Legal Research AI

United States v. Tucker

Court: Court of Appeals for the Tenth Circuit
Date filed: 2002-09-16
Citations: 305 F.3d 1193
Copy Citations
101 Citing Cases
Combined Opinion
                                                                       F I L E D
                                                                 United States Court of Appeals
                                                                         Tenth Circuit
                                     PUBLISH
                                                                        SEP 16 2002
                   UNITED STATES COURT OF APPEALS
                                                                     PATRICK FISHER
                                                                             Clerk
                               TENTH CIRCUIT




UNITED STATES OF AMERICA,

             Plaintiff - Appellee,
                                                       No. 01-4150
v.

JEFFREY TUCKER,

             Defendant - Appellant.




                 Appeal from the United States District Court
                           for the District of Utah
                          (D.C. No. 2:98-CR-425-C)


Thomas M. Gannon, Attorney, Department of Justice, Criminal Division,
Appellate Section, Washington, D.C., (Paul M. Warner, United States Attorney,
District of Utah; Richard N. Lambert, Assistant United States Attorney, District
of Utah, Salt Lake City, Utah, with him on the briefs), for Plaintiff-Appellee.

Deirdre A. Gorman, Ogden, Utah, for Defendant-Appellant.


Before BRISCOE, Circuit Judge, BRORBY, Senior Circuit Judge, and
MURPHY, Circuit Judge.


MURPHY, Circuit Judge.
I. INTRODUCTION

      The appellant, Jeffrey Tucker, was convicted of one count of possession of

child pornography, 18 U.S.C. § 2252A(a)(5)(B), and sentenced to sixty months’

imprisonment. 1 He appeals his conviction on numerous grounds. We have

jurisdiction under 28 U.S.C. § 1291 and affirm.

II. FACTS

      Tucker was convicted in 1990 in Utah state court for sexually abusing a

child. He was paroled by the Utah Department of Corrections in 1996. As part of

his parole agreement, Tucker agreed to “permit agents of Adult Probation and

Parole to search my person, residence, vehicle or any other property under my

control, without a warrant, at any time, day or night, upon reasonable suspicion to

ensure compliance with the conditions of my parole.” He further agreed to “[n]ot

view or have in my possession any material exploiting children or depicting

unconsensual sex acts or acts involving force or violence.” In another part of the

agreement, he agreed to “[h]ave no contact with children under age 18 without the

supervision of an adult who is aware of my sexual deviancy.” Finally, he agreed



      1
        The version of § 2252A(a)(5)(B) under which Tucker was convicted
criminalized knowing possession of material “that contains 3 or more images of
child pornography.” After Tucker committed the crime, § 2252A(a)(5)(B) was
amended to criminalize knowing possession of material containing “an” image of
child pornography. Throughout this opinion, citations to § 2252A(a)(5)(B) are to
the older version under which Tucker was charged and convicted.

                                        -2-
to “obey all state, federal, and municipal laws.” In June 1998, Tucker was still on

parole and subject to the parole agreement.

      On June 10, 1998, Corina Groneman, a former employee of the United

States Bureau of Reclamation (“Reclamation”) spoke over the telephone with

Officer Ryan Atack of the Salt Lake City Police Department about Tucker.

Groneman told Atack that a friend (“friend 1”), who wished to remain

anonymous, had received information that Tucker was viewing child pornography

on his computer and had contacted a child. According to friend 1, a friend of his

(“friend 2”), who also wished to remain anonymous, visited Tucker at his

residence. Friend 2 worked at Reclamation, as did friend 1, Tucker, and

Groneman. 2 Tucker showed friend 2 child pornography on his computer and

informed her that he had met a young girl and might try to arrange another

meeting with the child. Groneman never informed Atack of the identity of either

friend 1 or friend 2, but she did identify herself and told him she was an employee

of the U.S. Attorney’s office.

      Atack contacted Tucker’s parole officer, Ken England, after checking

Tucker’s criminal history and discovering his parole status. Atack told England

that he had received a tip from a citizen that an anonymous individual had seen



      2
       Tucker began working at Reclamation after Groneman left to work at the
U.S. Attorney’s office.

                                         -3-
child pornography on Tucker’s computer and had been told by Tucker that he was

planning a meeting with a young girl. England spoke with his supervisor,

Jennifer Bartell, who concluded that they had reasonable suspicion that Tucker

possessed child pornography and had contacted a young girl, both in violation of

his parole agreement. They decided to conduct a parole search the next day with

the assistance of Atack and other officers of the Salt Lake City police department.

