PRECEDENTIAL
UNITED STATES COURT OF APPEALS
FOR THE THIRD CIRCUIT
______
Nos. 09-3500 and 09-3501
______
UNITED STATES OF AMERICA
v.
SALVATORE STABILE
Appellant
______
On Appeal from the United States District Court
for the District of New Jersey
(Criminal Nos. 08-cr-00145 & 09-cr-00241-001)
District Judge: Honorable Stanley R. Chesler
______
Argued on December 16, 2010
Before: JORDAN, HARDIMAN and VAN ANTWERPEN,
Circuit Judges.
(Filed February 1, 2011)
Robert W. Ray, Esq. [ARGUED]
Ross M. Bagley, Esq.
Pryor Cashman LLP
1
7 Times Square
New York, NY 10036-6569
Counsel for Appellant
Paul J. Fishman
George S. Leone
John F. Romano [ARGUED]
Office of United States Attorney
970 Broad Street, Suite 700
Newark, NJ 07102-2535
Counsel for Appellee
______
OPINION OF THE COURT
______
VAN ANTWERPEN, Circuit Judge.
Defendant-Appellant Salvatore Stabile (―Stabile‖)
pleaded guilty to one count of bank fraud in violation of 18
U.S.C. § 1344, waived a jury trial and stipulated to facts for a
bench trial with regard to three counts of receipt of child
pornography and one count of possession of child
pornography in violation of 18 U.S.C. § 2252A(a)(5)(B). The
District Court found Stabile guilty of these child pornography
charges. Stabile retained the right to appeal the District
Court‘s ruling on his suppression motions. All charges were
consolidated for sentencing, and the District Court sentenced
Stabile to concurrent sentences of 78 months‘ imprisonment
on each count. Stabile appeals the District Court‘s denial of
his motion to suppress as well as the sentence the District
Court imposed.
2
The facts in this case are complex and they relate to a
number of issues. In particular we face issues regarding the
scope of the plain view doctrine in the context of computer
searches. We will affirm the District Court‘s suppression
order. Stabile also appeals his sentence, however we decline
to exercise our jurisdiction over the sentencing appeal
because Stabile waived his right to appeal his sentence.
I. Facts
A. Background
Prior to the beginning of the investigation, Stabile
resided in Mahwah, New Jersey, with Debbie Deetz. Deetz
believed that she was married to Stabile. However, Stabile
was already married and had not divorced his first wife.
Appx. at A-453. The house shared by Stabile and Deetz was
secured by a mortgage and home equity credit line in the
name of Stabile‘s brother. Stabile defaulted on these loans
and tried to mask his default by passing more than $156,000
in counterfeit checks. These counterfeit checks initially
formed the basis for investigating Stabile.
B. Search of Stabile’s House
At 1:00 p.m. on July 24, 2006, Secret Service Special
Agents Christopher Albanese and John Croes, and Detective
Joseph Nieciecki of the Bergen County Sheriff‘s Department,
arrived at Stabile‘s house to question Stabile about
counterfeiting checks. Stabile was not at home, but Deetz
answered the door, invited the agents inside, asked the
officers to sit at a table near the living room, and offered them
something to drink. The officers informed Deetz of the
3
purpose of their visit and explained that they suspected that
Stabile had engaged in financial crimes. Albanese then asked
Deetz for consent to search the house. Albanese provided
Deetz with a consent form and informed Deetz that she could
refuse consent. Deetz reviewed the consent form for
approximately thirty minutes and then signed it. Deetz
testified that one of the reasons she voluntarily signed the
form was so she herself could find out about Stabile‘s
deceptive financial practices.
Deetz granted consent orally and in writing by signing
a consent form.1 Without a search warrant but with Deetz‘s
1
The ―Consent To Search‖ form states, in its entirety:
―I, Debbie Deetz, have been informed of my
constitutional right not to have a search made of
the premises and/or automobile mentioned
without a search warrant. I have also been
informed of my right to refuse to consent to
such a search. However, I hereby authorize
Christopher Albanese and John Croes, Special
Agents, United States Secret Service to conduct
a complete search of the premises and/or
automobile at 181 Miller Road, Mahwah, NJ.
These (officers or agents) are authorized by me
to take from the premises and/or automobile
any letters, papers, materials or other property
which is contraband or evidence in the nature of
financial crimes. I understand that this
contraband or evidence may be used against me
in a court of law. This written permission is
being given by me to the above named persons
4
consent, the agents began a search of the house. During the
course of the search, Deetz led the agents around the house,
provided the agents with documents related to Stabile‘s
finances, and showed the agents the locations of several
computers. Next to one computer, the agents found check
stock, check writing software, photocopies of checks, copies
of previously-passed fraudulent checks, two printers, and
checks with an alias. Deetz also showed the agents two
computers and several hard drives in the basement of the
house. At the suppression hearing, Deetz testified:
Q. And who pointed out those hard drives to the law
enforcement officers?
A. I [Deetz] did.
Q. Did you provide consent for the officers to search
those computers?
A. Yes, I did.
Appx. at A-467. The agents then called the Bergen County
Prosecutor‘s Office, which sent two members from its
Computer Crimes Unit to disconnect the hard drives. Deetz
showed the recently-arrived Bergen County officers the
locations of the computers and the hard drives. Deetz
watched the officers remove the hard drives. When one
officer had difficulty removing a hard drive, Deetz asked the
officer if he needed a screwdriver. The officer replied that he
voluntarily and without threats, duress, or
promises of any kind. I understand that I may
ask for and receive a receipt of all things taken.‖
The form was then signed by Albanese, Croes, and Deetz.
Appx. at A-195.
5
did, so Deetz got a screwdriver from Stabile‘s toolbox and
gave it to the officer. At approximately 6:00 p.m., the Bergen
County officers Justified the house, taking with them six hard
drives. Stabile was not present in his house at any point
during this search. In fact, the search had been completed
when Stabile arrived home, at approximately 7:15 p.m.
During their search of Stabile‘s house, the agents also
found several DVDs in a desk bearing labels which led the
agents to believe the DVDs contained child pornography.2
The officers seized the DVDs but, upon a later viewing of
their contents, determined that they did not contain child
pornography.
When Stabile arrived home, Deetz waited outside the
house while the agents interviewed Stabile. Although the
agents attempted to question Stabile, Stabile refused to
answer questions without an attorney present. When
informed that Deetz had already consented to the search,
Stabile attempted to revoke Deetz‘s consent by stating ―I take
it back.‖ The agents then departed. It is undisputed that
Stabile did not request the return of his property at this time.
In fact, Stabile did not request return of his seized property
until February 15, 2008, when he filed a motion to return
property.
2
One such DVD was labeled ―Japanese Mature Women VS.
Ripe Boy Movies.‖ Agent Albanese also opined in his
affidavit attached to the warrant application that the ―images
of males depicted on the labels are . . . images of minors.‖
Appx. at A-127-28.
6
C. Issuance of the State Search Warrant
Although the agents obtained the six hard drives on
July 24, 2006, Agent Albanese did not apply for a state search
warrant until October 19, 2006 because he was assigned to a
Secret Service security detail for the President and other high
officials. Finally, Albanese applied for a state search warrant
on October 19, 2006 in New Jersey Superior Court in Morris
County.3 The state search warrant was issued and authorized
search of the computer hard drives4 for evidence of ―both
financial crimes and the possession of child pornography.‖
Probable cause to search the hard drives for evidence of
financial crimes was based on the check stock, printed
checks, and check printing software found in Stabile‘s house.
3
Stabile‘s home was in Bergen County, New Jersey, but the
investigation was centered in Morris County, New Jersey,
where Stabile allegedly delivered three counterfeit checks to
an attorney.
4
The Morris County Inventory Receipt identified six hard
drives:
(1) Western Digital 40 GB 3.5 inch HDD, Ser #
WMAAT1253959
(1) Western Digital 120 GB 3.5 inch HDD, Ser #
WMAAT2323593
(1) Western Digital 2559.8 MB 3.5 inch HDD, Ser #
WM3491805359
(1) Seagate 3.5 inch HDD, Ser # LAA62086
(1) Quantum 3.5 inch HDD, Ser # 824909331341
(1) Samsung 6.8 GB 3.5 inch HDD, Ser #
0149J1FKB07213
7
Probable cause to search for evidence of child pornography
was based on the DVDs found in a desk in Stabile‘s house.
The affidavit submitted by Albanese stated that ―This Affiant
believes these DVDs contain labels with language that refers
to mature women and young boys and contains images of
minors.‖ Unbeknownst to Albanese, between the July 24,
2006 seizure of the DVDs and the October 19, 2006 state
search warrant application, state law enforcement officers had
already viewed the DVDs and determined that they did not
contain child pornography. Albanese was not aware that the
DVDs had been viewed and determined not to contain child
pornography when he applied for the state search warrant on
October 19, 2006. Accordingly, the state search warrant
obtained on October 19, 2006 stated that it authorized search
of the hard drives for evidence of both financial crimes and
child pornography.
On November 16, 2006, after the issuance of the state
search warrant, Agent Albanese traveled to the Bergen
County Prosecutor‘s Office where the evidence was stored.
Albanese picked up the evidence and transported it to the
Morris County Prosecutor‘s Office. During this process, but
before Albanese brought the hard drives to the Morris County
Prosecutor‘s Office, Albanese learned that the DVDs from the
desk had been viewed and were found not to contain child
pornography. Appx. at A-726. Upon arrival, Albanese
―informed everybody,‖ including the detective who would
perform the forensic search, that there was a ―problem‖ with
the state search warrant as it related to child pornography.
Appx. at A-726.
