United States v. Daren Phillips

FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, No. 20-10304 Plaintiff-Appellee, D.C. No. v. 3:18-cr-00101- MMD-WGC-1 DAREN W. PHILLIPS, Defendant-Appellant. OPINION Appeal from the United States District Court for the District of Nevada Miranda M. Du, Chief District Judge, Presiding Argued and Submitted November 15, 2021 San Francisco, California Filed April 29, 2022 Before: Richard A. Paez and Michelle T. Friedland, Circuit Judges, and Edward R. Korman, * District Judge. Opinion by Judge Korman * The Honorable Edward R. Korman, United States District Judge for the Eastern District of New York, sitting by designation. 2 UNITED STATES V. PHILLIPS SUMMARY ** Criminal Law The panel affirmed a judgment of conviction in a case in which Daren Phillips entered a conditional guilty plea to possession of child pornography, reserving the right to appeal the denial of his motion to suppress evidence found on his laptop computer. After calling off her engagement to Phillips, Amanda Windes discovered child pornography on his computer, which she then brought to the Washoe County Sheriff’s Office. While Windes was there, Detective Gregory Sawyer asked her to show him only images that she had already viewed when she had accessed the laptop by herself. Windes complied with that request. Phillips moved to suppress on the ground that, because Sawyer directed Windes to access the computer without Phillips’s permission to show Sawyer what she had already seen, Windes’s search of the computer at the sheriff’s office was an unlawful law-enforcement search. Because the U.S. Attorney does not dispute Phillips’s assertion that Windes acted as a state agent when she accessed the computer at the sheriff’s office, the panel assumed that this was a government search. But applying United States v. Jacobsen, 466 U.S. 109 (1984), and United States v. Bowman, 215 F.3d 951 (9th Cir. ** This summary constitutes no part of the opinion of the court. It has been prepared by court staff for the convenience of the reader. UNITED STATES V. PHILLIPS 3 2000), the panel held that the search was permissible because, as the parties agree, when Windes accessed the child pornography on Phillips’s computer at the sheriff’s office, she merely mimicked her earlier private search. The panel rejected Phillips’s argument that Jacobsen imposes requirements tied to law enforcement’s subjective knowledge. The panel distinguished United States v. Young, 573 F.3d 711 (9th Cir. 2009), on the ground that this case does not involve a warrantless entry into a home or its equivalent. The panel rejected Phillips’s argument that the “common-law trespassory test” set forth in United States v. Jones, 565 U.S. 400 (2012), requires suppression in this case. Noting that in light of Phillips’s valid appeal waiver he may argue on appeal only that the supervised-release conditions he challenges exceed the permissible statutory penalty or violate the Constitution, the panel wrote that this court’s precedents establish the legality of all the challenged conditions (risk notification, prohibiting access to sexually explicit conduct material involving adults, polygraph testing). COUNSEL Aarin E. Kevorkian (argued), Assistant Federal Public Defender; Rene L. Valladares, Federal Public Defender; Office of the Federal Public Defender, Las Vegas, Nevada; for Defendant-Appellant. William R. Reed (argued), Assistant United States Attorney; Elizabeth O. White, Appellate Chief; Christopher Chiou, Acting United States Attorney; United States Attorney’s Office, Reno, Nevada; for Plaintiff-Appellee. 4 UNITED STATES V. PHILLIPS OPINION KORMAN, District Judge: In early 2018, Amanda Windes decided to call off her engagement to Daren Phillips. She believed Phillips had been lying to her about his alcohol use and financial troubles. She had also found “very inappropriate” text messages between Phillips and other women. Windes informed Phillips that he was no longer welcome in the house they shared. Two days later Phillips acknowledged that he needed help for his alcoholism, and Windes drove Phillips to a hospital, which arranged for a one-month stay at a residential treatment center. Windes had custody of many of Phillips’s possessions while he was away, including his laptop computer. Windes was contacted by Phillips’s ex-wife, Kelly Greek, who was worried about how Phillips would pay child support while he was in treatment. Greek also told Windes that she suspected that Phillips had watched child pornography and that Phillips may have been sexually interested in a friend of Greek’s daughter. Windes decided to examine Phillips’s laptop. She said that her primary