United States v. Zimmerman

IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT United States Court of Appeals Fifth Circuit FILED December 16, 2008 No. 08-40169 Charles R. Fulbruge III Clerk UNITED STATES OF AMERICA Plaintiff-Appellee v. JOHN CRAIG ZIMMERMAN Defendant-Appellant Appeal from the United States District Court for the Southern District of Texas No. 1:07-CR-232-1 Before SMITH, BARKSDALE, and PRADO, Circuit Judges. PER CURIAM:* Having conditionally pleaded guilty, John Craig Zimmerman challenges his convictions for: sexual exploitation of a child for the purpose of producing child pornography, in violation of 18 U.S.C. §§ 2251(a) and 2; receipt of child pornography, in violation of 18 U.S.C. §§ 2252A(a)(2)(B), 2256(8), and 2; and possession of child pornography, in violation of 18 U.S.C. §§ 2252A(a)(4)(B), 2252(b)(2), and 2. At issue is whether the district court erred in denying * Pursuant to 5TH CIR. R. 47.5, the court has determined that this opinion should not be published and is not precedent except under the limited circumstances set forth in 5TH CIR. R. 47.5.4. No. 08-40169 Zimmerman’s motion to suppress evidence obtained from his City-owned workplace computer and his residence. AFFIRMED. I. On 5 February 2007, the Brownsville Fire Department (BFD) received an anonymous tip that Zimmerman, one of its employees, had pornographic photographs of children on his City-owned workplace computer. Previously, in 2003, Zimmerman had been under investigation for similar suspicions involving child pornography. On that occasion, upon searching his workplace computer, officials found no evidence of such pornography. On the evening of 6 February 2007, an employee of the MIS department–the entity responsible for managing all major computer issues for the City–searched Zimmerman’s workplace computer, without a warrant, and discovered adult pornography, as well as encrypted information. The MIS employee decoded the information and uncovered many pornographic images, some of which he suspected to be child pornography. That same evening, the BFD fire chief informed the Brownsville Police Department (BPD) that what was believed to be child pornography had been found on a City computer. After showing the images to a BPD detective and an Immigrations and Customs Enforcement (ICE) Agent, the MIS employee signed a written consent form authorizing the BPD to take possession of Zimmerman’s workplace computer. Agents then obtained a search warrant for Zimmerman’s home. Claimed probable cause was founded on the images obtained from his workplace computer, as well as an affidavit by an ICE Special Agent stating: based on her training and experience, because child pornography had been found on Zimmerman’s workplace computer, he would have it at his home as well. On 9 February 2007, Zimmerman’s residence was searched and approximately 1200 images and 17 videos of child pornography were seized. Two 2 No. 08-40169 females later testified that Zimmerman had taken photos of them, with and without clothes, several years earlier when they were underage. In April 2007, Zimmerman was indicted on four counts of violating the Child Pornography Prevention Act, 18 U.S.C. § 2252A. He pleaded not guilty and moved to suppress the evidence he claimed was illegally seized: the images on the workplace computer and those found at his residence. The district court held an evidentiary hearing on 6 August 2007 and subsequently, through a comprehensive opinion, denied the motion, determining: Zimmerman did not have a reasonable expectation of privacy in his workplace computer; assuming, arguendo, Zimmerman had such an expectation, the initial search of the workplace computer did not violate his Fourth Amendment rights, because BFD officials had an objectively justifiable suspicion to initiate a reasonable search; the MIS employee had authority to consent later to the search of the workplace computer by law enforcement; and, the search warrant for Zimmerman’s home properly flowed from the evidence obtained from the workplace computer and the ICE Special Agent’s affidavit. United States v. Zimmerman, No. B-07-232 (S.D. Tex. 22 Aug. 2007) (District Court’s Order denying motion to suppress). Reserving the right to appeal the denial of his suppression motion, Zimmerman pleaded no contest to three of the four counts in the indictment. (The district court granted the Government’s motion to dismiss the other count.) On 8 February 2008, the district court sentenced Zimmerman, inter alia, to 300 months’ imprisonment. II. For reviewing the denial of a suppression motion, the district court’s conclusions of law are reviewed de novo; its factual findings, only for clear error. E.g., United States v. Lopez-Moreno, 420 F.3d 420, 429 (5th Cir. 2005). In reviewing findings of fact, the evidence is viewed in the light most favorable to 3 No. 08-40169 the prevailing party on the motion (here, the Government). Id. Essentially for the reasons stated in the district court’s opinion, the suppression motion was properly denied. A. Zimmerman first contends the search of his City-owned workplace computer violated his Fourth Amendment rights. That Amendment guarantees “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures”. U.S. CONST. amend. IV. The touchstone of Fourth Amendment analysis is whether the defendant had a constitutionally protected reasonable expectation of privacy in the item searched and seized by the Government. California v. Ciraolo, 476 U.S. 207, 211 (1986); United States v. Slanina, 283 F.3d 670, 675 (5th Cir. 2002). The district court’s findings of fact are not clearly erroneous. Viewing the evidence in the requisite light most favorable to the Government, we conclude Zimmerman did not have an objectively reasonable expectation of privacy in his City-owned workplace computer. Of course, as application of the Fourth Amendment hinges on finding an expectation of privacy, there can be no constitutional violation without one. Smith v. Maryland, 442 U.S. 735, 740 (1979). Thus, the procedure employed for Zimmerman’s workplace computer by City officials did not constitute a “search” for Fourth Amendment purposes. Additionally, it was not clear error for the district court to determine the MIS employee gave voluntary consent, as a third party possessing authority and common control over the item to be searched, to the BPD Agents to seize the workplace computer, justifying the warrantless search. See United States v. Matlock, 415 U.S. 164, 171 (1974). As such, the motion to suppress evidence found on Zimmerman’s workplace computer was properly denied. 4 No. 08-40169 B. Zimmerman also contends the evidence obtained from the search of his residence was inadmissible because it was the “fruit” of the claimed illegal search of his workplace computer and therefore tainted by that prior procedure. See Wong Sun v. United States, 371 U.S. 471, 487-88 (1963). As held above, evidence obtained from that workplace computer was not “tainted”. Nevertheless, a discussion follows for the proper procedure employed in this instance. The district court concluded that the affidavit of the ICE Special Agent, supporting the issuance of the search warrant for Zimmerman’s residence, supplied a “substantial basis for determining the existence of probable cause”. Illinois v. Gates, 462 U.S. 213, 239 (1983). Additionally, it determined: using evidence from the workplace search in obtaining the search warrant did not violate Zimmerman’s Fourth Amendment rights, because, as noted, that procedure was constitutionally reasonable. Giving the requisite deference to the district court’s findings of fact, and in the light of our holding supra that the evidence obtained from Zimmerman’s workplace computer was not “tainted”, Zimmerman’s motion to suppress evidence found in his home was properly denied. III. For the foregoing reasons, the judgment is AFFIRMED. 5