UNITED STATES OF AMERICA, Plaintiff - Appellee, v. ROBERT MICHAEL FALL, Defendant - Appellant.
No. 18-4673
UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT
Argued: December 10, 2019 Decided: April 3, 2020
PUBLISHED. Appeal from the United States District Court for the Eastern District of Virginia, at Norfolk. Henry Coke Morgan, Jr., Senior District Judge. (2:17-cr-00012-HCM-DEM-1)
Affirmed by published opinion. Judge Quattlebaum wrote the opinion in which Judge Diaz and Judge Cogburn joined.
ARGUED: Mark Diamond, Richmond, Virginia, for Appellant. Elizabeth Marie Yusi, OFFICE OF THE UNITED STATES ATTORNEY, Norfolk, Virginia, for Appellee. ON BRIEF: G. Zachary Terwilliger, United States Attorney, Daniel T. Young, Assistant United States Attorney, OFFICE OF THE UNITED STATES ATTORNEY, Alexandria, Virginia, for Appellee.
Robert Michael Fall asks us to reverse his conviction of receipt, possession and transportation of child pornography for four reasons. First, he claims that the Virginia Beach Police Department (the “VBPD“) violated his Fourth Amendment rights in the way it searched his laptop computer. Second, he asserts the counts against him for receipt and possession of child pornography produced improper multiplicity. Third, he argues that moving images from one‘s laptop to one‘s Dropbox account does not amount to transportation of child pornography. And fourth, he contends that the presence of child pornography images in temporary storage files on a laptop computer does not sufficiently prove knowing receipt of child pornography because such images can be saved through inadvertent internet use. These arguments require us to apply well-settled principles of criminal law to the realities of modern technological advancements in computers and the internet. While we agree with Fall that personal computing devices like laptops and cell phones implicate privacy interests about which we must exercise care, upon considering this record, we find no reversable error by the district court. Accordingly, we affirm.
I.
Fall was living with his parents in Virginia Beach, Virginia when he invited his niece, S.D., to stay with them. While S.D. and her boyfriend were watching television in the guest bedroom, they noticed a laptop computer partially visible under the guest bed. S.D.‘s boyfriend opened the laptop and discovered at least one image of child pornography. S.D. then observed several pictures of children visible on the laptop‘s home screen, as well
S.D. then went into Fall‘s bedroom, where she saw another laptop. After opening it, she discovered additional child pornography images. She left that laptop in her uncle‘s bedroom and drove the laptop from the guest bedroom to the local VBPD station.
While meeting with Officer James Mockenhaupt at the police station, S.D. showed him some of the images of child pornography on the laptop. Officer Mockenhaupt then contacted a VBPD Special Victims Unit detective, who instructed him to send S.D. to the VBPD headquarters.
There, S.D. met with Detectives Patrick Henderson and Ryan Sweeney. After S.D. explained what she had seen on the laptop, Detective Henderson opened it and observed thumbnail “icons on the desktop that appeared to be nude individuals.” J.A. 95. He thought the images could have depicted children. Detective Henderson then clicked on two video thumbnails on the laptop‘s home screen, both of which depicted child pornography.1
Detectives Henderson and Sweeney drove to Fall‘s auto repair shop to interview him. After receiving Miranda warnings, Fall invoked his right to counsel and refused consent for a search of his residence. The detectives then began drafting an affidavit for a
Subsequently, neighbors told Officer Mockenhaupt that they saw a man crawl out of Fall‘s second-story window behind the house, throw something on top of the lower-level roof and then jump off the roof and flee. They did not recognize the man.
When Officer Mockenhaupt investigated, he discovered a laptop on the lower-level roof. Fearing rain, he and another officer secured the laptop in the second-floor bathroom until police could execute a search warrant.