purpose was to examine his financial documents but that she also wanted to see if Phillips had been contacting other women and whether he had been viewing child pornography. She explained that she was also trying “to determine what other issues there w[ere] on top of [Phillips’s] alcohol problem for the safety of my children and myself.” The laptop was password protected, and Windes first tried the password for Phillips’s Netflix account, which he had given to her. That password didn’t work, so Windes clicked on the laptop’s “forgot your password” function, which prompted her to answer Phillips’s security questions. She successfully guessed the answers to those questions, which allowed her to send a UNITED STATES V. PHILLIPS 5 temporary password to her own email account. She was then able to reset the password and enter Phillips’s computer. As Windes browsed Phillips’s computer, she came across a folder entitled “phone.” She saw that it was several hundred megabytes in size and opened the folder. The folder displayed the names of all the files in the folder and their associated “thumbnail illustration[s]” (a small photo which indicated what each file contained). There were thousands of such thumbnail illustrations in the folder. They included “pictures of infants and all of their exposed genitalia” and “images of young females” who were “very scantily clad and [were in] extremely sexually provocative poses.” As she scrolled down through the folder, she saw that many of the file names indicated how old the children were (from infants to teenagers). Windes saw that this “phone” folder contained only child pornography. She testified that the images were “highly graphic” and left her “disgusted.” She “felt law enforcement needed to further investigate.” Windes first took the laptop to Police Services at the University of Nevada (where she worked) and told them only that she had a computer that she needed somebody to look at. Police Services told her to take the computer to the Washoe County Sheriff’s Office (“sheriff’s office”) because it did not belong to the university. At the sheriff’s office, Windes told the front desk deputy that she had a computer that she suspected contained a significant amount of child pornography. She was then interviewed by Detective Arick Dickson for about two-and-a-half hours. Windes told Dickson what she had found and how she had accessed the computer. She described in detail many of the thumbnail images of child pornography she had seen. She also relayed to Dickson her “concerns for . . . [her] children’s safety, 6 UNITED STATES V. PHILLIPS especially due to the nature of the material on Phillips’[s] laptop.” Dickson then brought in Detective Gregory Sawyer, who asked Windes to show him only images that she had already viewed when she had accessed the laptop by herself. Windes and Sawyer testified—and the district court found—that Windes complied with that request and showed the detectives only the thumbnail images and accompanying file names she had previously seen while scrolling through the “phone” folder. Only Windes operated the computer while she showed Sawyer the images. Sawyer recognized some of the thumbnail images from prior child pornography investigations. Sawyer then seized the laptop and applied for and obtained a search warrant. The application included a brief written description of two thumbnail images that Windes had shown him and the associated file names. A subsequent forensic search of the laptop found over 4,750 images of child pornography and 538 child pornography videos. Phillips was indicted for one count of transportation of child pornography, in violation of 18 U.S.C. § 2252A(a)(l), and one count of possession of child pornography, in violation of 18 U.S.C. § 2252A(a)(5)(B). He moved to suppress the evidence from the laptop on the ground that, because Sawyer directed Windes to access Phillips’s computer without his permission to show Sawyer what she had already seen, Windes’s search of the computer at the sheriff’s office was an unlawful law-enforcement search. After holding a hearing, the district judge denied the motion. Phillips then entered a conditional guilty plea to one count of possessing child pornography, reserving the right to appeal the denial of his motion to suppress. Phillips was sentenced to 63 months’ incarceration and 20 years of UNITED STATES V. PHILLIPS 7 supervised release subject to certain conditions that he also challenges on appeal. DISCUSSION The Supreme Court has long held that it does not violate the Fourth Amendment for a law enforcement officer to accept and use evidence that a private party discovers pursuant to its own private search, even if that private search was unlawful. See Burdeau v. McDowell, 256 U.S. 465, 475–76 (1921); Coolidge v. New Hampshire, 403 U.S. 443, 485–90 (1971). This rule is based on the principle that “[t]he Fourth Amendment[’s ]protection against unlawful searches and seizures . . . applies to governmental action” and “was not intended to be a limitation upon other than governmental agencies.” Burdeau, 256 U.S. at 475. Moreover, “the consequences of Burdeau do not offend the more modern rationale of the Fourth Amendment exclusionary rule . . . [which] is most often explained on grounds of deterrence.” 