      On the evening of June 11, 1998, England, Bartell, Atack, and several Salt

Lake City police officers searched Tucker’s residence. England and Bartell

approached the apartment from the front. The screen door on the apartment was

closed but the main door was open. Before he entered, England saw Tucker near

a computer. England and Bartell entered the apartment. Upon entry, England

ordered Tucker away from the computer. Immediately, Detective Rick Gruber, a

police officer with expertise in computer crimes, approached the computer.

Before taking control of the computer, he noticed that it was connected to the

Internet and that Tucker had been visiting a newsgroup 3 labeled “alt.sex.preteen.”

Gruber ran software on Tucker’s computer designed to prevent alteration of the

hard drive. He then discovered that a large number of files recently had been



      3
         A newsgroup is a location on the Internet which, as Detective Gruber
testified, “is analogous to a bulletin board where people post messages and
they’re able to reply, and they’re also able to exchange data, exchange documents
and images.”

                                         -4-
deleted from Tucker’s hard drive. Gruber ran another program that allowed him

to view deleted files, but none of the deleted files he viewed contained

pornography. In his investigation of Tucker’s Web browser history, 4 however, he

noticed that Tucker had visited other newsgroups whose names suggested they

contained child pornography. Gruber informed Tucker that technology existed to

recover the deleted files. Parole Agent Bartell then asked Tucker “What are we

going to find?” Tucker responded, “There’s some stuff on there that’s going to

cause me problems.” Bartell ordered the computer seized.

      England and Bartell placed Tucker in administrative custody. After

receiving Miranda warnings and waiving his rights, Tucker told investigators that

his computer contained over 5,000 images of children between the ages of ten and

twelve engaged in sexual acts and poses. He also acknowledged that he had

spoken with a seven year old girl on two occasions, as the anonymous informant,



      4
        The World Wide Web is one form of communication available over the
Internet. It allows computer users “to search for and retrieve information stored
in remote computers, as well as, in some cases, to communicate back to
designated sites.” Reno v. Am. Civil Liberties Union, 521 U.S. 844, 852 (1997).
The information is stored in the form of Web “pages.” See id. “Web pages
frequently contain information and sometimes allow the viewer to communicate
with the page’s (or ‘site’s’) author. They generally also contain ‘links’ to other
documents created by that site’s author or to other (generally) related sites.” Id.
A Web browser is computer software that allows a user to view Web pages.
Tucker used two different Web browsers, Microsoft Internet Explorer and
Netscape Navigator. Each Web browser keeps a history, or list, of Web pages
recently visited by the user.

                                         -5-
friend 2, had alleged. Following this interview, Tucker was placed in the custody

of the Utah Department of Corrections pending a determination by the Utah Board

of Pardons and Parole whether his parole should be revoked. 5

        Based on the information Tucker provided to officers during the search and

subsequent interview, Atack prepared an affidavit for a warrant to search

Tucker’s computer. A state magistrate found probable cause and signed the

warrant. Pursuant to the warrant, Special Agent Daniel Hooper of the Utah

Department of Public Safety conducted a forensic examination of the computer on

July 28, 1998. Using specialized software, Hooper recovered some 27,000 images

stored on Tucker’s computer. He estimated that of the .jpg 6 images which were

viewable, ninety to ninety-five percent were child pornography. Some of those

images were very small, called “thumbnail” images, but many were larger images.

Hooper recovered files containing child pornography from different parts of the

hard drive. Some were located in the Web browsers’ cache files. 7 Others were


        5
            The Board revoked Tucker’s parole nearly two years later on February 8,
2000.

        Hooper testified that “.jpg” files are a type of image file. Other types
        6

include .gif, .bmp, and .art files.

        The government’s witness, Senior Special Agent Don Daufenbach of the
        7

United States Customs Service, testified at trial that a “cache file” is a location on
a computer’s hard drive that contains “a collection of data images typically that
have been gleaned from your travels around the Internet.” Daufenbach explained
that upon visiting a Web page, a Web browser immediately caches or saves the
images on that page in the cache file. If a user selects an image on a Web page in

                                           -6-
located in the computer’s recycle bin 8 and in “unallocated” hard drive space.

Hooper testified that the forensic examination revealed that Tucker accessed the

cache files and manually deleted images in the files by dragging them to the

computer recycle bin. Hooper rejected the suggestion that Tucker had

accidentally run across these images, citing Web browser history files which

showed that Tucker repeatedly visited the same sites. Through Hooper, the

government also presented an email from Tucker to a Web site operator asking to

be given access to pictures of “naked young girls.”

