged in a single count with possessing child pornography, see id. § 2252, he moved to suppress the computer files. The district court granted the motion following a suppression hearing, on the ground that it was not objectively reasonable for Detective Gould to have concluded that evidence of the Thomas assault — the stated object of the consent search — would be found in files with such labels as “young” or “young with breasts.”
II
DISCUSSION
The district court ruled that even if the Turner consent authorized the opening of nondescript files containing photographs, it did not permit the opening of files labeled “young” or “young with breasts,” which were unlikely to contain evidence pertinent to the Thomas assault. The
government
vigorously responds that the consent was so broad— authorizing search of all Turner’s “personal property” — that it necessarily encompassed a comprehensive search of his computer files. As we conclude that the consent did not authorize the search of the computer, we affirm the district court judgment.
See United States v. Doe,
*87
Since it comes within an established exception to the Fourth Amendment warrant requirement, “[a] consensual search may not exceed the scope of the consent given.”
United States v. Rudolph,
“The scope of a [consensual] search is generally defined by its
expressed object.” Jimeno,
In the present case the detectives preliminarily restricted the scope of the consent in several respects. Upon their arrival at the Turner apartment early in the morning on July 28, the detectives, by their own admission, did not consider Turner a suspect in the Thomas assault. See supra Section I, ¶ 2. Rather, after finding a window screen ajar in the Turner apartment, they suspected that Thomas’s assailant might have broken into the Turner apartment while fleeing the crime scene next door, something which Turner presumably need not have done to gain access to his own apartment.
Later, after finding a knife and scattered blood stains for which Turner could provide no explanation, and before Turner signed the written consent form, the detectives told Turner that he was a suspect. The detectives nevertheless couched their search request in terms normally understood to refer only to an intruder, rather than a permanent resident, by announcing their intention to look for “any signs the suspect had been inside [the apartment],” and “any sighs a suspect had
left behind.” See, e.g., United States v. Elliott,
We think that an objectively reasonable person assessing in context the exchange between Turner and these detectives would have understood that the police intended to search only in places where an
intruder
hastily might have disposed of any
physical evidence of the Thomas assault
immediately after it occurred; for example, in places where a fleeing suspect might have tossed a knife or bloody clothing. Whereas, in sharp contrast, it obviously would have been impossible to abandon physical evidence of this sort in a personal computer hard drive, and bizarre to suppose — nor has the government suggested — that the suspected intruder stopped to enter incriminating evidence into the Turner computer.
Cf. United States v. Kim,
Similarly, we cannot accept the government’s contention that the sexually suggestive image which suddenly came into “plain view” on the computer screen rendered Turner’s computer files “fair game” under a consensual search simply because the Thomas assault had a sexual component (e.g., the attempt to tie her hands). The critical consideration in this regard is that the detectives never announced,
before Turner gave his consent,
that they were investigating a sexual assault or attempted rape. Nor is it material to the present inquiry that Turner, as the alleged assailant, would have been familiar with the details of the assault based on his first-hand knowledge, since the test is not subjective reasonableness, but
objective
reasonableness.
See Jimeno,
Thus, assuming
arguendo
that such computer images could be considered circumstantial evidence of a planned sexual assault, an
objectively reasonable person
assessing the actual exchange between the detectives and Turner would not have understood that such images were within the “expressed object” of the intended search for evidence of an aggravated assault.
See Elliott,
Furthermore, aggravated assault is neither akin to so-called “paper trail” crimes like bank or mail fraud, nor to possession of child pornography, wherein the suspect might be expected to retain evidence of the offense
*89
itself among personal papers or in a computer hard drive.
See United States v. Hall,
Finally, the government argues, even if Turner’s original consent was circumscribed, he expanded the authorization by failing to object to the computer-file search.
See, e.g., United States v. McRae,
Affirmed.
Notes
. The evidence is related in the light most favorable to the suppression ruling.
See United States
v.
Martinez-Molina,
. The rationale relied upon by the district court appears somewhat problematic. If the Turner consent did enable a computer search, arguably the file labels therein would not have constrained the scope of the search. By analogy, for example, had Turner consented to the search of un *87 locked containers on the premises, we doubt seriously whether his deceptive labeling ol an individual container (e.g., "Flour”) would preclude a consensual search, provided the container was capable of holding whatever contraband was the target of the search. Since we affirm on other grounds, however, we need not rule on the district court rationale.
. It was for the government to prove that the computer-file search was within the scope of the consent.
See United States
v.
Schaefer,
. Although divergent standards of review have emerged,
compare United States v. Stewart,
. Aggravated assault contains no implicit sexual-assault component, see Me.Rev.Stat. Ann. tit. 17-A, § 208, nor would the victim’s gender automatically give rise to such an inference.
. This is not to suggest that stray incriminating evidence might not be discovered among the personal papers, diaries or computer files of someone who planned and committed an aggravated assault. Were such remote and speculative prospects ' sufficient, however, consensual searches could become effectively boundless, since the same rationale would apply to virtually any type of criminal offense.