The completed affidavit submitted with the warrant application stated,
On August 4th, 2016, this affiant met with [S.D.] at Police HQ. [S.D.] is temporarily living at [redacted] in the city of Virginia Beach with her uncle, Robert Fall. . . . Under the bed in the room she is staying in, she discovered a laptop. She opened the laptop to see if it was operable and immediately noticed on the desktop several icons which appeared to be of pornography. She opened at least one file and saw that it was child pornography. She brought the laptop to this affiant at police headquarters. Detective Henderson and this affiant spoke with [S.D.] and Detective Henderson viewed two files on the desktop computer. One file depicted a female approximately 10-12 years old kneeling next to a man masturbating. The other video was of a 10-12 year old girl masturbating completely naked while lying on the floor. [S.D.] mentioned she believes the computer belongs to her uncle because there were programs on the computer indicative of mechanical knowledge and her uncle owns a mechanic shop. She then went into her uncle‘s bedroom and found a laptop. When looking at that laptop, she described that on the desktop of the computer she saw a thumbnail with a naked girl on it. . . . Prior to this occasion an individual matching Mr. Fall‘s clothing description and identified by a neighbor as Mr. Fall was seen exiting the residence at [redacted] and throwing a laptop computer on the roof of the residence before exiting the yard.
J.A. 65.
After obtaining a warrant later that evening, the VBPD searched Fall‘s residence. The VBPD seized various pieces of electronic evidence during the search, including the laptop recovered from the roof, another laptop from the defendant‘s closet and numerous compact discs from Fall‘s bedside table. All these items contained videos and images of child pornography.
A federal grand jury in Norfolk, Virginia indicted Fall on five counts of receipt and attempted receipt of child pornography, in violation of
Fall moved to suppress the physical evidence seized during the search of his residence, arguing that it was the product of an improper search of the laptop that S.D. found in the guest bedroom. He argued that the third-party consent doctrine did not apply to the search of his computer or his residence, and that the VBPD‘s search of the laptop extended beyond the private search of S.D. and her boyfriend. According to Fall, the information gained from this illegal search tainted the search warrant and, thus, the physical evidence obtained from his residence under that warrant. He also claimed that the warrant application improperly represented that Fall‘s neighbor reported seeing Fall on the roof of his residence when she merely said she saw a person on the roof.
The district court denied the motion, concluding “there is no evidence to suggest that Detective Henderson expanded the search beyond that which was needed to verify the
Fall was tried on six counts from the indictment: Counts 3, 4 and 5, which each charged him with receipt and attempted receipt of a single image of child pornography; Count 6, which charged him with transportation of child pornography by uploading a video of child pornography from his laptop to an online file-storage account; and Counts 7 and 8, which charged him with possession of child pornography on the roof laptop and the compact discs. The jury found Fall guilty on all counts.
Prior to sentencing, the government moved to dismiss Counts 7 and 8 to minimize any potential double jeopardy issues on appeal. The district court granted the government‘s motion to dismiss Count 8, but denied it as to Count 7. It reasoned that the high degree of factual overlap between the images on the discs in Count 7 and the roof laptop in Count 7 was significant enough to merit the dismissal of Count 8. It then compared the images in Count 7 with those identified in Counts 3, 4 and 5. It found that the degree of overlap was so small that the dismissal of Count 7 would be inappropriate.
Fall was sentenced to 96 months of imprisonment on Counts 3, 4, 5, 6 and 7—to run concurrently—and 20 years of supervised release. Fall filed a timely notice of appeal. We have jurisdiction over the appeal pursuant to
II.
Fall first argues that the physical evidence should have been suppressed as fruit of the poisonous tree—the improper warrantless search of his computer that S.D. and her boyfriend found in the guest bedroom and took to the VBPD. According to Fall, without that search, the VBPD could not have obtained the warrant to search his home, and the physical evidence would not have been discovered.
When “reviewing a district court‘s ruling on a motion to suppress, this Court ‘review[s] conclusions of law de novo and underlying factual findings for clear error.‘” United States v. Clarke, 842 F.3d 288, 293 (4th Cir. 2016) (quoting United States v. Banks, 482 F.3d 733, 738 (4th Cir. 2007)). If, as here, the district court denied the motion to suppress, this Court “construe[s] the evidence in the light most favorable to the government.” Id. (quoting United States v. Kelly, 592 F.3d 586, 589 (4th Cir. 2010)).
