Case: 14-14680 Date Filed: 04/01/2016 Page: 1 of 29
[PUBLISH]
IN THE UNITED STATES COURT OF APPEALS
FOR THE ELEVENTH CIRCUIT
________________________
No. 14-14680
________________________
D.C. Docket No. 8:13-cr-00462-VMC-TBM-1
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
versus
ERIC THOMAS,
Defendant-Appellant.
________________________
Appeal from the United States District Court
for the Middle District of Florida
________________________
(April 1, 2016)
Before HULL, JULIE CARNES, and CLEVENGER, * Circuit Judges.
HULL, Circuit Judge:
*
Honorable Raymond C. Clevenger, III, United States Circuit Judge for the Federal
Circuit, sitting by designation.
Case: 14-14680 Date Filed: 04/01/2016 Page: 2 of 29
After a jury trial, Eric Thomas, a federal prisoner, is serving a 96-month
sentence, followed by a life term of supervised release, on his conviction for
knowingly accessing with the intent to view child pornography. On appeal,
Thomas challenges the district court’s denial of his motion to suppress evidence
discovered on a HP desktop computer in his home. After a careful review of the
record and with the benefit of oral argument, we affirm.
I. PROCEDURAL OVERVIEW
On September 25, 2013, following a police search of Eric Thomas’s home
computers, a federal grand jury indicted Thomas for one count of knowingly
accessing with the intent to view child pornography, in violation of 18 U.S.C.
§ 2252(a)(4)(B) and (b)(2). Thomas filed a motion to suppress evidence gathered
from the HP desktop computer at his home. A magistrate judge held three hearings
on the motion to suppress, on December 20 and 23, 2013 and February 5, 2014,
and issued a report and recommendation (“R&R”), recommending a denial of
Thomas’s motion. The district court adopted the R&R and denied the motion to
suppress.
After a three-day trial, the jury found Thomas guilty of knowingly accessing
with the intent to view child pornography. On September 29, 2014, the district
court sentenced him to 96 months’ imprisonment followed by a life term of
supervised release. Thomas does not appeal his sentence but only his conviction
2
Case: 14-14680 Date Filed: 04/01/2016 Page: 3 of 29
based on the denial of his suppression motion. We thus review the evidence
adduced at the suppression hearings, the arguments on the suppression motion, and
the district court’s ruling.
II. MOTION TO SUPPRESS
A. December 20, 2013 Suppression Hearing
At the December 20, 2013 hearing, Officer Matt Steiner of the Largo Police
Department testified that he was the first officer to arrive at Thomas’s house on
July 21, 2012. Officer Steiner stated that he arrived at approximately 11:11 a.m.,
in response to a telephone report that there was child pornography on a computer
within the home. He spoke to Caroline Olausen, Thomas’s then-wife, who had
contacted the police.
According to Officer Steiner, Olausen told him that, on the previous night,
Thomas had appeared nervous and his heart was racing. That morning, Olausen
discovered eight to ten child pornography websites on a computer in their shared
home. She explained that she found the pictures after turning on the computer
monitor and clicking “yes” when asked if she wanted to “restore the previous
Internet Explorer session.” Olausen explained that the websites featured naked
prepubescent and pubescent girls, some of whom were performing oral sex on
adult men.
3
Case: 14-14680 Date Filed: 04/01/2016 Page: 4 of 29
Officer Steiner testified that he learned that Thomas was sleeping, so he
asked Olausen for consent to search the computers in the residence. Olausen told
him that she and Thomas both used the computers, but Thomas used the computers
more often than she did and used them for work purposes. Olausen then gave oral
and written consent to search all of the electronic media in the residence, which
included an HP desktop computer, a Dell desktop computer, a Toshiba tablet, and a
Maxtor internal hard drive. She also consented in writing to the removal of “any
property” from the home. Officer Steiner believed that Olausen had the authority
to consent to a search and seizure because the computers were in an unlocked
home office within the residence and Olausen used at least the HP desktop
computer that had allegedly displayed the child pornography.
According to Officer Steiner, when he approached the HP desktop computer,
two websites were in plain view and he could use the mouse to move between the
sites. The websites were called “NNLollys” and “HDSchoolTeens,” and both
featured “pictures of young girls that had only their underwear on.” The girls were
not engaged in any sexual activity. Officer Steiner did not have to type in a
password to view the computer screen. Officer Steiner stated that he did not
conduct any forensic analysis of the computers. After viewing the websites on the
HP computer, he provided “scene security” and “officer safety” while other agents
4
Case: 14-14680 Date Filed: 04/01/2016 Page: 5 of 29
performed forensic analyses of the electronic media. He departed from the
Thomas residence at 1:37 p.m.