1 Wayne R. LaFave, Search & Seizure § 1.8(a) (6th ed. 2021). Specifically, “extension of the exclusionary rule to all private illegal searches for purposes of deterrence would be difficult to justify” because “the private searcher . . . is often motivated by reasons independent of a desire to secure criminal conviction and . . . seldom engages in searches upon a sufficiently regular basis to be affected by the exclusionary sanction.” Id.; see also United States v. Janis, 428 U.S. 433, 455 n.31 (1976) (“[T]he exclusionary rule, as a deterrent sanction, is not applicable where a private party . . . commits the offending act.”). Still, “the issue of precisely what it takes to put a search outside the ‘private’ category is frequently litigated in a wide variety of settings.” 1 LaFave, supra, § 1.8. This is one such setting. Windes, on her own volition, searched Phillips’s laptop and uncovered child pornography. 8 UNITED STATES V. PHILLIPS While she may not have had the authority to conduct the search on that password-protected laptop, she was clearly acting as a private party. Having discovered child pornography, and thus finding herself in possession of contraband, she decided to take and show it to law enforcement authorities. And when she was informed by a law enforcement officer that she should access the computer so that he could see what she wanted to show him, he made it clear that he did not wish to see anything more than what she had already seen, and she acted in line with those instructions. 1 Phillips asserts that Windes acted as a state agent when she completed the second search because she took cues from Sawyer when doing so. This argument is premised on Sawyer’s effort to ensure that in viewing the materials that Windes had already seen and wished to show him, there would be no greater invasion of Phillips’s privacy than had already occurred. Because the U.S. Attorney does not dispute Phillips’s somewhat counterintuitive assertion that Windes acted as a state agent when she accessed the computer at the sheriff’s office, we assume that this was a government search. Nevertheless, this search was permissible. United States v. Jacobsen illustrates “the appropriate analysis of a governmental search which follows on the heels of a private one.” 466 U.S. 109, 115 (1984). There, FedEx employees opened a package, saw it contained a white powdery substance, repacked the materials, and alerted the Drug Enforcement Administration (“DEA”). See id. at 111. Then, a DEA agent reopened the package, removed its contents without obtaining a warrant, and found that the white powder it contained was cocaine. See id. at 111–12. The Supreme UNITED STATES V. PHILLIPS 9 Court held that the FedEx employees’ earlier private search and their decision to alert law enforcement to their findings made the agent’s warrantless search permissible. The Court explained that “the legality of the governmental search must be tested by the scope of the antecedent private search.” Id. at 116. “[I]t hardly infringed respondents’ privacy for the [DEA] agent to reexamine the contents of the open package” because “the Federal Express employees had just examined the package and had, of their own accord, invited the federal agent to . . . view[] its contents.” Id. at 119; see id. at 120 (“Similarly, the removal of the plastic bags from the tube and the agent’s visual inspection of their contents [were permissible actions because they] enabled the agent to learn nothing that had not previously been learned during the private search.”). We have thus held that Jacobsen establishes that, where a private party notifies law enforcement of its private search, a state “agent’s [subsequent] search is permissible, and constitutional, to the extent that it mimic[s the earlier] private search.” United States v. Bowman, 215 F.3d 951, 956, 963 (9th Cir. 2000). That is precisely what occurred here. Windes went to the sheriff’s office to alert law enforcement to what she uncovered on Phillips’s laptop. Sawyer testified that he told Windes to “[j]ust do what you had done and