FILED
United States Court of Appeals
PUBLISH Tenth Circuit
UNITED STATES COURT OF APPEALS May 13, 2019
Elisabeth A. Shumaker
FOR THE TENTH CIRCUIT Clerk of Court
_________________________________
UNITED STATES OF AMERICA
Plaintiff - Appellee,
v. No. 17-2180
JASON LOERA,
Defendant - Appellant.
_________________________________
Appeal from the United States District Court
for the District of New Mexico
(D.C. No. 1:13-CR-01876-JB-1)
_________________________________
Jerry A. Walz, Walz and Associates, P.C., Albuquerque, New Mexico for Defendant-
Appellant.
Kristopher N. Houghton, Assistant United States Attorney (John C. Anderson, United
States Attorney, with him on the brief), Albuquerque, New Mexico for Plaintiff-
Appellee.
_________________________________
Before LUCERO, EBEL, and PHILLIPS, Circuit Judges.
_________________________________
EBEL, Circuit Judge.
_________________________________
This appeal requires us to apply Fourth Amendment principles to a situation
where a police officer executing a warrant to search an electronic storage device for
evidence of one crime discovers evidence of other criminal activity. Here, while
executing a warrant to search Jason Loera’s home for evidence of computer fraud,
FBI agents discovered child pornography on four of Loera’s CDs. Despite
discovering the pornography, the agents continued their search for evidence of
computer fraud—one agent continued to search the CDs that were found to contain
some child pornography and a second agent searched other electronic devices
belonging to Loera, not including those particular CDs (Search 1). After the agents
finished their on-site search, they seized a number of electronic devices that appeared
to contain evidence of computer fraud, plus the four CDs that were found to contain
child pornography, and then brought the seized items back to their office. One week
later, one of the agents reopened the CDs that he knew contained some child
pornography so that he could describe a few pornographic images in an affidavit
requesting a (second) warrant to search all of the seized electronic devices for child
pornography (Search 2). A magistrate judge issued the warrant, and, upon executing
it through two searches, the agents found more child pornography.
In the subsequent prosecution against him for possessing child pornography,
Loera filed a motion to suppress the evidence seized pursuant to each search, arguing
that the searches violated the Fourth Amendment. On denial of his motion, Loera
pled guilty to receipt of child pornography but preserved his right to appeal that
denial. Exercising jurisdiction under 28 U.S.C. § 1291, we affirm the denial of
Loera’s motion to suppress. We hold, among other things, that the Fourth
Amendment does not require police officers to stop executing an electronic search
warrant when they discover evidence of an ongoing crime outside the scope of the
2
warrant, so long as their search remains directed at uncovering evidence specified in
that warrant.
I. BACKGROUND
This case involves several police searches governed by the Fourth
Amendment. The Fourth Amendment protects “the right of the people to be secure in
their persons, houses, papers, and effects, against unreasonable searches and
seizures.” U.S. Const. amend. IV. Generally, for a search to be reasonable, it must
be authorized by a warrant that “particularly” describes “the place to be searched, and
the persons or things to be seized.” U.S. Const. amend. IV. Once officers obtain a
sufficiently particular warrant, they must execute it according to the warrant’s terms.
Horton v. California, 496 U.S. 128, 140 (1990). The following undisputed facts
explain how the warrant-based searches in this case arose.
In 2012, the FBI began investigating Jason Loera for illegally intercepting e-
mails intended for then-sitting New Mexico Governor Susana Martinez and her staff
in violation of 18 U.S.C. § 2511 (illegal interception) and 18 U.S.C. § 1030
(computer fraud) [collectively, “computer fraud”]. As part of that investigation
(more details of which can be found in the district court’s opinion United States v.
Loera, 59 F. Supp. 3d 1089, 1095–1108 (D.N.M. 2014)), FBI agents applied for and
received a warrant to search Loera’s residence for computer fraud, including any
such evidence residing on electronic devices or storage media (“the first warrant”).
The first warrant authorized FBI agents to search and seize, in relevant part,
“All records, in any form, relating to violations of [computer fraud], involving Jason
3
Loera.” ROA Vol. I at 37. The warrant defined the terms “records” and “information”
as including: “all of the foregoing items of evidence in whatever forms and by whatever
means they may have been created or stored, including any form of computer or
electronic storage (such as hard disks or other media that can store data).” Id. at 39. In a
separate provision, the warrant sought “Any computers, cell phones, and/or electronic
media that could have been used as a means to commit the offenses described on the
warrant.” Id. at 87. Finally, for any electronic device, whether it was used to commit the
offenses or simply had relevant records stored on it, the warrant permitted the agents to
search and seize evidence of who used, owned, or controlled the device, such as
“configuration files . . . documents, browsing history . . . photographs, and
correspondence . . . .” Id. at 38.
A. The First Search
On November 20, 2012, FBI agents including Agent Aaron Cravens and
Special Agent Brian Nishida executed the first search warrant. They discovered a
large volume of electronic media in Loera’s residence, including CDs, DVDs, laptop
computers, external hard drives, a USB flash drive, an iPhone, and an iPad. Cravens
and Nishida were responsible for “previewing” the CDs at Loera’s residence to
ensure that the FBI seized only those CDs that contained information relevant to the
authorized investigation. ROA Vol. II at 53, 58. The two agents split up the CDs
between themselves and searched them separately.
Cravens tried to view the files of the first CD using a program called FTK
Imager, which would have allowed Cravens to limit his search to a particular type of
4
file, for example, only image, text, or audio files. However, the program did not
work. Consequently, Cravens opened the CD on a computer and used the “thumbnail
view” to preview the files stored on it, meaning, he saw small images of the files, the
file names, and the file types in a vertical list that he had to scroll through to see in
its entirety. Although Cravens believed he had authority under the first warrant to view
the entire contents of the CD, Cravens used the thumbnail-image view to fast-track his
search. He would scroll past irrelevant files but “click[] on anything that didn’t appear
correct, or any documents” to open them. Id. at 92. While Cravens was “scrolling
down through the images or files . . . on the CDs, [he] found what looked like a nude
child.” Id. at 60. He opened the file to confirm that it was an image of child
pornography. After determining that it was, Cravens ejected the CD from his
computer, set it aside, and alerted Agent Nishida and the FBI agent in charge of
Loera’s case. Then, Cravens searched the rest of the CDs assigned to him for
evidence of computer fraud. Cravens later found a child pornography image on a
second CD. Just as he did with the first, Cravens set the CD aside after discovering the
illegal images and did not open any other files on that CD.