Detective Nathan Dix testified that he was a cybercrimes detective for the
Largo Police Department and an agent on the Federal Bureau of Investigation’s
(“FBI”) Child Exploitation Task Force. He arrived at Thomas’s house at
12:18 p.m., after Officer Steiner had begun the initial investigation. Detective Dix
stated that he received a briefing and then examined the home office area and the
HP desktop computer, which was easily accessible within the office. He
concluded that there was child erotica, but no child pornography, on the two
websites visible on the HP computer. Notably though, Officer Steiner testified that
the “NNLollys” website visible on the computer had links to other websites with
terms indicative of child pornography.
Detective Dix spoke with Olausen after viewing the webpages. Olausen
confirmed that she had provided consent to search the computers and repeated why
she had contacted the police. According to Detective Dix, Olausen told him that
she had arrived home earlier than expected the previous night. She saw Thomas
get up “very quickly” from “the area of his computer desk.” He was acting
nervous and strange, and when she hugged him his heart was pounding.
Olausen continued that, when she woke up that morning, she turned on the
monitor of the HP computer, restored the previous browsing history, and watched
5
Case: 14-14680 Date Filed: 04/01/2016 Page: 6 of 29
eight to ten Internet windows appear. The windows contained child pornography,
in Olausen’s opinion. She saw nude pictures of 4-to-13-year old children and
some of the children were in “sex poses” or being “sexually abused.” In one
instance, there was an image with “an adult male penis and a completely nude
child’s vagina.” Detective Dix testified that the described images constituted child
pornography. He assumed that there were only two webpages left open on the HP
computer when the police arrived because Olausen had mistakenly closed some of
the tabs or was wrong about how many webpages she had seen.
Detective Dix further testified that Olausen stated that she and Thomas both
used the computers, though “Thomas was the primary user of the computers
because he worked from home and utilized them through his work.” Olausen
explained that Thomas was normally “compulsive” about properly shutting down
the computers, using pop-up-ware and spam filters, and deleting his Internet
cookies. At the end of Detective Dix’s conversation with Olausen, Olausen again
orally consented to a search of the computers and said that Thomas was asleep.
After this conversation, Detective Dix returned to the home office and
conducted a forensic search of the Dell desktop computer. He explained that he
used a “forensic scan on-site preview tool to scan that hard drive for video and
image files.” Eventually, Detective Corey Monaghan arrived in the room to scan
the HP desktop computer using the “OS Triage” forensic search tool.
6
Case: 14-14680 Date Filed: 04/01/2016 Page: 7 of 29
While Detective Dix was conducting the scan, Thomas woke up. Detective
Dix saw Thomas walk toward the home office area, but Officer James Shinn
intercepted him before he could enter. Officer Shinn told Thomas to go to the
living room and he would explain what was happening. Detective Monaghan also
left the home office to interview Thomas.
Detective Dix testified that Detective Monaghan was gone from the home
office for about 40 to 45 minutes. During that time, Detective Dix completed the
forensic scan of the Dell computer and began scanning the Toshiba tablet. When
Detective Monaghan returned, he told Detective Dix that Thomas had revoked
consent and they had to stop the search. Both officers stopped their forensic search
tools. They seized all of the electronic media in the residence. Detective Dix
believed that there was probable cause to seize the evidence and that there was a
“high risk that evidence could be destroyed or deleted” if left in the Thomas
household. Detective Dix testified that he did not discover any child pornography
pursuant to his preliminary forensic reviews of the Dell computer and Toshiba
tablet.
Officer James Shinn of the Largo Police Department testified that he arrived
at the Thomas residence at 1:31 p.m. He was instructed by officers already present
at the house that Thomas was sleeping in a bedroom and he should keep watch to
7
Case: 14-14680 Date Filed: 04/01/2016 Page: 8 of 29
see if Thomas wakes up. Officer Shinn positioned himself so that he could see the
bedroom.
From his post, Officer Shinn observed Thomas leave the bedroom and walk
toward the office. According to Officer Shinn, Detective Monaghan spoke to
Thomas and asked Thomas to go to the living room. Thomas, however, continued
walking toward the office, so Officer Shinn blocked the doorway to the office and
told Thomas to speak to Detective Monaghan. Officer Shinn testified that he was
concerned about Thomas going into the office because there were tools in that
room that could be used as weapons.
Thomas complied with Officer Shinn’s directions and went to the living
room to talk to Detective Monaghan. Officer Shinn could hear Detective
Monaghan and Thomas’s conversation from where he was standing. Officer Shinn
testified that Detective Monaghan asked Thomas to consent to a search of the
computers and Thomas replied, “Yes, that would be fine.” Detective Monaghan
then asked Thomas to fill out a consent-to-search form. Thomas agreed and began
writing on the form, but then stopped and asked to see his wife. Detective
Monaghan replied that Thomas could speak to Olausen after they dealt with the
form.
