J-S21041-14
NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P. 65.37
COMMONWEALTH OF PENNSYLVANIA IN THE SUPERIOR COURT OF
PENNSYLVANIA
Appellee
v.
WALTER FRANK MEYERLE
Appellant No. 1252 EDA 2013
Appeal from the Judgment of Sentence January 24, 2013
In the Court of Common Pleas of Bucks County
Criminal Division at No(s): CP-09-CR-0004709-2011
CP-09-CR-0004719-2011
CP-09-CR-0004747-2011
CP-09-CR-0004863-2011
CP-09-CR-0002035-2012
BEFORE: SHOGAN, J., ALLEN, J., and OTT, J.
MEMORANDUM BY OTT, J.: FILED DECEMBER 24, 2014
Walter Frank Meyerle brings this appeal from the judgment of
sentence imposed on January 24, 2013, in the Court of Common Pleas of
Bucks County. The trial judge found Meyerle guilty of numerous criminal
offenses arising from the sexual abuse of 15 male and female minor victims.
Meyerle was sentenced to an aggregate sentence of 479½ to 959 years’
imprisonment.1 In this appeal, Meyerle claims the trial court erred in failing
____________________________________________
1
On January 24, 2013, the trial court imposed consecutive sentences as
follows:
At Docket Number CP-09-CR-0004709-2011 — 20 to 40 years; at Docket
Number CP-09-CR-0002035-2012, 39½ to 79 years; at Docket Number CP-
09-CR-0004719-2011 — 25½ to 51 years; at Docket Number CP-09-CR-
(Footnote Continued Next Page)
J-S21041-14
to grant his motion to suppress, contending (1) the search warrant was
invalid because it contained information law enforcement knew or should
have known was false, (2) the search warrant was invalid because it
contained stale information, and (3) the search of a computer was improper
because the serial number of the computer that was searched did not match
the serial number listed on the search warrant. See Meyerle’s Brief, at 3.
Based upon the following, we affirm.
The parties are well acquainted with this case, and therefore, at the
outset, we reiterate only a portion of the trial court’s discussion to provide
background to the issues raised in this appeal:
On August 21, 2012, [Meyerle] was found guilty of 188 criminal
offenses arising from the sexual abuse of 15 male and female
victims ranging in age between four years old and 17 years old.
The abuse occurred over the course of 14 years. [Meyerle] was
convicted of Rape by Forcible Compulsion, Attempted Rape by
Forcible Compulsion, Sexual Assault (intercourse without
consent), Involuntary Deviate Sexual Intercourse by Forcible
Compulsion, Involuntary Deviate Sexual Intercourse - victim less
than 13 years old, Involuntary Deviate Sexual Intercourse -
victim less than 16 years old/defendant four or more years
_______________________
(Footnote Continued)
0004863-2011 — 3½ to 7 years; and at Docket Number CP-09-CR-0004747-
2011 — 406 to 812 years. The total aggregate sentence was 494½ to 989
years’ imprisonment. On January 30, 2013, the trial court vacated the
sentences imposed at Counts Seven and Eight of Docket Number CP-09-CR-
0002035-2012, which were consecutive sentences that totaled 15 to 30
years’ imprisonment. Therefore, we calculate Meyerle’s sentence as an
aggregate sentence of 479½ to 959 years’ imprisonment.
-2-
J-S21041-14
older, Unlawful Contact with Minor (for the purpose of engaging
in Involuntary Deviate Sexual Intercourse), multiple counts of
Aggravated Indecent Assault - victim less than 13 years old with
lack of consent, force, threat of force, unconscious/unaware,
Aggravated Indecent Assault - victim less than thirteen 13 years
old, Aggravated Indecent Assault - victim less than 16 years
old/defendant four or more years older than victim, Statutory
Sexual Assault, Indecent Assault - without consent, Indecent
Assault - victim less than 13 years old, Indecent Assault - victim
less than 16 years old/defendant four or more years older,
Obscene and Other Sexual Materials and Performances -
Dissemination to Minors, Terroristic Threats, Corruption of
Minors, Tattooing Minor, Criminal Use of a Communication
Facility, Sexual Abuse of Children - Child Pornography,
Solicitation to commit Escape from Bucks County Correctional
Facility.[2] …
Factual History
The facts in the instant case are not contested. [Meyerle]
stipulated to the admission of the Commonwealth’s evidence
through police reports, the testimony of the investigators and
other exhibits. The 15 victims, many of whom were unknown to
each other, corroborated one another and were corroborated by
numerous other witnesses including other uncharged victims.