Fall argues the district court erred in concluding that the officers did not expand S.D.‘s private search of the laptop. Thus, according to Fall, the private search exception to the Fourth Amendment does not apply here. The private search doctrine is based on the principle that the Fourth Amendment does not protect against searches conducted by private individuals acting in a private capacity. United States v. Richardson, 607 F.3d 357, 364 (4th Cir. 2010). And since the Fourth Amendment is not implicated by a private search,
The seminal private search doctrine case is United States v. Jacobsen, 466 U.S. 109 (1984). There, Federal Express employees saw a damaged box, opened it and found suspicious bags of white powder packaged inside a tube. Id. at 111. The employees notified the United States Drug Enforcement Agency (“DEA“) and placed the bags and tube back inside the box. Id. Upon the DEA agent‘s arrival, he removed the bags from the box and then tested the powder to confirm it was cocaine. Id. at 111–12. The Supreme Court held, in part, that no Fourth Amendment search occurred when the DEA agent removed the bags from the box, because “the removal of the plastic bags from the tube and the agent‘s visual inspection of their contents enabled the agent to learn nothing that had not previously been learned during the private search.” Id. at 120.
Although the testing of the powder went beyond the private search, the Court established that “additional invasions of respondents’ privacy by the government agent must be tested by the degree to which they exceeded the scope of the private search.” Id. at 115. There, the Court held that the DEA agent‘s field test of the narcotics was permissible because a “chemical test that merely discloses whether or not a particular substance is cocaine does not compromise any legitimate interest in privacy.” Id. at 123 (reasoning that “governmental conduct that can reveal whether a substance is cocaine, and no other arguably ‘private’ fact, compromises no legitimate privacy interest” because “Congress
While we have not addressed the private search doctrine in the context of electronic devices, our sister circuits have utilized varying approaches when confronted with this issue. The Eleventh and Sixth Circuits have held that there must be an exact one-to-one match between electronic files viewed by a private party and files later examined by police. Even if the police‘s extension of the search is de minimis, it loses the protection of the private search exception. See United States v. Sparks, 806 F.3d 1323 (11th Cir. 2015); United States v. Lichtenberger, 786 F.3d 478 (6th Cir. 2015).
But, as the government points out, other circuits have allowed a more permissive application of the private search doctrine to electronic searches. The Seventh and Fifth Circuits have held that with respect to officers searching containers that were not examined by the private party, a more expansive officer search “would not necessarily be problematic if the police knew with substantial certainty, based on the statements of the private searches, their replication of the private search, and their expertise, what they would find inside.” United States v. Runyan, 275 F.3d 449, 464 (5th Cir. 2001); see Rann v. Atchison, 689 F.3d 832, 838 (7th Cir. 2012). Runyan also held that the police do not exceed the private search when they examine more items within a closed container than did the private
We need not determine today the outer boundaries of the private search doctrine in the context of electronic searches for this Circuit because even if the search was not proper under the private search exception, the denial of the motion to dismiss should be affirmed under the good faith exception to the exclusionary rule. Under that exception, “evidence obtained by an officer who acts in objectively reasonable reliance on a search warrant will not be suppressed, even if the warrant is later deemed invalid.” United States v. Thomas, 908 F.3d 68, 72 (4th Cir. 2018) (citing United States v. Leon, 468 U.S. 897, 922 (1984)). “[E]vidence obtained from an invalidated search warrant will be suppressed only if ‘the officers were dishonest or reckless in preparing their affidavit or could not have harbored an objectively reasonable belief in the existence of probable cause.‘” United States v. Lalor, 996 F.2d 1578, 1583 (4th Cir. 1993) (quoting Leon, 468 U.S. at 926). Further, the exception may apply even where a search warrant is “facially deficient” as long as “the warrant . . . was not so facially deficient as to preclude reasonable reliance upon it . . . .” United States v. Dickerson, 166 F.3d 667, 694–95 (4th Cir. 1999), reversed on other grounds by Dickerson v. United States, 530 U.S. 428 (2000). “[U]ncontroverted facts known to [the officer] but inadvertently not presented to the magistrate” are an important part of this inquiry. United States v. Lyles, 910 F.3d 787, 797 (4th Cir. 2018) (internal quotation marks omitted).