At that point, according to Officer Shinn, Thomas started to equivocate
about filling out the form. Thomas said that he would sign the form if he could
8
Case: 14-14680 Date Filed: 04/01/2016 Page: 9 of 29
speak to Olausen. Detective Monaghan urged Thomas to “make a clear decision,”
and when Thomas again asked to talk to Olausen, Detective Monaghan instructed
him to make an “informed decision.” According to Officer Shinn, Thomas became
increasingly upset and asked again to speak with Olausen. Officer Shinn tried to
explain to him that Detective Monaghan was attempting to protect his rights by
soliciting a clear answer concerning consent to search.
Officer Shinn testified that Detective Monaghan left the living room to ask
Olausen if she was willing to talk to Thomas. Detective Monaghan came back and
informed Thomas that Olausen did not want to speak to him. Thomas then stated
that his sister was a lawyer and he wanted to talk to her. At that point, Detective
Monaghan stopped the conversation, and Officer Shinn escorted Thomas to the
front patio. Officer Shinn thought the conversation between Thomas and Detective
Monaghan lasted about five or six minutes.
B. December 23, 2013 Suppression Hearing
Detective Monaghan was the sole witness at the second suppression hearing.
Detective Monaghan testified that he was part of the Largo Police Department’s
Investigative Services Division and worked on cybercrimes. He also worked on
the FBI’s Innocent Images Task Force, investigating online child exploitation.
According to Detective Monaghan, when he arrived at the Thomas residence
at approximately 12:55 p.m., Detective Dix briefed him on what was happening
9
Case: 14-14680 Date Filed: 04/01/2016 Page: 10 of 29
and informed him that Olausen had consented to a search of the computers.
Detective Monaghan was under the impression that Thomas was asleep in a
bedroom, so he proceeded to the office area. He observed that access to the HP
computer was unrestricted and there were already two websites containing child
erotica displayed on the computer monitor. At least one of the websites appeared
to contain links to child pornography.
Detective Monaghan stated that he initiated his use of the OS Triage forensic
preview tool at approximately 1:01 p.m. The forensic tool completed a scan of the
HP computer’s Internet history and computer registry within a minute. 1 Detective
Monaghan reviewed the Internet history immediately and saw “websites with
names indicative of child pornography” and browser history consistent with what
Olausen had described. The OS Triage tool saved the Internet history results to a
thumb drive.
Detective Monaghan testified that he left the forensic search running and
spoke to Olausen. Olausen told him that the images she saw on the computer were
of “prepubescent” children. Olausen also stated that she used the HP computer to
“Google” the Largo Police Department earlier that morning. Detective Monaghan
1
The OS Triage forensic preview tool was on a thumb drive, which Detective Monaghan
plugged into the HP desktop computer. The tool immediately gathered information from the
computer’s Internet history and registry. It also did a more time-consuming secondary scan of
the computer for images, videos, and “key words that match[ed] a list within the software of
names indicative of child pornography.” Detective Monaghan ultimately cancelled the
secondary search before that portion of the scan was complete. The Internet history relied upon
in the search warrant was available after the first scan.
10
Case: 14-14680 Date Filed: 04/01/2016 Page: 11 of 29
hypothesized that the other six to eight child erotica/pornography websites Olausen
had seen were not on the screen when the police arrived because Olausen had
inadvertently closed the websites when she used Google that morning before
calling the police. Finally, Olausen stated that the HP computer was password
protected and she and Thomas shared access to the password.
After Detective Monaghan turned his attention back to analyzing the Internet
history, Thomas came out of the bedroom. Detective Monaghan testified that he
left the home office and met Thomas in the living room to explain why the police
were in the house. Thomas denied viewing child pornography, but admitted to
accessing adult pornography, and immediately gave oral consent to search the
computers in the home office.
Detective Monaghan asked Thomas to sign a consent-to-search form to
memorialize his oral consent. Thomas, instead of signing, asked to speak to
Olausen. Detective Monaghan testified that he “again asked [Thomas] if he
wanted to sign the consent to search.” Thomas responded a second time that he
wanted to speak to his wife. Detective Monaghan walked away from Thomas to
locate Olausen, who was waiting outside of the house. Olausen did not want to
speak with Thomas, so Detective Monaghan returned to the living room to convey
this information to Thomas. Thomas said that he would not sign the consent-to-
search form until he talked to his wife.
11
Case: 14-14680 Date Filed: 04/01/2016 Page: 12 of 29
After this ultimatum, Detective Monaghan attempted to “clarify” whether
Thomas was consenting to the search, but Thomas continued to insist on talking to
Olausen. Thomas also mentioned that his sister was an attorney and he wanted to
speak to her. Detective Monaghan testified that, at that point, he determined that
Thomas was revoking his oral consent. Detective Monaghan went to the office
area and told Detective Dix that consent had been withdrawn, and he shut down the
OS Triage tool. Data from the forensic scan showed that Detective Monaghan
terminated the search at 1:50 p.m. Detective Monaghan stated that he seized the
computer media and planned to obtain a search warrant. He did not want to leave
the computers at the Thomas residence because, in his experience, the evidence
would be destroyed.