Agent Nishida took a different approach to his search. He previewed the files
on his assigned CDs using the “details view” of Windows Explorer, meaning that he
saw a list of files, file names, and last-modified dates of those files, but not pictures
associated with the files. Id. at 157. For his search of the CDs, or “triage,” as he called
it, Nishida would open two or three files on each CD and then determine from that
sample whether the CD should be seized pursuant to the warrant. Id. at 160. If Nishida
5
found something he believed might be responsive to the warrant in the files that he
sampled, he would set the CD aside to be reviewed off-site. As he was sampling files,
Nishida found child pornography on two CDs. Unlike Cravens, Nishida did not cease his
search of those CDs after discovering child pornography; he continued sampling files on
the CDs to determine if they contained information that was responsive to the warrant.
The FBI seized thirteen CDs in total from Loera’s residence: four contained child
pornography images and nine contained evidence of computer fraud.1 In addition to the
thirteen CDs, the FBI seized computers, external hard drives, an iPhone, and an iPad.
B. The Second Search
One week later, on November 27, 2012, Cravens decided to apply for a search
warrant to search the items seized from Loera’s residence for child pornography.
Cravens wanted to include in his warrant affidavit a detailed description of one child
pornography image from each of the four CDs on which he and Nishida had found child
pornography during their on-site preview. Consequently, Cravens opened each of the
four CDs, viewing several images on each, to find child pornography images that he
could accurately describe. Viewing the photos and drafting the affidavit took a total of
two-and-a-half hours. However, Cravens testified before the district court that he did not
spend “anywhere near the two-and-a-half hours” actually looking at photos on the CDs.
Id. at 74-75.
1
There is no indication in the record whether the four CDs that contained child
pornography also contained evidence responsive to the warrant. However, Loera does
not challenge the FBI’s seizure of those CDs pursuant to the first warrant.
6
Cravens’ affidavit included two sections. In Section I, Cravens described his
training and experience with computers and child pornography. In Section II, Cravens
explained the details of the FBI’s investigation of Loera that led to the agent’s discovery
of child pornography on the CDs in Loera’s residence. In particular, paragraph 21
described in general terms how Cravens discovered the child pornography:
21. In the process of executing this warrant, an FBI certified computer
forensic examiner and a computer analysis response team (CART)
technician previewed the loose media located during the search (e.g.,
thumb drives, CD-Rs, DVD-Rs, memory cards, etc.) for evidence
relevant to the original unrelated investigation. During the preview, the
examiners identified four writable CDs which appeared to contain
images of child pornography. The CDs were seized and placed in the
evidence control room at the local FBI office.
ROA Vol. I at 120. In paragraph 23, Cravens explained that on November 27, 2012,
he “reviewed the four CDs . . . that were believed to contain child pornography,” id.
at 121, and that “[d]uring the review of the CDs, [he] observed multiple pictures of
children many of which are in various states of dress,” id. Then, in paragraphs
24-27, Cravens provided a detailed description of one image from each CD that
depicted a minor engaged in sexually explicit conduct. Cravens’ descriptions
included the apparent age of the minor and the conduct depicted. On November 29,
2012, based on Cravens’ affidavit, a federal magistrate judge approved a warrant to
search the thirteen CDs and six other electronic devices that were seized from Loera’s
residence for child pornography (“the second warrant”).
7
C. Searches Pursuant to the Second Warrant
Agent Nishida executed the second warrant on two separate dates. In December
2012, Nishida searched Loera’s laptop pursuant to both the first and second warrants,
looking for evidence of computer fraud and child pornography. He discovered more than
730 child pornography images on Loera’s laptop. In April 2013, Nishida searched the
four CDs seized from Loera’s residence for child pornography pursuant to the second
warrant. He discovered approximately 330 images and two movies of child pornography
on those CDs.
D. Proceedings Below
A federal grand jury indicted Loera on several counts of possessing child
pornography that implicated the images found on both his laptop and his CDs. Loera
filed a motion to suppress that child pornography evidence, and the district court
denied the motion. Loera filed a motion for reconsideration, which the district court
also denied. Following that denial, Loera pled guilty to one count of knowingly
receiving child pornography in violation of 18 U.S.C. §§ 2252(a)(2), 2252(b)(1), and
2256, pursuant to a plea agreement, but he reserved the right to appeal the denial of
his motions.
On appeal, Loera argues that the district court should have suppressed the
child pornography evidence discovered during the first search, the second search, and
the searches conducted pursuant to the second warrant because, according to Loera,
each search was unlawful. Loera argues that the first search exceeded the scope of
the first warrant, the second search exceeded the scope of the first warrant, and the
8
last two searches, while authorized by the second warrant, were unlawful because
that warrant was invalid. Additionally, Loera maintains that none of the exceptions
to the warrant requirement apply to the searches in this case. We conclude that the
first search was lawful, but we agree with Loera that the remaining searches were
unlawful. Nevertheless, we AFFIRM the district court’s denial of Loera’s motion to
suppress and motion to reconsider under the inevitable discovery doctrine.
II. DISCUSSION
A. Standard of Review
“When reviewing the district court’s denial of a motion to suppress, we view
the evidence in the light most favorable to the government and accept the district
court’s factual findings unless they are clearly erroneous,” United States v. Grimmett,
439 F.3d 1263, 1268 (10th Cir. 2006), but “[t]he ultimate question of reasonableness
under the Fourth Amendment is a legal conclusion that we review de novo.” Id.
Accordingly, de novo review applies to the issues we address in this opinion,
including, the scope of a search warrant, United States v. Angelos, 433 F.3d 738, 745
(10th Cir. 2006), the sufficiency of a search warrant, United States v. Danhauer, 229
F.3d 1002, 1005 (10th Cir. 2000), the applicability of the good-faith exception, id.,
and the applicability of the inevitable discovery doctrine, United States v. Christy, 739
F.3d 534, 540 (10th Cir. 2014).
B. Validity of the Government’s Application for the First Warrant
First, Loera argues that the FBI agents obtained the initial warrant to search
his residence for evidence of computer fraud as a pretext to search instead for
9
evidence of child pornography. The district court disagreed, finding that the sole
purpose of the first search was to uncover evidence of computer fraud. We affirm
that conclusion.
Loera’s pretext argument is based on a statement that Agent Nishida made in a
report dated February 28, 2013, three months after the first and second searches were
conducted. In that report, Nishida wrote:
On November 14, 2012, SA Michael Boady requested that the above
listed specimen or specimens be examined for evidence of intercepting a
communication. For example, e-mail messages to or from the domain
Susanna2010.com. In addition, SA Boady requested that the evidence
also be examined for evidence of child pornography possession and
receipt.
ROA Vol. II at 191–92. Loera argues that this report proves that on November 14,
2012, six days before the first search, Agent Nishida received instructions to search
Loera’s home and effects for evidence of child pornography.
