United States v. Michael Karrer

NOT PRECEDENTIAL UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT ____________ No. 11-2642 ____________ UNITED STATES OF AMERICA v. MICHAEL L. KARRER, Appellant ____________ On Appeal from the United States District Court for the Western District of Pennsylvania (D.C. No. 2-08-cr-00236-001) District Judge: Honorable D. Michael Fisher * ____________ Submitted Under Third Circuit LAR 34.1(a) January 27, 2012 Before: AMBRO, CHAGARES and HARDIMAN, Circuit Judges. (Filed: February 1, 2012) ____________ OPINION OF THE COURT ____________ * The Honorable D. Michael Fisher, Judge of the United States Court of Appeals for the Third Circuit, sitting by designation. HARDIMAN, Circuit Judge. Michael Karrer appeals his judgment of conviction for possession of child pornography under 18 U.S.C. § 2252(a)(4)(B) after the District Court refused to suppress evidence found pursuant to a search warrant he claims was general, overbroad, and lacking in probable cause. We will affirm. I Because we write solely for the parties, who are well acquainted with the case, we recount only the essential facts and procedural history. Pennsylvania State Trooper Glenn Bard began investigating Karrer after monitors at Neopets, a children’s website with virtual pets and online chat functionality, noticed “inappropriate communication” from a 37-year-old male registered user. 1 Working with a Neopets security consultant, Bard discovered that Karrer’s various Neopets accounts originated from one computer and that Karrer had a MySpace page. Upon viewing Karrer’s MySpace profile photograph, Bard recognized him from a 2003 investigation for unlawful contact with a minor. Using Karrer’s internet protocol (IP) address and the 1 Karrer asked one thirteen-year-old girl, “would it bother you if i said that i was trying to hit on you? . . . just curious as to if i asked you to be my gf, would you accept?” In another chat with a fourteen-year-old girl, Karrer represented himself as a teenager and wrote “i am 15 female from new jerse[y], united states. my family and i are in a n-u-d-i- s-t camp and love it. what about you?” Karrer also asked questions regarding what types of underwear the girls wore and whether he could send them flowers. 2 Pennsylvania driver’s license database, Bard determined that Karrer lived at the Pittsburgh address from which the Neopets communications originated. On May 13, 2008, Bard applied for a warrant to search Karrer’s residence for evidence of unlawful contact with a minor in violation of 18 Pa. Cons. Stat. § 6318. 2 In his application, Bard requested authorization to search and seize 2 Under § 6318, (a) . . . A person commits an offense if he is intentionally in contact with a minor, or a law enforcement officer acting in the performance of his duties who has assumed the identity of a minor, for the purpose of engaging in activity prohibited under any of the following, and either the person initiating the contact or the person being contacted is within this Commonwealth: (1) Any of the offenses enumerated in Chapter 31. [By way of example, Chapter 31 enumerates ten offenses, including rape, sexual assault, and indecent exposure. See 18 Pa. Cons. Stat. §§ 3121–3130.]. (2) Open lewdness as defined in section 5901. (3) Prostitution as defined in section 5902. (4) Obscene and other sexual materials and performances as defined in section 5903. (5) Sexual abuse of children as defined in section 6312. (6) Sexual exploitation of children as defined in section 6320. Contact with a minor is defined as [d]irect or indirect contact or communication by any means, method or device, including contact or communication in person or through an agent or agency, through any print medium, the mails, a common carrier or communication common carrier, any electronic communication system and any telecommunication, wire, computer or radio communications device or system. 3 [a]ll computer internal and peripheral storage devices, (such as fixed disks, external hard disks, floppy disk drives, and diskettes, tape drives, tapes, and optical storage devices), peripheral input / output devices (such as keyboards, printers, hardware, including, but not limited to, any equipment which can collect, analyze, create, display, convert, store, conceal, or transmit electronic, magnetic, optical or similar computer impulses or data . . . [and] [a]ny computer processing units, scanners, plotters, video display monitors, and optical readers), and related communication devices such as modems, cables, and connections, recording equipment, as well as any devices, mechanisms, or parts that can be used to restrict access to computer hardware. In addition to the broad array of computer-related items, Bard