Detective Monaghan testified that he later, on August 22, 2012, reviewed the
results of the OS Triage forensic scan, looked at the websites listed in the Internet
history, and discovered that at least one of the websites had an image of child
pornography. On August 24, 2012, Detective Monaghan obtained a federal search
warrant. 2 Detective Monaghan stated that he would have pursued a search warrant
even without the forensic evidence. After Detective Monaghan obtained the search
2
The State Attorney’s Office advised Detective Monaghan that the evidence he gathered
at the house and from the forensic scan were insufficient to obtain a search warrant for any state
offense.
12
Case: 14-14680 Date Filed: 04/01/2016 Page: 13 of 29
warrant, he conducted a complete forensic analysis of the HP computer and found
about 860 images of child pornography.
After the testimony concluded, Thomas argued that, under Georgia v.
Randolph, 547 U.S. 103, 126 S. Ct. 1515 (2006), he negated Olausen’s consent to
search the computers, and therefore the officers acted illegally when they removed
the thumb drive of forensic evidence and the computers from his home without his
consent. Thomas also claimed that all of the evidence obtained pursuant to the
federal search warrant was fruit of the poisonous tree, as the warrant application
included the results of the OS Triage forensic scan.
The government responded that the withdrawal of consent does not require
police officers to give back the evidence they have already gathered. It
emphasized that Detective Monaghan obtained a search warrant based solely on
the information stored on the thumb drive and did not search the HP computer
again until he had the warrant. Additionally, the government asserted that there
was probable cause to seize the computers, and the officers did not need a warrant
because there were legitimate concerns that Thomas would destroy the evidence if
they left the computers at the residence.
C. February 5, 2014 Oral Argument on Motion to Suppress
When the magistrate judge called for additional argument on the suppression
motion, Thomas broadened his position and claimed that Randolph should be
13
Case: 14-14680 Date Filed: 04/01/2016 Page: 14 of 29
expanded to require police officers to obtain both spouses’ consent before
searching a shared home when both spouses are present. Thomas also argued that:
(1) the officers did not have probable cause to seize the HP computer because
Olausen’s tip was unsubstantiated at the time of the seizure and the officers did not
observe any child pornography on the HP computer; (2) Thomas “veto[ed]”
Olausen’s consent, so the police could not rely on her signed consent form
authorizing them to seize any item in the house to justify removing the HP
computer; (3) the police could not justify the seizure based on a disappearing-
evidence exception to the warrant requirement because they had ample time to
secure the premises and obtain a search warrant if they were truly concerned about
the destruction of evidence; and (4) the warrant affidavit, even as written, did not
establish probable cause because Detective Monaghan visited the websites over a
month after Thomas allegedly opened them, and the contents may have changed
during that time, or Thomas may have accessed the websites inadvertently.
The government argued three theories in support of the search and seizure.
First, the government claimed that Olausen’s consent allowed the officers to search
and seize the computers and take the thumb drive. Second, the government
contended that the exigent circumstances exception to the warrant requirement
allowed them to seize the computers to prevent Thomas from destroying the
evidence. Third, the government stated that under the plain view doctrine, officers
14
Case: 14-14680 Date Filed: 04/01/2016 Page: 15 of 29
can seize obviously incriminating items without a warrant when they have lawful
access to the items. It argued that there was no dispute that the officers were
lawfully within the Thomas residence, and it maintained that it was clear that the
computers contained incriminating evidence based on (1) Olausen’s statements,
which were consistent on key points, (2) the visible child erotica websites, and
(3) the initial results of the OS Triage forensic scan.
D. R&R and District Court’s Ruling
The magistrate judge filed an R&R, recommending denial of Thomas’s
motion to suppress. The magistrate judge found that Olausen “shared authority
and access over the home, the home-office area, and the computers found therein.”
The magistrate judge also found that Thomas “verbally consented to the search of
the computers when first asked but shortly thereafter balked at signing a written
consent to search form.” The forensic data that Officer Monaghan relied on to
obtain the search warrant had been downloaded for nearly 50 minutes before
Thomas withdrew his consent to search.
Based on these factual findings, the magistrate judge determined that the
officers had Olausen’s consent to enter the house and search and seize the
computers. Olausen’s consent was valid because she shared control of the home
and the computers, and even if she did not, the officers had a reasonable good-faith
belief that she had the authority to consent to a search. Therefore, the search and
15
Case: 14-14680 Date Filed: 04/01/2016 Page: 16 of 29
seizure of data from the HP computer was consistent with the Fourth Amendment.