The district court made explicit factual findings to the contrary, which are
supported by the record. First, the district court found that, had the FBI agents had
suspicions that Loera possessed child pornography, agents would have included that
information in their application for the first warrant. Second, Agent Nishida testified
at the suppression hearing that the February 2013 report summarized two separate
instructions from SA Boady: on November 14, 2012, Boady instructed Nishida to
search for evidence of interception, and, later, Boady instructed Nishida to search for
evidence of child pornography. Finally, both Cravens and Nishida testified at the
suppression hearing that the purpose of the November 20 search was only to uncover
10
evidence of computer fraud, and the district court credited that testimony. Each of
these facts supports the district court’s determination that the agents conducted the
first search solely to look for evidence of computer fraud. And we are unpersuaded
by Loera’s only evidence of pretext, the report written three months after the
allegedly pretextual search.2
Thus, we conclude the FBI agents had no pretextual motivations for obtaining
the first warrant, and we affirm the district on this issue.
C. Reasonableness of the First and Second Searches
Next, we determine that the first search of Loera’s residence was reasonable
because it was directed solely at uncovering the items specified in the first warrant
both before and after the officers discovered the child pornography evidence.
However, we conclude that the second search was unreasonable because it was
directed at uncovering evidence of child pornography.
1. Relevant legal principles
The Fourth Amendment provides:
The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be
violated, and no Warrants shall issue, but upon probable cause,
supported by Oath or affirmation, and particularly describing the place
to be searched, and the persons or things to be seized.
2
Alternatively, even if the agents had an additional motive for conducting the first
search, that argument would fail as a matter of law under Whren v. United States,
517 U.S. 806, 813 (1996).
11
U.S. Const. amend. IV. It is now well-recognized that “the ultimate touchstone of
the Fourth Amendment is ‘reasonableness.’” Brigham City v. Stuart, 547 U.S. 398,
403 (2006). “[R]easonableness generally requires the obtaining of a judicial
warrant,” Riley v. California, 134 S.Ct. 2473, 2482 (2014), subject to only a few
exceptions. The warrant must “particularly” describe “the place to be searched, and
the persons or things to be seized,” U.S. Const. amend. IV.
However, obtaining a sufficiently particular warrant is just the first step to
conducting a reasonable search. The officers tasked with executing a sufficiently
particular warrant must conduct their search “strictly within the bounds set by the
warrant.” Bivens v. Six Unknown Named Agents of Fed. Bureau of Narcotics, 403
U.S. 388, 395 n.7 (1971) (quoting Marron, 275 U.S. at 196). The Supreme Court has
held that, “[i]f the scope of [a] search exceeds that permitted by the terms of a validly
issued warrant . . . the subsequent seizure [of evidence] is unconstitutional without
more.” Horton v. California, 496 U.S. 128, 140 (1990).
Determining whether a search exceeds the scope of its authorizing warrant is,
like most inquiries under the Fourth Amendment, an exercise in reasonableness
assessed on a case-by-case basis. Dalia v. United States, 441 U.S. 238, 258 (1979)
(holding that the manner of a search is subject to “later judicial review as to its
reasonableness”). The general Fourth Amendment rule is that investigators executing
a warrant can look anywhere where evidence described in the warrant might
conceivably be located. United States v. Ross, 456 U.S. 798, 824 (1982). For
example:
12
Just as probable cause to believe that a stolen lawnmower may be found in
a garage will not support a warrant to search an upstairs bedroom, probable
cause to believe that undocumented aliens are being transported in a van
will not justify a warrantless search of a suitcase. Probable cause to believe
that a container placed in the trunk of a taxi contains contraband or
evidence does not justify a search of the entire cab.
Id. This limitation works well in the physical-search context to ensure that searches
pursuant to warrants remain narrowly tailored, but it is less effective in the electronic-
search context where searches confront what one commentator has called the “needle-in-
a-haystack” problem. Orin S. Kerr, Digital Evidence and the New Criminal
Procedure, 105 Colum. L. Rev. 279, 301 (2005). Given the enormous amount of data
that computers can store and the infinite places within a computer that electronic
evidence might conceivably be located, the traditional rule risks allowing unlimited
electronic searches.
To deal with this problem, rather than focusing our analysis of the
reasonableness of an electronic search on “what” a particular warrant permitted the
government agents to search (i.e., “a computer” or “a hard drive”), we have focused
on “how” the agents carried out the search, that is, the reasonableness of the search
method the government employed. See United States v. Burgess, 576 F.3d 1078
(10th Cir. 2009); United States v. Walser, 275 F.3d 981 (10th Cir. 2001); United
States v. Carey, 172 F.3d 1268 (10th Cir. 1999). Our electronic search precedents
demonstrate a shift away from considering what digital location was searched and
toward considering whether the forensic steps of the search process were reasonably
directed at uncovering the evidence specified in the search warrant. Shifting our
13
focus in this way is necessary in the electronic search context because search
warrants typically contain few—if any—restrictions on where within a computer or
other electronic storage device the government is permitted to search. See United
States v. Christie, 717 F.3d 1156, 1165 (10th Cir. 2013) (holding that, so long as an
electronic search warrant requires the government to “direct all of its search efforts”
toward evidence relating to a specific crime, the warrant is sufficiently particular,
even where it permits the government to search a “computer” for “all records”
relating to the crimes of “murder, neglect, and abuse”). Because it is “unrealistic to
expect a warrant prospectively [to] restrict the scope of a search by directory,
filename or extension or to attempt to structure search methods,” Burgess, 576 F.3d
at 1093 (alteration added), our ex post assessment of the propriety of a government
search is essential to ensuring that the Fourth Amendment’s protections are realized
in this context. Our precedent of Carey, Burgess, and Walser, to which we turn next,
are instructive as to what constitutes a reasonable electronic search pursuant to a
valid warrant.
Carey is the only case in which we invalidated an electronic search for
exceeding the scope of its authorizing warrant. See 172 F.3d at 1276. There, a
police officer obtained a warrant to search files on the defendant’s computer for
evidence “pertaining to the sale and distribution of controlled substances.” Id. at
1270. Prior to searching the computer, the officer first viewed the computer’s file
directory, which showed numerous “JPG” files with sexually suggestive titles. Id.
During his search, the officer came across a number of files that he did not recognize
14
and that he was unable to view on the computer that he was using. Id. at 1271. To
view the files, the officer downloaded them onto a separate disk, inserted that disk
into another computer, and then was immediately able to view a “JPG file” that
depicted child pornography. Id. Rather than navigating away from the
nonresponsive material, the officer “downloaded approximately two hundred forty-
four” more JPG files and then transferred them to nineteen disks, viewing five to
seven images on each disk to determine that they all contained child pornography.
Id. The whole process took about five hours. Id. at 1273. After he had catalogued
the child pornography images in this manner, he then “returned” to his “original task
of looking for evidence of drug transactions.” Id. at 1271.