D. Execution of State Search Warrant
8
In mid-November, 2006, Detective Vanadia, a forensic
specialist at the Computer Crimes Unit of the Morris County
Prosecutor‘s Office, received the hard drives. Vanadia had
been instructed to search only for evidence of financial crimes
and told that if he came across child pornography, he was to
stop his review and contact the Secret Service. Appx. at A-
528, A-562, A-580-81, A-727-28.
With these instructions, Detective Vanadia
commenced his forensic hard drive search. He began with the
120 GB hard drive (Western Digital 120 GB 3.5 inch HDD,
Ser # WMAAT2323593). During this search, Vanadia noted
numerous suspicious folders. One such folder was entitled
―Kazvid.‖ Vanadia understood this folder to reference
―Kazaa,‖ a peer-to-peer file sharing program used to share
music, movies, pictures, and programs. Appx. at A-532.
Vanadia also testified that, in his experience, Kazaa has been
used to share and distribute child pornography.
Detective Vanadia then ―highlighted‖ the Kazvid
folder, a procedure that allowed him to view a list of file
names contained in the folder. Vanadia later testified that he
highlighted the Kazvid folder not because it necessarily
contained child pornography but because – as a suspicious
folder – it could harbor evidence of any sort of crime,
including a financial crime. Appx. at A-536-37, A-581-82.
Vanadia also testified that, in his experience, people hoping to
conceal the contents of a folder or file would often mislabel
or otherwise disguise those folders or files. Appx. at A-537,
A-582. However, Vanadia did acknowledge that when he
viewed the file names in the ―Kazvid‖ folder, the thought that
it may contain child pornography did cross his mind. Appx. at
A-588.
9
After highlighting the ―Kazvid‖ folder, Detective
Vanadia observed a list of file names with file extensions
indicating video files and file names suggestive of child
pornography.5 At this point, although Vanadia admitted that
he suspected child pornography and did not believe these
video files contained evidence of financial crimes, Vanadia
proceeded to open twelve different video files within the
Kazvid folder. Appx. at A-534-35, A-591-92. Vanadia
testified that he opened these twelve files to ―confirm‖ that
they contained child pornography rather than something else
(such as adult pornography). Appx. at A-534-35, A-591-92.
After ―confirming‖ that these files did contain child
pornography, Vanadia contacted the prosecutor, who
instructed Vanadia to cease his review of the hard drive.
Agent Albanese was notified of Vanadia‘s findings.
E. The Federal Search Warrants
After learning of Detective Vanadia‘s discovery of
child pornography, Agent Albanese applied for a federal
search warrant on April 23, 2007, which was issued on April
24, 2007. This was the first federal search warrant issued in
this case. The affidavit for the first federal search warrant
was based on probable cause gleaned from the names of the
files in the Kazvid folder, not the contents of the files
5
These files had names such as ―PTHC‖ (pre-teen hardcore),
―PEDO‖ (pedophile-related), ―6YO‖ (six-year-old), and
―8YO‖ (eight-year-old). Some file names identified a sex act
and the gender of the participant following the ―YO‖ age
designation.
10
themselves.6 At no point in the first federal search warrant
application did the affidavit state that Vanadia had opened the
files in the Kazvid folder.
On April 24, 2007, based on the file names found in
the Kazvid folder on the 120 GB drive, a magistrate issued
the first federal search warrant authorizing further
investigation. However, by mistake the first federal search
warrant only authorized the search of a different hard drive
owned by Stabile, the 40 GB hard drive (Western Digital 40
GB 3.5 inch HDD, Ser # WMAAT1253959), rather than the
120 GB hard drive Detective Vanadia had examined.
Around April 25, 2007, Agent Joseph Tokash executed
the first federal search warrant and searched the 40 GB hard
6
The affidavit stated:
26. While running a search for the counterfeit check
numbers, Detective Vanadia began reviewing the file
folders on the DRIVE to locate a commercially
available check processing program which, based upon
his training and expertise, he knew was commonly
used in the production of counterfeit checks. While
conducting this review, Detective Vanadia observed a
file folder labeled ―Kazaa Vid‖ that contained
approximately 410 saved files. Detective Vanadia
further observed that several of these files contained
titles with the abbreviation ―PTHC‖ as well as file
names including ―6yopedo‖ and ―9yofuck.‖
Appx. at A-164.
11
drive. This search resulted in the discovery of two videos and
86 thumbnail images of child pornography. Appx. at A-189.
Based on the discovery of child pornography on the 40
GB hard drive, Agent Albanese sought a second federal
search warrant on September 20, 2007 to search the other five
hard drives (including the 120 GB hard drive originally
searched by Detective Vanadia in November, 2006 pursuant
to the state search warrant for financial information). The
second federal search warrant was issued authorizing the
search of the remaining five hard drives (excluding the
previously-searched 40 GB hard drive). Agent Tokash
executed the second federal search warrant and discovered
more than 200 videos and 100 thumbnail images depicting
child pornography.
F. Arrest and Prosecution
On October 10, 2007, Stabile was arrested and charged
with receipt of child pornography in violation of 18 U.S.C. §
2252A(a)(2)(B) and indicted on February 21, 2008. On
February 2, 2009, a superseding indictment was filed
charging Stabile with three counts of receipt of child
pornography in violation of 18 U.S.C. § 2252A(a)(2)(B) and
one count of possession of child pornography in violation of
18 U.S.C. § 2252A(a)(5)(B). In a separate prosecution, on
May 9, 2008, Stabile was charged with bank fraud under 18
U.S.C. § 1344.
G. Stabile’s Motion to Suppress and the District Court’s
Decision
12
On July 1, 2008, Stabile moved to suppress evidence
seized from his house on July 24, 2006, arguing (1) that the
Government‘s warrantless seizure of the hard drives for three
months without a search warrant was unreasonable, and (2)
that pursuant to Franks v. Delaware, 438 U.S. 154 (1978), the
state search warrant authorizing search for child pornography
was invalid because the DVDs from the desk which formed
the alleged ―probable cause‖ did not actually contain child
pornography.
In September, 2008, the District Court held a two-day
evidentiary hearing. On November 3, 2008, the parties
submitted post-hearing briefs. Stabile argued that: (1)
Detective Vanadia‘s search exceeded the scope of the search
for financial information authorized by Deetz‘s consent and
the state search warrant; (2) Stabile withdrew Deetz‘s consent
when he got home and therefore, pursuant to Georgia v.
Randolph, 547 U.S. 103 (2006), the Government waited an
unreasonable period of time to secure the state search
warrant; and (3) suppression of evidence was required as a
result of this unreasonable search. On December 4, 2008, the
District Court again heard oral argument.
On January 21, 2009, the District Court denied
Stabile‘s motion to suppress. United States v. Stabile, Crim.
No. 08-145 (SRC), 2009 U.S. Dist. LEXIS 4263 (D.N.J. Jan.
21, 2009). The District Court concluded that the search of
Stabile‘s house was a valid consent search, that Stabile could
not ―revoke‖ Deetz‘s prior consent under Georgia v.
Randolph, that the Government‘s delay in obtaining a state
search warrant was not unreasonably long, and that, under the
inevitable discovery doctrine, the evidence obtained from the
search of the 120 GB hard drive need not be suppressed.
13
On February 3, 2009, Stabile filed a motion for
reconsideration in which he argued that, inter alia, the
District Court committed legal error by applying the
inevitable discovery doctrine rather than the independent
source doctrine, and that this error required correction. On
March 13, 2009, the District Court denied the motion for
reconsideration, reaffirming its application of the inevitable
discovery doctrine and holding that the evidence would also
be admissible under the independent source doctrine. United
States v. Stabile, Crim. No. 08-145 (SRC), 2009 U.S. Dist.
LEXIS 20275 (D.N.J. Mar. 13, 2009).
H. Stipulated Facts Trial and Guilty Verdict (Child
Pornography Counts)
Following denial of his motion to reconsider, Stabile
executed stipulations with the Government, including an
admission that he knowingly received and possessed child
pornography. Stabile also executed a stipulation preserving
his right to appeal the denial of the motion to suppress. The
parties also stipulated that the applicable Guidelines offense
level was 26. Finally, Stabile stipulated that he ―voluntarily
waives the right to file any appeal . . . including but not
limited to an appeal under 18 U.S.C. § 3742 . . . which
challenges the sentence imposed by the sentencing court in
this case if that sentence falls within or below the Guidelines
range that results from the agreed total Guidelines offense
level of 26.‖
On April 3, 2009, Stabile was advised in court about
the impact of the stipulations, including the appellate waiver.
Stabile knowingly and voluntarily agreed to the stipulations.
14
After a bench trial, the District Court found Stabile guilty of
all four counts in the Superseding Indictment pertaining to
child pornography.
I. Guilty Plea (Bank Fraud Count)
On April 3, 2009, Stabile was charged in a one-count
information with bank fraud in violation of 18 U.S.C. § 1344,
executed a written Plea Agreement, and entered a guilty plea
to the information.
J. Consolidated Sentencing Proceeding
All of Stabile‘s convictions were consolidated for
sentencing. A sentencing hearing was held on August 12,
2009. The District Court calculated the applicable Guidelines
range using offense level 26 – the level to which Stabile had
agreed. Stabile‘s criminal history category was level III.
The District Court determined that Stabile‘s Guidelines range
was 78 to 97 months. The District Court also heard
arguments from Stabile that the child pornography guideline,
specifically U.S.S.G. § 2G2.2, should be afforded little
deference. After considering these arguments and the 18
U.S.C. § 3553(a) factors, the District Court imposed
concurrent 78-month sentences on each count.
K. Appeal
On August 21, 2009, Stabile filed an appeal
challenging the District Court‘s denial of his motion to
suppress and his sentence.
