United States v. Grosenheider

                  IN THE UNITED STATES COURT OF APPEALS
                          FOR THE FIFTH CIRCUIT



                                    No. 98-50888



     UNITED STATES OF AMERICA,

                                       Plaintiff-Appellant-Cross-Appellee,

            versus


     JOHN STEPHEN GROSENHEIDER,

                                       Defendant-Appellee-Cross-Appellant.




         Appeals from the United States District Court
       for the Western District of Texas, Austin Division

                                January 11, 2000

Before GARWOOD, SMITH and BENAVIDES, Circuit Judges.

GARWOOD, Circuit Judge:

     Defendant-cross-appellant                John     Stephen         Grosenheider

(Grosenheider) was indicted for the receipt and possession of

computer    images       of    child   pornography       under    18     U.S.C.     §

2252A(a)(5)(B).         After the district court denied his motion to

suppress the evidence taken from his computer, Grosenheider entered

a conditional guilty plea to one count of possession.                    The court

sentenced   him    to    twelve     months’    incarceration.          Grosenheider

appeals the denial of his suppression motion, and the government

appeals the sentence. We affirm the district court’s denial of the

suppression   motion,         but   vacate    the    sentence    and    remand    for

resentencing.
                              Facts and Proceedings Below

          On October 24, 1997, Grosenheider dropped off his personal

computer for repair work at Upgraders, a computer repair shop in

Austin, Texas. While conducting a final quality assurance check of

the computer on Thursday, October 30, 1997, Upgraders employee

Patrick Rowan (Rowan) discovered an unusually large number of image

files, known as “JPG’s”, on the computer’s hard drive.                            Knowing

that JPG’s in large numbers often depict pornographic images, Rowan

opened some of these files and found between two and five images of

child pornography.              Rowan showed the images to his employer,

Nathaniel Monks (Monks), the owner of Upgraders, as well as to two

other employees, all of whom agreed that the images depicted child

pornography.            The    repairs   now       complete,    the      Upgraders     staff

returned         the    computer    to     the      retail     store      for   pick    up.

Grosenheider retrieved the computer some time later that day.1

          At approximately 9:00 a.m. the next morning, Friday, October

31, 1997, Monks contacted the Austin Police Department about the

images Rowan had discovered.               He spoke with Steven Meaux (Meaux),

a vice officer, and informed Meaux about the images he had seen and

the       fact   that    the    computer    was      now     back   in    Grosenheider’s

possession.            Meaux arrived at Upgraders thirty to forty-five

minutes later.          His primary purpose was to identify and interview

      1
      Upgraders occupies two suites at either end of a strip shopping
mall in south Austin. The front suite contains the retail store, where
customers interact with store personnel and pick up their repaired
computers. The back suite is the “tech shop” where the actual repairs
take place. Rowan, Monks, and the others all viewed the images on
Grosenheider’s computer in the tech shop suite. Grosenheider picked up
his computer from the retail store suite.

                                               2
the staff members who had seen the images.             Meaux first entered the

retail store, but an employee directed him to the tech shop, where

Monks, Rowan, and the other employees who had seen the images were

waiting.    When Meaux got there, Monks told him that Grosenheider

had brought the computer back that morning because the hard drive

was still not operating properly, and that Rowan had begun working

on it in the tech shop.      As Meaux began to interview the assembled

employees, another employee entered the tech shop and said that

Grosenheider had again returned to the retail store, asking about

his computer.      Meaux told Monks to “stall” Grosenheider by telling

him the store needed to order additional parts.               Monks complied,

and from the tech shop Meaux watched Grosenheider leave the retail

store and drive away.

     After Grosenheider left, Meaux completed his interview of

Rowan, Monks, and the other employees about the images they had

seen on the computer.      They told him that the images depicted young

girls approximately ten years old engaged in sexual conduct of

various kinds.      During this time, Rowan had been working on his

repair     of   Grosenheider’s    computer,        a    process   which   took

approximately fifteen minutes to complete.              There is some dispute

–which the district court expressly declined to resolve-whether

Meaux then asked to see or Rowan offered to show him the pictures.

