IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE
AT NASHVILLE
February 16, 2010 Session
STATE OF TENNESSEE v. KENNETH WENDLAND
Direct Appeal from the Circuit Court for Rutherford County
No. F-60686 David Bragg, Judge
No. M2009-01150-CCA-R3-CD - Filed January 31, 2011
The defendant, Kenneth Wendland, entered a plea of guilty to aggravated sexual exploitation
of a minor, a Class B felony, and criminal simulation, a Class E felony, but reserved a
certified question of law pursuant to Rule 37. He received sentences of eight years for the
Class B felony and one year for the Class E felony. The question reserved for review is
whether the searches of the defendant’s home and computers were illegal under both the
United States and Tennessee constitutions. After careful consideration, we conclude that the
searches at issue were legal. Police were properly admitted into Mr. Wendland’s house with
the consent of his roommate. While properly in the home, the officers legally seized
evidence of counterfeiting, pursuant to the plain view doctrine. Specifically, the officers had
legal authority to seize certain computers, computer equipment, and other items as evidence
because they had probable cause to believe that these items were involved in the production
of counterfeit money. After these items were lawfully seized, the computers were properly
searched pursuant to valid search warrants. Consequently, we affirm the judgments of the
trial court.
Tenn. R. App. P. 3 Appeal as of Right; Judgments of the Circuit Court Affirmed
J OHN E VERETT W ILLIAMS, J., delivered the opinion of the Court, in which D AVID H. W ELLES
and J ERRY L. S MITH, JJ., joined.
Brent O. Horst, Nashville, Tennessee, for the appellant, Kenneth Wendland.
Robert E. Cooper, Jr., Attorney General and Reporter; Lacy Wilber, Assistant Attorney
General; William C. Whitesell, Jr., District Attorney General; and Laural A. Hemenway,
Assistant District Attorney General, for the appellee, State of Tennessee.
OPINION
This case began when the Murfreesboro Police Department was notified that an
individual had passed counterfeit ten-dollar bills at three McDonald’s restaurants. Video
obtained from one of the restaurants showed the defendant at the time of the crime, as well
as a clear view of his license plate. All three counterfeit bills passed at the restaurants had
identical serial numbers.
Members of the police department were dispatched to the defendant’s residence. The
defendant answered the door to his home and informed officers that he had a gun “on his
side.” The detectives patted down the defendant and removed a gun and a pocketknife. The
defendant was then placed in the back of a patrol car. The defendant was Mirandized, and
a detective explained to him that they were there because they had received information that
he had passed counterfeit money.
The police returned to the residence and awoke the defendant’s roommate. They
sought and obtained his consent to search the common area of the residence. During the
search, officers saw and later removed the following incriminating items: three computers,
a printer, printing paper, a paper cutter, a ten-dollar bill found at the defendant’s work station
with the same serial number as the counterfeit bills passed at the McDonald’s restaurants, a
McDonald’s sack, and a McDonald’s receipt showing a “90-something cent” purchase paid
for with a ten-dollar bill.
Detective Abbott, one of the officers conducting the search, explained during the
motion to suppress why the incriminating nature of the items that the officers removed was
immediately apparent to him when he first saw them. Based on an examination of the
counterfeit bills they had obtained from the McDonald’s restaurants, the police believed that
all of these bills had been produced from a single ten-dollar bill, which had been scanned into
a computer or copied on a printer. When they searched the house, the police saw what
appeared to be the original ten-dollar bill (which was later copied to make the counterfeit ten-
dollar bills), lying in plain view along with some other money on top of a computer work
station in the common room of the defendant’s home. There was no other visible manner of
making counterfeit money in the home, other than the computers and printer/scanner that
were seen in that common area. Consequently, the only logical conclusion he could reach
when he saw the computers and printer/scanner was that they were the very instrumentalities
that had been used to make the counterfeit copies of the ten-dollar bill that was found near
them.
After the seizures, the defendant gave the police written consent to search his
bedroom, where the police discovered a pipe bomb. Detective Abbott promptly contacted
the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF), who arrived upon the
scene to provide assistance with the removal of the bomb. The ATF advised Officer Abbott
-2-
to secure a search warrant for the residence and the defendant’s car. Judge Loughry, of the
Rutherford County General Sessions Court, issued such a warrant, the first of three ultimately
obtained by police in the case.