II. Jurisdiction
15
The District Court had jurisdiction under 18 U.S.C. §
3231. We have jurisdiction over Stabile‘s appeal of the
District Court‘s denial of his motion to suppress under 28
U.S.C. § 1291 and over his challenge to his sentence under 18
U.S.C. § 3742(a).
III. Issues and Analysis
On appeal, Stabile challenges the District Court‘s
denial of his motion to suppress as well as the sentence the
District Court imposed.
III.A. Motion to Suppress
Stabile first appeals the District Court‘s denial of his
motion to suppress evidence of child pornography obtained
from Stabile‘s six computer hard drives. Stabile alleges
myriad violations of his Fourth Amendment rights and
concludes that the fruits of these allegedly illegal searches
must be suppressed. We consider Stabile‘s arguments in
chronological order of the investigation: (1) search of
Stabile‘s house; (2) seizure of Stabile‘s six computer hard
drives; (3) delay in obtaining the state search warrant; and (4)
search of the hard drives. Finding no Fourth Amendment
violations requiring suppression, we will affirm.
We review the District Court‘s denial of a motion to
suppress for clear error as to the underlying factual
determinations but exercise plenary review over the District
Court‘s application of law to those facts. See United States v.
Bond, 581 F.3d 128, 133 (3d Cir. 2009); United States v.
Perez, 280 F.3d 318, 336 (3d Cir. 2002).
16
III.A.1. Search of Stabile’s House
Stabile first argues that the Government‘s July 24,
2006 warrantless search of his house violated the Fourth
Amendment. This argument fails because Deetz consented to
the search.
The Fourth Amendment prohibits unreasonable
searches and seizures. See Illinois v. Rodriguez, 497 U.S.
177, 183 (1990); United States v. Price, 558 F.3d 270, 277
(3d Cir. 2009); Payton v. New York, 445 U.S. 573, 586
(1980). In general, a ―warrantless entry into a person‘s house
is unreasonable per se.‖ See Payton, 445 U.S. at 586.
However, there are exceptions to this rule. See Jones v.
United States, 357 U.S. 493, 499 (1958).
Consent is an exception to the ―requirements of both a
warrant and probable cause.‖ Schneckloth v. Bustamonte, 412
U.S. 218, 219 (1973); see Florida v. Jimeno, 500 U.S. 248,
250-51 (1991) (approving consent searches because a search
permitted by consent is reasonable). Consent must be given
voluntarily, Bumper v. North Carolina, 391 U.S. 543, 548
(1968), and voluntariness may be gleaned from considering a
range of factors. See Price, 558 F.3d at 279; United States v.
Kim, 27 F.3d 947, 955 (3d Cir. 1994). The individual giving
consent must also possess the authority to do so, see
Rodriguez, 497 U.S. at 181, and ―the consent of one who
possesses common authority over premises or effects is valid
as against the absent, nonconsenting person with whom that
authority is shared,‖ United States v. Matlock, 415 U.S. 164,
170 (1974). Common authority rests not on property rights
but ―rather on mutual use of the property by persons generally
having joint access or control . . . so that it is reasonable to
17
recognize that any of the cohabitants has the right to permit
the inspection in his own right and that the others have
assumed the risk that one of their number might permit the
common area to be searched.‖ Id. at 172 n.7. Finally, ―a
warrantless search of a shared dwelling for evidence over the
express refusal of consent by a physically present resident
cannot be justified as reasonable as to him on the basis of
consent given to the police by another resident.‖ Georgia v.
Randolph, 547 U.S. 103, 120 (2006).
Here, Deetz had authority to consent and voluntarily
consented. Deetz had common authority to consent to a
search of the house because, as a cohabitant, she mutually
used the property along with Stabile and exercised joint
access and control over the house. See Matlock, 415 U.S. at
172 n.7. Deetz‘s mistaken belief that she was married to
Stabile does not alter the analysis because an unmarried
cohabitant has authority to consent to a search of shared
premises. See id. at 176. Finally, we note that at the time
Deetz granted consent, Stabile was not present. Stabile‘s
absence distinguishes this case from Georgia v. Randolph,
which applies only when a ―physically present resident‖
refuses consent. 547 U.S. at 120. Therefore, because Deetz
exercised her access and control over the premises absent any
contemporaneous refusal by a co-resident, she had authority
to consent at the time of the search.
We also conclude that Deetz‘s consent was voluntary.
―[W]e determine the voluntariness of a consent by examining
the totality of the circumstances.‖ Price, 558 F.3d at 278;
Schneckloth, 412 U.S. at 227. We consider such factors as
―age, education, and intelligence of the subject; whether the
subject was advised of his or her constitutional rights; the
18
length of the encounter, the repetition or duration of the
questioning; and the use of physical punishment.‖ Price, 558
F.3d at 278; see Schneckloth, 412 U.S. at 226. The ―‗setting
in which the consent was obtained [and] the parties‘ verbal
and non-verbal actions‘‖ are also relevant. Price, 558 F.3d at
278 (quoting United States v. Givan, 320 F.3d 452, 459 (3d
Cir. 2003)). Finally, even though Deetz was told she could
refuse, the Government need not inform the subject of his
right to refuse consent. Schneckloth, 412 U.S. at 227 (not
essential for prosecution to show that the consenter knew of
the right to refuse consent in order to establish that the
consent was voluntary); Kim, 27 F.3d at 955.
Here, Deetz, an educated person, invited the officers
into her house. She asked the officers to sit and offered them
drinks. The officers asked Deetz to sign a written consent
form, and Deetz thought about whether to sign it for thirty
minutes before she did, in fact, sign it. Deetz also orally
consented to the search. After signing the form, Deetz
assisted the officers in their search of the house by leading
them to several computers and, later, providing one officer
with a screwdriver to help remove a hard drive. Considering
the totality of the circumstances, there is no indication that
Deetz‘s consent was involuntary.
Therefore, because Deetz had the authority to consent
to a search of the house and because Deetz voluntarily
consented to the search, the initial warrantless search of the
house did not violate the Fourth Amendment.
III.A.2. Seizure of Stabile’s Six Hard Drives
19
Although Stabile concedes in his brief that the
warrantless seizure of the six computer hard drives is
controlled by the case law7 of this circuit, he nevertheless
contests the seizure and makes two arguments in his brief.
First, Stabile contends that the Government lacked authority
to seize the six hard drives because Deetz could not consent
to a seizure of the drives. Second, Stabile argues that even if
Deetz did validly consent to the seizure of the hard drives, the
Government‘s seizure was still unreasonably overbroad.
Both of these arguments lack merit.
III.A.2.a. Consent to Seize Hard Drives
We first consider whether Deetz consented to the
seizure of the hard drives. This analysis parallels the analysis
of whether Deetz could consent to the search of the house:
Deetz must have had authority to consent to the seizure of the
hard drives, and she must have consented voluntarily.
We believe Deetz had authority to consent to the
seizure of the six hard drives. The ―authority to consent‖
determination is complicated because computers often
contain segregated blocks of information. We begin with the
same proposition that authority to consent derives from
―mutual use of the property by persons generally having joint
access or control for most purposes.‖ Matlock, 415 U.S. at
171 n.7; see Frazier v. Cupp, 394 U.S. 731, 740 (1969) (joint
use of duffel bag gave third party authority to consent to
search of bag). However, a third party lacks authority to
consent to a search of an area in which the target of the search
7
Stabile cites United States v. King, 604 F.3d 125 (3d Cir.
2010).
20
has not ―relinquished his privacy.‖ United States v. King, 604
F.3d 125, 137 (3d Cir. 2010); see United States v. Block, 590
F.2d 535 (4th Cir. 1978) (holding that mother had authority to
consent to search of son‘s bedroom but not to son‘s locked
footlocker kept under his bed); Randolph, 547 U.S. at 135
(Roberts, C.J., dissenting) (―To the extent a person wants to
ensure that his possessions will be subject to a consent search
only due to his own consent, he is free to place these items in
an area over which others do not share access and control, be
it in a private room or a locked suitcase under a bed.‖). Thus
if a person has not ―relinquished his privacy‖ in some files on
a computer or in a subset of information contained on the
computer, a third party would have no authority to consent to
the search or seizure of those segregated materials.
Additionally, multiple people may use the same
computer and store information on the same hard drive. It is
more difficult to determine whether joint access and control
exists over information stored on a computer than the
contents of a duffel bag. See Frazier, 394 U.S. at 740.
Indeed, attempting to make these determinations would force
courts to engage in the very ―metaphysical subtleties‖ the
Supreme Court expressly rejected in Frazier when the
defendant unsuccessfully argued that a third party had ―actual
consent‖ only to use one compartment of a duffel bag. Id.
Thus we are faced at the outset with a conceptual question: is
a computer more like a shared duffel bag, see Frazier, 394
U.S. 731, or more like a locked footlocker under the bed? See
Block, 590 F.2d 535. We believe the answer depends on
factors such as the identity of the user(s), whether password
protection is used, and the location of the computer in the
house. See United States v. Andrus, 483 F.3d 711,718-20
21
(10th Cir. 2007) (listing factors to consider when evaluating
validity of third party consent to search computer).
Recently, in United States v. King, where the
defendant ―placed his hard drive inside the computer‖ owned
by another person but which the two of them shared, and did
not use password protection, the defendant ―assumed the risk‖
that the other person would ―consent to its seizure.‖ 604 F.3d
at 137. Conversely, in Trulock v. Freeh, the defendant
utilized password protection to protect his private computer
files, and, therefore, the Fourth Circuit determined that the
defendant had not assumed the risk that his co-user ―would
permit others to search his files.‖ 275 F.3d 391, 403 (4th Cir.
2001). Moreover, in King, we considered whether the
holding of Georgia v. Randolph that a ―present and objecting
resident can override another resident‘s consent to search a
home‖ applied to the seizure of a computer. 604 F.3d at 130.