The victims’ statements were substantiated by telephone records
and wire interceptions. Their accounts of abuse at the hands of
[Meyerle] followed a strikingly similar pattern of grooming and
escalation.
****
On March 16, 2011, detectives applied for and obtained a search
warrant for [Meyerle’s] home[.] The items to be seized were
identified as follows:
____________________________________________
2
See 18 Pa.C.S. §§ 3121(a)(1), 901, 3124.1, 3123(a)(1), 3123(a)(6),
3123(a)(7), 6318(a)(1), 3125(b), 3125(a)(7), 3125(a)(8), 3122.1,
3126(a)(1), 3126(a)(7), 3126(a)(8), 5903(c)(1), 2706(A)(1), 6301(a)(1),
6311(a), 7512, 6312(d), 902(a), respectively.
-3-
J-S21041-14
iPhone, [c]omputers, digital media storage devices to
include iPods, compact discs, external hard drives, thumb
drives, digital tape backup drives, DVD's, VHS or other
video tapes, camcorders, cameras, recording devices,
photographs, [p]hotographs of the interior and exterior of
the home, Gray dumbbell weights, tattooing equipment,
pornographic material, [c]ell phones and packaging for
Cricket and TracFoneone cellular telephones.
The following day, March 17, 2011, the search warrant was
executed at his residence. The evidence seized as a result of the
search warrant included a Toshiba Satellite L355D Laptop
computer, a Fujitsu N124 250 Gigabyte hard drive, a generic
desktop computer, a Western Digital Caviar 30.7 Gigabyte hard
drive, a Memorex CD-R with 700 Megabyte capacity, a photo
card with pictures, two iPhones, a Cannon Power Shot Camera
SD79013, an AT&T receipt for an iPhone, a Fuji Film Fine Pix
Camera F-10, an Olympus Camera K7140562760, a round
thumb drive, three assorted compact discs, a black bag with a
Polaroid camera and other assorted old cameras, a black bag
with Olympus camera and flash, a black folder with compact
discs, a Ja Rule compact disc case which contained two
pornographic compact discs, a “Jaken” compact disc, an
Olympus VN-180 Digital Voice Recorder, a VHS video tape, a
black camera, and assorted items.
****
The probable cause affidavit for the challenged search warrant
related the following facts. K.M.’s mother reported that [Meyerle]
had given her 15-year-old daughter a tattoo “of a star that was
placed on her daughter’s pelvic (sic) low enough to be hidden
from view by her underwear,” that [Meyerle] had been in cellular
telephone communication with K.M., encouraging her to
masturbate while he listened and requesting that she send him
naked photographs of herself, and that K.M. admitted that she
had sent [Meyerle] suggestive photographs. On February 3,
2011, K.M. was interviewed and told police that she had sexual
intercourse with [Meyerle] in order to get the tattoo, that she
continued to have sexual relations with him thereafter at which
time she noticed that he had a dollar sign tattoo on his penis,
that she had regular telephone contact with [Meyerle] late at
night and during the early morning hours, and that she had
“telephone sex with [him] upwards of fifty times” using her
-4-
J-S21041-14
cellular telephone and two other pre-paid cellular telephones
provided by [Meyerle]. K.M. told police that her friend L.H. also
engaged in “telephone sex” with [Meyerle].
The affidavit set forth L.H.’s cellular telephone number as related
by K.M. and then read as follows:
[K.M.] advised that sometime in January 2011, “LH” has
taken revealing pictures of [K.M.] with this cellular
telephone and sent them to [Meyerle’s] cellular
telephone. [K.M.] also has taken revealing pictures of
“LH” with “LH’s” cellular telephone and sent the pictures
of “LH” to [Meyerle’s] cellular telephone. [K.M.] saw these
pictures on Meyerle’s iPhone when she was at his house
at the end of January 2011. An iPhone is a line of internet
and multimedia enabled smartphones designed and
marketed by Apple Inc. Smartphones are typically backed
up through Microsoft software and Apple iTunes software
that are installed on a computer specifically to back up
and download multimedia files that include music,
pictures, and video.