In any event, Rowan attempted to access the images on the computer,

only to     find   them   “locked”,   that   is,   inaccessible     without   a

password.       The password lock had not appeared the day before.

Unable to override the lock, Rowan asked another, more experienced


                                      3
Upgraders employee, Cary Richardson (Richardson), for help.             By

using another image viewing program, Richardson by-passed the lock.

Rowan then showed Meaux the images he had seen the day before, as

well as additional ones. After viewing between six and ten images,

Meaux “had seen enough” to determine that the computer contained

depictions of child pornography.

     At approximately 11:00 a.m., Meaux took the computer from

Upgraders to his office at the Austin Police Department, and

contacted Theodore Siggins (Siggins), a special agent with the

United States Customs Service.         Meaux advised Siggins of his

discovery and asked if Siggins was interested in pursuing a federal

investigation.      Siggins   agreed   to   take   over   the   case,   and

immediately began preparing a search warrant affidavit.            In his

affidavit, Siggins recounted the discovery by the Upgraders staff

of the pornographic images, Grosenheider’s bringing the computer

back to Upgraders, and the call from Monks to Meaux.            He did not

mention Meaux’s viewing of the images or his seizure of the

computer.     At approximately 4:30 p.m. that afternoon, Siggins

applied for and received a warrant to search the computer from a

United States Magistrate Judge.

      After obtaining the warrant, Siggins secured the computer

from Meaux and took it to Upgraders, where he informed Monks that

he had a warrant for the computer and would return it to Upgraders

once he had finished searching it.     Siggins then took the computer

back to his office and made a backup image of the computer’s entire

hard drive.      He analyzed the image on one of the government’s


                                   4
computers, and found that Grosenheider had subscribed to Forte

Agent, an on-line service that enables subscribers to access

various “newsgroups” on the Internet.2 Grosenheider had subscribed

to fifteen newsgroups, thirteen of which featured images and

messages concerning child pornography.3                   Siggins found that from

these newsgroups Grosenheider had downloaded over 500 images of

young females, ages ten to fourteen, engaged in various sexually

explicit acts. Grosenheider had also established over 250 files,

each of which contained at least one image of child pornography and

sometimes included textual commentary with the image.                         Siggins

determined further that Grosenheider had viewed many of these

images more than once because the “creation date” on the files

sometimes differed from the “last access date”, meaning that the

file had been modified or viewed after being downloaded.                     Based on

these findings, Siggins applied for and received another warrant to

search Grosenheider’s home in Austin.

          On the following Monday, November 3, 1997, Siggins returned

the       computer    to   Upgraders   in       anticipation    of    a   “controlled

delivery.”           Grosenheider’s    wife      picked    up   the   computer   from

Upgraders that same day and took it back to their home.                      Federal

agents followed Mrs. Grosenheider to the residence; upon her

arrival, they executed the search warrant.                  The agents seized the

          2
       A “newsgroup” is an Internet site organized around a single
topic. Like a bulletin board, a newsgroup enables individuals to post
files, such as text messages or images, which other viewers may then
read or download onto their own computers.
      3
     Eleven of the newsgroups had titles that clearly indicated that
they dealt with child pornography.

                                            5
computer, but did not find any additional child pornography at the

residence.

     Grosenheider was indicted and charged with (1) Receipt of

Visual Depictions of Minors engaged in Sexually Explicit Conduct in

violation of 18 U.S.C. § 2252(a)(2), and (2) Possession of Visual

Depictions of Sexual Activities by Minors in violation of 18 U.S.C.