The King court determined that Randolph was meant to apply
only to dwellings and, therefore, that a ―present and objecting
resident‖ could not override another resident‘s consent to
seize a shared computer which contained a personal hard
drive but lacked user-specific password protection. Id. at
137; see Andrus, 483 F.3d at 721 (objectively reasonable to
perceive third party consent where consenter was a ―user‖ of
the computer).
Here, the facts weigh in favor of a determination that
Deetz had the authority to consent to a search and seizure of
the shared hard drives. First, the computer was not password-
protected. The failure to use password protection indicates
that Stabile relinquished his privacy in the contents of the
computer. Cf. Trulock, 275 F.3d at 403 (third party did not
have authority to consent to search of joint computer user‘s
22
password-protected files). In distinction to King, here Stabile
was not present and objecting to the search of the computer.
Moreover, all of the computers and seized hard drives were
located in common areas of the home, such as on the main
floor and in the basement, rather than in a private bedroom.
See Andrus, 483 F.3d at 719 (third party authority to consent
generally upheld when computer located in common area
accessible to family members). These factors indicate that,
under the totality of the circumstances, Deetz had unfettered
access to the hard drives and had authority to consent to the
seizure of all of them.
Deetz‘s consent to the seizure of the six hard drives
was voluntary. As previously discussed, Deetz signed the
consent form and told the investigator to ―go ahead and take
them [the hard drives].‖ Moreover, Deetz‘s consent may also
be inferred from the assistance she provided to the officers.
Specifically, when one officer had difficulty extracting a hard
drive from the computer terminal, Deetz obtained a
screwdriver from Stabile‘s toolbox and gave it to the officer.
See United States v. Al-Marri, 230 F. Supp. 2d 535, 539
(S.D.N.Y. 2002) (defendant objectively consented to search
of his computer by, inter alia, assisting the investigation by
helping FBI agents pack his computer in a carrying case).
Thus we conclude that Deetz had authority to consent
to the seizure of the six hard drives and did so voluntarily.
III.A.2.b. Scope of Seizure of Hard Drives
Pursuant to Deetz‘s consent, the officers searched the
house and seized six computer hard drives. Stabile argues
that even assuming Deetz validly consented to this search and
23
seizure, the seizure of six entire hard drives was unreasonable
because it was unconstitutionally overbroad. Stabile notes
that by seizing six entire hard drives, the Government also
seized personal emails and other information not related to
financial crimes. Therefore, according to Stabile, the
Government‘s failure to ―segregate‖ data on-site (at Stabile‘s
house) renders this seizure unconstitutionally overbroad. The
Government defends the seizure on the grounds that Deetz
did not limit the scope of her consent, that evidence of
financial crimes could be found anywhere on any computer
hard drive, and that the practical considerations of
investigating and seizing electronic evidence counsel against
on-site data collection. We agree with the Government and
reject Stabile‘s argument.
The seizure of the six entire hard drives was
reasonable. First, except for the restriction as to financial
crimes, Deetz did not limit the scope of her consent in any
way. See Jimeno, 500 U.S. at 251-52 (requiring explicit
limitation on consent). Second, a broad seizure was required
because evidence of financial crimes could have been found
in any location on any of the six hard drives, and this
evidence very likely would have been disguised or concealed
somewhere on the hard drive. See United States v. Adjani,
452 F.3d 1140, 1150 (9th Cir. 2006). Third, as a practical
matter, ―[w]hen a search requires review of a large collection
of items, such as papers, ‗it is certain that some innocuous
documents will be examined, at least cursorily, in order to
determine whether they are, in fact, among those papers
authorized to be seized.‘‖ United States v. Williams, 592 F.3d
511, 519-20 (4th Cir. 2010) (quoting Andresen v. Maryland,
427 U.S. 463, 482 n.11 (1976)). Finally, Stabile argues for an
―on-site‖ search requirement, but the practical realities of
24
computer investigations preclude on-site searches. For
example, a hard drive search requires a ―controlled
environment.‖ United States v. Hay, 231 F.3d 630, 637 (9th
Cir. 2000). Computer searches are also time consuming and
require trained forensic investigators. See United States v.
Upham, 168 F.3d 532, 535 (1st Cir. 1999). In short, such on-
site searches would be ―fraught with difficulty and risk,‖
United States v. Hill, 459 F.3d 966, 974 (9th Cir. 2006), and
cannot be rushed by a cursory on-site search.8 All these
reasons suggest that the seizure of the six entire hard drives
was reasonable.
Lastly, although Stabile attempted to revoke Deetz‘s
consent when he returned home later on the day of the search
8
Stabile heavily relies on United States v. Tamura, 694 F.2d
591 (9th Cir. 1982). His reliance is faulty. Tamura, a case
dealing with the overbroad seizure of paper records,
―preceded the dawn of the information age.‖ Comprehensive
Drug Testing, 621 F.3d 1162, 1169 (9th Cir. 2010)
(discussing Tamura). And even the Ninth Circuit recognized
that Tamura needed to be ―updated . . . to apply to the
daunting realities of electronic searches.‖ Id. at 1177. Thus
while the concerns of Tamura may remain valid, we hesitate
to apply the procedures Tamura outlined for proper searches
of physical evidence to the procedures required to searches of
electronic evidence. See generally, id., at 1175-78. Finally,
we note that although the Tamura court found the overbroad
seizure of documents ―unreasonable,‖ the court concluded
that suppression was not required. Tamura, 694 F.2d at 696-
97. Thus, even if Tamura were to apply, it would not require
suppression here either.
25
by stating ―I take it [Deetz‘s consent] back‖ to the
investigating agents, this revocation is ineffective. Stabile
could not revoke Deetz‘s consent to search the house because
Stabile was not ―physically present‖ at the time Deetz
consented. Randolph, 547 U.S. at 120. Nor can Stabile
revoke Deetz‘s consent to the seizure of the shared hard
drives because Stabile had ―relinquished his privacy‖ in the
hard drives, King, 604 F.3d at 137, and thus ―assumed the
risk‖ that a third party could consent to their search or
seizure, Matlock, 415 U.S. at 171.
III.A.3. Delay in Obtaining the State Search Warrant
Stabile also argues that the Government unreasonably
delayed by waiting almost three months9 before obtaining the
state search warrant and searching the seized hard drives.
This argument raises some difficult issues.
Initially, we note that Stabile‘s reliance on United
States v. Mitchell, 565 F.3d 1347 (11th Cir. 2009), and United
States v. Dass, 849 F.2d 414 (9th Cir. 1988), is misplaced.
Mitchell and Dass held, respectively, that a 21-day delay and
a 7- to 23-day delay between seizure and search were
unreasonable when the warrantless seizures were based on
probable cause, not consent. Mitchell, 565 F.3d at 1349-51;
Dass, 849 F.2d at 414-15. This distinction matters. The
Mitchell court carefully policed the temporal delay in
obtaining a search warrant because each passing day
―infringes possessory interests protected by the Fourth
9
The officers seized the hard drives on July 24, 2006, but the
state search warrant was not issued until October 19, 2006.
26
Amendment‘s prohibition on ‗unreasonable searches.‘‖
Mitchell, 565 F.3d at 1350 (quoting United States v.
Jacobsen, 466 U.S. 109, 124 (1984)). But where a person
consents to search and seizure, no possessory interest has
been infringed because valid consent, by definition, requires
voluntary tender of property.10
Of course, ―a seizure lawful at its inception can
nevertheless violate the Fourth Amendment if its manner of
execution unreasonably infringes possessory interests
protected by the Fourth Amendment‘s prohibition on
‗unreasonable seizures.‘‖ Jacobsen, 466 U.S. at 125. To
determine whether the seizure became unreasonable, this
Court ―must balance the nature and quality of the intrusion on
the individual‘s Fourth Amendment interests against the
importance of the governmental interests alleged to justify the
intrusion.‖ United States v. Place, 462 U.S. 696, 703 (1983);
see United States v. Martin, 157 F.3d 46, 54 (2d Cir. 1998)
(―even a seizure based on probable cause is unconstitutional if
police act with unreasonable delay in securing a warrant‖).
Here, we balance the interests at stake to determine
whether the three month delay was reasonable. Stabile relies
on Mitchell‘s focus on the property interest at stake in one‘s
computer:
Computers are relied upon heavily for personal
and business use. Individuals may store
personal letters, e-mails, financial information,
10
As noted, there was no request for return of the hard drives
until February 15, 2008, which was well after the state search
warrant had been obtained.
27
passwords, family photos, and countless other
items of a personal nature in electronic form on
their computer hard drives. . . . If anything, this
consideration applies with even greater force to
the hard drive of a computer, which is the
digital equivalent of its owner‘s home, capable
of holding a universe of private information.
Mitchell, 565 F.3d at 1351-52. Stabile also argues that ―his
job required him to have constant access to a computer.‖
Appx. at A-202; Appellant‘s Br. 23.
Stabile‘s actions undermine his argument. First, it is
undisputed that Stabile did not ask for the return of his hard
drives until February 15, 2008 – eighteen months after the
initial seizure of the hard drives.11 See United States v. Johns,
469 U.S. 478, 487 (1985) (defendants who ―never sought
return of the property‖ cannot argue that delay adversely
affected Fourth Amendment rights). And when asked why he
never requested the return of the hard drives, Stabile testified,
―I just assumed that perhaps that they didn‘t find anything
and it was going to go away.‖ Appx. at A-780. Second,
11
Stabile argues that his attempted revocation of Deetz‘s
consent must be construed as a ―request for re-possession of
his seized property. Appellant‘s Br. 26. We disagree. In
response to the officers‘ statement to Stabile that Deetz had
already given consent to a search of the house, Stabile
replied, ―I take it back.‖ This bare statement cannot be
transformed into a request for return of the hard drives.