The affidavit then related the following information. Telephone
records obtained by court order confirmed that, between July
2010 and November 2010, there were thousands of cellular
communications between [Meyerle’s] AT&T cellular telephone
and K.M.’s cellular telephone, 151 of which were voice calls
placed between 10:00 P.M. and 4:00 A.M. The telephone records
also confirmed that from January 2011 up to February 9, 2011,
there were thousands of communications between [Meyerle’s]
AT&T cellular telephone and L.H.’s cellular telephone, that the
majority of the 216 voice calls were placed in the late evening or
early morning hours, and that 43 multimedia messaging service
text messages were sent.
In addition to the recent victimization of K.M. and L.H., the
affidavit also included the following information regarding prior
abuse:
K.M.’s aunt was interviewed and advised police that she
had a sexual relationship with [Meyerle] beginning in 2001
when she was 16 years old, that after Children and Youth
and her father barred her from having contact with him,
she continued to have contact with him through a pre-paid
-5-
J-S21041-14
telephone he paid for, that he asked her to masturbate
while he listened, that he attempted to involve children in
their sexual encounters, and, finally, that he videotaped
her performing oral sex on him and subsequently
threatened to show the tape to others.
In 2003, nine-year-old V.K. reported to Bensalem
Township police that she was sexually abused by
[Meyerle], that she was shown a pornographic image of
pop singer Brittney Spears and that [Meyerle] tried to
make her watch a movie that had “people having sex.”
S.H. reported to Bensalem Township police that she was
sexually abused by [Meyerle] between December 2000 and
August 2002, when she was 13 or 14 years old.
In 1999, J.C.’s mother reported to Bensalem police that
[Meyerle] “touched” 4-year-old J.C. and “made her watch
dirty movies.” Mother and daughter confirmed this report
to a Bensalem detective in 2010.
In a letter dated July 15, 2010, “D.H.” told her sister that
nine years earlier, when she was 16 years old, she was
sexually assaulted by [Meyerle] and that, at that time,
[Meyerle] showed her a video of her changing in the
bathroom of his residence.
In approximately 2006, [Meyerle] attempted to persuade
his girlfriend to have sex with her five-year-old son while
he watched. After she “threw him out,” she found a
videotape depicting two young girls undressing and taking
showers.
L.I. reported to Bensalem police that in June of 2010 she
was raped by [Meyerle], that he showed her a dollar sign
tattoo he had on his penis, telling her that “women like to
blow money,” and that he called her and told her to
masturbate while he listened. On one occasion he told her
to masturbate in her son’s bed.
Trial Court Opinion, 8/14/2013, at 1–2, 23–24, 25–27 (footnotes omitted).
-6-
J-S21041-14
Following the disposition of pretrial motions, a non-jury trial was held
on August 13, 14, 15, and 17, 2012. On August 21, 2012, Meyerle was
found guilty as set forth above. Meyerle was sentenced on January 24,
2013. By order dated January 30, 2013, the court vacated sentence on two
counts at case number CP-09-CR-0002035-2012.3 Meyerle filed post-
sentence motions that were later withdrawn. On April 22, 2013, Meyerle
filed this timely appeal.4
At the outset, we state our standard of review of the trial court’s denial
of the motion for suppression:
Our standard of review in addressing a challenge to the denial of
a suppression motion is limited to determining whether the
suppression court’s factual findings are supported by the record
and whether the legal conclusions drawn from those facts are
correct. Because the Commonwealth prevailed before the
suppression court, we may consider only the evidence of the
Commonwealth and so much of the evidence for the defense as
remains uncontradicted when read in the context of the record
as a whole. Where the suppression court’s factual findings are
supported by the record, we are bound by these findings and
may reverse only if the court’s legal conclusions are erroneous.
Where, as here, the appeal of the determination of the
suppression court turns on allegations of legal error, the
suppression court’s legal conclusions are not binding on an
appellate court, whose duty it is to determine if the suppression
____________________________________________
3
The trial court noted that “[the] two counts had been demurred at the time
of trial based on the age of the victim.” Trial Court Opinion, 8/14/2013, at
20 n.42.
4
Meyerle timely complied with the order of the trial court to file a concise
statement of errors complained of on appeal pursuant to Pa.R.A.P. 1925(b).
-7-
J-S21041-14
court properly applied the law to the facts. Thus, the conclusions
of law of the courts below are subject to our plenary review.
