RECOMMENDED FOR FULL-TEXT PUBLICATION
Pursuant to Sixth Circuit Rule 206
File Name: 08a0156p.06
UNITED STATES COURT OF APPEALS
FOR THE SIXTH CIRCUIT
_________________
X
Plaintiff-Appellee, -
UNITED STATES OF AMERICA,
-
-
-
No. 07-3757
v.
,
>
BRENT TERRY, -
Defendant-Appellant. -
N
Appeal from the United States District Court
for the Southern District of Ohio at Cincinnati.
No. 06-00091—Sandra S. Beckwith, Chief District Judge.
Argued: March 17, 2008
Decided and Filed: April 15, 2008
Before: BOGGS, Chief Judge; ROGERS, Circuit Judge; and SHADUR, District Judge.*
_________________
COUNSEL
ARGUED: Richard W. Smith-Monahan, OFFICE OF THE FEDERAL PUBLIC DEFENDER,
Cincinnati, Ohio, for Appellant. Christopher K. Barnes, ASSISTANT UNITED STATES
ATTORNEY, Cincinnati, Ohio, for Appellee. ON BRIEF: Richard W. Smith-Monahan, OFFICE
OF THE FEDERAL PUBLIC DEFENDER, Cincinnati, Ohio, for Appellant. Jeb T. Terrien,
ASSISTANT UNITED STATES ATTORNEY, Cincinnati, Ohio, for Appellee.
_________________
OPINION
_________________
BOGGS, Chief Judge. Brent Terry entered a conditional guilty plea to one count of
possession of images of minors engaged in sexually explicit conduct, in violation of
18 U.S.C. § 2252(a)(4)(B), reserving his right to appeal the district court’s denial of his motion to
suppress. Terry argues that the search warrant permitting federal agents to search his home was not
grounded upon probable cause, and that the search therefore violated the Fourth Amendment. For
the following reasons, we affirm the judgment of the district court.
*
The Honorable Milton I. Shadur, United States District Judge for the Northern District of Illinois, sitting by
designation.
1
No. 07-3757 United States v. Terry Page 2
I
The facts of this case are undisputed. In the early morning hours of October 14, 2004,
Internet service provider AOL (formerly known as America Online) intercepted two e-mail
messages containing a known child pornography image. These messages were sent from the e-mail
address “skippie4u@aol.com” to an unknown recipient (or recipients) at 2:35 a.m. and again at 2:36
a.m. The following day, AOL forwarded the image, along with the screen name, e-mail address, and
zip code of the user, to the National Center for Missing and Exploited Children (NCMEC), which
in turn forwarded the information to Immigration and Customs Enforcement (ICE) officers. Upon
issuance of a summons, AOL provided ICE more information on the “skippie4u” screen name,
which revealed that “skippie4u” was one of three screen names assigned to a master AOL account
registered to Roy Terry, who lived at 10 Township Avenue in Cincinnati, Ohio. Defendant Brent
Terry (Roy’s son) was the registered user of the “skippie4u” screen name. ICE confirmed through
the Postal Service that both Roy and Brent Terry received mail at 10 Township Avenue.
Based on this information, ICE obtained a search warrant for the Township Avenue address
and executed it on March 21, 2005. The record does not reveal what, if anything, was searched
and/or seized from the Township Avenue residence. It appears, however, that ICE was most
interested in Brent Terry, not his father, because the e-mail account used to send the image was
registered specifically to the younger Terry. During the search, ICE reported that Roy Terry
was interviewed at which time he stated that he has an Internet account through
America Online (AOL), which is utilized, by himself, Brenda TERRY and Brent
TERRY. Roy TERRY stated that Brent TERRY lives at 16 Walnut St. Cincinnati,
OH and has access to the aforementioned AOL account from that address. Roy
TERRY also stated that Brent TERRY has a computer that he uses at that address to
access the account. Furthermore, Roy TERRY informed [ICE] that Brent TERRY
utilizes the screen name Skippie 4U when accessing the aforementioned AOL
account from his address 16 Walnut St. Cincinnati, OH.
Application and Affidavit for Search Warrant at 8 (capitalization in original). Roy also told ICE that
Brent had lived at the Walnut Street address, which he rented from Roy, for approximately one and
a half years. Thus, he was living in the Walnut Street residence at the time his e-mail account was
used to send the illegal image.
ICE then obtained the search warrant for 16 Walnut Street that is the subject of this appeal.
That warrant was executed on the same day, and agents recovered a laptop computer, three hard
drives, and various external media from the residence, which were found to contain a total of 123
images and eight videos of minors engaged in sexually explicit conduct. Terry later moved to
suppress this evidence, which motion the district court denied. Thereafter Terry entered a
conditional guilty plea pursuant to Federal Rule of Criminal Procedure 11(a)(2) and appealed the
denial of his suppression motion to this court.