Moreover, Stabile concedes, as he must, that our opinion in
United States v. King forecloses his attempt to revoke consent
pursuant to Georgia v. Randolph. Appellant‘s Br. 35 n.16.
28
although Stabile claims he needed a computer for work,
Deetz brought a replacement computer to the house one day
after Stabile‘s computers had been seized. Appx. at A-473-
75.
We also consider the Government‘s rationale for the
delay. Agent Albanese testified that the three-month delay in
securing a state search warrant was due to his assignment to a
Secret Service Detail protecting the President and other high
officials. Moreover, because Albanese was the lead case
agent, he was responsible for seeking the state search warrant.
Stabile notes that the Eleventh Circuit in Mitchell rejected the
argument that a 21-day delay was not unreasonable because
the officer was attending a training seminar. Mitchell, 565
F.3d at 1352. However, the Mitchell court explicitly stated
that ―we emphasize that we are applying a rule of
reasonableness that is dependent on all of the circumstances.‖
Id. Moreover, the Mitchell court stated that it would be
―sympathetic‖ if ―some overriding circumstances arose,
necessitating the diversion of law enforcement personnel to
another case.‖ Id. at 1353. Here, such overriding
circumstances were present because Agent Albanese was
assigned to what was obviously important security work.
Agent Albanese was also the lead investigator on a multiple-
county investigation requiring coordination. Considering this
explanation along with the other factors, we believe the
Government‘s three-month delay in obtaining a state search
warrant was reasonable under the circumstances.
Nevertheless, the delay was not unavoidable, and we are
troubled by it. In the absence of the same circumstances
present here, we might very well reach a different result.
III.A.4. Execution of State Search Warrant
29
As previously discussed, Agent Albanese obtained the
state search warrant on October 19, 2006. In mid-November,
Detective Vanadia commenced a warranted search of the 120
GB hard drive solely for evidence of financial crimes.12
During this search, Vanadia noticed a folder named ―Kazvid.‖
The folder contained files bearing names indicative of child
pornography. Vanadia then opened these files and
―confirmed‖ that they did contain child pornography. Stabile
argued that this search violated the Fourth Amendment and
that the fruits of the search had to be suppressed.
The District Court first determined that Detective
Vanadia lawfully opened the Kazvid folder. The District
Court then found that the file names of the files in the Kazvid
folder were in ―plain view,‖ but that the plain view doctrine
did not encompass the contents of those files. However, the
District Court determined that Vanadia‘s decision to view the
contents of the files, although violative of the Fourth
Amendment, did not require suppression because of the
inevitable discovery doctrine.
On appeal, Stabile challenges each step of this search,
arguing that: (1) Detective Vanadia improperly opened the
12
The warrant initially authorized a search for evidence of
both financial crimes and child pornography. However,
because probable cause was based on DVDs found in
Stabile‘s desk that did not actually contain child pornography,
the District Court determined that the child pornography
section of the warrant had to be excised in violation of Franks
v. Delaware, 438 U.S. 154 (1978). United States v. Stabile,
2009 U.S. Dist. LEXIS 4263, at *20-*21 (D.N.J. Jan. 21,
2009). The parties do not dispute this decision.
30
―Kazvid‖ folder; (2) that the plain view doctrine should not
apply to the file names found in the Kazvid folder; and (3)
that the inevitable discovery and independent source doctrines
do not apply and therefore this evidence must be suppressed.
The Government contends that the plain view doctrine applies
not only to the names of the files in the Kazvid folder but also
to all the contents of those files. For the reasons that follow,
we determine that Detective Vanadia properly opened that
Kazvid folder; that the names of the files in that folder were
in plain view; and that although under the facts of this case
the plain view doctrine may not apply to the contents of those
files, the independent source and inevitable discovery
doctrines apply to the contents of the files, thereby removing
any need for suppression. Therefore, we will affirm the
District Court‘s decision.
III.A.4.a. View of Files in “Kazvid” Folder
The first issue is whether, pursuant to the state search
warrant to search for evidence of financial crimes, Detective
Vanadia properly viewed the files in the Kazvid folder. The
District Court found that Vanadia properly opened this file
because he reasonably believed that it could contain evidence
of financial crimes.
Stabile contends that Detective Vanadia ―stumbled‖
upon the videos in the Kazvid folder by failing to limit the
scope of his search to evidence of financial crimes.
Appellant‘s Br. 29. According to Stabile, Vanadia‘s decision
to open Kazvid was an unreasonably overbroad search, not
limited to evidence of financial crimes, and a pretext for
searching for child pornography. See Appellant‘s Br. 29-30,
37 n.19. We disagree.
31
Resolution of this issue forces us to reconcile two
competing principles. On one hand, it is clear that because
criminals can – and often do – hide, mislabel, or manipulate
files to conceal criminal activity, a broad, expansive search of
the hard drive may be required. See United States v. Burgess,
576 F.3d 1078, 1092-94 (10th Cir. 2009) (―[T]here may be no
practical substitute for actually looking in many (perhaps all)
folders and sometimes at the documents contained within
those folders, and that is true whether the search is of
computer files or physical files.‖); United States v. Mann, 592
F.3d 779, 782 (7th Cir. 2010) (relevant files are often hidden
and can be mislabeled and ―manipulated to hide their true
contents‖); Adjani, 452 F.3d 1140, 1150 (9th Cir. 2006). On
the other hand, as Stabile argues, granting the Government a
carte blanche to search every file on the hard drive
impermissibly transforms a ―limited search into a general
one.‖ Marron v. United States, 275 U.S. 192, 196 (1927)
(―The requirement that warrants shall particularly describe
things to be seized makes general searches under them
impossible and prevents the seizure of one thing under a
warrant describing another.‖); see United States v. Tracey,
597 F.3d 140, 146 (3d Cir. 2010). To reconcile these
competing aims, many courts have suggested various
strategies and search methodologies to limit the scope of the
search.
In United States v. Comprehensive Drug Testing, Inc.,
the federal government investigated the Bay Area Lab
Cooperative (―Balco‖), suspected of providing steroids to
professional baseball players. 621 F.3d 1162, 1166 (9th Cir.
2010). In 2002, the Major League Baseball Players
Association entered into a collective bargaining agreement
32
that provided for drug testing of all players (performed by
Comprehensive Drug Testing) for the purpose of determining
only whether more than five percent of players tested
positive. Id. The players were assured that the results would
remain anonymous and confidential. Id. During the Balco
investigation, the government learned of ten players who had
tested positive, and it sought and obtained a warrant limited to
the records of ten players as to whom there was probable
cause to search. Id. However, when the government
executed the warrant, the government seized and reviewed the
drug testing record for hundreds of players. Id. On appeal to
the Ninth Circuit en banc, the en banc court discussed proper
procedures for handling seized data premised on its earlier
opinion in Tamura. Id. At 1167. For example, the initial
review and segregation of the data was to be performed not
by the case agents but by ―law enforcement personnel trained
in search and seizing computer data.‖ Id. At 1168. The
government was to return any data that did not fall within the
scope of the warrant. Id. At 1168-69. As the Ninth Circuit
stated:
We recognize the reality that over-seizing is an
inherent part of the electronic search process
and proceed on the assumption that, when it
comes to the seizure of electronic records, this
will be far more common than in the days of
paper records. This calls for greater vigilance
on the part of judicial officers in striking the
right balance between the government‘s interest
in law enforcement and the right of individuals
to be free from unreasonable searches and
seizures. The process of segregating electronic
data that is seizable from that which is not must
33
not become a vehicle for the government to gain
access to data which it has no probable cause to
collect.
Id. At 1177.
In United States v. Carey, the Tenth Circuit suggested
methods to avoid searching files of the type not identified in
the warrant, such as ―observing files types and titles listed on
the directory, doing a key word search for relevant terms, or
reading portions of each file stored in the memory.‖ 172 F.3d
1268, 1276 (10th Cir. 1999). The Tenth Circuit has refined
its approach since Carey. In Burgess, the Tenth Circuit
considered the appropriate standards for searching a hard
drive, offering the following guidance: ―while officers must
be clear as what it is they are seeking on the computer and
conduct the search in a way that avoids searching files of
types not identified in the warrant,‖ United States v. Walser,
275 F.3d 981, 986 (10th Cir. 2001), ―a computer search may
be as extensive as reasonably required to locate the items
described in the warrant‖ based on probable cause. United
States v. Grimmett, 439 F.3d 1263, 1270 (10th Cir. 2006)
(quotations omitted). But the search warrant itself need not
―contain a particularized computer search strategy.‖ United
States v. Brooks, 427 F.3d 1246, 1251 (10th Cir. 2005).
Given that it would be ―folly for a search warrant to structure
the mechanics of the search‖ because ―imposing such limits
would unduly restrict legitimate search objectives,‖ Burgess,
576 F.3d at 1094, the scope of the search must be
―constrained by content.‖ Id. at 1093. In Burgess, that
content was computer files containing evidence of drug use or
trafficking. Id. To avoid transforming a limited search into a
general one, the court cautioned that ―[a]s the description of
34
such places and things becomes more general, the method by
which the search is executed become[s] more important – the
search method must be tailored to meet allowed ends.‖ Id. at
1094. Speaking directly to search methodology, Burgess
recommended that computer searches begin by using search
protocol to structure the search with an analysis of the file
structure, followed by a search for suspicious file folders, and
then looking for files and types of files most likely to contain
the objects of the search by doing keyword searches. Id. In
the end, however, the Burgess court noted that ―there may be
no practical substitute for actually looking in many (perhaps
all) folders and sometimes at the documents contained within
those folders . . . .‖ Id.