Commonwealth v. Hoppert, 39 A.3d 358, 361–362 (Pa. Super. 2012)
(citation omitted), appeal denied, 57 A.3d 68 (Pa. 2012).
Meyerle first contends that “[t]he March, 2011 affidavit [of probable
cause for the search warrant] was invalid because it contained information
law enforcement knew or should have known was false.” Meyerle’s Brief at
22. The principles that guide our review are as follows:
In order to secure a valid search warrant, an affiant must
provide a magistrate with information sufficient to
persuade a reasonable person that there is probable
cause for a search. The information must give the
magistrate the opportunity to know and weigh the facts
and to determine objectively whether there is a need to
invade a person’s privacy to enforce the law.
****
While we have recognized that the veracity of facts
establishing probable cause recited in an affidavit
supporting a search warrant may be challenged and
examined, we have not suggested that every inaccuracy
will justify an exclusion of evidence obtained as a result
of the search.
The question of whether a misstatement was deliberately made
is to be answered by the lower court.
Commonwealth v. Baker, 24 A.3d 1006, 1017 (Pa. Super. 2011) (citations
omitted), affirmed on other grounds, 78 A.3d 1044 (Pa. 2013).
Meyerle’s argument is based on language in the March 16, 2011,
affidavit regarding the report of the minor victim, K.M., that, in January,
2011, another minor victim, L.H., had taken revealing pictures of K.M. with
-8-
J-S21041-14
L.H.’s cell phone and sent them to Meyerle’s phone, and K.M. had taken
revealing pictures of L.H. on L.H.’s cell phone that were sent to Meyerle, and
that K.M. had seen these photographs on Meyerle’s iPhone when she was at
his house at the end of January, 2011. Meyerle points out this same
information was repeated in the April 14, 2011 affidavit. 5 Meyerle argues he
did not own the iPhone in question until February, 2011. He asserts police
learned this, too, before they obtained the April 14, 2011, warrant. 6 See
Meyerle’s Brief, at 22. Meyerle maintains “K.M.’s representation that [she]
saw any pictures on it in January, 2011 was untrue.” Id.
Meyerle also argues that law enforcement should have known that the
statement in the March 16, 2011 affidavit, which stated that in a September,
2010, interview, L.I. indicated she was raped by Meyerle, was a
misstatement, since he was incarcerated from June 15, 2010 and into July,
____________________________________________
5
There were four search warrants in this case:
Police obtained the first search warrant on March 16, 2011.
Based on items seized during the execution of that warrant,
police obtained a second warrant on April 14, 2011 to search
computers, iPhones and all associated storage devices. Police
obtained the third warrant on June 16, 2011 to seize [Meyerle’s]
correspondence. Police obtained a fourth warrant on June 22,
2012, to conduct further forensic analysis of [Meyerle’s] iPhone.
Trial Court Opinion, 8/14/2013, at 30 n.53.
6
We note that no information was seized from Meyerle’s iPhone as a result
of the April 14, 2011, warrant, due to “technology issues” regarding the
locked iPhone. See N.T., 7/26/2012, at 96.
-9-
J-S21041-14
2010. Meyerle again notes this information was repeated in the April 14,
2011 affidavit.
The trial court rejected Meyerle’s argument that the allegations were
material misrepresentations police knew to be false, as follows:
First, [Meyerle] claimed that K.M. lied when she told police that
she and L.H. had sent revealing photographs of themselves to
[Meyerle’s] cellular telephone and that she had seen those
photographs on [Meyerle’s] iPhone when she was at [Meyerle’s]
home in January of 2011. [Meyerle] argued that evidence that
the iPhone seized from [Meyerle’s] residence was not purchased
until February of 2011, after K.M. stated she saw the
photographs, and the fact that no images of K.M. were found on
that iPhone proved that K.M. lied to police and further proved
that the police knew that she had lied.
Contrary to [Meyerle’s] assertion, there is no basis to conclude
that K.M. lied to police. There is more than sufficient evidence to
warrant the conclusion that explicit photographs of K.M. and L.H.
were sent to [Meyerle]. L.H. corroborated K.M.’s account.