show me what you saw.” Windes testified that she “opened up the computer and turned it on, used the same password to log into Phillips’[s] user name, and then opened up the same Phone folder.” She then scrolled down and showed him “the same files that [she] saw” the previous night with the same names that she had remembered. Id. She “did not access anything that [she] had not previously seen.” A video was also admitted into evidence of Sawyer recreating the search he conducted with Windes, which showed that she did not have to “scroll down very far in the ‘phone’ folder before locating 10 UNITED STATES V. PHILLIPS the thumbnails corresponding to the filenames and descriptions he included in his search warrant affidavit.” Based on this evidence, the district court judge found that “Sawyer told [Windes] to not show him anything she had not already seen, she understood his instruction, and she did not show anything she had not already seen.” Indeed, the judge “infer[red]” from Sawyer’s admonition that “Sawyer was aware of the private search exception and was trying to operate within it.” Although it is possible that—unlike a stagnant container—the folder on Phillips’s computer could have automatically updated with new material from his phone between Windes’s searches at her home and the sheriff’s office or that a previously unviewed notification or alert could have popped up on the screen, Phillips does not allege that his devices were set to do so. Indeed, he concedes that the scope of the two searches was the same. Accordingly, we accept the district court’s conclusion that, when Windes accessed the child pornography on Phillips’s computer at the sheriff’s office, she merely “mimicked [her earlier] private search.” Bowman, 215 F.3d at 963. 1 2 Nevertheless, Phillips argues that the evidence uncovered pursuant to Windes’s actions at the sheriff’s office must be suppressed for reasons tied to law 1 Even if Sawyer had inadvertently seen more of Phillips’s computer than Windes originally had, at least one circuit has held—as then-Judge Sotomayor explained—that “only the information attributable to that additional ‘search’ would require suppression,” not the information the private individual already uncovered. United States v. $557,933.89, More or Less, in U.S. Funds, 287 F.3d 66, 87–88 (2d Cir. 2002) (Sotomayor, J.) (emphasis in original). UNITED STATES V. PHILLIPS 11 enforcement’s subjective knowledge. For example, Phillips argues that Jacobsen does not apply because: “Sawyer lacked virtual certainty a subsequent search of Phillips’s computer would reveal only contraband” or “virtual certainty that a subsequent search of the item [would] compromise no remaining privacy interest”; and “Sawyer did not know the details of Windes’s [prior] search or full contents of the folder” containing the child pornography before Windes accessed the computer in his presence. 2 Phillips relies on language in the Supreme Court’s decision in United States v. Jacobsen—language that we repeated in United States v. Young, 573 F.3d 711 (9th Cir. 2009). But neither case ultimately supports his arguments. As Phillips points out, Jacobsen states that “[w]hen the first federal agent on the scene initially saw the package, he knew it contained nothing of significance except a tube containing plastic bags and, ultimately, white powder” and that, “[e]ven if the white powder was not itself in ‘plain view,’ . . . there was a virtual certainty that nothing else of significance was in the package and that a manual inspection of the tube and its contents would not tell him anything more than he already had been told.” 466 U.S. at 118–19; see id. at 120 n.17 (“[T]he precise character of the white powder’s visibility to the naked eye is far less significant than the facts that the container could no longer support any expectation of privacy, and that it was virtually certain that it contained nothing but contraband.”). But read in context, Jacobsen’s “virtual certainty” references—and other similar language—do not create any 2 Phillips argues that, before Windes accessed the computer in Sawyer’s presence, she had only told Detective Dickson what she had found and Dickson had not relayed that information to Sawyer. 