The Carey court held that this was an unlawful, general exploratory search
because, although it was permissible for the officer to open the first JPG file to see if
it was responsive to the warrant, id. at 1273 n.4, his opening of the remaining files
exceeded the bounds of the authorizing warrant, id. at 1276. The Carey court’s
holding turned on four facts: (1) the officer spent five hours, a significant amount of
time, specifically perusing the trove of nonresponsive material, id. at 1273; (2) the
nonresponsive files were characteristically distinct and set apart from the other files
on the computer (such that they could have been avoided) because each file was
labeled “JPG,” many had sexually suggestive titles, and the officer had to download
them to open them, id. at 1274; (3) the officer did not discover the files inadvertently
(at least after his first look), id. at 1273; and (4) a more narrowly tailored search was
possible—the officer could have gone back to searching for drug-related documents
15
much sooner than he did, id. at 1273. Importantly, we did not condemn the officer’s
decision to return to searching for drug-related documents after discovering the child
pornography, but, instead, we condemned his “temporar[y] abandon[ment]” of the
original search to conduct a “five hour search of the child pornography files.” Id. at
1273.
Next, we turn to Walser and Burgess, both of which upheld electronic searches
in which the investigator discovered incriminating, nonresponsive material while
executing a search warrant but then navigated away from it. In United States v.
Walser, the police obtained a warrant to search the defendant’s hotel room for
electronically stored records of “evidence of the possession of controlled
substances.” 275 F.3d 981, 983–84 (10th Cir. 2001). A police officer searched the
room pursuant to the warrant and found a laptop and a digital camera. Id. at 984.
The agent seized the laptop, removed it from the hotel room, and then conducted a
drug-specific search of the laptop, looking for “ledgers of drug transactions or images
of drug use.” Id. In order to find those things, the agent employed a particularized
search method that “selectively proceeded to the ‘Microsoft Works’ sub-folder on the
premise that[,] because Works is a spreadsheet program, that folder would be most
likely to contain records relating to the business of drug trafficking.” Id. at 986. It
was while searching the contents of the Works folder that the officer came across a
file labeled “bstfit.avi” and opened it. Id. at 984. When he viewed the contents, he
discovered that the file contained child pornography images. Id. at 986–87. He then
immediately ceased his search. Id.
16
We upheld the officer’s search as reasonable because we determined that, by
using a particularized search method, the officer avoided conducting the kind of
“sweeping, comprehensive search of a computer’s hard drive” that Carey prohibited.
Id. at 986. The defendant in Walser argued that the agent exceeded the scope of the
warrant by opening the “AVI file,” a video file, because “it could not possibly have
contained the type of evidence the [a]gent was authorized to search for, namely,
records of drug transactions or still images of drug use.” Id. at 987. We rejected that
argument by interpreting Carey to excuse an officer’s discovery of child pornography
during a search for “relevant records in places where such records might logically be
found” so long as the officer does not conduct a supervening search specifically
directed at finding pornography evidence. Id. at 986. Applying that rule, we held in
Walser that the officer’s opening the “bstfit.avi” file was permissible because (1) he
was looking in a folder that was “most likely to contain records relating to the
business of drug trafficking” when he opened it, and (2) he did not conduct an
intervening search directly focused on child pornography like the agent in Carey. Id.
Based on those facts, we concluded that the “search was reasonable and within the
parameters of the search warrant” and that the evidence found as a result of it did not
need to be suppressed. Id. at 987.
Finally, in United States v. Burgess, 576 F.3d 1078 (10th Cir. 2009), we again
upheld an electronic search that uncovered evidence of child pornography as
reasonable and within the scope of its authorizing warrant. There, police obtained a
warrant to search a motorhome for, among other things, “computer records” that
17
would tend to show “conspiracy to sell drugs.” Id. at 1083. The warrant
incorporated the affidavit on which it was based, which stated that the affiant “knows
that persons involved in trafficking or the use of narcotics often keep photographs of
coconspirators or photographs of illegal narcotics in their vehicle.” Id.
Based on the warrant, officers searched two hard drives and a laptop found in
the motorhome. Id. An agent searched one of the hard drives by using a program
called EnCase, which copies the contents of a hard drive over to a computer to
prevent file corruption. Id. at 1083–84. EnCase allows an investigator to “preview”
reduced-sized photos of each image file as they are being copied. Id. at 1084, 1094.
The agent took advantage of this feature and viewed each image file on the hard drive
as it was being copied. Id. at 1084. After viewing 200-300 digital images, mostly
personal photos, the agent saw an image that looked like child sexual exploitation.
Id. He then closed the preview program and sought a warrant to search all of the
defendant’s electronic storage devices for evidence of child pornography. Id. Upon
conducting that search, the agent found more than one hundred thousand illegal
images. Id.
The defendant asked the district court to suppress the child pornography
evidence because, he argued, the agent’s use of the “preview” program exceeded the
scope of the warrant because he did not employ a particularized search method like
the agent in Walser but instead looked through each image file contained on the hard
drive. We determined that the agent’s use of the “preview” program was reasonable
and did not exceed the scope of the warrant for two reasons. First, we noted that,
18
because the warrant did not expressly limit the file types that the agent was allowed
to search, for example, by limiting the search to text files (.doc, .wpd, .txt, etc.), the
agent was well within the scope of the warrant when he decided to view all of the
image files on the hard drive using the preview program. Id. at 1092. Second, we
determined that there was no reasonable way for the agent to conduct a more
narrowly tailored search because, when the object of a search is likely to be an image
file, as it was in Burgess, “there may be no practical substitute for actually looking in
many (perhaps all) folders and sometimes at the documents contained within those
folders.” Id. at 1094.
Reading these cases together, we determine that four features of the
unconstitutional search in Carey demonstrate that it was unreasonably directed at
uncovering evidence of child pornography, rather than directed at the evidence
specified in the warrant, and distinguish it from the reasonable searches in Walser
and Burgess: (1) the length of time the searching officer spent looking at the
incriminating, nonresponsive evidence (five hours in Carey versus less than one
minute in Walser and Burgess); (2) the fact that the nonresponsive files were set apart
from the responsive files saved on the storage device (JPG files downloaded onto
separate disks in Carey versus generic files intermingled all in one place in Burgess);
(3) the manner in which the evidence was discovered (purposefully in Carey versus
inadvertently in Walser and Burgess);3 and (4) the breadth of the search method
3
We acknowledge that in Horton v. California, 496 U.S. 128, 130 (1990), the
Supreme Court held that, in physical searches, “even though inadvertence is a
19
employed (the wide detour in Carey versus the narrowly tailored search in Walser).
Contrary to Loera’s assertion, these cases do not require that officers stop searching
upon discovering evidence of a crime outside the scope of the warrant. Such a rule
would prohibit what the Fourth Amendment expressly permits—reasonable searches
based upon a warrant supported by probable cause. We have never required that.