Telephone records confirmed that [Meyerle] had communicated
with the girls during overnight hours on hundreds of occasions
and that 43 multimedia messaging service text messages were
exchanged between [Meyerle’s] cellular telephone and L.H.’s
cellular telephone during the period of time K.M. reported the
photographs were taken using L.H.’s cellular telephone and
forwarded to [Meyerle]. The fact that the photographs described
by K.M. were not on the iPhone he purchased in February does
not prove that K.M. lied when she said she saw the photographs
on an iPhone in January. K.M. never identified any particular
iPhone. Police confirmed that [Meyerle] had a cellular telephone
in January, that that cellular telephone had the same telephone
number as the iPhone purchased in February and that it was
capable of sending and receiving multimedia messaging service
text messages.
Since there is no evidence that K.M. lied to police, it follows that
the police did not make deliberate and material misstatements of
fact. Even if the facts relied upon by [Meyerle] could somehow
be interpreted to call into question the reliability of K.M.’s
- 10 -
J-S21041-14
statement, the warrant would still be valid. The validity of the
warrant must be judged in light of the information available to
the officers at the time they obtained the warrant. The discovery
of facts demonstrating that a valid warrant was unnecessarily
broad does not retroactively invalidate the warrant. See
Maryland v. Garrison, 480 U.S. 79, 107 S. Ct. 1013, 94
L.Ed.2d 72 (1987); Commonwealth v. Simpkins, 36 A.2d 623
(Pa. Super. 2012).
In the instant case, the affiants were not aware that [Meyerle]
purchased an iPhone in February of 2011 when they wrote and
submitted the affidavit of probable cause.51
________________________________________
51
N.T., 7/26/12 p. 125. The defense conceded that the
affiants were not aware of the purchase of the new
iPhone when they made the application for the March 16,
2011 search warrant. N.T. 7/26/12 p. 92.
_________________________________________
Nor could the affiants have been aware of what a search of the
iPhone would ultimately reveal when they submitted that
affidavit. There is, therefore, no basis to conclude that the
affiants made deliberately false statements. See
Commonwealth v. Gomolekoff, 910 A.2d 710 (Pa. Super.
2006) (held, although the two emails on which the warrant was
based were not actually found on appellant’s computer, there
was no evidence that the affiant made a deliberately false
statement or made statements with a reckless disregard for the
truth).
[Meyerle] also argued that the affiants made a deliberate
misstatement of material fact when they included information
from L.I. that she had been raped by [Meyerle] in “late June of
2010” relying on evidence that [Meyerle] was incarcerated from
June 15, 2010 until July 9, 2010. Contrary to [Meyerle’s]
assertion, this evidence does not prove that L.I. lied about being
raped. At most, it establishes an issue as to the date of the
offense which is not an element of the crime. Moreover, there is
no evidence that the police made a deliberate misstatement of
fact since there was no evidence that they were aware of
[Meyerle’s] incarceration when they submitted their search
warrant application. What they may have learned after the fact
- 11 -
J-S21041-14
cannot retroactively invalidate the warrant. See Maryland v.
Garrison, supra; Commonwealth v. Simpkins, supra.
Trial Court Opinion, 8/14/2013, at 27–29 (some footnotes omitted).
The trial court’s conclusion that there is no evidence K.M. lied to police
and that police did not make a deliberate or knowing misstatement of
material fact is sound, and there is no basis upon which to disturb this
determination. As the trial court cogently reasoned, K.M. did not identify
any particular iPhone; telephone records confirmed multimedia messaging
service text messages exchanged between Meyerle’s cellular telephone and
L.H.’s cellular telephone during the period of time K.M. reported the
photographs were taken using L.H.’s cellular telephone and forwarded to
Meyerle; and police confirmed that Meyerle had a cellular telephone in
January, that that cellular telephone had the same telephone number as the
iPhone purchased in February, and that it was capable of sending and
receiving multimedia messaging service text messages. Likewise, the trial
court aptly concluded that L.I.’s information that she had been raped in “late
June of 2010,” does not evidence a material and deliberate
misrepresentation simply because Meyerle was incarcerated between June
15, 2010 and July 9, 2010. As the trial court astutely recognized, Meyerle’s
- 12 -
J-S21041-14
incarceration established, at most, an issue as to the date of the offense.