Later that evening, the defendant’s computers were taken to the police department,
and a second search warrant was obtained for the purpose of searching them for any files
related to counterfeiting. In the course of searching the defendant’s computers for evidence
relating to counterfeiting, authorities stumbled across what appeared to be files containing
child pornography. Authorities obtained a third search warrant, permitting them to search
the computers for child pornography and, pursuant to this new warrant, found several
suspicious files which did, in fact, contain child pornography.
On May 18, 2009, the defendant pled guilty to aggravated sexual exploitation of a
minor and criminal simulation. His negotiated guilty plea reserved a certified question of law
regarding the lawfulness of the search of his home and computers. This appeal followed.
Analysis
On appeal, the defendant has reserved a certified question of law in which he contends
the trial court improperly denied his motion to suppress. In State v. Preston, 759 S.W.2d 647
(Tenn. 1988), our supreme court made explicit to the bench and bar exactly what the
appellate courts require as prerequisites to the consideration of the merits of a certified
question of law. These requirements are as follows:
Regardless of what has appeared in prior petitions, orders, colloquy in open
court or otherwise, the final order or judgment from which the time begins to
run to pursue a [Tennessee Rule of Appellate Procedure] 3 appeal must contain
a statement of the dispositive certified question of law reserved by [the]
defendant for appellate review and the question of law must be stated so as to
clearly identify the scope and the limits of the legal issue reserved. For
example, where questions of law involve the validity of searches and the
admissibility of statements and confessions, etc., the reasons relied upon by
[the] defendant in the trial court at the suppression hearing must be identified
in the statement of the certified question of law and review by the appellate
courts will be limited to those passed upon by the trial judge and stated in the
certified question, absent a constitutional requirement otherwise. Without an
explicit statement of the certified question, neither the defendant, the State nor
the trial judge can make a meaningful determination of whether the issue
sought to be reviewed is dispositive of the case. . . . Also, the order must state
that the certified question was expressly reserved as part of a plea agreement,
-3-
that the State and the trial judge consented to the reservation and that the State
and the trial judge are of the opinion that the question is dispositive of the case.
. . . No issue beyond the scope of the certified question will be considered.
Id. at 650 (emphasis added); see also State v. Caldwell, 924 S.W.2d 117, 118 (Tenn. Crim.
App. 1995). Failure to properly reserve a certified question of law pursuant to Preston will
result in the dismissal of the appeal. State v. Pendergrass, 937 S.W.2d 834, 838 (Tenn.
1996). Here, the defendant expressly reserved the following question:
whether the search of his home, and his computer were illegal violating the
[Fourth], and [Fourteenth] Amendments to the Constitution of the United
States of America, Article I, [section] 7 of the Constitution of the State of
Tennessee, [Tennessee Code Annotated section] 40-6-105, and [Tennessee
Rule of Criminal Procedure] 41, and whether the Trial Court erred in denying
the Defendant’s motion to suppress evidence seized by the State as a result of
the searches.
Addressing this question under the stringent standards listed above, we must address two
distinct issues: (1) whether officers lawfully searched the defendant’s home; and (2) whether
the officers lawfully searched his computers.
The findings of fact made by the trial court at the hearing on a motion to suppress are
binding upon this court unless the evidence contained in the record preponderates against
them. State v. Ross, 49 S.W.3d 833, 839 (Tenn. 2001). The trial court, as the trier of fact,
is able to assess the credibility of the witnesses, determine the weight and value to be
afforded the evidence, and resolve any conflicts in the evidence. State v. Odom, 928 S.W.2d
18, 23 (Tenn. 1996). The prevailing party is entitled to the strongest legitimate view of the
evidence and all reasonable inferences drawn from that evidence. State v. Hicks, 55 S.W.3d
515, 521 (Tenn. 2001). However, this court is not bound by the trial court’s conclusions of
law. State v. Randolph, 74 S.W.3d 330, 333 (Tenn. 2002). The application of the law to the
facts found by the trial court are questions of law that this court reviews de novo. State v.
Daniel, 12 S.W.3d 420, 423 (Tenn. 2000). The defendant has the burden of establishing that
the evidence contained in the record preponderates against the findings of fact made by the
trial court. Braziel v. State, 529 S.W.2d 501, 506 (Tenn. Crim. App. 1975). Applying these
standards to the record before us to answer the question reserved, we conclude that the search
of defendant’s house was lawful because of the consent to search the common area of the
residence granted by the defendant’s roommate. We also conclude the seizure of the
defendant’s computers to be legal as well, as the prior search of his home established,
through items found in plain view, that the computers and printer to be seized were possible
instrumentalities of a crime.