12 UNITED STATES V. PHILLIPS subjective requirements for the application of its holding. Instead, the language to which Phillips points simply articulates an objective test pertaining to the scope of the searches. The Court described the DEA agent’s prior knowledge of the entire package, as conveyed by the Fedex employees, because that knowledge made clear that the package had already been thoroughly examined and thus the government search could not exceed the scope of those employees’ prior one. Indeed, the Court went on to explain: Respondents do not dispute that the Government could utilize the Federal Express employees’ testimony concerning the contents of the package. If that is the case, it hardly infringed respondents’ privacy for the agents to reexamine the contents of the open package by brushing aside a crumpled newspaper and picking up the tube. The advantage the Government gained thereby was merely avoiding the risk of a flaw in the employees’ recollection, rather than in further infringing respondents’ privacy. Protecting the risk of misdescription hardly enhances any legitimate privacy interest, and is not protected by the Fourth Amendment. Id. at 119. The Court’s explanation confirms that a government search that does not exceed the bounds of a private one is not an invasion of privacy under the Fourth Amendment. The only advantage gained by the government’s own search is avoiding the private party’s “misdescription”—and that is a permissible advantage. What was important to the Jacobsen Court was that the DEA agent’s search “enabled [him] to learn nothing that had not previously been learned during the private search,” not that UNITED STATES V. PHILLIPS 13 he have subjective knowledge of what was learned during the private search. The description of the DEA agent’s knowledge simply made clear that he was not exceeding the private search. Id. at 120; see also id. at 116 (“[T]he legality of the governmental search must be tested by the scope of the antecedent private search.”). “As in other Fourth Amendment contexts,” then, the inquiry remains “an objective one.” Graham v. Connor, 490 U.S. 386, 397 (1989); cf. Torres v. Madrid, 141 S. Ct. 989, 998 (2021) (“[W]e rarely probe the subjective motivations of police officers in the Fourth Amendment context.”). Here, as in Jacobsen, Windes’s accessing the computer in Sawyer’s presence “enabled [Sawyer] to learn nothing that had not previously been learned during the private search” and was therefore permissible. Id. at 120. But unlike Jacobsen, our conclusion regarding the equivalence between the scope of the searches arises because the record demonstrates that Sawyer instructed Windes to recreate her prior search so he only saw what she had already seen, and Windes abided by those instructions. 3 Our opinion in Young, 573 F.3d 711, does not change this conclusion. It simply represents an application of the Supreme Court’s decision in Stoner v. California, 376 U.S. 483 (1964). Stoner held that “[n]o less than a tenant of a 3 Moreover, even if Jacobsen’s application depends on the subjective knowledge of the person conducting the search, that test was satisfied here. Unlike the DEA agent in Jacobsen, who had not conducted the initial search but who had learned about the entire contents of the package from the FedEx employees, Windes had previously accessed the Phone folder of Phillips’s computer and saw that it contained child pornography. Thus Windes—the alleged state agent conducting the subsequent search in this case—possessed subjective knowledge and virtual certainty of what her search would reveal. 14 UNITED STATES V. PHILLIPS house, . . . a guest in a hotel room is entitled to constitutional protection” from a warrantless entry into his room regardless of any prior intrusion or permission given by hotel employees. Id. at 490. In Young, hotel security initially entered the defendant’s room without his permission to investigate whether he had stolen items from another guest, and they uncovered a gun in his backpack in addition to other items. 573 F.3d at 714. This was a private search that did not implicate the Warrant Clause of the Fourth Amendment. Nevertheless, the issue in Young turned on a second entry into and search of the hotel room by hotel security after they contacted law enforcement officers. Id. at 715. “The Government d[id] not dispute the district court’s conclusion that [hotel] security should be considered state actors for the purposes of the second search.” Id. at 717. Thus, Young involved a warrantless entry into the defendant’s hotel room by state actors against which he was protected by the Warrant Clause because “a hotel guest’s . . . room is like a home . . . [and the] guest has a legitimate and significant privacy interest . . . against unlawful government intrusions.” Id. at 721. And, absent exigent circumstances, such an intrusion is unlawful if undertaken without a warrant or consent of the occupant. See Stoner, 376 U.S. at 489–90; see also Payton v. New York, 445 U.S. 573, 589–90 (1980) (“[A]t the very core of the Fourth Amendment stands the right of a man to retreat