      Before trial, Tucker moved to suppress the evidence taken in the June 11

search of his apartment and the July 28 search of his computer. He argued that

the June 11 search was not supported by reasonable suspicion as required for a

parole search. He also argued that the parole search was not conducted to further

the purposes of the parole system but was a subterfuge for a law enforcement

investigatory search. The district court rejected both arguments. Relying on Utah

law, the district court concluded the parole officers had reasonable suspicion. It

reasoned that anonymous informants may provide a basis for reasonable



order to enlarge the image, the larger image is also cached. The Web browser
automatically caches such images; no act is required of the user. The purpose of
caching is to allow already-visited pages to forego the necessity of loading
pictures and thus allow visits to these pages to be processed much faster.
      8
        The recycle bin is a location on the computer in which a user places files
to be deleted.

                                         -7-
suspicion, the level of detail in Groneman’s tip was high, and Groneman’s tip was

corroborated by the officers’ investigatory work which revealed that Tucker had

been convicted of a crime similar to the one alleged in the tip. The district court

also concluded the parole search advanced a parole purpose because the tip

contained information indicating that Tucker had violated the terms of his parole.

      The district court also rejected Tucker’s argument that his parole agreement

did not authorize seizure of his computer. The district court acknowledged that

the parole agreement did not mention seizures but concluded that “seizure of

contraband or evidence garnered from a valid parole search is clearly implicit in

any parole agreement.” Tucker’s final Fourth Amendment argument was that the

July 28 forensic examination of his computer was not a valid parole search

because Tucker was already in custody and the search could not therefore have

any parole purpose. The district court rejected the argument, reasoning that

Tucker’s parole was not yet revoked when Hooper conducted the forensic

examination and the officers “had an incentive to compile evidence that he had

violated his parole for use at the [revocation] hearing.”

      After a bench trial, the district court found the defendant guilty. See

United States v. Tucker, 150 F. Supp. 2d 1263, 1270 (D. Utah 2001). It found

that Tucker visited Web sites that displayed child pornography as thumbnail

images. See id. at 1265. Tucker would often select thumbnail images to enlarge


                                         -8-
them. See id. The district court found that upon visiting a site displaying

thumbnail images or upon selecting a thumbnail for enlargement, the images were

automatically cached on Tucker’s hard drive. See id. The district court found

that Tucker had admitted that he routinely accessed the cached images on his hard

drive and deleted them after an Internet session. See id.

      The district court concluded that Tucker possessed child pornography under

the meaning of 18 U.S.C. § 2252A(a)(5)(B) because he had control over the

images cached on his hard drive. See id. at 1267. The court reasoned that

Tucker’s habit of manually deleting images from the cache files established that

he exercised control over them. See id. The district court also rejected Tucker’s

argument that since the Web browsers automatically cached image files without

his input, he did not voluntarily possess the images. The district court reasoned

that Tucker visited Web sites for the purpose of viewing child pornography, and

that “[t]he images would not have been saved to his cache file had Tucker not

volitionally reached out for them.” Id. at 1268. Finally, the district court

concluded that Tucker’s possession was knowing, since he purposefully visited

Web sites containing child pornography knowing that the images would be stored

on his computer’s hard drive. See id. at 1269.




                                         -9-
III. FOURTH AMENDMENT CHALLENGES

      Tucker appeals the denial of his suppression motion. We view the evidence

in the light most favorable to the government and review the district court’s

factual findings for clear error. See United States v. Lewis, 71 F.3d 358, 360

(10th Cir. 1995). “We review the district court’s ultimate determination of

reasonableness under the Fourth Amendment de novo.” Id.

A. Search of Tucker’s Home

      Generally, the Fourth Amendment prohibits a search of a residence unless it

is pursuant to a search warrant supported by probable cause. See id. at 361.

Parole searches pursuant to a valid parole agreement are different, however. A

parole agreement containing a provision allowing the search of a parolee’s

residence diminishes the parolee’s reasonable expectation of privacy in his

residence. See United States v. Knights, 122 S.Ct. 587, 591-92 (2001). 9

Moreover, the state has a heightened interest in monitoring the behavior of a

parolee, because, a parolee is more likely to violate the law than an ordinary

citizen. See id. at 592. “[T]hese considerations require no more than reasonable

suspicion to conduct a search” of a parolee’s home when the parolee is subject to


      9
        Knights involved the search of a probationer’s home. See United States v.
Knights, 122 S. Ct. 587, 589 (2001). We have, however, previously treated
parolees and probationers identically for Fourth Amendment purposes. See, e.g.,
United States v. Lewis, 71 F.3d 358, 361 (10th Cir. 1995) (applying probationer
precedent in a case involving a parolee).

                                        -10-
a search condition in his parole agreement. Id. For the same reasons, a warrant is

not required in a parole search. See id. at 593.