Accordingly, Meyerle’s first argument warrants no relief.7
Next, Meyerle argues that “[t]he March 16, 2011, search warrant was
invalid because it contained stale information necessary to the finding of
probable cause.” Meyerle’s Brief at 24. Specifically, Meyerle claims:
The affidavit relies on old allegations of [Meyerle’s] misconduct:
Making a juvenile watch pornography in 1999, assaulting a
juvenile seven or eight times between 2000 and 2002, threats to
show a videotape of someone performing oral sex on [Meyerle]
in 2001, videotaping a juvenile changing clothes in 2001,
showing a juvenile pornographic movies in 2003, and [Meyerle]
trying to persuade his girlfriend to have sex with her son while
[Meyerle] watched. These allegations are too old to be the basis
for a 2011 search[.] For these reasons, the results of the search
should be discarded.
Id. at 25.
With respect to staleness, this Court has stated:
[A]ge of the information supporting a warrant application is a
factor in determining probable cause. If too old, the information
is stale, and probable cause may no longer exist. Age alone,
however, does not determine staleness. The determination of
probable cause is not merely an exercise in counting the days or
even months between the facts relied on and the issuance of the
warrant. Rather, we must also examine the nature of the crime
and the type of evidence.
____________________________________________
7
Meyerle, in his reply brief, further asserts “[i]n this case the investigating
officers do not have any excuse for seizing a phone not described in their
warrant.” Meyerle’s Reply Brief at 3. This argument concerns the issue of
the scope of the search. “[A]n appellant cannot raise new issues in a reply
brief.” Commonwealth v. Williams, 909 A.2d 383, 386 n.6 (Pa. Super.
2006). In any event, the trial court properly rejected this argument. See
Trial Court Opinion, 8/14/2013, at 34.
- 13 -
J-S21041-14
Commonwealth v. Janda, 14 A.3d 147, 159 (Pa. Super. 2011) (citation
omitted).
Pennsylvania courts have not adopted a hard and fast rule as to what
constitutes staleness; instead, such a determination is made on a case by
case basis. Commonwealth v. Dennis, 618 A.2d 972, 981 (Pa. Super.
1992), appeal denied, 634 A.2d 218 (Pa. 1993). A “[m]ere lapse of time
between discovery of criminal activity and issuance of the warrant will not
necessarily dissipate probable cause; a showing that the criminal activity is
likely to have continued up to the time of issuance of the warrant will render
otherwise stale information viable.” Dennis, 618 A.2d at 981 (citation
omitted).
Here, we find no merit in Meyerle’s staleness argument. Moreover, the
trial court thoroughly and correctly addressed this issue, as follows:
“Although probable cause cannot, as a general rule, be
founded upon stale or temporally remote information,
corroborative information need not be current for it to be
properly considered by magistrate issuing search warrant so long
as it relates to prior conduct sufficiently similar to acts in
question.” Commonwealth v. Weidenmoyer, 518 Pa. 2, 10,
539 A.2d 1291, 1295 (1988). In the instant case, the
information was included in the affidavit to establish [Meyerle’s]
course of conduct that spanned 12 years. It is that course of
conduct that established probable cause to seize [Meyerle’s]
computers.
Probable cause can be established based upon the type of
crime, the nature of the evidence sought, and “normal inference
about where a criminal might hide the fruits of his crime.” U.S.
v. Hodge, 246 F.3d 301, 305 (3d Cir. 2001) (quotations and
citations omitted). The probable cause standard merely requires
facts that would warrant a man of reasonable caution to believe
- 14 -
J-S21041-14
that certain items may provide useful evidence of criminal
activity. “It does not demand any showing that such a belief be
correct or more likely true than false. A practical, non-technical
probability that incriminating evidence is involved is all that is
required.” Commonwealth v. McEnany, 667 A.2d 1143 (Pa.
Super. 1995) (quotations and citations omitted).
A fair reading of the probable cause affidavit establishes
the [Meyerle] began to abuse children as early as 1999 and
continued to do so up until police became involved in 2011.
That victimization consistently involved [Meyerle] accumulating
and saving pornographic images of his victims and other
pornographic images for use during his victimization of those
children. In approximately 1999, [Meyerle] made J.C. “watch
dirty movies.” [Meyerle] sexually assaulted 13-year-old S.H. on
seven or eight occasions between December of 2000 and August
of 2002. In approximately 2001 or 2002, K.M.’s aunt was
videotaped while performing oral sex on [Meyerle]. He
subsequently threatened to show that tape to others. In 2001,
[Meyerle] videotaped 16-year-old D.H. changing in the bathroom
of his residence. In 2003, [Meyerle] showed V.K. pornographic
images and he tried to make her watch a movie of “people
having sex.” In approximately 2006, [Meyerle] attempted to
persuade his girlfriend to have sex with her five-year-old son
while he watched. She later found a videotape of two young girls
undressing and taking showers. [Meyerle] continued this course
of conduct, victimizing K.M. and L.H. in 2010 and 2011,
collecting sexually explicit photographs of the victims as he had
done before.