The magistrate judge concluded that Thomas’s later revocation of consent did not
require suppression of the evidence the officers had already lawfully obtained:
“neither the information obtained by the osTriage device nor the information
developed from review of that information was the fruit of the poisonous tree.”
The magistrate judge further found that the officers lawfully seized and HP
computer and removed it from Thomas’s house.3 According to the magistrate
judge, there was probable cause to believe that there was child pornography on the
HP computer based on the totality of: (1) Olausen’s statement that she saw images
that constituted child pornography; 4 (2) the officers’ observation of child erotica on
the computer with links to websites indicative of child pornography; (3) the
Internet history displayed by the OS Triage device, which suggested that a user
visited child pornography or child erotica websites the previous night;
(4) Thomas’s admission that he viewed adult pornography; and (5) Detective
Monaghan’s experience with child pornography investigations. Furthermore,
3
The magistrate judge found that there was not probable cause to seize Thomas’s other
electronic media. However, there was nothing to suppress as a result of this finding because the
police did not discover child pornography on the Dell computer or Toshiba tablet during their
initial search of the Thomas residence, and they did not search the Dell or Toshiba again after the
seizure.
4
The magistrate judge remarked that Olausen’s written statement concerning her
discovery of child pornography on the HP computer, which she provided to Officer Steiner
during the search, was “fairly consistent” with what each officer testified she said in
conversation.
16
Case: 14-14680 Date Filed: 04/01/2016 Page: 17 of 29
given the portable nature of the computer and its contents, and the fact that Thomas
was aware of the nature of the police investigation, the magistrate judge concluded
that it was reasonable for the officers to fear that the evidence would be destroyed
and seize the HP computer without a warrant.
Finally, after finding that the search and seizure were lawful, the magistrate
judge concluded that probable cause supported the search warrant, and the 860
images of child pornography were admissible. After Thomas filed objections and
the government responded, the district court adopted the magistrate judge’s R&R
and denied Thomas’s motion to suppress. This appeal followed.
III. DISCUSSION
On appeal, Thomas argues that Olausen did not have the authority to consent
to a forensic search of the HP computer, and, in the absence of her consent, the
police did not have a lawful ground for conducting a warrantless forensic scan of
the computer. Accordingly, Thomas maintains that the results of the forensic
search and all of the evidence discovered after the police obtained a search warrant
(based on an affidavit including the results of the OS Triage scan) must be
suppressed as fruit of the poisonous tree. Thomas also argues that Randolph was
wrongly decided and should be revisited. 5
5
Additionally, Thomas appears to argue, in a single sentence unsupported by any
citations, that Olausen’s consent was invalid because it was not informed. Thomas asserts that
Olausen was unaware when she consented to a search of the computers that the police would use
17
Case: 14-14680 Date Filed: 04/01/2016 Page: 18 of 29
A. Standard of Review
The denial of a motion to suppress is a mixed question of fact and law.
United States v. Laist, 702 F.3d 608, 612 (11th Cir. 2012). We review questions of
law de novo and questions of fact for clear error, construing the facts in the light
most favorable to the prevailing party below. Id. We will reverse for clear error
only when we are “left with a definite and firm conviction that a mistake has been
committed.” United States v. Rothenberg, 610 F.3d 621, 624 (11th Cir. 2010)
(quotation marks omitted).
B. Third-Party Consent Rule
The Fourth Amendment guarantees people the right to be “secure in their
persons, houses, papers, and effects, against unreasonable searches and seizures.”
U.S. Const. amend. IV. Without a warrant, “a search is reasonable only if it falls
within a specific exception to the warrant requirement.” Riley v. California, 573
U.S. ___, ___, 134 S. Ct. 2473, 2482 (2014). One exception is that a warrantless
search is lawful when a person with actual or apparent authority voluntarily
consents to law enforcement officers conducting a search. United States v.
a forensic tool to reach back into the Internet browser history. Thomas’s one conclusory
sentence, however, is insufficient to raise the issue of knowing consent by Olausen. See United
States v. Jernigan, 341 F.3d 1273, 1283 n.8 (11th Cir. 2003) (“[A] party seeking to raise a claim
or issue on appeal must plainly and prominently so indicate . . . . At the very least, he must
devote a discrete, substantial portion of his argumentation to that issue.”). We also note that
Thomas did not raise this argument below.
18
Case: 14-14680 Date Filed: 04/01/2016 Page: 19 of 29
Watkins, 760 F.3d 1271, 1279 (11th Cir. 2014); Bates v. Harvey, 518 F.3d 1233,
1243 (11th Cir. 2008).