This conclusion brings us in line with every circuit that has confronted this
issue. See United States v. Stabile, 633 F.3d 219, 240 (3d Cir. 2011) (upholding
denial of motion to suppress where officers continued warrant-authorized search of
the defendant’s computer for financial crimes after discovering child pornography);
United States v. Williams, 592 F.3d 511, 521–24 (4th Cir. 2010) (upholding search
where the officer continued his warrant-authorized search of the defendant’s
computer for evidence of “making threats and computer harassment” after
discovering child pornography); United States v. Miranda, 325 F.App’x 858, 859–60
(11th Cir. 2009) (per curiam) (unpublished) (upholding search where officer
continued his warrant-authorized search for evidence of counterfeit software after
discovering child pornography); United States v. Wong, 334 F.3d 831, 834 (9th Cir.
characteristic of most legitimate ‘plain view’ seizures, it is not a necessary
condition.” However, because Carey, Walser, and Burgess, each of which succeeded
Horton in time, considered the subjective intentions of the searching officers where
that information was available, we continue to include inadvertence as a factor to
consider when deciding whether an electronic search fell within the scope of its
authorizing warrant or outside of it. The fundamental differences between electronic
searches and physical searches, including the fact that electronic search warrants are
less likely prospectively to restrict the scope of the search, justify our inclusion of
that factor. See Horton, 496 U.S. at 139 (abandoning inadvertence as a necessary
condition for a legitimate plain view seizure).
20
2003) (upholding denial of motion to suppress where the officer continued his
warrant-authorized search of the defendant’s computer for, among other things,
“[a]ny maps, receipts, or writings, depicting Churchill County Nevada” after
discovering child pornography).
Although officers do not have to stop executing a search warrant when they
run across evidence outside the warrant’s scope, they must nevertheless reasonably
direct their search toward evidence specified in the warrant. What that looks like
depends on the particular facts of a given case. Narrowly tailored search methods
that begin looking “in the most obvious places and [then] progressively move from the
obvious to the obscure,” Burgess, 576 F.3d at 1094, should be used where possible but
are not necessary in every case. In cases like this one, where the electronic storage
device is not well-organized and the most practical way to search it is through an item-
by-item review, “there may be no practical substitute for actually looking in many
(perhaps all) folders and sometimes at the documents contained within those folders.”
Id. In such a case, however, the searching officer must respond appropriately to what
he or she sees. The reasonableness of a search evolves as the search progresses and
as the searching officer learns more about the files on the device that he or she is
searching.
An analogy to the physical realm is helpful here. Imagine a warrant authorizes
police officers to search a “residence” for evidence of “firearms and ammunition.”
Under that warrant, it would be reasonable for a police officer to search the medicine
cabinet in the bathroom for a minute or two to see if a small gun or ammunition is
21
hidden there, however, it would be unreasonable for the officer to spend two hours
reading the labels on each bottle of medicine in the cabinet. On the other hand, if the
warrant had authorized the officer to search the residence for evidence of “illegal
drug trafficking and manufacture,” an intensive search of the medicine cabinet would
be reasonable. In both cases, the medicine cabinet is fair game to search, but the
intensity level of the permitted search differs depending on the evidence to be seized.
The same is true for electronic searches. While in some cases many (perhaps all)
electronic areas of a computer will be fair game to search, the level of intensity that
officers are permitted to spend searching those areas will differ depending on
whether the area appears to contain responsive material. This is true even when
officers come across evidence of incriminating, nonresponsive material. In all cases,
the ultimate test is the one mandated by the Fourth Amendment: whether the search
was “reasonable” under the circumstances. In the case of a computer search,
“reasonableness” requires officers to take into account the flexibility of computers
and the multiple configurations to which they may be adapted. As the computer
search continues and as the executing officer obtains more information about how a
suspect used his computer, that too may inform the reasonableness of the continuing
search.
We now apply these principles to the November 20 and 27 searches conducted
in this case.
22
2. November 20 search was reasonable
Loera argues that, although the first warrant permitted the FBI agents to search his
CDs for evidence of computer fraud, the officers’ search exceeded the scope of the first
warrant when they continued searching after discovering evidence of child pornography.
We disagree. The searches that Agent Cravens and Agent Nishida each conducted of
Loera’s CDs on November 20 were reasonable and conducted within the scope of the
first warrant because at all times each was reasonably directed at discovering evidence of
computer fraud. Therefore, the first search did not violate the Fourth Amendment and
thus did not warrant suppression of the evidence discovered during that search.
The agents’ searches on November 20 resemble the searches in Walser and
Burgess more than they resemble the search in Carey, both before and after they
discovered the child pornography evidence. First, both agents here spent very little
time looking at the child pornography images they discovered. They noticed them,
alerted a supervisor, and then moved on to the rest of the images on the same CD (in
Nishida’s case), or the other CDs (in Cravens’ case), looking for evidence of
computer fraud. Both responses were reasonable because, as mentioned above, the
agents were not required to stop searching altogether. And both responses
demonstrate an effort to navigate away from the nonresponsive material and toward
files that they believed were more likely to contain material responsive to the
warrant. Second, the files on the CDs that the agents previewed were not
characteristically distinct or set apart from the other files, in contrast to Carey. Agent
Cravens testified that, when he put a CD into his computer to see the files that it
23
contained, the computer pulled up a generic list of those files. The record does not
indicate that there were any folders or distinctive titles setting clearly apart the
nonresponsive child pornography files from the other files on the disk. Loera bears
the burden of proof on his suppression motion, and he has offered no evidence on this
point. Third, the agents discovered the child pornography files inadvertently on
November 20. Fourth, both agents’ search methods were reasonably narrow under
the circumstances, considering the fact that the CDs did not seem particularly
organized. Given that the warrant permitted the agents to search the CDs for
“photographs,” “documents,” and “configuration files,” it was reasonable for Nishida and
Cravens to search all file types on the CDs (image, video, and text) for evidence of
computer fraud rather than to narrow that search to one particular file type. The agents’
searches on November 20 were reasonable because they fell within the scope of the
first warrant both before and after they discovered the child pornography evidence. We
reverse the district court’s ruling to the contrary.
3. November 27 search was unreasonable
Loera also argues that Agent Cravens’ subsequent search on November 27,
2012, of the four seized CDs that contained child pornography violated the Fourth
Amendment because Cravens was “[i]ntentionally searching for evidence of a crime
outside the scope of the [f]irst [w]arrant prior to obtaining a new warrant.” Aplt. Br. 29.
In making this argument, Loera accepts that the first warrant permitted the government to
seize the four CDs that were found to contain some child pornography and to search them
for evidence of computer fraud. Therefore, Loera challenges Cravens’ November 27
24
search only for exceeding that permission. Accordingly, we confine our analysis to
whether the second search exceeded the scope of the first warrant. The district court
concluded that it did and that neither exigent circumstances nor any other exception to
the warrant requirement justified that search. We agree and conclude that the district
court correctly excised the evidence obtained during the November 27th search from
Cravens’ affidavit for the second warrant. Several of the district court’s factual findings
support that result.