§ 2252A(a)(5)(B).        On February 26, 1998, Grosenheider filed a

motion to suppress the evidence seized from his computer and

residence.     While conceding that the first search of his computer

by Rowan was a private search, and therefore not subject to the

Fourth Amendment, Grosenheider challenged the second search by

Meaux.    Specifically, he alleged that Meaux’s breaking (with the

help of Upgraders employees) the password lock, viewing more images

than Rowan had seen, and subsequently seizing the computer violated

Grosenheider’s rights under the Fourth Amendment.            The district

court conducted two evidentiary hearings, on March 13 and May 1,

1998, and denied the motion in a May 11, 1998 memorandum order.

The following day, May 12, Grosenheider entered a conditional

guilty plea to the possession charge (Count II), pursuant to which

he reserved the right to appeal the denial of his suppression

motion.    The remaining count was dismissed.

     The district court conducted a sentencing hearing on July 31,

1998,    and   found   that   Grosenheider’s   total   offense   level   was

eighteen, with an applicable incarceration range of twenty-seven to




                                      6
thirty-three months.4           Apparently reasoning that Grosenheider’s

case bore little resemblance to the “pornography” cases the court

had previously sentenced, which (with one exception) had all

involved “perverted people with a long track record of harm to

others,”       the   district   court   departed   downward   and   sentenced

Grosenheider to twelve months incarceration, followed by a three-

year term of supervised release.5           In the court’s opinion, this

sentence was amply sufficient,6 though the court plainly doubted

its legality.7

       4
       Under U.S.S.G. § 2G2.4, Grosenheider’s initial total offense
level was twenty-one: fifteen for violating 18 U.S.C. § 2252A(a)(5)(B);
two for the specific offense characteristic of material involving a
prepubescent minor; two for the characteristic of possessing ten or more
images depicting the sexual exploitation of a minor; and two for the
characteristic of obtaining the material by using a computer. Because
it found that Grosenheider accepted responsibility for his actions,
however, the district court reduced his offense level by three, pursuant
to section 3E1.1. Grosenheider had no prior convictions.
   5
     Before pronouncing sentence on Grosenheider, the district court
made preliminary remarks, including the following: “So that everybody
knows where we stand, I am concerned with the guidelines in this case.
I think they’re wrong. I’m not–not that I have one second of doubt that
what you did was not only illegal but just terrible. But the guidelines
in this particular case, it seems to me, are just too high. I don’t see
that it does anybody any good to put you away for three years in prison
. . . . I don’t believe that the sentencing commission had a case in
mind where we have a person who’s 38 or 39 years old, never been in
trouble really, have zero points on criminal history, whether it be
curiosity or just absolute perversion to utilize his computer in this
way . . . . So I’m just giving everybody fair warning, I don’t like this
case, I don’t like the defendant very much, don’t like the guidelines
very much, don’t like the law very much.”
       6
      “Twelve months in the penitentiary is not easy for anybody. I
think you’ve been more than sufficiently punished for an intelligent
person, and I don’t think you’re going to do this again.”
           7
       “I state in the record that as far as I’m concerned . . . ,
[this] is an illegal sentence and I do not have the authority to do it
under the express provisions of the guidelines. But this case and the
United States will not be any better off by putting Mr. Grosenheider in

                                        7
     Grosenheider now appeals the district court’s denial of his

motion to suppress.      The United States appeals Grosenheider’s

sentence.     We affirm the denial of the suppression motion, but

vacate the sentence and remand for resentencing.

                             Discussion

I.   Grosenheider’s Motion to Suppress

     Grosenheider contends that the district court erred in denying

his motion to suppress the evidence obtained from his computer.

Specifically, he argues that Meaux’s search of the computer, during

which Meaux viewed images of child pornography with help from and

in the presence of Upgraders employees, was illegal, as was Meaux’s

subsequent warrantless seizure of the computer.        We conclude,

however, that because Siggins obtained the evidence by lawful means

independent of Meaux’s search or seizure, the evidence used against

Grosenheider was not the “tainted fruit” of any illegality.   Under

the “independent source” doctrine, we conclude that this evidence

should not be suppressed.      We therefore affirm the denial of

Grosenheider’s motion.