When two people share common authority over “premises or effects,” the
consent of one person “is valid as against the absent nonconsenting person with
whom the authority is shared.” United States v. Matlock, 415 U.S. 164, 170, 94 S.
Ct. 988, 993 (1974). The Supreme Court has explained that it is reasonable to
recognize that any co-inhabitant can consent to a search of a jointly-controlled area
because the co-inhabitants assume “the risk that one of their number might permit
the common area to be searched.” Id. at 171 n.7, 94 S. Ct. at 993 n.7.
In order to determine whether a person has the authority to consent to a
search of shared property, courts ask whether there is “mutual use of the property
by persons generally having joint access or control for most purposes.” Id.
Another formulation of this standard is whether the defendant has placed the items
in question “in an area over which others do not share access and control.”
Randolph, 547 U.S. at 135, 126 S. Ct. at 1535 (Roberts, C.J., dissenting).6
C. Randolph Rule
In Georgia v. Randolph, the Supreme Court added an exception to this third-
party consent rule, providing that when a physically present co-inhabitant
expressly refuses to consent to a police search, such refusal is dispositive,
6
Both parties cite Chief Justice Robert’s Randolph dissent in their briefs, and Thomas
uses this formulation.
19
Case: 14-14680 Date Filed: 04/01/2016 Page: 20 of 29
regardless of the consent of a fellow co-inhabitant. Id. at 114-17, 126 S. Ct. at
1523-25. In that case, Defendant Randolph’s wife called law enforcement to their
shared home after a domestic dispute and informed the officers that there were
“items of drug evidence” in the house. Id. at 107, 126 S. Ct. at 1519. Both the
defendant and his wife were present when the police asked to search the home. Id.
The wife consented, but the defendant unequivocally refused. Id. The law
enforcement officers searched the house and discovered cocaine. Id. The Supreme
Court suppressed the drug evidence, holding that the warrantless search was
invalid as to Defendant Randolph. Id. at 114-17, 126 S. Ct. at 1523-25. It
provided that “a physically present co-occupant’s stated refusal to permit entry
prevails, rendering the warrantless search unreasonable and invalid as to him.” Id.
at 106, 126 S. Ct. at 1519.
The Supreme Court in Randolph also addressed the situation presented in
this appeal: what to do when a co-tenant is asleep when the police knock on the
door and another co-tenant gives consent to enter and search the residence. 547
U.S. at 121, 126 S. Ct. at 1527. The Supreme Court responded to this scenario by
stating that it was “drawing a fine line” with the Randolph rule, and that “if a
potential defendant with a self-interest in objecting is in fact at the door and
objects, the co-tenant’s permission does not suffice for a reasonable search,
whereas the potential objector, nearby but not invited to take part in the threshold
20
Case: 14-14680 Date Filed: 04/01/2016 Page: 21 of 29
colloquy, loses out.” Id. Thus, the Supreme Court expressly declined to require
police to wake a sleeping co-tenant. See id.
D. Applicability of the Randolph Rule to Personal Effects
The Supreme Court crafted the Randolph rule in the context of the search of
a residence. Both Thomas and the government acknowledge that it is an open
question whether Randolph applies to searches of personal effects, such as
computers. Indeed, federal appeals courts have split on this issue. Compare
United States v. King, 604 F.3d 125, 135-37 (3d Cir. 2010) (holding that Randolph
does not apply to searches of personal effects and that the police can search
personal effects with one user’s consent, even if the other user objects), with
United States v. Murphy, 516 F.3d 1117, 1124 (9th Cir. 2008) (“[T]here is no
reason that the rule in Randolph should be limited to residences.”).
We need not settle the issue here, though. We see no error in the district
court’s finding that, in seeking a search warrant, Detective Monaghan relied on
information obtained before Thomas even objected and attempted to revoke
Olausen’s consent to search the HP computer. See Laist, 702 F.3d at 612.
Detective Monaghan did not continue searching after Thomas expressed
uncertainty about signing the written consent form, so assuming that Olausen had
the authority to consent to a search in the first place, the law enforcement officers
complied with the Randolph rule.
21
Case: 14-14680 Date Filed: 04/01/2016 Page: 22 of 29
Therefore, whether the applicable rule for searching personal effects is the
Randolph rule or the general principle that anyone with shared control over the
property can consent to a search (regardless of the other’s party’s objection), the
only issue in this case is whether Olausen had actual or apparent authority to
consent to a forensic search of the computer, even though Thomas had taken steps
to prevent her from viewing his Internet history. We answer this question in the
affirmative.
E. Olausen’s Authority to Consent
When the police obtained Olausen’s consent to search the HP computer and
undertook the forensic scan, they knew that: (1) the computer was easily accessible
and located in an unlocked room in the Thomas’s shared residence; (2) Olausen
had access to the computer and had used it that morning; and (3) Olausen and
Thomas shared the password to access the computer. Based on this information, it
appeared that Olausen had control and authority over the HP computer, and could
consent to a forensic search. See Matlock, 415 U.S. at 170, 94 S. Ct. at 993.