sought authorization to search for and seize “[a]ny cellular phones, smart phones, (IE blackberry, iPhone, and so on) and personal data assistants which can be used for the purpose of accessing the internet, chat programs, or e-mail applications.” Bard attached a seven-page affidavit detailing his experience in computer forensics and his investigation of Karrer’s Neopets communications. He explained that in light of the numerous ways in which evidence on computers can be masked, hidden, or deleted, “it is very often necessary to take all computer hardware and software found at the suspected location.” Bard also expressed the intent to transport the computer-related items from Karrer’s residence to an off-site location for a thorough forensic search. The Magistrate Judge issued a warrant granting Bard permission to search for and seize all computer-related items and cell phones listed in his affidavit. The warrant listed the “date(s) of violation” as November 2007 through May 2008 and expressly 18 Pa. Cons. Stat. § 6318(c) (emphasis added). 4 incorporated the affidavit by reference. It also erroneously indicated that the seized items would be “searched for evidence relating to the possession and/or distribution of child pornography.” Later that day, Bard and Trooper Scott Lucas executed the warrant at Karrer’s address. In Karrer’s bedroom, Lucas identified a computer and a Motorola KLM cellular phone. According to Lucas, he searched the phone because it was capable of transmitting “text-type communications” and e-mails and accessing the Internet. Lucas decided to view the phone’s photos folder because cell phones often store remnants of Internet-based communications as image files in that type of folder. When Lucas accessed the photos folder, he immediately saw what he believed to be a male hand touching a young girl’s genitals. Lucas showed the photo to Bard and stopped searching the cell phone. Lucas also seized Karrer’s computer but did not search it at Karrer’s residence. Bard and Pennsylvania State Police Supervisor Corporal Robert Erderly approached Karrer to discuss the image found on his cell phone. They told Karrer they wished to record a conversation with him but that he was under no obligation to speak with them and could stop the discussion at any time. They also read Karrer the Miranda warnings. During the conversation, Karrer admitted that he had taken three photographs of his four-year-old niece, that he had touched her genitals, and that he had chatted with minor girls on the Internet. He further confessed that his computer and a separate CD 5 contained sexually explicit photographs of a girl he met on MySpace. Karrer then gave the officers his signed consent to view the CD images. Based on the information they had gathered, the officers obtained a second search warrant for child pornography3 and notified local police of Karrer’s potential offenses against his four-year-old niece. Upon searching Karrer’s computer, cell phone, and CD, police located sexually explicit conversations with minors and photographs of minors “in various states of undress,” which were eventually used to indict him on three criminal counts. Count One charged Karrer with violating 18 U.S.C. § 2251(a), which criminalizes sexual exploitation of a minor “for the purpose of producing [a] visual depiction of such conduct.” Counts Two and Three alleged receipt and possession of child pornography in violation of 18 U.S.C. § 2252(a)(2) and (4)(B), respectively. After Karrer’s motion to suppress was denied by the District Court, he entered a conditional guilty plea to Count Three, reserving his right to challenge “whether the search warrant was invalid because it was not supported by probable cause, because it violated the particularity requirement, or because it was overly broad.” Thereafter, Karrer was sentenced to 120 months’ imprisonment and a life term of supervised release pursuant to his plea agreement. He timely appealed. 3 Karrer’s arguments concern only the first warrant for evidence of unlawful communications with a minor, not this second warrant for child pornography. Thus, our references herein to “the warrant” concern the first warrant. 