      Tucker contends that all evidence should be suppressed because the June

11th entry into his home was an invalid parole search. In particular, he argues

that the search was not supported by reasonable suspicion and that the purpose of

the parole search was not to further the goals of the parole system but rather to

uncover evidence of new crimes.

      1. The Purpose of the Search

      Tucker contends that parole searches are reasonable under the Fourth

Amendment when they are carried out pursuant to state law that itself complies

with the Fourth Amendment. Tucker acknowledges that this court has previously

determined that the Utah law governing parole searches complies with the Fourth

Amendment. See Lewis, 71 F.3d at 362. He argues, however, that the search of

his residence did not comply with Utah law, which requires that the parole search

be “reasonably related to the parole agent’s duty.” State v. Johnson, 748 P.2d

1069, 1072-73 (Utah 1987). This requirement, Tucker contends, was violated

because the parole search did not relate to the agents’ duty of monitoring

Tucker’s compliance with his parole conditions but rather was a subterfuge for a

criminal investigation.




                                         -11-
      Tucker is correct that a parole search may be upheld if it is conducted

pursuant to a state parole/probation system that itself complies with the Fourth

Amendment. See Griffin v. Wisconsin, 483 U.S. 868, 873 (1987). Thus, the

search of Tucker’s home would be valid if it complied with the Utah requirement

that, among other things, the search be conducted for parole purposes. That,

however, is not the exclusive avenue by which the search may be deemed

reasonable under the Fourth Amendment. A unanimous Supreme Court made

clear in Knights that a parole search is also valid if reasonable under general

Fourth Amendment principles. See Knights, 122 S. Ct. at 590, 593. In Knights,

the Supreme Court, applying general principles, reversed the lower courts’

determination that a search of a probationer’s home by a police officer for purely

investigatory purposes was unreasonable under the Fourth Amendment. See id. at

593. Because probationers subject to a search provision in their probation

agreement have a diminished expectation of privacy, and because the state has a

greater interest in ensuring probationers do not violate the law, the Court

concluded that a probation search was permissible so long as supported by

reasonable suspicion, regardless of the motivation for the search. See id. at 591-

93.

      Tucker’s parole agreement contained a search provision authorizing

officers to search his home for a violation of any parole condition. One of those


                                         -12-
parole conditions was that he comply with all federal, state, and municipal laws.

This case is thus materially indistinguishable from Knights in which the

probationer’s probation agreement authorized searches for any law enforcement

purposes. See Knights, 122 S.Ct. at 590. Therefore, even assuming that the

search was a subterfuge for a law enforcement investigation, it was permissible

under general Fourth Amendment principles if the officers had reasonable

suspicion that contraband was located at Tucker’s residence or that a crime had

taken place. As in Knights, the officers’ motivation is irrelevant.

      2. Reasonable Suspicion

      “Reasonable suspicion is a less demanding standard than probable cause.”

United States v. Treto-Haro, 287 F.3d 1000, 1004 (10th Cir. 2002) (quotation

omitted). While probable cause means “a fair probability that contraband or

evidence of a crime will be found,” reasonable suspicion is merely a

particularized and objective basis for suspecting criminal activity. United States

v. Sokolow, 490 U.S. 1, 7 (1989) (quotation omitted); Treto-Haro, 287 F.3d at

1004. To determine whether the investigating officers had reasonable suspicion, 10


      10
         The district court referenced Utah’s definition of reasonable suspicion in
analyzing the reasonableness of the parole search. A state’s definition of
reasonable suspicion should be consulted in determining whether a parole search
is reasonable when the government seeks to justify the search based on the
“special needs” exception, i.e., that the search was conducted pursuant to a state
parole system which complies with the Fourth Amendment. See Lewis, 71 F.3d at
362. Because we are applying general Fourth Amendment principles and not the

                                         -13-
we consider both the quantity of information possessed by law enforcement and

its reliability. See Alabama v. White, 496 U.S. 325, 330 (1990). Both factors

must be viewed under the totality of the circumstances. See id. When the

officers’ information comes from an informant, reliability may be assessed by

viewing “the credibility or veracity of the informant, the basis of the informant’s

knowledge, and the extent to which the police are able independently to verify the

reliability of the tip.” United States v. Leos-Quijada, 107 F.3d 786, 792 (10th

Cir. 1997). Reasonable suspicion may exist, however, on information less

reliable than that needed to establish probable cause. See Treto-Haro, 287 F.3d at

1004.

        Tucker contends that something more than an anonymous tip of illegal

activity is required to provide reasonable suspicion. Tucker’s general proposition

is correct. See Florida v. J.L., 529 U.S. 266, 270 (2000); White, 496 U.S. at 329.