These facts are clearly sufficient to cause a reasonable
person to conclude that pornography and other images of
[Meyerle’s] victims would probably be found on [Meyerle’s]
computer. Even if those images had been deleted, forensic
examiners could easily retrieve previously stored images.
Commonwealth v. Hoppert, 39 A.3d 358 (Pa. Super. 2012);
Commonwealth v. Gomolekoff, supra.
Trial Court Opinion, 8/14/2013, at 30–32.
As we agree with the trial court’s sound analysis, which requires no
further elaboration by this Court, we reject Meyerle’s second claim.
- 15 -
J-S21041-14
Nor do we find merit in the final argument of Meyerle that the search
of his Toshiba computer was improper because the April 14, 2011 warrant,
did not set forth the correct serial number of the computer.
Meyerle argues that the April 14, 2011 warrant sought to search the
hard drive of a Toshiba computer “bearing serial number PSLE04-1000R[,
but] the computer searched bore a serial number 980020176Q.” Meyerle’s
Brief, at 25. Meyerle contends that “[o]nce the police discovered that they
had seized and wanted to search a computer not described in the April 14,
201[1] warrant, they were obligated, if they still wanted to search it, to
obtain a new warrant,” and because they did not do so, “the results of the
search should be suppressed.” Id. at 27. We disagree.
“It is well-settled that a search warrant must describe the items to be
seized with specificity.” Commonwealth v. Janda, supra, 14 A.3d at 160
(citation omitted).
The requirement for specificity is not strictly construed,
however; it has historically been tempered by the rule that
search warrants should be read in a common sense fashion and
should not be invalidated by hypertechnical interpretations. This
may mean, for instance, that when an exact description of a
particular item is not possible, a generic description will suffice.
Our law requires only that [t]he place to be searched must be
described precise[ly] enough to enable the executing officer to
ascertain and identify, with reasonable effort, the place intended,
and where probable cause exists to support the search of the
area so designated, a warrant will not fail for lack of
particularity.
Commonwealth v. Johnson, 33 A.3d 122, 125 (Pa. Super. 2011)
(citations and quotations omitted), appeal denied, 47 A.3d 845 (Pa. 2012).
- 16 -
J-S21041-14
In this case, the first page of the April 14, 2011, application for search
warrant indicates police were seeking to search “a Toshiba laptop computer
serial no. PSLE04-1000R.”8 In fact, “PSLE04-1000R was the model number,
and not the serial number, of the Toshiba laptop computer. Nevertheless,
there were only three computers that were seized during the search of
Meyerle’s residence on March 17, 2011, and only one was a laptop
computer. That laptop was the only Toshiba computer brand. The search
warrant indicated that the item to be searched was “a Toshiba laptop
computer.” Therefore, notwithstanding the fact that the warrant application
mischaracterized Toshiba laptop model number “PSLE04-1000R” as the
“serial number,” the information provided in the warrant was sufficient to
identify with particularity the specific computer to be searched.
Accordingly, we agree with the trial court that “[s]ince there was no
ambiguity regarding the item to be searched, the particularity requirements
of the Fourth Amendment, Article I, Section 8 of the Pennsylvania
____________________________________________
8
The trial court further noted:
The affidavit [of probable cause] identified the computer as “a
Toshiba laptop computer serial number 980201760.” The
computer seized and in the custody of police, the computer they
sought to have forensically examined, was identified on the
search warrant handwritten Receipt/Inventory as follows:
MODEL PSLE04-01000, SERIAL #[98020176Q].” The computer
actually forensically examined was identified as a “Toshiba
Satellite L355D Laptop computer S/N [98020176Q].”
Trial Court Opinion, 8/14/2013, at 35 (footnotes omitted).
- 17 -
J-S21041-14
Constitution and Rule 206 of the Pennsylvania Rules of Criminal Procedure
were not violated.” Trial Court Opinion, 8/14/2013, at 35–36.
Judgment of Sentence affirmed.
Judgment Entered.
Joseph D. Seletyn, Esq.
Prothonotary
Date: 12/24/2014
- 18 -