6 II The District Court had jurisdiction under 18 U.S.C. § 3231, and we have jurisdiction under 28 U.S.C. § 1291. When reviewing a district court’s suppression ruling, we review its factual findings for clear error and exercise plenary review over its legal conclusions. E.g., United States v. Tracey, 597 F.3d 140, 146 (3d Cir. 2010). In reviewing a magistrate’s finding of probable cause, we inquire only whether there was a “substantial basis” to conclude that the affidavit established probable cause, and we are necessarily deferential. E.g., United States v. Ritter, 416 F.3d 256, 264 (3d Cir. 2005). A Karrer first argues that his motion to suppress should have been granted because the warrant was an illegal general warrant. We disagree. It is axiomatic that a “warrant[] must ‘particularly describ[e] the place to be searched and the persons or things to be seized,’” United States v. Yusuf, 461 F.3d 374, 393 (3d Cir. 2006) (second alteration in original) (quoting U.S. Const. amend. IV), and that when it does not, “all evidence seized pursuant to [the] general warrant must be suppressed,” United States v. Christine, 687 F.2d 749, 758 (3d Cir. 1982). A warrant is not unconstitutionally general “unless it can be said to ‘vest the executing officer with unbridled discretion to conduct an exploratory rummaging . . . in search of criminal evidence.’” United States v. Leveto, 540 F.3d 200, 211 (3d Cir. 2008) (quoting Christine, 7 687 F.2d at 753). Karrer argues that the warrant failed to impose meaningful limits on what and where the officers could search. In fact, the warrant identified particular devices and file types to be searched for evidence of a specific statutory offense. See Yusuf, 641 F.3d at 395. It also sufficiently identified a time period during which the suspected offenses occurred. See id. And the warrant’s authorization to search and seize virtually all computer-related items in Karrer’s home does not invalidate the warrant. See, e.g., United States v. Stabile, 633 F.3d 219, 234 (3d Cir. 2011); United States v. Ninety-Two Thousand Four Hundred Twenty-Two Dollars and Fifty-Seven Cents ($92,422.57), 307 F.3d 137, 149–50 (3d Cir. 2002) (upholding a similar warrant as “indubitably broad,” but not unconstitutionally general). Nor does the language in the incorporated affidavit authorizing officers to search for “such evidence of a criminal offense” render the warrant general. A warrant must be read as a whole, see, e.g., Tracey, 597 F.3d at 154, and a supporting affidavit likewise “is to be read in its entirety and in a common sense, nontechnical manner,” United States v. Miknevich, 638 F.3d 178, 182 (3d Cir. 2011); see also United States v. Johnson, 690 F.2d 60, 64 (3d Cir. 1982) (“When a warrant is accompanied by an affidavit that is incorporated by reference, the affidavit may be used in construing the scope of the warrant.”). Accordingly, “such evidence of a criminal offense” refers not to any criminal offense, but to the criminal offense of unlawful contact 8 with a minor defined throughout the remainder of the warrant and affidavit. See Andresen v. Maryland, 427 U.S. 463, 480–81 (1976) (holding that the phrase “together with other fruits, instrumentalities and evidence of crime at this (time) unknown” did not render a warrant general where context made clear that the reference was to false pretenses crime). Karrer contends that the warrant failed to particularly describe the offenses for which evidence could be searched. He argues that the warrant’s reference to § 6318 of the Pennsylvania Crimes Code was inadequate to limit the warrant’s scope because that statute is extraordinarily broad, defining what he calculates to be fifty-two possible communications offenses. Indeed, the Supreme Court has held that reference to a very broad statutory offense may not cure an otherwise general warrant. See Stanford v. Texas, 379 U.S. 476 (1965); Marcus v. Search Warrants of Prop. at 104 E. Tenth St., Kan. City, Mo., 367 U.S. 717 (1961). But the statutes in those cases are easily distinguished from § 6318. In Stanford, the Texas statute was a “sweeping and many-faceted law, which, among other things, outlaw[ed] the Communist Party” and “authoriz[ed] the issuance of a warrant ‘for the purpose of searching for and seizing any books, records, pamphlets, cards, receipts, lists, memoranda, pictures, recordings, or any written instruments showing that a person or organization [was] violating or ha[d] violated any provision of [the] Act.’” 379 U.S. at 477 (citation omitted). Moreover, the Stanford Court based its 9 invalidation of the warrant substantially on the statute’s criminalization of “literary material.” Id. at 486. In Marcus, the Missouri statute criminalized similarly ill-defined, speech-related materials, including “obscene, lewd, licentious, indecent or lascivious [items] . . . or other articles or publications of an indecent, immoral or scandalous character.” 