     This Court will accept a district court’s factual findings on

a motion to suppress based on live testimony at a suppression

hearing “unless clearly erroneous or influenced by an incorrect

view of the law.”   United States v. Wilson, 36 F.3d 1298, 1303 (5th

Cir. 1994).    When reviewing the district court’s ruling, we will

“view the facts in the light most favorable to the prevailing

party.”   United States v. Howard, 106 F.3d 70, 73 (5th Cir. 1997).


jail for three years and I’m not going to do it.”

                                  8
Our review of the district court’s interpretation and application

of law is de novo.     See United States v. Blocker, 104 F.3d 720, 725

(5th Cir. 1997).

      A.    Meaux’s Search of the Computer

      Grosenheider first argues that Meaux’s search of the computer,

during which Upgraders staff helped by-pass the password lock, was

illegal.      At the outset, he rightly concedes that the initial

search by Rowan did not violate the Fourth Amendment, which only

implicates searches and seizures by governmental agents or those

working for them.      See United States v. Jacobsen, 104 S.Ct. 1652,

1656 (1984); Blocker, 104 F.3d at 725.             He contends, however, that

by breaking the password lock, the second search exceeded the scope

of   the    initial   private   search,     and,    lacking    a   warrant,   was

therefore illegal.      We do not reach the merits of this argument,

but instead affirm the district court’s determination that the

evidence from Grosenheider’s computer is admissible under the

“independent source” doctrine.          See United States v. Register, 931

F.2d 308, 311 (5th Cir. 1991) (refusing to consider whether exigent

circumstances justified a warrantless entry because the independent

source doctrine applied).

      The    exclusionary   rule   of    the   Fourth   Amendment     generally

prohibits the introduction at trial of not only primary evidence

obtained as a direct result of an illegal search or seizure, but

also evidence discovered later that is derivative of an illegality,

or constitutes “fruit of a poisonous tree.”                   Segura v. United

States, 104 S.Ct. 2280, 2284 (1984) (citing Weeks v. United States,


                                        9
34 S.Ct. 341 (1914) and Nardone v. United States, 60 S.Ct. 266, 268

(1939)).     The   primary      limit   on   this   rule    is    that   otherwise

suppressible evidence will still be admitted if the connection

between the alleged illegality and the acquisition of the evidence

is “so attenuated as to dissipate the taint.”              Nardone, 60 S.Ct. at

268; see also Segura, 104 S.Ct. at 3391 (rejecting the notion “that

evidence is ‘fruit of the poisonous tree’ simply because ‘it would

not have come to light but for the illegal actions of the police’”)

(citations omitted).          One example of this “attenuation” limit is

known as the “independent source” doctrine, which permits the

introduction of unlawfully discovered evidence when the police have

acquired that evidence through a distinct, untainted source.                     See

Silverthorne Lumber Co. v. United States, 40 S.Ct. 182, 183 (1920);

Segura,    104   S.Ct.   at    3391.    Animating     this       doctrine   is   the

recognition that the goal of the exclusionary rule is to put the

police “in the same, not a worse, position that they would have

been in if no police error or misconduct had occurred.”                     Nix v.

Williams, 104 S.Ct. 2501, 2509 (1984).                 “When the challenged

evidence has an independent source, exclusion of such evidence

would put the police in a worse position than they would have been

in absent any error or violation.”           Id.

     In Murray v. United States, 487 U.S. 533, 537 (1988), the

Supreme Court held that the independent source doctrine extends to

evidence “initially discovered during, or as a consequence of, an

unlawful search, but later obtained independently from activities

untainted by the initial illegality.”               Whether Meaux’s assisted


                                        10
breaking of the password lock and subsequent viewing of the JPG

images on the computer’s hard drive were illegal, there is no

causal link between those activities and Siggins’s later search and

seizure of the computer pursuant to his valid warrant.              Indeed, it

is undisputed that Siggins obtained his search warrant by relying

solely on the statements by the Upgraders employees to Meaux.               He

never mentioned to the Magistrate Judge the fact that Meaux had

viewed the    images,   or   that   he    still   possessed   the   computer.