II
“When reviewing the denial of a motion to suppress, we review the district court’s findings
of fact for clear error and its conclusions of law de novo.” United States v. Foster, 376 F.3d 577,
583 (6th Cir. 2004) (quoting United States v. Hurst, 228 F.3d 751, 756 (6th Cir. 2000)). However,
when judging the sufficiency of an affidavit to establish probable cause in support of a search
warrant, the Supreme Court has “repeatedly said that after-the-fact scrutiny . . . should not take the
form of de novo review. . . . Rather, reviewing courts are to accord the magistrate’s determination
‘great deference.’” United States v. Allen, 211 F.3d 970, 973 (6th Cir. 2000) (en banc) (quoting
Illinois v. Gates, 462 U.S. 213, 236 (1983)). This means that “so long as the magistrate had a
No. 07-3757 United States v. Terry Page 3
‘substantial basis for . . . conclud[ing]’ that a search would uncover evidence of wrongdoing, the
Fourth Amendment requires no more.” Ibid. (quoting Gates, 462 U.S. at 236). Accordingly, “[t]his
circuit has long held that an issuing magistrate’s discretion should only be reversed if it was
arbitrarily exercised.” Ibid.
In deciding whether to issue a search warrant, the Fourth Amendment requires “the issuing
magistrate . . . simply to make a practical, common-sense decision whether, given all the
circumstances set forth in the affidavit before him . . . there is a fair probability that contraband or
evidence of a crime will be found in a particular place.” Gates, 462 U.S. at 238; see also United
States v. Smith, 510 F.3d 641, 652 (6th Cir. 2007) (referring to this as a ‘totality of the
circumstances’ approach). A “fair probability” is not interpreted as connoting any particular
mathematical degree of probability. See Maryland v. Pringle, 540 U.S. 366, 371 (2003) (“The
probable-cause standard is incapable of precise definition or quantification into percentages because
it deals with probabilities and depends on the totality of the circumstances. . . . Finely tuned
standards such as proof beyond a reasonable doubt or by a preponderance of the evidence . . . have
no place in the probable-cause decision.”) (internal quotation omitted).
Terry asserts that that there was an insufficient nexus to connect the intercepted child
pornography image to his home computer, arguing that the AOL e-mail account used to send the
illicit image could have been accessed from any computer with an Internet connection. We certainly
agree that to establish probable cause to support a search warrant, there must be some nexus between
the illegal activity suspected and the property to be searched. See United States v. McPhearson, 469
F.3d 518 (6th Cir. 2006) (mere fact that man arrested for non-drug offense had drugs on his person
did not establish the requisite nexus to search his home for drugs); United States v. Carpenter, 360
F.3d 591, 594 (6th Cir. 2004) (en banc) (fact that marijuana was found growing near a residence,
by itself, “f[e]ll short of establishing the required nexus between the . . . residence and evidence of
marijuana manufacturing”). We do not agree, however, that such a nexus was lacking in this case.
The government’s affidavit established that (1) the AOL e-mail account belonging to the
“skippie4u” screen name sent two e-mail messages at approximately 2:30 a.m. containing a known
child pornography image; (2) Brent Terry was the registered user of the “skippie4u” screen name;
(3) Brent Terry lived at 16 Walnut Street at the time the e-mail messages were sent; and (4) Brent
Terry had a computer at that address through which he accessed the “skippie4u” e-mail account used
to send the messages. It requires no great leap of logic to conclude that the computer in Terry’s
home was probably used to send the intercepted messages. Given that the probable cause standard
deals with “the factual and practical considerations of everyday life on which reasonable and prudent
men, not legal technicians, act,” Gates, 462 U.S. at 231 (quoting Brinegar v. United States, 338 U.S.
160, 175 (1949)), the district court did not err in concluding that “as a matter of plain common sense,
if . . . a pornographic image has originated or emanated from a particular individual’s email account,
it logically follows that the image is likely to be found on that individual’s computer or on storage
media associated with the computer.” Dist. Ct. Order at 7. There are other possibilities, of
course—a hacker illicitly using Terry’s e-mail account, for example—but probable cause does not
require “near certainty,” only a “fair probability.” See United States v. Martin, 289 F.3d 392, 400
(6th Cir. 2002) (“Although innocent explanations for some or all of these facts may exist, this
possibility does not render the . . . determination of probable cause invalid.”).1
In a similar case, this court upheld probable cause to search a home where the defendant had
purchased subscriptions to known child pornography websites, but where it was unknown precisely
which computer he had used to access those sites. See United States v. Wagers, 452 F.3d 534 (6th
1
Though not central to our analysis on this point, the fact that the images were sent at approximately 2:30 in
the morning further reduces the likelihood that a computer other than the one in Terry’s home was used.
No. 07-3757 United States v. Terry Page 4
Cir. 2006). In Wagers, the defendant used a business-based checking card to subscribe to two
websites that made available both legal and illegal pornography. He argued that since “his
subscriptions were connected only to his business office, not to his home,” there was “nothing . . .