The warrant here is not facially deficient, much less to the extent required to preclude reasonable reliance on it. The affidavit submitted to obtain the warrant contained much more information than Detective Henderson‘s description of what he saw on the laptop. Specifically, the affidavit contained S.D.‘s statements about personally observing child pornography on the defendant‘s laptop and the neighbor‘s statement about a man throwing a laptop on the roof of Fall‘s residence. Removing Detective Henderson‘s potentially problematic observations, the affidavit would have contained the following information:
On August 4th, 2016, this affiant met with [S.D.] at Police HQ. [S.D.] is temporarily living at [redacted] in the city of Virginia Beach with her uncle, Robert Fall. . . . Under the bed in the room she is staying in, she discovered a laptop. She opened the laptop to see if it was operable and immediately noticed on the desktop several icons which appeared to be of pornography. She opened at least one file and saw that it was child pornography. She brought the laptop to this affiant at police headquarters. . . . [S.D.] mentioned she believes the computer belongs to her uncle because there were programs on the computer indicative of mechanical knowledge and her uncle owns a mechanic shop. She then went into her uncle‘s bedroom and found a laptop. When looking at that laptop, she described that on the desktop of the computer she saw a thumbnail with a naked girl on it. . . . Prior to this occasion an individual matching Mr. Fall‘s clothing description and identified by a neighbor as Mr. Fall was seen exiting the residence at [redacted] and throwing a laptop computer on the roof of the residence before exiting the yard.
J.A. 65. This information provides an objectively reasonable basis for the officers to objectively believe that probable cause existed. See Simmons v. Poe, 47 F.3d 1370, 1378 (4th Cir. 1995) (“[T]he case law establishes that, even if an affidavit supporting a search warrant is based in part on some illegal evidence, such inclusion of illegal evidence does not taint the entire warrant if it is otherwise properly supported by probable cause.“).
Aside from the information reflecting Detective Henderson‘s search of the laptop, the only other criticism lodged by Fall to the affidavit requesting the warrant relates to the erroneous statement that the neighbors observed Fall throw the laptop on the roof.2 We agree the record indicates the neighbors did not identify Fall. They instead said a man on the roof of Fall‘s residence threw a laptop on the roof. But we also agree with the district court that the error does not constitute evidence of dishonesty or recklessness in preparing the affidavit. Accordingly, we agree with the district court that the record supports the application of the good faith exception.3
III.
Fall next claims that Count 7, which charged him with possession of child pornography, was multiplicitous of Counts 3, 4 and 5 charging him with receiving child pornography. Count 7 alleged that Fall “did knowingly possess one or more matters, that is, [the roof] laptop computer and the hard drive contained therein, . . . which contained visual depictions . . . . [that] involved the use of minors . . . engaging in sexually explicit
“Multiplicity is ‘the charging of a single offense in several counts.‘” United States v. Lawing, 703 F.3d 229, 236 n.7 (4th Cir. 2012) (quoting United States v. Burns, 990 F.2d 1426, 1438 (4th Cir. 1993)). The Fifth Amendment‘s Double Jeopardy Clause prohibits multiplicitous indictments for crimes that “are in law and in fact the same offense.” United States v. Schnittker, 807 F.3d 77, 81 (4th Cir. 2015) (quoting United States v. Crew, 538 F.2d 575, 577 (4th Cir. 1976)).
Importantly, however, Fall did not raise this argument by pretrial motion, as required by
The circuits that have addressed the question are split as to whether to review an unpreserved challenge to a multiplicitous indictment for plain error or whether the claim is altogether waived. While we have not previously addressed this issue, we need not weigh in on this split today because Fall‘s argument fails even under plain error review.