into his own home and there be free from unreasonable governmental intrusion. . . . Absent exigent circumstances, that threshold may not reasonably be crossed without a warrant.” (alterations and internal quotation marks omitted)). The language in Young upon which Phillips relies appears in our discussion rejecting “[t]he Government[’s] argu[ment],” which it had raised “for the first time on appeal, that United States v. Jacobsen . . . should be extended to UNITED STATES V. PHILLIPS 15 permit the search of Young’s backpack stored in his hotel room.” 573 F.3d at 720. Phillips is correct that in Young we discussed language from Jacobsen that, by the time the DEA agent arrived, “it was virtually certain that [the package] contained nothing but contraband.” Jacobsen, 466 U.S. at 120 n.17; see Young, 573 F.3d at 721. But when we did so, it was merely to explain that Young “[wa]s distinguishable from Jacobsen” because the hotel security “could not have been ‘virtually certain’ . . . that the gun was contraband.” Id. After all, unlike narcotics, “[i]t is not a crime in most circumstances for a non-felon to possess a gun.” Id. While the two cases were distinguishable in the manner Young suggested, it is unlikely this distinction was crucial to our decision. Surely, we did not mean to suggest that our decision would have been different had the hotel security in Young been “virtually certain” as to the nature of the items the second search of Young’s hotel room would uncover. Indeed, it could not have been. Unlike this case, Young concerned the unique privacy interests an individual has in his residence (and, by extension, a temporary residence like a hotel room). See United States v. Lichtenberger, 786 F.3d 478, 484 (6th Cir. 2015) (“Homes are a uniquely protected space under the Fourth Amendment.”). Under Stoner, no prior private search and no level of certainty regarding what the second search would uncover could have allowed state actors to enter Young’s hotel room without a warrant or his consent. Young relied expressly on well-settled Supreme Court law that “[b]elief, however well founded, that an article sought is concealed in a dwelling house, furnishes no justification for a search of that place without a warrant. And such searches are held unlawful notwithstanding facts unquestionably showing probable cause.” 573 F.3d at 721 (emphasis added) (quoting Johnson v. United States, 16 UNITED STATES V. PHILLIPS 333 U.S. 10, 14 n.14 (1948))). 4 Unlike Young, but like Jacobsen, this case does not involve a warrantless entry into a home or its equivalent. Accordingly, Young does not alter the current inquiry. Phillips also argues that the extensive amount of personal information contained in a laptop makes it similar to a private residence, meaning that the private search doctrine should not apply. An analysis of this argument depends on to which of the two aspects of the doctrine it refers. The first involves an intrusion—even an extraordinarily invasive intrusion—by a private party who gives the contents discovered pursuant to that intrusion to law enforcement. Burdeau v. McDowell, 256 U.S. at 475–76. The validity of this conduct does not depend on the extent of the private information contained in the object or location on which the private party intruded. If there is no state action, there is no Fourth Amendment violation. Id. By contrast, the second aspect of the private search doctrine involves “a governmental search which follows on the heels of a private one,” Jacobsen, 466 U.S. at 115, and it is to this aspect of the doctrine that Phillips’s argument refers. While it is true that modern computers contain so much personal information that a search of one could 4 The leading treatise on the Fourth Amendment cites Young correctly for the proposition that “it is to be doubted that if a private person searched the premises of another and then reported to police what he had found . . . that the police could then make a warrantless entry of those premises and seize the named evidence.” 