Finally, in United States v. Mann, the defendant argued
that the government‘s search of his computer for evidence of
voyeurism exceeded the scope of the search warrant where
the search produced evidence of child pornography. 592 F.3d
at 781. The Seventh Circuit held that the search was lawful,
and noted the particular difficulties in attempting to locate
image files on a computer because the files may be
―manipulated to hide their true contents.‖ Id. at 782; see Hill,
459 F.3d at 978 (―Images can be hidden in all manner of files,
even word processing documents and spreadsheets.
Criminals will do all they can to conceal contraband,
including the simple expedient of changing the names and
extensions of files to disguise their content from the casual
observer.‖).
Turning to the instant case, the scope of the consent
and state search warrant were limited to evidence of financial
crimes. For a number of reasons, we believe that Detective
Vanadia‘s decision to highlight and view the contents of the
35
Kazvid folder was reasonable and permissible under the
Fourth Amendment.
First, Detective Vanadia‘s decision to highlight and
view the contents of the Kazvid folder was objectively
reasonable because criminals can easily alter file names and
file extensions to conceal contraband. See Williams, 592 F.3d
at 522; Hill, 459 F.3d at 978. Second, Detective Vanadia‘s
search procedures complied with the search procedures
outlined in Carey – a case which advocates more restrictive
search procedures than the broader search procedures
approved in Williams and Burgess. For example, Carey
suggested search methods such as focusing on the file type
identified in the warrant, file names, key word search, and
directory structure. 172 F.3d at 1276. Conversely, Williams
stated that a computer search authorized at least a ―cursory
review of each file on the computer.‖ 592 F.3d at 522.
Likewise, Burgess suggested that ―there may be no practical
substitute for actually looking in many (perhaps all) folders
and sometimes at the documents contained within those
folders‖ while conducting an electronic search. 576 F.3d at
1094. Here, Vanadia took steps to ensure that his
investigation complied with the state search warrant. Vanadia
began by physically inspecting the hard drive and creating a
copy of the drive to ensure that the original drive was not
damaged or corrupted during the search. Next, Vanadia
examined the file signatures to see if any files had been
corrupted. He then conducted a ―hash value analysis‖ to see
if any files had been copied. Finally, he examined suspicious
and out-of-place folders, such as the Kazvid folder. Appx. at
A-521-27, A-531-32, A-536-37. These procedures
36
demonstrate that Vanadia engaged in a focused search of the
hard drives rather than a general search.13
Finally, Stabile argues that Detective Vanadia
exceeded the scope of the state search warrant because
Vanadia testified that he knew that there may have been child
pornography contained in the Kazvid folder.14 This argument
13
We note that although Stabile argues that Detective
Vanadia‘s search methodology was overbroad, Stabile offers
no practical alternative methodology that would have
protected his interests yet still permitted a thorough search for
evidence of financial crimes. See Burgess, 576 F.3d at 1095;
Brooks, 427 F.3d at 1251. Indeed, Stabile‘s only suggestion
was for Vanadia to use EnCase software to conduct a ―green
home plate highlighting of the entire hard drive,‖ which
would have permitted Vanadia to isolate file types.
Appellant‘s Br. 28. But because evidence of check fraud is
often contained on image files, if Vanadia had employed
Stabile‘s suggested method, he still would have isolated
image files and, eventually, Vanadia would have discovered
images of child pornography. Therefore, Stabile fails to
propose a legitimate alternative methodology.
14
Stabile quoted the following testimony in support of his
argument:
Q. At the moment that you were making the decision
to open up Kazvid, didn‘t you say to yourself, you
know, there may well be child pornography here?
A. Sure.
Q. Okay. So it‘s not true that you opened the folder
only for the purpose of trying to see whether or not
37
fails because an investigator‘s subjective intent is not relevant
to whether a search falls within the scope of a search warrant.
See Maryland v. Garrison, 480 U.S. 79, 84 (1987) (―the scope
of a lawful search is defined by the object of the search and
the places in which there is probable cause to believe it may
be found‖) (internal citation omitted); Williams, 592 F.3d at
524 (where investigators executed search warrant for
evidence of computer harassment on defendant‘s hard drive,
plain view seizure of child pornography discovered during
search was permissible ―even if finding child pornography
was their hope from the outset‖).15 Here, the state search
warrant objectively authorized Vanadia to search for evidence
of financial crimes, and Vanadia‘s testimony that he
subjectively believed the Kazvid folder could harbor evidence
of child pornography does not render the search of the Kazvid
folder invalid. Moreover, as Vanadia made clear in his
testimony, the Kazvid folder required further investigation
because evidence of financial crimes could be hidden within.
Appx. at A-536-37.
there were financial crimes or evidence of financial
crimes lurking in the Kazvid directory. Isn‘t that fair
to say?
A. Yes.
Appx. at A-42.
15
See also Horton v. California, 496 U.S. 128, 138 (1990)
(―The fact that an officer is interested in an item of evidence
and fully expects to find it in the course of a search should not
invalidate its seizure if the search is confined in an area and
duration by the terms of a warrant or a valid exception to the
warrant requirement.‖).
38
For the foregoing reasons, we conclude that
highlighting the Kazvid folder was reasonable and did not
exceed the scope of the state search warrant.
III.A.4.b. Plain View Examination of File Names
After highlighting the Kazvid folder, Detective
Vanadia observed in the folder a list of files with lurid names.
The Government argues that these file names may be
examined pursuant to the plain view doctrine. Stabile
disagrees. This brings us to the question of whether evidence
of other crimes in a computer can be examined under the
plain view doctrine. We hold that the plain view doctrine
applies to seizures of evidence during searches of computer
files, but the exact confines of the doctrine will vary from
case to case in a common-sense, fact-intensive manner.16
16
We decline to follow the Ninth Circuit‘s suggestion to
―forswear reliance on the plain view doctrine‖ whenever the
government seeks a warrant to examine a computer hard
drive. United States v. Comprehensive Drug Testing, 621
F.3d 1162, 1178 (9th Cir. 2010) (Kozinski, C.J., concurring).
Instead, we agree with the Seventh Circuit‘s view that rather
than jettisoning the plain view doctrine entirely in electronic
searches, ―the more considered approach ‗would be to allow
the contours of the plain view doctrine to develop
incrementally through the normal course of fact-based
adjudication.‘‖ Mann, 592 F.3d at 785 (quoting
Comprehensive Drug Testing, 621 F.3d at 1184 (Callahan, J.,
concurring in part and dissenting in part from the en banc
panel‘s per curiam opinion)). In short, we agree that ―[a]
measured approach based on the facts of a particular case is
39
What is permissible in one situation may not always be
permissible in another.
There are three requirements for valid seizures of
evidence in plain view. ―First, the officer must not have
violated the Fourth Amendment in ‗arriving at the place from
which the evidence could be plainly viewed.‘ Second, the
incriminating character of the evidence must be ‗immediately
apparent.‘ Third, the officer must have ‗a lawful right of
access to the object itself.‘‖ United States v. Menon, 24 F.3d
550, 559-60 (3d Cir. 1994) (quoting Horton, 496 U.S. at 141)
(internal citations omitted). Detective Vanadia‘s examination
of the file names in the Kazvid folder, to the extent that he
may arguably be said to have ―seized‖ the names by, for
example, making a screen print, satisfies all three plain view
requirements.17
especially warranted in the case of computer-related
technology, which is constantly and quickly evolving.‖
Comprehensive Drug Testing, 621 F.3d at 1184 (Callahan, J.,
concurring in part and dissenting in part from the en banc
panel‘s per curiam opinion). We engage in just such a fact-
intensive inquiry here.
17
Mere observation must be distinguished from seizure, a
distinction that may become hazy in the digital environment.
We do not believe that simply seeing the file names
constitutes a seizure. See Texas v. Brown, 460 U.S. 730, 739
n.4 (1983) (plurality opinion) (―It is important to distinguish
‗plain view,‘ . . . to justify seizure of an object, from an
officer‘s mere observation of an item left in plain view.
Whereas the latter generally involves no Fourth Amendment
search . . . , the former generally does implicate the
40
First, Detective Vanadia did not violate the Fourth
Amendment in arriving at the place from which the evidence
could be viewed. Deetz consented to the seizure of all six
hard drives and a magistrate issued a state search warrant to
search all six hard drives for evidence of financial crimes.
Vanadia began executing the state search warrant by
searching the 120 GB hard drive. Within the 120 GB hard
drive, Vanadia noticed the Kazvid folder. He lawfully
highlighted the Kazvid folder to view its contents because a
thorough computer search requires a broad examination of
files on the computer to ensure that file names have not been
manipulated to conceal their contents. See Williams, 592
F.3d at 522; Hill, 459 F.3d at 978. Nor did Vanadia
unreasonably expand the scope of his search by highlighting
the Kazvid folder and viewing its contents. See Mann, 592
F.3d at 784 (search was lawful where investigator conducted
search within scope of warrant and did not knowingly expand
the scope of the search to discover child pornography).
Therefore, the first plain view requirement is satisfied
because Vanadia ―lawfully arrived at the point from which
the evidence could be viewed.‖
Amendment‘s limitations upon seizures of personal property.
The information obtained as a result of observation of an
object in plain sight may be the basis for probable cause or
reasonable suspicion of illegal activity. In turn, these levels
of suspicion may, in some cases, . . . justify police conduct
affording them access to a particular item.‖) (internal citations
omitted). Whether recording the names in some fashion
implicates the Fourth Amendment is not something we need
to decide in this case. We will assume that it does, solely for
the sake of analyzing why Stabile‘s arguments fail.