There is plain error only when “(1) an error was made; (2) the error is plain; (3) the error affects substantial rights; and (4) the error seriously affects the fairness, integrity, or public reputation of judicial proceedings.” United States v. Harris, 890 F.3d 480, 491 (4th Cir. 2018). The first part of this test—the requirement that an error be made—is fatal to Fall‘s argument.
Charges cannot be multiplicitous where they are “based on two distinct offenses, occurring on two different dates, and proscribed by two different statutes.” United States v. Bobb, 577 F.3d 1366, 1375 (11th Cir. 2009), cited favorably in United States v. Schnittker, 807 F.3d 77, 81 (4th Cir. 2015). Applied here, Fall was convicted under two separate statutes for distinct conduct. Under Count 7, he was convicted of possessing child pornography on August 4, 2016, the date of the warrant execution. And under Counts 3 through 5, he was convicted of knowingly receiving child pornography in January 2016—the date he received those images. Because these convictions involve different conduct on different dates, they are not multiplicitous.
While Fall claims United States v. Schnittker, 807 F.3d 77 (4th Cir. 2015) supports his multiplicity argument, it actually cuts against him. In explaining the general multiplicity rule, Schnittker explained that the Double Jeopardy Clause only prohibits convicting a defendant for two crimes that “are in law and in fact the same offense.” Schnittker, 807 F.3d at 81 (quoting United States v. Crew, 538 F.2d 575, 577 (4th Cir. 1976)). Thus, Schnittker reasoned, two propositions can be true at the same time. First, it may be the case “that possession of child pornography is a lesser-included offense of receipt of child pornography.” Id. Second, two charges for possessing and receiving images of child pornography might not actually be “the same in fact.” Id. at 82. To determine the degree of factual overlap between two related counts, courts review “‘the entire record’ of the proceedings.” Id. (quoting United States v. Benoit, 713 F.3d 1, 17 (10th Cir. 2013)).
Schnittker went on to conclude that no multiplicity problem arose from convicting a defendant of possessing images found on one hard drive and receiving videos found on a second hard drive, even when those same videos appeared on both drives. This was because “the defendant admitted to possessing over one thousand images or videos of child pornography, at least some of which did not ground the receipt conviction.” Id. at 83. This supported the inference “that ‘the possession conviction was based on an image the receipt of which did not form the basis of the receipt conviction.‘” Id. (quoting United States v. Polouizzi, 564 F.3d 142, 159 (2d Cir. 2009)).
The same inference applies here. The evidence below established that the roof laptop contained four videos and 726 images of child pornography. The district court properly noted that “any overlap between [Counts 3, 4 and 5] and Count 7 is much too
IV.
Fall next argues that there was insufficient evidence for a reasonable jury to find that he transported a pornographic video under Count 6. While acknowledging that he moved a video containing child pornography from his laptop to a Dropbox account, Fall contends that the district court improperly denied his motion for acquittal because there was no evidence that he shared, attempted to share or even intended to share the video.
But as with his multiplicity argument, Fall failed to properly preserve this issue. Although he moved for acquittal on Count 6 after the close of the government‘s case, Fall failed to renew the motion after trial. Thus, this argument, which we would normally review de novo, is waived. See United States v. Chong Lam, 677 F.3d 190, 200 & n.10 (4th Cir. 2012) (holding that “[w]hen a defendant raises specific grounds in a Rule 29 motion, grounds that are not specifically raised are waived on appeal,” unless a “manifest miscarriage of justice” has occurred).
But even if this claim was not waived, Fall‘s argument is without merit. Fall improperly conflates the offense of transportation with the offense of distribution. Transportation, which is the basis of Count 6, does not require conveyance to another person. For example, in United States v. Ickes, 393 F.3d 501, 504 (4th Cir. 2005), we
Last, Fall‘s use of the internet in the transmission of child pornography satisfies the interstate commerce element of
V.