The district court found that “Cravens was not searching for evidence of
electronic fraud” on November 27 but instead was searching for child pornography.
Dist. Ct. Op. at 144. The district court based this finding on Cravens’ testimony at the
suppression hearing that he reopened Loera’s CDs on November 27 specifically “[t]o
write a description of an image on the disc” so that he could “obtain a second warrant
for child pornography.” ROA Vol. II at 72. That admission is the most probative
fact in the record that Cravens’ search was directed at finding child pornography.
The district court also found that Cravens had the four CDs for a total of two-and-a-
half hours that day, during which time he searched the CDs and drafted the second
affidavit. Although the record does not indicate how long Cravens searched the CDs,
he testified at the suppression hearing that he looked at several images on each CD—
“more than just a couple” but “[m]ost likely less than a dozen.” ROA Vol. II at 143.
Whatever the amount of time, Cravens’ devoted it exclusively to nonresponsive
material. Rather than navigate away from the child pornography images when he found
them, Cravens explicitly navigated toward such images. Based on these findings, we
25
agree with the district court that, in contrast with the agents’ searches on November
20, Agent Cravens’ search on November 27 was unreasonable because it was directed
at uncovering evidence of child pornography.
The government argues that two exceptions save Cravens’ search from
violating the Fourth Amendment: the plain view doctrine and the foregone-
conclusion exception. We disagree. For its plain view argument, the government
asserts that the law permitted Agent Cravens to take a “second look” at the child
pornography images on Loera’s CDs because members of the FBI had already seen
the images in plain view during a lawful search, and, therefore, his “second look”
was no further invasion of Loera’s privacy than the initial, lawful viewing. The
government points to a Fourth Circuit case, United States v. Jackson, 131 F.3d 1105
(4th Cir. 1997), where a law enforcement officer had consent to search a residence for a
fugitive. Id. at 1107. While looking for the fugitive in the basement, the officer observed
some suspicious metal items on the floor. Id. He did not pause to examine those items at
that time, but he instead proceeded to finish his sweep for the fugitive. Id. Once
finished, he went back to take a closer look at the objects on the floor, this time
recognizing them as drug paraphernalia. Id. More officers arrived and took a look at the
paraphernalia, eventually using the presence of those items to obtain a search warrant for
the house, which uncovered a gun and large quantities of drugs. Id. at 1108. That further
search was held to have been constitutional under the plain-view doctrine. Id.
There are too many factual distinctions between Jackson and this case to permit
Cravens’ second look under the plain view doctrine. First, as government counsel
26
admitted at oral argument, there is no evidence in the record that Cravens looked at the
same photos on November 27 that the officers viewed on November 20. Second, seven
days elapsed between the first and second searches in this case, not a matter of minutes.
Third, Cravens’ “second look” led him to peruse more than just the child pornography
images, so we cannot say that the November 27 search did not cause a further invasion
of Loera’s privacy. The plain view doctrine permits the warrantless seizure of
evidence of criminal activity when police officers observe the evidence during a
lawful search. United States v. Naugle, 997 F.2d 819, 822 (10th Cir. 1993). That
doctrine cannot be used to justify Cravens’ November 27 search.
The government also argues that Cravens’ “second look” was justified under
what it has termed the “foregone-conclusion exception” to the warrant requirement.
This doctrine comes from several of our plain view cases where we have permitted
the warrantless search of containers in plain view whose contents “are a foregone
conclusion” because the container is “not closed,” “transparent,” or, if it is closed,
“its ‘distinctive configuration . . . proclaims its contents’” nonetheless. United States
v. Corral, 970 F.2d 719, 725 (10th Cir. 1992). We have also held that the doctrine
applies “where the police have already seen the contents of a seized container prior to
conducting the search, [because] there is no significant additional invasion of privacy
involved in searching the container.” Id. at 725. We reject this argument for the
same reasons as the government’s plain view argument. Here, Cravens knew to a
near certainty that the seized and re-searched CDs contained some child pornography,
but he had no idea what else they contained. And, again, there is no evidence that
27
Cravens had previously seen the child pornography images that he viewed on
November 27.
Thus, Cravens’ November 27 search was unlawful because it exceeded the scope
of the first warrant and none of the exceptions to the warrant requirement apply.
D. Reasonableness of the Searches Conducted Under the Second Warrant
Additionally, Loera argues that the child pornography evidence that Agent
Nishida discovered when he executed the second warrant should have been
suppressed because the second warrant was not supported by probable cause and no
exceptions to the warrant requirement apply. We agree that the second warrant was
not supported by probable cause and that the good faith exception is inapplicable
here. However, the inevitable discovery doctrine supports the district court’s denial
of Loera’s motion to suppress, and we affirm on that basis.
1. Second warrant was not supported by probable cause
We review whether a magistrate properly issued a search warrant by determining
whether there was a “substantial basis” for probable cause in the affidavit submitted in
support of the warrant. Illinois v. Gates, 462 U.S. 213, 236 (1983). Because we find
that the November 27 search was unlawful, we must excise from the affidavit that
Cravens filed in support of the second warrant all of the descriptions of child
pornography that he unlawfully obtained during the second search and then
determine whether “there was probable cause absent that information.” United States
v. Sims, 428 F.3d 945, 954 (10th Cir. 2005). The district court determined that the
28
second warrant remained supported by probable cause without the tainted
descriptions. We disagree.
While “probable cause does not demand the certainty we associate with formal
trials,” Gates, 462 U.S. at 246, “[s]ufficient information must be presented to the
magistrate to allow that official to determine probable cause; his action cannot be a mere
ratification of the bare conclusions of others,” id. at 239 (emphasis added). For example,
“[a] sworn statement of an affiant that ‘he has cause to suspect and does believe that’
liquor illegally brought into the United States is located on certain premises” is not
sufficient to support a finding that probable cause exists to search the premises. Id.
The child pornography descriptions that Agent Cravens obtained during the
unlawful second search appear in paragraphs 24-27 of Cravens’ affidavit. Once we
excise those descriptions, all that remains substantively is Cravens statement that,
“During the preview, the examiners identified four writable CDs which appeared to
contain images of child pornography.” ROA Vol. I at 120. This sentence does not
support a finding of probable cause.
In United States v. Pavulak, the Third Circuit reviewed an affidavit to support
a warrant to search for child pornography that contained language very similar to the
bare-bones description left in the affidavit in our case, 700 F.3d 651, 661 (3d Cir.
2012). The warrant affidavit in Pavulak stated that an informant had seen the
defendant “viewing child pornography” of females “between 16 and 18 years old,”
without providing any further details about what the images depicted. Id. at 657.