-4-
The Fourth Amendment to the United States Constitution grants the right to be secure
from unreasonable searches and seizures and prohibits the issuance of warrants without
probable cause. Article I, section 7 of the Tennessee Constitution is identical in purpose and
intent to the federal Fourth Amendment. State v. Troxell, 78 S.W.3d 866, 870 (Tenn. 2002).
Under both constitutions, a warrantless search or seizure is presumed to be unreasonable, and
the resulting evidence is subject to suppression unless the State demonstrates the search or
seizure was conducted pursuant to one of the narrowly defined exceptions to the warrant
requirement. State v. Binette, 33 S.W.3d 215, 218 (Tenn. 2000).
One such exception is a search conducted pursuant to a person’s consent. Schneckloth
v. Bustamonte, 412 U.S. 218, 248 (1973). To provide the basis of a lawful search, any
consent given must be “unequivocal, specific, intelligently given, and uncontaminated by
duress or coercion.” State v. Simpson, 968 S.W.2d 776, 784 (Tenn. 1998) (quoting State v.
Brown, 836 S.W.2d 530, 547 (Tenn. 1992)). Any consensual search must not exceed the
scope of the consent given. Troxell, 78 S.W.3d at 871. To determine whether the scope of
a search has exceeded the scope of the consent given, courts use an objective “reasonable
person” standard, see id., and any express or implied limitations regarding the time, duration,
area, or intensity of police activity necessary to accomplish the stated purpose of the search
are relevant considerations. Florida v. Jimeno, 500 U.S. 248, 251 (1991). The scope of
consent given by a co-inhabitant may not exceed that of his or her authority over the
property; however, such a co-inhabitant may give consent to search areas of common
authority, meaning:
mutual use of the property by persons generally having joint access or control
for most purposes, so that it is reasonable to recognize that any of the co-
inhabitants has the right to permit the inspection in his own right and that the
others have assumed the risk that one of their number might permit the
common area to be searched.
United States v. Matlock, 415 U.S. 164, 171 n.7 (1974); see also State v. Bartram, 925
S.W.2d 227, 231 (Tenn. 1996).
Here, the trial court found the defendant’s roommate gave valid consent to search the
common areas of the house, which included the living room, where the officers observed
some computers and a printer/scanner sitting out on a desk. Prior to the search, police were
aware that the defendant had been identified, by his automobile license plate number and
video tape, as a person who had passed a counterfeit ten-dollar bill at a McDonald’s.
Officers observed that a ten-dollar bill was lying on the living room computer work station
and that the serial number of the bill matched that of the counterfeit currency passed at the
McDonald’s restaurants. In the garbage can, a McDonald’s sack was found, containing a
receipt showing that a purchase was paid for with ten dollars. Under the circumstances, the
-5-
criminal nature of these items, including the computers and the printer/scanner, would have
been immediately apparent to any reasonable observer.
Over ten years ago, in a meeting of the United States House of Representatives,
Subcommittee on Domestic and International Monetary Policy, Committee on Banking and
Financial Services, it was observed that:
We are here today because the Secret Service, the Treasury, and the United
States of America are facing an alarming new challenge to the integrity of our
national currency. Over the past two to three years, the face of counterfeiting
has changed dramatically. The classic movie cliche of the ink-stained master
engraver painstakingly touching up his counterfeit printing plates has now
given way to amateurs, often suburban and teenaged computer hackers, or
drug-dealing urban street gangs. The price of admission to commit the felony
of counterfeiting has suddenly dropped from years of skilled apprenticeship
and access to expensive professional printing equipment to anyone with the
inclination, a personal computer and a color inkjet printer. All that is required
to produce passable bills may be computer equipment no more advanced than
what [forty] percent of American families already own, plus a printer that can
be purchased for as little as $200.
Counterfeiting Using Personal Computers: Before the Committee on Banking and Financial
Services, Subcommittee on Domestic and International Monetary Policy, 105th Cong. 1
(statement of Hon. Michael N. Castle, Chairman, S. Comm. on Dom. and Int’l Monetary
Policy). In the ensuing years, technology has advanced further by leaps and bounds, and it
has become practically common knowledge how little modern technology and specialized
know-how is actually needed to commit serious financial crimes.
In this case, the officers, who were lawfully positioned to observe the computers and
related items pursuant to the consent given to them to search the living room by defendant’s
roommate, were lawfully permitted not only to observe the items, but to actually seize them.