41
Second, there is no doubt that the incriminating
character of the evidence—in this instance the names
themselves—was ―immediately apparent.‖18 The Kazvid
folder contained files with lurid names. These file names
suggested that Stabile illegally possessed contraband (child
pornography). See Williams, 592 F.3d at 522 (―[W]hen the
officer then comes upon child pornography, it becomes
‗immediately apparent‘ that its possession by the computer‘s
owner is illegal and incriminating.‖).
Third, Detective Vanadia had a ―lawful right of
access‖ to the object of the search because he was authorized
by a state search warrant to search the 120 GB hard drive for
evidence of Stabile‘s financial crimes. See id.
Therefore, we conclude that the Government properly
examined the file names listed in the Kazvid folder pursuant
to the plain view doctrine.
III.A.4.c. Plain View Examination of File Contents
After highlighting the Kazvid folder, Detective
Vanadia viewed a list of file names with file extensions
suggesting child pornography videos. Vanadia testified that
18
Again, it is only because the file names themselves have
evidentiary significance and may at least arguably be ―seized‖
via, for example, a screen print, and then tendered in
evidence, that the plain view doctrine could be implicated at
all. See Brown, 460 U.S. at 739 n.4 (distinguishing ―plain
view‖ as a doctrine that justifies the seizure of evidence from
the mere observation of things in plain sight).
42
he opened these video files to ―confirm‖ they contained child
pornography. Appx. at A-534-35, A-591-92. The
Government claims in their brief that under the plain view
doctrine, once Detective Vanadia saw the lurid file names he
was then empowered to seize and examine the contents of
those files. Gov‘t‘s Br. 38. Stabile argues, and the District
Court concluded, that opening the video files to view their
contents exceeded the scope of the state search warrant and
that plain view did not apply, resulting in an illegal search.19
The state search warrant issued on October 19, 2006
authorized Vanadia to search all six hard drives only for
evidence of financial crimes.20
We need not resolve whether the plain view doctrine
applies to examination of contents of the video files because
the independent source and inevitable discovery doctrines
apply to the contents of all the video files. Therefore, we
ultimately conclude that suppression is not required.
III.A.4.d. Independent Source
19
The District Court concluded, however, that this violation
did not require suppression because the inevitable discovery
doctrine applied.
20
The warrant also authorized a search for child pornography
in the DVDs found in a desk in Stabile‘s home. These DVDs
did not contain child pornography, and the District Court
ultimately excised this portion of the warrant because it ran
afoul of Franks v. Delaware. Appx. at A-101.
43
Even assuming Detective Vanadia illegally opened and
examined the contents of the video files in the Kazvid folder,
the independent source doctrine applies and removes any taint
from this search.21 Typically, the exclusionary rule requires
that we suppress evidence obtained as a result of an illegal
search. Wong Sun v. United States, 371 U.S. 471, 485 (1963).
However, ―[t]he independent source doctrine serves as an
exception to the exclusionary rule and permits the
introduction of ‗evidence initially discovered during, or as a
consequence of, an unlawful search, but later obtained
independently from activities untainted by the initial
illegality.‘‖ United States v. Price, 558 F.3d 270, 281 (3d
Cir. 2009) (quoting Murray v. United States, 487 U.S. 533,
537 (1988)). Here, the District Court concluded that
suppression was not required because the inevitable discovery
exception to the exclusionary rule applied.22 For the reasons
21
For purposes of applying the independent source doctrine,
we assume, without deciding, that Vanadia illegally viewed
the contents of the video files in the Kazvid folder.
22
Following the District Court‘s January 21, 2009 order
denying his motion to suppress, Stabile filed a motion to
reconsider, arguing that the District Court erred by applying
the inevitable discovery doctrine rather than the independent
source doctrine. On March 13, 2009, the District Court
denied Stabile‘s motion to reconsider and reaffirmed its
reliance on the inevitable discovery doctrine. The District
Court concluded that suppression was unnecessary under the
independent source doctrine as well.
Here, we think the independent source doctrine more
appropriately applies to the contents of the video files. We
also think that the inevitable discovery doctrine applies to the
44
evidence obtained while executing the invalid first and
second federal warrants, which were obtained subsequently.
The Third Circuit contrasted these doctrines in United
States v. Herrold:
[U]nder the independent source doctrine,
evidence that was in fact discovered lawfully,
and not as a direct or indirect result of illegal
activity, is admissible. In contrast, the
inevitable discovery doctrine, applied in Nix,
permits the introduction of evidence that
inevitably would have been discovered through
lawful means, although the search that actually
led to the discovery of the evidence was
unlawful. The independent source and
inevitable discovery doctrines thus differ in that
the former focuses on what actually happened
and the latter considers what would have
happened in the absence of the initial search.
962 F.2d 1131, 1140 (3d Cir. 1992). Here, pursuant to the
state search warrant, Vanadia lawfully discovered evidence of
child pornography (lurid file names and the first video file)
while searching for evidence of financial crimes. Although
Vanadia may have exceeded the scope of the state search
warrant by expanding the search and opening the contents of
the video files, the initial inspection and resulting discovery
were lawful. Accordingly, the independent source doctrine
applies. In contrast, and for reasons we will discuss, the
inevitable discovery doctrine applies to the ensuing unlawful
searches made pursuant to the two federal search warrants.
45
that follow, we conclude that the independent source doctrine
applies to the results of the search executed pursuant to the
state search warrant and vitiates any need to suppress
evidence of child pornography.
Assuming that Detective Vanadia illegally viewed the
contents of the videos in the Kazvid folder, we ask whether
this illegal search is so intertwined with the eventual
acquisition of child pornography from Stabile‘s hard drives
that this evidence must be suppressed. We ask: ―(1) whether
a neutral justice would have issued the search warrant even if
not presented with information that had been obtained during
an unlawful search and (2) whether the first search [the search
of the contents of the eleven video files] prompted the
officers to obtain the [subsequent] search warrant.‖ Herrold,
962 F.2d 1131, 1144 (3d Cir. 1992); see Price, 558 F.3d at
282. ―If the answers to these questions are yes and no
respectively . . . then the evidence seized during the warranted
search, even if already discovered in the original entry, is
admissible.‖ Herrold, 962 F.2d at 1144.
The answer to the first question is ―yes.‖ After
Detective Vanadia executed the state search warrant, Agent
Albanese applied for the first federal search warrant. The
application for the first federal search warrant cited, as
probable cause, the lurid file names Vanadia observed in
plain view during his search of the 120 GB hard drive. The
application also cited Vanadia‘s experience that files bearing
such names may contain child pornography. Importantly, the
warrant application did not mention that Vanadia had viewed
These subsequent searches were unlawful for lack of probable
cause.
46
the contents of any of the video files.23 Even assuming that
Vanadia illegally viewed the video files‘ contents, the results
of that search did not taint the warrant application Albanese
presented to the magistrate. See Price, 558 F.3d at 282
(applying independent source doctrine where warrant was still
supported by probable cause even after excising illegally-
obtained information). After considering the warrant
application, the magistrate issued the first federal search
warrant. Therefore, the answer to the first inquiry under the
independent source doctrine is clearly yes because a neutral
magistrate did, in fact, issue the first federal search warrant.
The answer to the second question is ―no.‖ The
contents of the video files, which we presume Detective
Vanadia viewed illegally, did not prompt Agent Albanese to
apply for the first federal search warrant. In Price, police
arrested the defendant after he sold methamphetamine to an
undercover police officer. 558 F.3d at 273. A search incident
to the arrest ―revealed items indicative of methamphetamine
trafficking.‖ Id. The police then went to the defendant‘s
home, where they asked for, and received, consent to search
the home from the defendant‘s wife. Id. at 274. After
searching the home, the police attempted to obtain consent to
search the locked basement, but the defendant‘s wife said she
did not have a key. Id. at 275. The officer picked the lock on
the basement door, entered the basement, and observed items
used to manufacture methamphetamine. Id. Later that day,
police applied for and obtained a search warrant, returned to
the home, and seized the chemicals related to
methamphetamine manufacture from the basement. Id. The
defendant moved to suppress the items seized from the
23
The full text of the affidavit is contained in footnote 6.
47
basement on the grounds that the police lacked valid consent
to enter the basement, and the district court denied the
relevant portion of the motion. Id. at 276. On appeal, we
held that regardless of the validity of the wife‘s consent, the
items seized from the basement were admissible under the
independent source doctrine. Id. at 280. First, the illegally
observed evidence did not prompt the officers to apply for the
search warrant. Id. at 282. Second, the search warrant
contained sufficient probable cause from independent sources
even though the affidavit in support of the warrant application
referenced the items illegally discovered in the basement. Id.
Even without this evidence, given the history of the
investigation, such as the facts that the defendant had
incriminating paraphernalia on his person at the time of arrest
and that paraphernalia was found in his home, it seemed
―impossible that the police would not have applied for a
warrant to search the basement of the house . . . .‖ Id. at 282;
see also Herrold, 962 F.2d at 1140-41 (―It is inconceivable
that the police would have Justified the premises without
searching the trailer and without arresting [the defendant]
since they had information that Herrold, who was known to
them as a drug dealer with a record of convictions for violent
crimes, had obtained a large quantity of cocaine some of
which he sold to the informant.‖). Therefore, the Price court
invoked the independent source doctrine and affirmed the
district court‘s suppression order.
Here, there are even more compelling reasons to vitiate
the taint of the presumed illegal search than existed in Price.