The fact that Thomas was the primary user of the computer, worked from
home, and typically deleted his Internet history, used pop-up-ware and spam
filters, and usually fully shut down the HP computer (although he did not on the
night in question) were insufficient to show that Olausen lacked the requisite
common authority to provide consent. Despite Thomas’s security measures,
22
Case: 14-14680 Date Filed: 04/01/2016 Page: 23 of 29
Olausen had “joint access or control [over the computer] for most purposes,” and
Thomas did not isolate his Internet use in a manner that prevented Olausen from
accessing it all together. See Randolph, 547 U.S. at 135, 126 S. Ct. at 1535
(Roberts, C.J., dissenting); Matlock, 415 U.S. at 171 n.7, 94 S. Ct. at 993 n.7.
We find it particularly significant that Thomas did not protect his Internet
history from Olausen by maintaining a separate login name and password or by
encrypting his files. See United States v. Stabile, 633 F.3d 219, 232-33 (3d Cir.
2011) (holding that there was valid consent to search and seize computer hard
drives when the defendant did not password-protect the computers and the
computers were located in a common area of the house); United States v. King,
604 F.3d 125, 137 (3d Cir. 2010) (determining that a defendant who placed his
hard drive in a shared computer that lacked password protection assumed the risk
that the other user would consent to a search); Trulock v. Freeh, 275 F.3d 391, 403
(4th Cir. 2001) (holding that the defendant did not assume the risk that other users
of a shared computer would permit a third-party to search his password-protected
files); see also United States v. Andrus, 483 F.3d 711, 718-20 (10th Cir. 2007)
(stating that password protection and the location of the computer are factors in
determining who has authority to consent to a forensic search of the computer).
Without separate passwords, encryption, or like measures, Olausen and Thomas
shared access to the HP computer and all of its data, and by doing so, assumed the
23
Case: 14-14680 Date Filed: 04/01/2016 Page: 24 of 29
risk that the other would allow the police to view the computer’s contents. See
Matlock, 415 U.S. at at 171 n.7, 94 S. Ct. at 993 n.7.
F. Heightened Privacy Interest
We also hold that Olausen had the authority to consent to a forensic search
of the HP computer even in recognition that the Supreme Court, in Riley v.
California, noted a heightened privacy interest in cell phones—which the Supreme
Court called “minicomputers.” The Riley Court held that the search-incident-to-
arrest exception to the warrant requirement does not empower law enforcement
officers to search the contents of an arrestee’s cell phone. Riley, 573 U.S. at ___,
134 S. Ct. at 2484-85. It noted that the typical search incident to arrest turns up a
limited quantity of evidence—namely, those items that are on the arrestee’s person,
such as a wallet—whereas the search of cell phone data could reveal more
information than an “exhaustive search of a house.” Id. at ___, 134 S. Ct. at 2489-
91.
While this reasoning played a central role in the Supreme Court’s analysis of
the search-incident-to-arrest rule, we find it less critical to our analysis because the
Supreme Court has already approved of exhaustive searches in the consent-based
search context. In Matlock itself, for example, the Supreme Court upheld the
consent-based search of a home, including the defendant’s bedroom and closet.
415 U.S. at 166-67, 177, 94 S. Ct. at 991, 996. Again, the touchstone of the third-
24
Case: 14-14680 Date Filed: 04/01/2016 Page: 25 of 29
party consent rule is assumption of the risk, and a person sharing access to a
computer, just as a person sharing access to a home, exposes himself to a police
search based on another’s consent.
G. Summary: Fruits of the Search Warrant were Admissible
We hold that Olausen had authority to consent to the forensic search of the
shared HP computer in her home, and thus there was no Fourth Amendment
violation when Detective Monaghan conducted the OS Triage forensic scan based
on Olausen’s consent. Even assuming arguendo that Randolph applied to the
search, there was no Fourth Amendment violation because the officers stopped
their search when Thomas seemed to object.
Furthermore, the only information Detective Monaghan relied on in
obtaining the search warrant was data collected prior to Thomas’s objection.
Therefore, we hold that all of the fruits of the search following the issuance of the
warrant were admissible.7
H. Overturning or Extending Randolph
As a final note, we address Thomas’s argument that Randolph was wrongly
decided. Thomas believes that Randolph should be overturned and replaced with a
flexible rule that analyzes objective indicia of the defendant’s intent to keep
7
Because we find Olausen’s consent to the forensic search was valid until Thomas
objected, we need not examine whether any other warrant exception, such as plain view or
disappearing evidence, would have allowed the police to search the HP computer.