The Third Circuit held that the affidavit lacked probable cause because it did not
29
allow the magistrate judge “to independently evaluate whether the contents of the
alleged images [met] the legal definition of child pornography.” Id. at 661. We find
that analysis persuasive here. Agent Cravens’ remaining statement that the CDs
“appeared to contain images of child pornography” provides no detailed description
of what the images depicted such that a magistrate could independently assess
whether the images meet the legal definition of child pornography. ROA Vol. I at
120.
Therefore, the affidavit supporting the second warrant lacked probable cause
absent the tainted information. We reverse the district court’s contrary conclusion.
2. Good-faith exception inapplicable to these facts
Next, we consider whether the good faith exception to the exclusionary rule
from United States v. Leon, 468 U.S. 897, 918 (1984), applies when police execute a
search warrant that is based on information obtained through an unlawful predicate
search. Disagreeing with the district court, we conclude that it does not. The
Supreme Court’s opinion in Leon and our opinion in United States v. Scales, 903
F.2d 765, 768 (10th Cir. 1990), dictate that the good faith exception does not apply in
a case like the one before us because the illegality at issue stems from unlawful
police conduct, rather than magistrate error, and therefore the deterrence purposes of
the Fourth Amendment are best served by applying the exclusionary rule.
In United States v. Leon, the Supreme Court modified the exclusionary rule
“so as not to bar the use in the prosecution’s case in chief of evidence obtained by
officers acting in reasonable reliance on a search warrant issued by a detached and
30
neutral magistrate but ultimately found to be unsupported by probable cause,” 468
U.S. at 900. The Court reasoned that the purpose of the exclusionary rule is to deter
police misconduct and in such a case “there is no police illegality and thus nothing to
deter.” Id. at 920. In this circuit, “Leon’s good faith exception applies only narrowly,
and ordinarily only when an officer relies, in an objectively reasonable manner, on a
mistake made by someone other than the officer.” United States v. Cos, 498 F.3d 1115,
1132 (10th Cir. 2007) (declining to apply good faith exception to warrantless search of
apartment where officers mistakenly believed the person that consented to the search had
the authority to do so); United States v. Herrera, 444 F.3d 1238, 1251 (10th Cir. 2006)
(declining to apply good faith exception to state trooper who conducted a warrantless
inspection of a truck based on the officer’s mistaken belief the truck was a commercial
vehicle subject to such inspection). Thus, Leon is inapplicable here where the
mistake—the unconstitutional second search—was the fault of the officer, not the
magistrate.
We considered whether Leon applied to a warrant affidavit based on tainted
evidence in Scales, 903 F.2d at 768. There, we held that Leon did not apply to
excuse a law enforcement officer’s reliance on a search warrant where the facts in the
warrant affidavit were obtained through an unlawful predicate seizure. In that case,
DEA agents seized a suitcase that they believed contained drugs. Id. at 767. Then,
they took the suitcase to a drug-sniffing canine team that signaled the suitcase did
contain drugs. Id. Finally, after having had the suitcase in their possession for
twenty-four hours, the agents applied for and obtained a warrant to search the
31
suitcase based on the probable cause provided by the canine alert. Id. Upon
conducting the search, the agents discovered more than 2,000 grams of cocaine in the
suitcase. Id. The defendant moved to suppress the cocaine evidence, arguing that the
agents’ initial seizure of the suitcase was unlawful because it was unsupported by
probable cause. Id. at 767.
The district court in Scales denied the motion, finding that, even if the seizure
of the suitcase was unlawful, the good faith exception ratified the agents’ behavior.
Id. We reversed, holding that Leon was inapplicable “[b]ecause the DEA agents
were not acting in reliance on a search warrant when they seized the luggage and held
it for more than twenty-four hours.” Id. at 768. Our holding was informed by the
reasoning in Leon that “Penalizing the officer for the magistrate’s error, rather than
his [or her] own, cannot logically contribute to the deterrence of Fourth Amendment
violations.” Id. at 768 (quoting Leon, 468 U.S. at 921) (alteration in original).
Because the contraposition is also true—that penalizing an officer for his or her own
error does contribute to deterrence—we determined that the exclusionary rule must
apply to the agents’ unlawful pre-warrant seizure of the suitcase. Id.
Scales and Leon control our outcome here. Cravens conducted an unlawful
search of Loera’s CDs on November 27 in the absence of a warrant. He included the
tainted fruit that he uncovered during that search in the affidavit that he submitted in
support of the second warrant. Cravens’ warrant affidavit was facially valid, and
therefore the magistrate did not error by issuing a warrant based upon it. Instead, the
constitutional error came from Agent Cravens.
32
The government argues that Cravens acted in good faith because he
“transparently informed the magistrate judge of the steps he had taken to obtain the
descriptions he included in his affidavit.” Aple. Br. at 40. Cravens’ affidavit
provided some information about the first search. It explained that, while executing
the first search warrant, the FBI agents identified four CDs that contained child
pornography and seized them. Then, Cravens wrote:
On November 27, 2012, the writer, an FBI certified CART Technician,
reviewed the four CDs, each of which are designated in attachment A,
that were believed to contain child pornography. During the review of
the CDs, the writer observed multiple pictures of children many of
which are in various state of dress including the following images . . . .
ROA Vol. I at 50. However, that information was not sufficient to allow the
magistrate to determine the constitutionality of the second search such that the
magistrate can be said to have endorsed Cravens’ pre-warrant conduct. Furthermore,
even if it was, that would not affect our outcome. Tenth Circuit precedent dictates
that the good faith exception does not apply at all when a warrant affidavit is based
on tainted evidence from a prior, unlawful search.
Four other circuits have likewise concluded that Leon is inapplicable when an
officer executes in good faith a search warrant that is based on unlawfully-obtained
evidence. United States v. Scott, 731 F.3d 659, 664 (7th Cir. 2013) (holding that
evidence discovered pursuant to a warrant based on illegally-obtained evidence will
be inadmissible unless other, untainted information in the affidavit establishes
probable cause); United States v. Mowatt, 513 F.3d 395, 405 (4th Cir. 2008) (holding
that “Leon only prohibits penalizing officers for their good-faith reliance on
33
magistrates’ probable cause determinations” and that the exclusionary rule operates
to penalize officers for any unconstitutional conduct preceding a magistrate’s
involvement); United States v. McGough, 412 F.3d 1232 (11th Cir. 2005) (refusing
to apply good faith exception where an unlawful entry into the defendant’s apartment
led to the officer’s request for a search warrant); United States v. Vasey, 834 F.2d
782, 789 (9th Cir. 1987) (holding that good faith exception did not apply to a warrant
that was based on information obtained in an illegal warrantless search because “[t]he
constitutional error was made by the officer . . ., not by the magistrate”). At least two
commentators support this analysis as well. See Wayne R. LaFave, Search &
Seizure: A Treatise on the Fourth Amendment § 1.3(f) (5th ed. 2016) (explaining
that, because courts rarely require affiants to prove that they obtained the evidence
listed in an affidavit lawfully, “there is no reason why that process should, via Leon,
shield that activity from full scrutiny at the suppression hearing”); Craig M.