[to] connect[] the residence to the alleged child pornography offenses.” Id. at 539. We rejected this
“feeble” argument, observing that the affidavit “aver[red] that an [Internet Protocol (IP)] address
assigned by Insight [Communications] . . . was used to purchase both memberships” and that the
defendant “used Insight at his home but not his office . . . .” Ibid. Logically, we concluded that the
defendant’s “home would be well within the ambit of a properly issued search warrant.” Ibid. We
further noted that “[e]ven if the home were only one of two locations—home and office—served by
Insight, there would be sufficient evidence to support probable cause.” Ibid.
Terry attempts to distinguish Wagers on the ground that, unlike in Wagers, there was no IP
information either to tie his computer to the e-mail messages, or even to limit the possible number
of computers that could have been used to send the message. But the Wagers opinion did not hold
that IP information was an indispensable prerequisite to obtaining a search warrant in a case
involving Internet-based child pornography, only that such information contributed to the totality
of the probable-cause determination. Indeed, Wagers favorably cited several cases that arguably
involved even less evidence of probable cause than is presented here. See id. at 540, 543 (citing
United States v. Gourde, 440 F.3d 1065 (9th Cir. 2006) (en banc); United States v. Martin, 426 F.3d
68 (2d Cir. 2005); and United States v. Froman, 355 F.3d 882 (5th Cir. 2004)). All of the cited cases
involved defendants who subscribed to websites that were advertised as child pornography sites but
contained both legal and illegal material, and in which the government’s affidavit supporting a
search warrant never stated whether the individuals had actually downloaded any of the illicit
materials. Nevertheless, the courts universally found that the probable cause threshold had been
satisfied because the defendants had purchased access to child pornography. In this case, although
there was no evidence that Terry belonged to such a website, there was evidence that Terry had
actually possessed (as opposed to merely having had access to) child pornography. While any IP
or other information that could have more specifically tied Terry’s home computer to the e-mail
messages would certainly have been welcome, we are satisfied that the use of Terry’s personal e-
mail account in the wee hours of the morning, combined with information that Terry used his home
computer to access that account, established at least a “fair probability” that the computer used to
send the messages was, in fact, the one in Terry’s home. Ergo,2there was at least a fair probability
that the illicit image (or similar images) would be found there.
We are somewhat troubled by the fact that the content of the incriminating e-mail messages
was apparently not preserved.3 It is thus impossible to know the context in which the image was
sent; Terry argues that he may have merely been replying to some unsolicited child pornography4
spam to request that no further such images be sent to him. Although this is theoretically possible,
it is not enough for Terry simply to speculate about hypothetical “false-positive” scenarios. He
presented no evidence at the suppression hearing about the actual occurrence of such “spam-
2
We do not believe that the passage of five months between the sending of the intercepted e-mail messages and
the execution of the warrant changes the probable cause calculus much, if at all. Images typically persist in some form
on a computer hard drive even after the images have been deleted and, as ICE stated in its affidavit, such evidence can
often be recovered by forensic examiners. See United States v. Lacy, 119 F.3d 742, 746 (9th Cir. 1997) (holding that
the nature of the crime “provided good reason to believe the computerized visual depictions downloaded by Lacy would
be present in his apartment when the search was conducted ten months later”) (internal quotation omitted).
3
The record does not reveal whether this failure was the fault of AOL, the NCMEC, or ICE.
4
Whether an image that is received via an e-mail message is also included in an outgoing reply would depend
on various factors, including the e-mail client settings, whether the image was included within the body of the incoming
message or as an attachment, the operation of any filtering software, etc.
No. 07-3757 United States v. Terry Page 5
rejection” transmission of child porn, either in his case or in society generally. Since a probable
cause finding does not require a preponderance of the evidence, in order to undermine the
magistrate’s finding, the likelihood of an innocent explanation must (at the very least) be greater
than the likelihood of a guilty one. For example, this court has indicated that—given studies
demonstrating that a sizable percentage of United States currency in circulation is tainted with a
detectable level of cocaine residue—a canine alert to currency, standing alone, will likely not
establish probable cause in a forfeiture action. United States v. $5,000.00 in U.S. Currency, 40 F.3d
846, 849-50 (6th Cir. 1994).5 In the context of automobiles, however, the rate of false positives is
significantly lower, and an alert from a trained, reliable canine will alone establish probable cause
to search the vehicle. United States v. Diaz, 25 F.3d 392, 393-94, 396 (6th Cir. 1994). Although
we recognize that the government ultimately has the burden of demonstrating probable cause, absent
any evidence that innocent persons frequently receive and reply to unsolicited child pornography
spam (and in a way that would produce the computer traces in this case), this court cannot say that
the magistrate judge arbitrarily exercised his discretion in issuing a search warrant for Terry’s home.
III
For the foregoing reasons, we AFFIRM the judgment of the district court.
5
More recent case law has called this assumption into question. See United States v. Funds in Amount of Thirty
Thousand Six Hundred Seventy Dollars, 403 F.3d 448, 459 (7th Cir. 2005) (skeptically approaching the “currency
contamination theory” and citing newer research indicating that “it is likely that trained cocaine detection dogs will alert
to currency only if it has been exposed to large amounts of illicit cocaine within the very recent past”).