In Price, the search warrant application referenced the
illegally observed evidence, but here, as previously
mentioned, the warrant application made no mention of the
contents of the Kazvid video files. This distinction supports
48
our determination that if the contents of the remaining video
files were illegally viewed, they did not prompt Agent
Albanese to seek the first federal search warrant. Moreover,
as in Price, here the police legally discovered ample
additional evidence. While executing the state search
warrant, Detective Vanadia lawfully viewed lurid file names
indicative of child pornography. In light of this evidence, it
would be ―impossible‖ or ―inconceivable‖ that Albanese
would not have applied for the first federal warrant. See
Price, 558 F.3d at 282; Herrold, 962 F.2d at 1140. The
answer to the second question in the independent source
inquiry – i.e., whether the results of the illegal search
prompted officers to obtain a subsequent search warrant – is
―no‖ because the lurid file names prompted Albanese to seek
the first federal search warrant. Therefore, the independent
source doctrine applies, and there would be no reason to
suppress the contents of the videos.
III.A.4.e. Inevitable Discovery
The independent source doctrine removes the taint of
any illegality from the initial search of the contents of the
Kazvid folder in the 120 GB hard drive. However, the
subsequent searches of the 120 GB hard drive and ultimately
all the hard drives were illegal because these searches were
not supported by valid warrants. As previously discussed, the
first federal search warrant was invalid because it mistakenly
authorized a search of the 40 GB hard drive rather than the
120 GB hard drive. The second federal search warrant was
invalid because it relied on evidence obtained from the
unlawful search of the 40 GB hard drive. Despite this
illegality, the inevitable discovery doctrine applies, rendering
49
suppression of the evidence gathered as a result of these
illegal searches unnecessary.
Under the inevitable discovery doctrine, ―if the
prosecution can establish by a preponderance of the evidence
that the information ultimately or inevitably would have been
discovered by lawful means . . . then the deterrence rationale
has so little basis that the evidence should be received.‖
United States v. Vasquez De Reyes, 149 F.3d 192, 195 (3d
Cir. 1998) (quoting Nix v. Williams, 467 U.S. 431 (1984)).
The Government can meet its burden by establishing ―that the
police, following routine procedures, would inevitably have
uncovered the evidence.‖ Vasquez De Reyes, 149 F.3d at
195. The inevitable discovery analysis focuses on ―historical
facts capable of ready verification, not speculation.‖ Id.; see
Nix, 467 U.S. at 444 n.5.
As the District Court concluded, the Government has
shown by a preponderance of the evidence that routine police
procedures inevitably would have led to the discovered child
pornography. Although the first federal search warrant
mistakenly called for searching the 40 GB hard drive rather
than the 120 GB hard drive, the file names in the Kazvid
folder Detective Vanadia opened still continued to provide
probable cause to obtain a valid warrant to search the 120 GB
hard drive. A lawful search of the 120 GB hard drive would
have led to the videos of child pornography in the Kazvid
folder. These videos, in turn, would have provided probable
cause to obtain federal search warrants to search Stabile‘s five
remaining hard drives for evidence of child pornography,
including the illegally searched 40 GB hard drive.
50
This conclusion is supported by ―historical facts
capable of ready verification, and not speculation.‖ Vasquez
De Reyes, 149 F.3d at 195. As previously discussed, the
Government lawfully obtained the state search warrant, and
execution of the state search warrant exposed lurid file names
and at least one video of child pornography. Thus, ―viewing
affairs as they existed at the instant before the unlawful
search,‖ Vasquez de Reyes, 149 F.3d at 195, the Government
had probable cause to obtain a warrant to conduct a full
search of the 120 GB hard drive. In accordance with routine
police procedures, the Government attempted to obtain the
first federal search warrant before fully searching the 120 GB
hard drive. Moreover, the Government sought the second
federal search warrant before embarking on a search of
Stabile‘s five remaining hard drives. As the District Court
found, ―Albanese‘s application for the second federal search
warrant [was] based on Agent Tokash‘s search of the 40 GB
hard drive and the second federal search warrant issued based
on probable cause supplied by the evidence discovered in
Agent Tokash‘s search.‖ Appx. at A-107-08. Although
mistakes were made, proper execution of these routine
procedures would have yielded evidence of child
pornography. Moreover, the very fact that the Government
attempted to secure state and federal search warrants at every
step of the search indicates that there would be little
deterrence benefit in punishing the Government. See Vasquez
De Reyes, 149 F.3d at 195 (inevitable discovery doctrine
―permits the court to balance the public interest in providing a
jury with all relevant and probative evidence in a criminal
proceeding against society‘s interest in deterring unlawful
police conduct‖). We conclude that the evidence obtained as
a result of these illegal searches need not be suppressed
because it inevitably would have been discovered.
51
III.B. Sentencing
Stabile also claims that his sentence is unreasonable.
Because Stabile knowingly and voluntarily waived his right
to appeal, and because nothing compels us to disregard this
waiver, we decline to exercise our jurisdiction to review the
merits of this claim.24
Prior to sentencing, Stabile agreed to a set of ―non-jury
trial stipulations,‖ which included a waiver of the right to
―challenge [on appeal] the sentence imposed . . . if that
sentence falls within or below the Guidelines range that
results from the agreed total Guidelines offense level of 26.‖25
Appx. at A-74. Stabile was sentenced to 78 months‘
imprisonment, the bottom of the applicable Guidelines range.
Moreover, our review of the record provides no indication
that Stabile‘s waiver was anything less than knowing and
voluntary. Waivers of appellate rights, if entered into
knowingly and voluntarily, are valid. See United States v.
Khattak, 273 F.3d 557, 562 (3d Cir. 2001).
Nonetheless, Stabile urges us to reach his claims by
arguing that a constitutional concern and a procedural defect
allegedly committed by the District Court amount to a
24
We review de novo whether Stabile waived his right to
appeal his sentence. Price, 558 F.3d at 277.
25
Stabile did not waive his right to appeal determination of
his criminal history category, but he does not dispute this
calculation.
52
miscarriage of justice. In rare circumstances, we will exercise
our jurisdiction irrespective of a waiver ―where an error
amount[s] to a miscarriage of justice.‖ Khattak, 237 F.3d at
562; see United States v. Gwinnett, 483 F.3d 200, 203 (3d
Cir. 2007). This exception ―will be applied sparingly and
without undue generosity.‖ United States v. Wilson, 429 F.3d
455, 458 (3d Cir. 2005) (quoting United States v. Teeter, 257
F.3d 14, 26 (1st Cir. 2001)).
Stabile first argues that his sentence raises a
―constitutional concern‖ because U.S.S.G. § 2G2.2, as
amended, imposes increased punishment on individuals who
merely possess child pornography based on congressional
concerns relating solely to offenders who actually engage in
pedophilia. Appx. at A-945-46. As acknowledged by the
District Court, no evidence indicated that Stabile ever
engaged in pedophilia. He thus argues that his sentence,
imposed pursuant to U.S.S.G. § 2G2.2, punishes him for acts
for which he has never been convicted, contrary to the tenets
of Apprendi v. New Jersey, 530 U.S. 466 (2000). Stabile
additionally argues that the District Court should have
departed from the child pornography Guidelines because they
are neither the product of empirical research nor consistent
with the Sentencing Commission‘s characteristic institutional
role, as recently acknowledged by the Third Circuit in United
States v. Grober, Nos. 09-1318 & 09-2120, 2010 U.S. App.
LEXIS 21980, at *41-42 (3d Cir. Oct. 26, 2010).
Neither of these claims compel us to set aside Stabile‘s
waiver. Even if preceding amendments to U.S.S.G. § 2G2.2
were motivated by concerns pertaining specifically to acts of
pedophilia rather than possession of child pornography alone,
we do not believe this to be a sufficient reason to justify
53
disregarding Stabile‘s waiver. See United States v. Lockett,
406 F.3d 207, 212-14 (3d Cir. 2005) (upholding a valid
waiver of appellate rights even in light of a subsequent
holding by the Supreme Court that the pre-Booker regime
under which appellant was sentenced was unconstitutional);
United States v. Rubbo, 396 F.3d 1330, 1335 (11th Cir. 2005)
(―[T]he right to appeal a sentence based on Apprendi/Booker
grounds can be waived in a plea agreement.‖). Moreover,
while the District Court was entitled to depart from the child
pornography Guidelines for the reasons cited by Stabile,
neither Kimbrough v. United States, 552 U.S. 85 (2007) nor
our recent decision in Grober, 2010 U.S. App. LEXIS 21980,
required the District Court to take this course when
sentencing Stabile. Similarly, Stabile‘s reliance on United
States v. Olhovsky, 562 F.3d 530 (3d Cir. 2009) is misplaced.
In Olhovsky, the District Court made critical procedural errors
and ignored expert testimony pertaining to the youthful
offender‘s unique potential for rehabilitation – factors that are
absent from the case before us. Id. at 551.
We similarly conclude that the procedural defects
alleged by Stabile are insufficient to merit setting aside his
appellate waiver. Stabile argues that the District Court
committed a procedural error by failing to sentence him at the
higher end of the recommended Guidelines range in
accordance with the Guidelines provision applicable to
combined offenses. U.S.S.G. § 3D1.4. Stabile also contends
that the District Court erred by failing to adequately explain
its rejection of his arguments in favor of a non-Guidelines
sentence. Neither of these purported errors justify
disregarding Stabile‘s waiver as we do not believe that they
amount to a miscarriage of justice. See United States v.
Jackson, 523 F.3d 234, 244 (3d Cir. 2008) (―[I]t will be a rare
54
and unusual situation when claims of an unreasonable
sentence, standing alone, will be sufficient to invalidate a
waiver because of a miscarriage of justice.‖).
Because we conclude that the sentence imposed by the
District Court does not amount to a miscarriage of justice, we
will not set aside Stabile‘s waiver and reach the sentencing
challenges he presents on appeal.
IV.
We affirm the defendant‘s conviction and the District
Court‘s denial of the motion to suppress. Because we will
enforce the appellate waiver, we dismiss this sentencing
appeal and thereby affirm the defendant‘s sentence.
55