See Thomas K. Clancy, The Fourth Amendment: Its History and Interpretation 305
(Carolina Academic Press 2008) (“[P]lain view doctrine differs from mere visual inspection
from a lawful vantage point in that the officer is also in a lawful position to seize the object
without an additional intrusion.”) (emphasis in original). The defendant argues that there
was no consent to search his personal desk area in the living room, as opposed to the living
room itself, because the desktop was not an area of common authority. However, no
additional consent was required when the seized objects were in plain view of officers
lawfully positioned in the living room. Requiring these officers to simply freeze at the side
of the desk upon viewing these items and to seek a warrant before proceeding further would
“be impractical and do little to promote the objectives of the Fourth Amendment.” Id.
-6-
(quoting Minnesota v. Dickerson, 508 U.S. 366, 375 (1993).
There are a number of courts that have held that officers can seize computers under
the plain view doctrine when the incriminating nature of the computer is immediately
apparent. See United States v. Phan, 628 F. Supp. 2d 562, 572 (M.D. Pa. 2009) (finding that
the incriminating nature of a computer was immediately apparent because computers often
contain documents related to business, and the officers were investigating a claim of
fraudulent business practices); United States v. Rosario, 558 F. Supp. 2d 723, 727-28 (E.D.
Ky. 2008) (holding that the criminating nature of the computer was immediately apparent
when officers had received reports that multiple people had viewed child pornography on the
defendant’s computer); United States v. O’Brien, 498 F. Supp. 2d 520, 545 (N.D. N.Y. 2007)
(finding that officers had probable cause to seize computer under the plain view doctrine
when officers were investigating a claim of inappropriate internet communication and
computer appeared to be connected to the internet). Here, the incriminating nature of the
defendant’s computers and computer equipment would have been immediately apparent to
any reasonable officer, in light of the circumstances that led up to the items being seen. No
other means of making counterfeit money of the kind passed in this case was present in the
home, except for the computers and other items seized by police. Reasonable officers would
necessarily conclude under the circumstances that the computers at issue had, in fact, been
used to create the counterfeit currency the defendant had recently passed.
Next, the defendant argues that the police did not have probable cause to conduct a
further warrantless search of the internal files of the computers. The defendant argues that
the fact that the computers were password protected indicates that the computers were not
under the common authority of the roommate, and thus, any search of its internal files
necessarily exceeded the power of his roomate’s consent. See United States v. Aaron, 33
Fed. Appx. 180, 184 (6th Cir. 2002) (holding search valid under consent given by common
authority where defendant’s computers were not password protected against possible use by
his live-in girlfriend). However, the defendant’s argument on this issue is misplaced. This
second internal search of the computers in question was conducted pursuant to a lawfully
issued search warrant.
The defendant’s argument to the contrary hinges on his assumption that the computers
were initially seized under the authority of the first search warrant obtained by the police,
which was subsequently found to be invalid. However, our review of the record leads us to
the conclusion that the seizure of the computers were lawfully completed before the issuance
of the first search warrant. Therefore, the first search warrant could not serve as the basis
for the seizure of the computers nor does its subsequent invalidation somehow taint the
issuance of the two search warrants that followed. Rather, these computers were seized by
lawfully positioned officers pursuant to the plain view doctrine and, thereafter, searched
internally pursuant to the second and third search warrants, which were lawfully issued.
-7-
Finally, the defendant argues that the second search warrant, dated April 20, 2007, and
the third search warrant, dated May 15, 2007, were issued pursuant to false and misleading
statements and, therefore, should be suppressed. The defendant also contends that the first
search warrant, having been declared invalid on a procedural ground, so taints the issuance
of the second and third warrants as to make them invalid. We note our earlier ruling above
in which we concluded that the search and seizure of the computers initially were not
pursuant to the first warrant issued but, rather, seized lawfully under the doctrine of plain
view.
The defendant’s argument that the second and third warrants were products of false
and misleading statements concerns statements in the affidavits for their issuance that
reference the fact that an earlier search warrant had been issued. The statements contained
in the affidavits for the second and third warrants were essentially that the computers were
in custody of the police pursuant to “a lawfully issued search warrant.” We acknowledge that
the trial court found the first warrant invalid. We conclude, however, that the police officer
statements contained in the two additional affidavits were superfluous and did not amount
to false or misleading statements.
Conclusion
Based on the foregoing and the record as a whole, we affirm the defendant’s
convictions.
_________________________________
JOHN EVERETT WILLIAMS, JUDGE
-8-