1 LaFave, supra, § 1.8(b) & n.97. Indeed, Young was guided by the analytic framework of the Sixth Circuit in United States v. Allen, 106 F.3d 695, 698–99 (6th Cir. 1997), which specifically rejected the argument that Jacobsen could permit a “warrantless search of [a defendant’s] motel room.” See Young, 573 F.3d at 720–21. UNITED STATES V. PHILLIPS 17 “expose to the government far more than the most exhaustive search of a house,” Riley v. California, 573 U.S. 373, 396 (2014), and more than the private party had previously uncovered, we have already held that the private search doctrine does apply to them, see United States v. Tosti, 733 F.3d 816 (9th Cir. 2013). We note that unlike in Riley, which involved a search incident to arrest, the search here involved a clear limiting principle: the private search exception allows police to review only the material that a private actor has already viewed. Because a digital container like “an email account, cell phone, or laptop” is composed of many smaller containers, a subsequent government search of a single file (or even a number of files) will not frustrate an individual’s privacy interest in the entire device. United States v. Wilson, 13 F.4th 961, 977 n.13 (9th Cir. 2021). We acknowledge that it may be more difficult to have “virtual certainty” that a search of an electronic device does not reveal more than the private search had already revealed, given the dynamic nature of such devices. See United States v. Rivera-Morales, 961 F.3d 1, 13 (1st Cir. 2020) (“The Court did not define ‘virtual certainty,’ and it is not immediately apparent how that concept translates from the context of a static object like a package to the ever-changing screen on a cellphone.”); see also Lichtenberger, 786 F.3d at 488. In this case, however, all parties agree that the officer did not see anything more than Windes had previously viewed, so we need not address this issue. 3 Phillips additionally argues that the Supreme Court’s decision in United States v. Jones, 565 U.S. 400 (2012), supports reversing the district court’s decision. In Jones, police attached a GPS tracking device to a car owned by the defendant’s wife without a valid warrant. Id. at 402–03. The 18 UNITED STATES V. PHILLIPS district court denied the defendant’s motion to suppress the data the police collected from that device, holding that the defendant lacked a reasonable expectation of privacy with respect to the car’s movements on public streets. Id. at 403. The Supreme Court disagreed. It explained that, even if the defendant lacked a reasonable expectation of privacy with respect to the car’s public movements, the Fourth Amendment nonetheless prohibited the police from physically trespassing on the defendant’s wife’s car by installing and using the tracking device without a valid warrant, and the exclusionary rule applied to the fruits of that unwarranted trespass. Id. at 404–06. According to Phillips, Jones’s “common-law trespassory test” for Fourth Amendment violations requires suppression in this case. Id. at 409. Jacobsen, Phillips says, merely stands for the proposition that a private search eliminates an individual’s reasonable expectation of privacy with respect to an item’s contents. Thus, the fact that Windes had previously viewed the files containing child pornography on Phillips’s computer only eliminated his reasonable expectation of privacy with respect to those files. It did not, Phillips argues, give Sawyer the license to instruct Windes to again “physically intrude[]” on Phillips’s property—i.e., his computer—by “open[ing] the laptop computer, enter[ing] the password . . . navigat[ing] to the ‘phone folder’ and scroll[ing] through the images.” And, under Jones, that intrusion violated Phillips’s Fourth Amendment rights. This argument fails. Even if we attribute Windes’s action to the officers and assume that those actions constituted a “trespass” of Phillips’s property, Jacobsen, too, involved a trespass of the defendant’s property. There, after the FedEx employees had opened the defendant’s package and found UNITED STATES V. PHILLIPS 19 white powder, the DEA agent reopened the package and removed its contents. Yet the Supreme Court permitted the warrantless search even though the agent physically intruded onto the package. See Jacobsen, 466 U.S. at 118–22. Jacobsen thus establishes that law enforcement officers do not violate the Fourth Amendment when, as Phillips claims occurred here, they mimic the trespass a private individual visited on another’s possessions after being alerted to the information uncovered pursuant to that trespass. See Bowman, 215 F.3d at 956, 963. Jones did not involve any aspect of the private search exception, nor did it reference Jacobsen. Under these circumstances, we must follow the Supreme Court’s instruction that “if a precedent of this Court has direct application in a case, yet appears to rest on reasons rejected in some other line of decisions, the Court of Appeals should follow the case which directly controls, leaving to this Court the prerogative of overruling its own decisions.” Agostini v. Felton, 521 U.S. 203, 237 (1997) (internal quotation marks and citation omitted). Moreover, our decision in Tosti, which postdates Jones, is consistent with our rejection of Phillips’s argument. There, a computer