25
Case: 14-14680 Date Filed: 04/01/2016 Page: 26 of 29
materials private, not a bright-line rule based on the defendant’s ability to object to
a search. As Thomas acknowledges, however, Randolph is binding precedent, and
we are not free to overturn it and fashion a new rule in its place. See United States
v. Thomas, 242 F.3d 1028, 1035 (11th Cir. 2001) (stating the well-known rule that
we are bound to follow Supreme Court precedent “unless and until the Supreme
Court itself overrules th[e] decision”).8
Thomas also appears to argue that Randolph should be extended to require
the police to wake a sleeping but present co-occupant when there is evidence that
the co-occupant is the primary user of the effect (here a computer) or area to be
searched. We decline to extend Randolph in this fashion when the Supreme Court
made clear that Randolph was a narrow rule, simple and formulaic in application.
See Randolph, 547 U.S. at 122, 126 S. Ct. at 1528. The Supreme Court expressly
declined to require “the police to take affirmative steps to find a potentially
objecting co-tenant before acting on the permission they . . . already received.” Id.
at 122, 126 S. Ct. at 1527.
However, even if there should come a time when the Supreme Court extends
or overrules Randolph in the manner Thomas desires, as we explain below, our
result today would stand under the independent source doctrine, which provides
the basis for an independent and alternative ruling here.
8
Thomas raises this argument primarily to preserve it for further review.
26
Case: 14-14680 Date Filed: 04/01/2016 Page: 27 of 29
IV. INDEPENDENT SOURCE DOCTRINE
Under the independent source doctrine, when law enforcement officers use
evidence gathered after an arguable violation of the Fourth Amendment to secure a
warrant, this Court applies a two-part test to determine whether the evidence seized
pursuant to the warrant is admissible. United States v. Albury, 782 F.3d 1285,
1291 (11th Cir. 2015). First, this Court excises from the affidavit filed in support
of the warrant application any information gained from the illegal search and
determines whether the remaining information supports a finding of probable
cause. Id. Probable cause exists where, under the totality of the circumstances,
there is a fair probability that contraband or evidence of a crime will be found in a
particular place. Id. If the remaining information supports a finding of probable
cause, this Court next determines whether the officers’ decision to seek the warrant
was prompted by what they saw during the illegal search. Id. If the warrant would
have been sought without the illegality, then the evidence seized pursuant to the
warrant is admissible. Id. at 1291-92.
As the government argued below and now on appeal, the evidence seized
from Thomas’s computer pursuant to the search warrant was admissible under the
independent source doctrine.9 Thomas does not contend that Olausen lacked
9
The district court did not address the independent source doctrine, but “we may affirm
the denial of a motion to suppress on any ground supported by the record.” United States v.
Caraballo, 595 F.3d 1214, 1222 (11th Cir. 2010).
27
Case: 14-14680 Date Filed: 04/01/2016 Page: 28 of 29
authority to invite the police into the home and show them the two websites that
were on the computer screen. He objects only to Olausen’s authority to consent to
a forensic search of the HP computer. Thus, we excise from the warrant the results
of the OS Triage scan and the information that Detective Monaghan later gathered
from analyzing the results. See id. at 1291.
Removing these facts from the affidavit, there was still enough evidence to
support a finding of probable cause. See id. The affidavit provided that:
(1) Olausen observed her husband acting nervous and then discovered images
qualifying as child pornography on the HP computer; (2) the police observed on
the computer two websites containing child erotica, one of which had links with
names indicative of child pornography; and (3) based on training and experience,
the majority of people who view child pornography also collect child erotica, such
that the presence of child erotica suggests the presence of child pornography.
Based on these facts, there was a fair probability that child pornography
would be found on the HP computer. See id. The officers may not have been able
to corroborate Olausen’s statement that she originally viewed eight to ten websites
containing child pornography, but her statement was sufficiently reliable.
Specifically, she risked incriminating herself by contacting the police about illegal
images on a computer she used and, as the magistrate judge found, her written and
oral statements were always consistent on key points. Further, that Olausen saw
28
Case: 14-14680 Date Filed: 04/01/2016 Page: 29 of 29
eight to ten images that morning but only two were left when the police arrived
was not inconsistent. Rather, Olausen admitted that she used Google to locate the
Largo Police Department’s contact number, which apparently left only two of the
websites open.
As to the second prong of the independent source doctrine, Agent Monaghan
testified at the suppression hearing that he would have sought a search warrant in
this situation, regardless of the results of the OS Triage scan. Thus, law
enforcement would have sought the search warrant even without the fruits of the
allegedly illegal forensic search, and the evidence ultimately obtained pursuant to
the warrant was admissible under the independent source doctrine. See id. at 1291-
92.
V. CONCLUSION
For all of the foregoing reasons, we affirm the judgment of the district court.
AFFIRMED.
29