367 U.S. at 719 n.2, 731–32. Unlike the statutes in Stanford and Marcus, § 6318 does not invite the value judgments of officers. Although it is broad in scope and prohibits communicating with minors on an array of topics, it specifically defines those topics. Accordingly, we hold that the officers’ discretion was sufficiently limited. B Karrer next argues that the warrant was overbroad. An overly broad warrant “‘describe[s] in both specific and inclusive generic terms what is to be seized,’ but . . . authorizes the seizure of items as to which there is no probable cause.” Ninety-Two Thousand, 307 F.3d at 149 (quoting Christine, 687 F.3d at 753–54). Probable cause exists where the totality of the circumstances suggests “there is a fair probability that contraband or evidence of a crime will be found in a particular place.” Illinois v. Gates, 462 U.S. 213, 238 (1983). We find no lack of probable cause to search and seize Karrer’s computer-related and cell phone technologies for evidence of unlawful communications with minors. Bard’s affidavit presented the magistrate with a substantial basis to believe such evidence 10 existed in Karrer’s home, where the computer used to interact with teens on the Neopets website was located. Nor was the warrant overbroad simply because the devices and files it authorized to be searched and seized were likely to include materials unrelated to any § 6318 offense. “[A]s a practical matter, when a search requires review of a large collection of items, . . . ‘it is certain that some innocuous [items] will be examined, at least cursorily, in order to determine whether they are, in fact, among those [items] authorized to be seized.’” Stabile, 633 F.3d at 234 (quoting Andresen, 427 U.S. at 482 n.11) (citation and internal quotation marks omitted). As Bard explained in his affidavit, given the nature of computer files and the tendency of criminal offenders to mislabel, hide, and attempt to delete evidence of their crimes, it would be impossible to identify ex ante the precise files, file types, programs and devices that would house the suspected evidence. See id. at 237 (“[I]t is clear that because criminals can—and often do—hide, mislabel, or manipulate files to conceal criminal activity, a broad, expansive search of the hard drive may be required.”); see also Yusuf, 461 F.3d at 395 (“[T]he breadth of items to be searched depends upon the particular factual context of each case and also the information available to the investigating agent that could limit the search at the time the warrant application is given to the magistrate.”); Christine, 687 F.2d at 760 (“[T]he use of generic classifications in a warrant is acceptable when a more precise description is not feasible.”). Moreover, as the Supreme Court has explained, “[t]echnical requirements of 11 elaborate specificity . . . have no proper place in this area.” United States v. Ventresca, 380 U.S. 102, 108 (1965). Finally, there is no merit in Karrer’s argument that the warrant was overbroad for failing to specify a protocol for browsing Karrer’s computer files. Although we held in Stabile that such a protocol was sufficient to demonstrate a valid computer search in that case, 633 F.3d at 239–40, and that search methods must be “‘tailored to meet allowed ends,’” id. at 239 (quoting United States v. Burgess, 576 F.3d 1078, 1094 (10th Cir. 2009)), we also held that “the search warrant itself need not ‘contain a particularized computer search strategy,’” id. at 238 (quoting United States v. Brooks, 427 F.3d 1246, 1251 (10th Cir. 2005)). C Finally, we consider the warrant’s authorization to search for and seize evidence of child pornography. It is undisputed that at the time the warrant was issued there was no probable cause to believe that evidence of child pornography offenses would be found on Karrer’s technological devices. At the suppression hearing in the District Court, Bard testified that the reference to child pornography was template language that he inadvertently failed to delete. Crediting Bard’s explanation and looking to the context of the entire affidavit, the District Court agreed that the reference to child pornography was simply “misplaced.” We are skeptical that an erroneous reference to a wholly separate 12 crime, effectively authorizing a search for which no probable cause exists, can be analogized to harmless ministerial errors, see, e.g., Johnson, 690 F.2d at 65 n.3 (attaching “no significance” to a typographical error in which the word “Section” in the statutory designation was mistakenly substituted with the word “Chapter”), or mistakes of fact not discoverable until the execution of the warrant, see, e.g., Maryland v. Garrison, 480 U.S. 79, 85–86, 87 & n.11 (1987) (upholding a warrant that failed to specify which of two apartments on a single floor was to be searched where the police believed there was only one apartment on that floor and explaining the “need to allow some latitude for honest mistakes that are made by officers in the dangerous and difficult process of making arrests and executing search warrants”). But we need not resolve