Bradley, The “Good Faith Exception” Cases: Reasonable Exercise in Futility, 60 Ind.
L.J. 287, 302 (1985) (quoting Leon, 468 U.S. at 914) (“When the magistrate issued
the warrant, he did not endorse past activity; he only authorized future activity. . . .
[T]he function of the magistrate is to determine ‘whether a particular affidavit
establishes probable cause,’ not whether the methods used to obtain the information
in that affidavit were legal.”).
However, five other circuits have concluded that the good faith exception can
apply where an affidavit supporting a search warrant is tainted by illegally-obtained
evidence in at least some limited circumstances. Three of those circuits apply the
34
good faith exception if the predicate search, although ultimately determined to be
unlawful, was arguably lawful under the binding precedent in effect at the time of the
search. United States v Bain, 874 F.3d 1, 22–23 (1st Cir. 2017) (applying good faith
exception because binding precedent did not “clearly classify” as unlawful the
conduct that invalidated the predicate search); United States v. Hopkins, 824 F.3d
726 (8th Cir. 2016) (applying good faith exception because the reasonableness of the
illegal predicate search was “close enough to the line of validity” to make an
officer’s belief in the validity of the warrant objectively reasonable); United States v.
Holley, 831 F.3d 322, 326–27 (5th Cir. 2016) (also applying “close enough to the
line of validity” test). Two other circuits apply the good faith exception in these
types of cases when (1) the predicate search was arguably reasonable and (2) the
warrant affidavit truthfully conveyed the circumstances of the illegal predicate search
to the magistrate judge. United States v. McClain, 444 F.3d 556, 566 (6th Cir. 2005)
(applying Leon because the reasonableness of the predicate search was a close call
and the warrant affidavit “fully disclosed” the circumstances surrounding the initial
warrantless search); United States v. Thomas, 757 F.2d 1359 (2d Cir. 1985) (applying
good faith exception because officer’s affidavit fully described the unlawful, pre-
warrant canine sniff that supplied probable cause for the warrant and there was
“nothing more the officer could have or should have done” to be sure his search was
legal). We cannot read Leon or Scales to support the rules adopted by these courts.
When a magistrate issues a warrant based on illegally obtained evidence, typically the
manner in which the affidavit evidence is obtained is not before the magistrate, and the
35
magistrate is not asked explicitly to endorse the evidence-gathering procedure. Even
though some disclosure of the evidence-gathering technique may have occurred, that is
not ordinarily the focus of an application for a warrant. Thus, we are unwilling to read a
warrant as ratifying the information-gathering process of a search that preceded it. In any
event, we are bound by Scales, which appears to us to have been correctly decided.
Therefore, the district court erred by finding that the good faith doctrine applied to
the searches Agent Nishida conducted in execution of the second warrant.
3. Inevitable discovery doctrine supports denial of Loera’s motion
Finally, we consider whether the government would have inevitably discovered
the child pornography evidence on Loera’s electronic devices. Loera argues that, because
there was no probable cause to support the second warrant, all evidence discovered as a
result of the execution of the second warrant should have been suppressed. The issue
before us, then, is whether the FBI agents would have inevitably discovered the roughly
330 child pornography images on Loera’s CDs and 730 child pornography images on
Loera’s laptop that Nishida found when he executed the second warrant. We conclude
that they would have. Accordingly, we affirm the district court’s denial of Loera’s
motion to suppress.
When evidence is obtained in violation of the Fourth Amendment, that
evidence need not be suppressed if agents inevitably would have discovered it
through lawful means independent from the unconstitutional search. United States v.
Christy, 739 F.3d 534, 540 (10th Cir. 2014). The government is required to prove by a
preponderance of the evidence that the unlawfully-obtained evidence would have been
36
discovered through lawful means. Id. The “lawful means” need not be a second,
independent investigation. Id. Rather, the inevitable discovery doctrine will apply if
there was “one line of investigation that would have led inevitably to the obtaining of a
search warrant by independent lawful means but was halted prematurely by a search
subsequently contended to be illegal.” Id. (citations omitted). The key to applying this
doctrine is to place the government officers in the “same positions they would have
been in had the impermissible conduct not taken place,” and, from that vantage point,
to ask whether the government would have inevitably discovered the evidence
lawfully. Nix v. Williams, 467 U.S. 431, 447 (1984).
Here, the district court’s supportable findings demonstrate by a preponderance of
the evidence that the FBI would have inevitably discovered the child pornography
evidence on Loera’s electronic devices through lawful means independent from Agent
Cravens’ unlawful second search. On November 26 (the day before the second search),
the government lawfully had in its possession Loera’s computers, external hard drives,
iPhone, iPad, and thirteen CDs (nine without child pornography and four with child
pornography).4 The government had the authority under the first warrant to search
Loera’s electronic devices—most importantly his laptop and CDs—for evidence of
computer fraud. The district court issued an explicit factual finding that, had the
second warrant never been obtained, Agent Nishida would “have searched [Loera’s
4
As mentioned above, although Loera challenges the first search of these four CDs,
he does not separately challenge their seizure were we to determine, as we have, that
the first search was constitutional.
37
laptop] for evidence of electronic mail hijacking and computer fraud pursuant to the
[f]irst [w]arrant.” Dist. Ct. Op. at 24. The district court further found that, as part of
that search, lawfully conducted pursuant to the parameters of the first warrant, Agent
Nishida would have searched the electronic folders where he discovered child
pornography when he executed the second warrant, including, the “My Documents”
folder, the “Bookmarks” tab of Loera’s internet browser, and a folder saved on the
Desktop titled “Allmyfiles.txt.” Id. at 24–25. The district court also accepted
Nishida’s statement that, had he found child pornography images on the laptop
during a search conducted solely pursuant to the first warrant, he would have “alerted
the case agent so that [he] could get a search warrant for child pornography.” Id. at
25.
The laptop, including the specific files referenced above, contained over 730
images and 40 movies involving child pornography. Id. at 24. To take one specific
example, the “Allmyfiles.txt” file, which the district court found Nishida would have
lawfully opened pursuant to the first warrant, contained files called “Spycam 9yr
Undress.” Id. Such information would have been sufficient to establish probable
cause to support a warrant to search all of the electronic devices belonging to Loera
that the government had in its possession, including the four CDs that Agent Cravens
searched unlawfully on November 27. That fact, combined with Agent Nishida’s
indication that he would have sought a warrant, allows us to conclude that the
inevitable discovery doctrine applies in this case such that the evidence discovered
pursuant to the second warrant did not need to be suppressed.
38
III. CONCLUSION
For the foregoing reasons, we AFFIRM the orders of the district court denying
the defendant’s motion to suppress and motion for reconsideration.
39