Consequently, the search did not taint the Magistrate Judge’s

decision to issue the warrant, which the district court found “the

government obtained exclusively on the basis of Rowan’s initial

private search of the [computer] files.”          See id. at 541 (applying

independent source doctrine to later search in which affidavit made

no mention of earlier unlawful search).

       In addition to requiring that the decision making process of

the judicial officer issusing the warrant be shielded from the

earlier alleged illegality, Murray also mandates that the district

court find that the agents would have sought the warrant even if

that illegality had never taken place.            See id. at 542-43 & n.3

(“[W]hat counts is whether the actual illegal search had any effect

in producing the warrant.”).8        The district court satisfied this

   8
      Despite being framed as part of the independent source analysis,
this requirement bleeds into the “inevitable discovery” doctrine, which
renders the exclusionary rule inapplicable to otherwise suppressible
evidence if that evidence would inevitably have been discovered by
lawful means. See 5 WAYNE R. LAFAVE, SEARCH AND SEIZURE: A TREATISE ON THE
FOURTH AMENDMENT § 11.4(a) (3d ed. 1996). The reason for this slippage
between the two doctrines is that they are actually two sides of the
same coin. As the Murray Court recognized, inevitable discovery is no
more than “an extrapolation” of the independent source doctrine: “Since

                                     11
requirement by finding “credible” Siggins’s testimony that the

witness statements by the four Upgraders employees, all of whom

agreed that the images depicted child pornography, were sufficient

to prompt his decision to seek the warrant.              The district court

also found “[i]f Meaux had not viewed the images, the Court is

certain that Siggins would nevertheless have sought and obtained a

search warrant for the defendant’s computer.”              These findings are

supported by the record and are not clearly erroneous.



     B.   Meaux’s Seizure of the Computer

     Grosenheider    next       argues    that   Meaux’s    seizure   of   the

computer–his taking it from Upgraders and holding it for the four

or five hour period until Siggins secured it with the search

warrant–was illegal.       According to Grosenheider, even if Meaux’s

search was reasonable, the seizure was not, and in any event the

independent source doctrine does not apply to illegal seizures. We

reject Grosenheider’s latter argument as unsupported by precedent,

and consistent with our discussion of Meaux’s search, do not

address   the   question   of    the     seizure’s   reasonableness   because

Siggins’s “re-seizure” of the computer eliminated any taint from

Meaux’s initial seizure.

     Citing a passage in part IV of the opinion in Segura v. United


the tainted evidence would be admissible if discovered through an
independent source, it should be admissible if it inevitably would have
been discovered.” Murray, 487 U.S. at 539; see also LAFAVE at § 11.4(a)
(referring to inevitable discovery as “a variation” on the independent
source doctrine). We observe that the decision not to suppress the
evidence in this case–with regard to both the search and seizure by
Meaux–could be upheld under either doctrine.

                                         12
States, 104 S.Ct. 3380, 3386-90 (1984), Grosenheider contends that

the   independent   source    doctrine   is   inapplicable   to    illegal

seizures, and would have us announce a rule that the occurrence of

all such seizures automatically mandates the suppression of any

evidence seized.    This we decline to do.       In Segura, the Supreme

Court held that two officers’ illegal entry into an apartment did

not   require   suppression   of   evidence   later   discovered   at   the

apartment pursuant to a valid, independent search warrant.              The

defendants argued that during the first illegal entry the officers

had “seized” all the contents of the apartment and therefore the

evidence should be suppressed.           In part IV of Chief Justice

Burger’s opinion for the Court–a portion of the opinion joined in

only by Justice O’Connor–the following somewhat cryptic passage

appears:

      “Plainly, this argument is advanced to avoid the
      Silverthorne