Finally, Fall argues that there was insufficient evidence to convict him for receipt of child pornography in Counts 3, 4 and 5. He claims that because the images charged in these Counts were stored in the roof laptop‘s temporary internet files, it is possible they
When reviewing the sufficiency of the evidence supporting a count of conviction, this Court considers whether “there is substantial evidence, taking the view most favorable to the Government, to support it.” Glasser v. United States, 315 U.S. 60, 80 (1942), abrogated on other grounds by Bourjaily v. United States, 483 U.S. 171 (1987). “[T]he relevant question is whether, after viewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt.” Jackson v. Virginia, 443 U.S. 307, 319 (1979). We “consider circumstantial as well as direct evidence, and allow the government the benefit of all reasonable inferences from the facts proven to those sought to be established.” United States v. Savage, 885 F.3d 212, 219–20 (4th Cir. 2018) (internal quotation marks omitted).
At trial, Fall pressed the same argument that he advances here extensively before the jury. He cross-examined the government‘s forensic examiner on this topic. During cross-examination and in his closing, Fall argued that the images charged in Counts 3 through 5 might have appeared at the bottom of a webpage, and if he failed to scroll down to view the entire website, his laptop may have cached these images without him realizing they were there. Fall‘s assertions depended heavily on the assumption that he was a technological novice so lacking in sophistication that his receipt of child pornography via the internet might have been accidental.
The government‘s evidence offered a different explanation—that Fall was a savvy collector of child pornography who had been seeking it out on the internet for well over a
In considering whether there is sufficient evidence to support the jury‘s finding, we agree with Fall that the government offered no specific evidence tying contraband images located in the computer‘s temporary internet files to specific browsing activity or particular web searches. But we do not require direct evidence that Fall sought out and acquired these specific images. In criminal trials, a defendant‘s knowledge “will be provable (as knowledge must almost always be proved) by circumstantial evidence.” United States v. Santos, 553 U.S. 507, 521 (2008). We see no reason that general principle would not apply
In response, Fall relies primarily on the Tenth Circuit‘s decision in United States v. Dobbs, 629 F.3d 1199 (10th Cir. 2011). There, the government charged the defendant with receipt of child pornography images found in his temporary internet files. Id. at 1201. At trial, “the forensic specialist testified that a pattern existed wherein the arrival of suspect images on [the defendant‘s] computer was immediately preceded by searches using terms typically affiliated with child pornography.” Id. at 1202. Relying on this evidence, the government argued that the defendant “engaged in a pattern of methodically seeking out child pornography, by conducting image searches for terms . . . [associated with child pornography] and downloading websites consistent with child pornography.” Id. at 1203. The Tenth Circuit concluded that this evidence of knowledge was insufficient to establish
Dobbs, of course, is not binding on us.5 Even so, Fall‘s illicit conduct here is more extensive than the conduct in Dobbs. The forensic examiner in Dobbs “discovered over 150 images of child pornography in the hard drive‘s temporary Internet files folder.” Id. at 1201. The defendant‘s conduct in that case involved a single device and occurred over a period of only six months. Id. at 1211. By contrast, the record here contained evidence of over ten years of illicit conduct across multiple devices and thousands of images and videos of child pornography.
VI.
For these reasons, the judgment of the district court is
AFFIRMED.
Notes
J.A. 410.Temporary internet files are maintained in the registry in multiple locations. They‘re going to cache when the user goes out into the internet. The data from a website is going to be stored in the computer‘s temporary internet files, and the reason for this is so that, when you go to that website again, it will load quicker because the operating system knows to just pull some of the data from the temporary internet files versus loading it all over again.
We also cited Dobbs in United States v. Myers, 560 F. App‘x 184 (4th Cir. 2014). There, too, we affirmed a conviction for receiving child pornography based on “circumstantial evidence of knowledge.” Id. at 187. We explained that “investigators discovered a plethora of child pornography on [the defendant‘s] computer, thus establishing that it was not by mistake or error that the files were downloaded.” Id. Under these cases, it was reasonable for the jury to conclude that Fall did not stumble upon the child pornography that formed the basis of his receipt charge.