whether the child pornography reference was a forgivable ministerial error. Even redacting the unsupported child pornography reference from the warrant, 4 the images Lucas discovered on Karrer’s cell phone fall within the “plain view” exception to the exclusionary rule. Under the “plain view” exception, evidence obtained in violation of the Fourth Amendment need not be suppressed so long as three requirements are met. “First, the officer must not have violated the Fourth Amendment in ‘arriving at the place from which 4 “[A]n overly broad warrant can be redacted to strike out those portions of the warrant that are invalid for lack of probable cause, maintaining the remainder of the warrant that satisfies the Fourth Amendment.” Yusuf, 461 F.3d at 393 n.19. “[T]he court need not suppress materials seized pursuant to the valid portions of the warrant,” 13 the evidence could be plainly viewed.’ Second, the incriminating character of the evidence must be ‘immediately apparent.’ Third, the officer must have ‘a lawful right of access to the object itself.’” United States v. Menon, 24 F.3d 550, 559 (3d Cir. 1994) (quoting Horton v. California, 496 U.S. 128, 141 (1990)). We recently held that “the plain view doctrine applies to seizures of evidence during searches of computer files,” noting that “the exact confines of the doctrine will vary from case to case in a common- sense, fact-intensive manner.” Stabile, 633 F.3d at 240–41. In Stabile, we held that evidence of child pornography discovered during an officer’s examination of file names in a suspiciously titled folder did not require suppression because: (1) the officer was authorized by a warrant to search the hard drive at issue and to access the suspicious folder to search for financial crimes; and (2) the lurid file names immediately suggested that they contained contraband. Id. at 241–42. In this case, the warrant authorized Lucas to access Karrer’s cellular phone to search for evidence of unlawful communications with minors, and he did not violate the Fourth Amendment in arriving in the phone’s photos folder. See Menon, 24 F.3d at 560 (explaining that a search is within the scope of the warrant “if [it] fits within the literal terms of the warrant and is a reasonable means of obtaining the objects described in the warrant”). We reach this conclusion because we find no clear error in the District Court’s Christine, 687 F.2d at 754,—in this case, anything seized based on those provisions 14 implicit factual finding that cell phones often archive communications as image files, which may be saved in photos folders. 5 Once Lucas had entered the photos folder, it was readily apparent that one image likely depicted a sexual offense against a child, and thus constituted child pornography, based on the sizes and characteristics of the hand and genitalia in the photo. The image located on Karrer’s cell phone was therefore admissible under the “plain view” exception, and the subsequently discovered evidence of child pornography did not require suppression. 6 regarding evidence of unlawful contact with a minor. 5 Based on Lucas’s testimony at the suppression hearing, the District Court concluded that “[t]he alleged internet communications described in the warrant and affidavit could have been conducted through Karrer’s cellular telephone, and evidence could logically be stored there.” Lucas testified that it is “[v]ery common[,] [s]pecifically with cell phones,” for “documents and files related to conversations to have an image component or picture component,” and that remnants of those and other Internet-based communications are “often preserved as image files.” Moreover, according to the officers, not only images of text or Internet conversations, but also photographs themselves could provide evidence of unlawful communications. Lucas testified that an “image [can be] saved out of [a] message into the images and then the message [can be] deleted.” 6 Because the “plain view” doctrine allowed for the introduction of all of the child pornography evidence discovered after and as a result of Lucas’s identification of an image depicting child molestation on Karrer’s cell phone, we need not resolve whether the child pornography evidence was otherwise admissible under the “good faith” or “inevitable discovery” exceptions to the exclusionary rule. See, e.g., Ninety-Two Thousand, 307 F.3d at 145–46 (describing the “good faith” exception established in United States v. Leon, 468 U.S. 897 (1984)); United States v. Vasquez De Reyes, 149 F.3d 15 III For the foregoing reasons, we will affirm Karrer’s judgment of conviction. 192, 195 (3d Cir. 1998) (outlining the “inevitable discovery” exception set forth in Nix v. Williams, 467 U.S. 431 (1984)). 16