technician uncovered child pornography on the defendant’s computer and alerted the police. Tosti, 733 F.3d at 818–19. When two detectives arrived, without first obtaining a warrant, one of them “directed [the technician] to open the images in a ‘slide show’ format so that they would appear as larger images viewable one by one.” Id. at 819. The technician then “opened up the individual images” as the detective requested. Id. We held that, in light of the technician’s prior search, Jacobsen dictated that these actions did not violate the defendant’s Fourth Amendment rights. Id. at 821–22. Thus, we applied Jacobsen even though the technician, at the “direct[ion]” of the detective, arguably physically intruded on the defendant’s computer 20 UNITED STATES V. PHILLIPS when he “opened up the individual images.” Id. at 819. If Jacobsen applied in Tosti, it must also apply here. Indeed, this case may be a stronger case than Tosti for applying Jacobsen. When Windes, acting as a private person, discovered the child pornography on Phillip’s computer, she had at least two options for bringing it to the attention of law enforcement. First, and impracticably, she could have entered the sheriff’s office with laptop open and the child pornography displayed in plain view. Second, she could have entered with the laptop closed and waited until she was in a private setting before opening the laptop and navigating to the child pornography. Sensibly, she chose the second option. And the only direction she received from a law enforcement officer was aimed at ensuring that she would not intrude on Phillips’ privacy more than she already had. In Coolidge v. New Hampshire, the Supreme Court observed in analogous circumstances that had the defendant’s wife “wholly on her own initiative, sought out her husband’s guns and clothing and then taken them to the police station to be used as evidence against him, there can be no doubt under existing law that the articles would later have been admissible in evidence.” 403 U.S. at 487 (citing Burdeau, 256 U.S. 465). Phillips argues that because Windes chose the second option, the evidence uncovered pursuant to her actions at the sheriff’s office must be suppressed. “[I]t would seem strange” if the result in “cases of this kind . . . [would] ‘turn on the fortuity’ of whether and to what extent the private person put the contents back into [or closed] the container before the police appeared,” 1 LaFave, supra, § 1.8(b) (quoting Jacobsen, 466 U.S. at 120 n.17). Tosti’s application of Jacobsen to permit “the warrantless searches of [the defendant’s] computer,” id. at UNITED STATES V. PHILLIPS 21 821–22, also disposes of Phillips’s argument, which we have already addressed, that “given the significant privacy interests implicated by modern digital devices, [Jacobsen] is categorically inapplicable to warrantless searches of these devices, such as Phillips’s personal computer.” Cf. United States v. Wilson, 13 F.4th 961, 972 (9th Cir. 2021) (declining to extend Jacobsen to a case where, in response to a Google report that its algorithm detected a match between images the defendant had attached to an email and known child pornography, “the government agent viewed [the] email attachments even though no Google employee—or other person—had done so”). Other circuits have also applied Jacobsen to searches of modern digital devices. See United States v. Castaneda, 997 F.3d 1318, 1327–29 (11th Cir. 2021); Rivera-Morales, 961 F.3d at 8–11; United States v. Reddick, 900 F.3d 636, 638–39 (5th Cir. 2018); Lichtenberger, 786 F.3d at 483–84; United States v. Goodale, 738 F.3d 917, 921 (8th Cir. 2013); Rann v. Atchison, 689 F.3d 832, 836–37 (7th Cir. 2012). Phillips’s objections to the use of evidence obtained from his computer therefore all fail. We also reject Phillips’s challenge to three conditions of his supervised release. Because Phillips signed a valid appeal waiver, he may argue on appeal only that those conditions “exceed[] the permissible statutory penalty [for the crime] or violate[] the Constitution.” United States v. Watson, 582 F.3d 974, 981 (9th Cir. 2009). Yet our precedents establish the legality of all the challenged conditions. See United States v. Gibson, 998 F.3d 415, 422– 23 (9th Cir. 2021) (risk notification), cert. denied, No. 21- 6465 (Jan. 10, 2022); United States v. Ochoa, 932 F.3d 866, 869–71 (9th Cir. 2019) (prohibiting access to material depicting sexually explicit conduct involving adults to 22 UNITED STATES V. PHILLIPS defendant convicted of child pornography offense); United States v. Stoterau, 524 F.3d 988, 1003–04 (9th Cir. 2008) (polygraph testing). The judgment of conviction is AFFIRMED.