Groneman was not an anonymous informant, however. While her sources

remained anonymous, Groneman was known and could be “held responsible if her

allegations turn[ed] out to be fabricated.” J.L., 529 U.S. at 270. Such citizen-

informants are presumed to be reliable. See J.B. v. Washington County, 127 F.3d

919, 930 (10th Cir. 1997). Moreover, friend 2 was not completely anonymous.

Groneman confided in Atack that friend 2 was a co-worker of Tucker’s.



special needs exception, we look to the federal standard of reasonable suspicion.

                                         -14-
      Additionally, there was information contained in the tip about the basis of

Groneman’s knowledge. Groneman explained that she had been told by friend 1

that friend 2, a co-worker of Groneman’s at Reclamation, had visited Tucker’s

house for lunch during a break from a training session or seminar and saw child

pornography on his computer. 11 Moreover, the tip was detailed and related the

circumstances under which friend 2 was in Tucker’s apartment, that Tucker

possessed a computer containing child pornography, and Tucker’s statements

regarding his attraction to young girls. Such detail indicates that friend 2’s

statement, through Groneman, was reliable. Cf. United States v. Tuter, 240 F.3d

1292, 1298 (10th Cir. 2001).

      We conclude the parole search was supported by reasonable suspicion. The

tip was not anonymous, but came from a citizen-informant. Moreover, it

adequately explained the informant’s basis of knowledge and was quite detailed.

While the police did not corroborate predictive details in the tip, reasonable

suspicion may be founded on less reliable information than that required to

establish probable cause. See Treto-Haro, 287 F.3d at 1004. Consequently, the

lack of corroboration is not fatal.




      11
         Groneman’s knowledge was permissibly based on hearsay. See United
States v. Gonzales, 897 F.2d 504, 507 (10th Cir. 1990) (“The informant’s
knowledge may be based on hearsay or even double hearsay.”).

                                        -15-
B. Computer Search and Seizure

      1. Validity of the June 11 Computer Search

      Tucker contends that even if the search of his home were permissible, the

search of his computer was not. He argues that our decision in United States v.

Carey establishes that permission to search a residence does not extend to

permission to search computer files. See 172 F.3d 1268 (10th Cir. 1999).

Therefore, he argues, his parole agreement did not authorize officers to search his

computer. This is a misreading of Carey and Tucker’s parole agreement.

      In Carey, the defendant was suspected of selling illegal drugs. See id. at

1270. After an officer threatened to obtain a search warrant for the defendant’s

house unless he consented to a search, the defendant consented to a search of the

“premises and property” located at a particular address. See id. The searching

officers found two computers they believed contained evidence of drug dealing

and seized them. See id. The police obtained a warrant to search the computers

for evidence of distribution of drugs. See id. at 1271. While searching the

computers, however, the officers found child pornography. See id. at 1270. This

court held that the search could not be justified by the defendant’s consent to

search his house. See id. at 1274. 12 As emphasized by the concurrence, our



      12
        We also held that the search of the computers exceeded the scope of the
warrant. See United States v. Carey, 172 F.3d 1268, 1272-76 (10th Cir. 1999).

                                        -16-
conclusion depended on the specific facts of the case, including the language of

the consent agreement and the discussions held between the defendant and police

officers. See id. at 1276 (“[W]e are quick to note these results are predicated only

upon the particular facts of this case.” (emphasis added)); id. at 1276-77

(Baldock, J., concurring). After examining the relevant facts, which indicated

that the defendant and the officer seeking consent were discussing a search for

drugs, we concluded that the defendant did not consent to a search of his

computer for child pornography. See id. at 1270, 1274; id. at 1276-77 (Baldock,

J., concurring).

      The search of Tucker’s computer is distinguishable. The terms of his

parole agreement are much broader. The agreement allowed parole officers to

“search my person, residence, vehicle or any other property under my control . . .

to ensure compliance with the conditions of my parole.” (emphasis added). Thus,

by its own terms, the parole agreement authorized a search of any of Tucker’s

property, including the computer. Cf. id. at 1274 (concluding that the consent

agreement “by its own terms” limited the search to a search of Carey’s residence

and excluded his computers). The parole agreement also prohibited Tucker from

possessing or viewing “any material exploiting children or depicting unconsensual

sex acts or acts involving force or violence.” Therefore, unlike the consent

agreement in Carey, which we interpreted as consent to a search for drugs and not


                                        -17-
child pornography, Tucker’s parole agreement expressly allowed parole officers

to search for any evidence that Tucker violated parole conditions by possessing or

viewing child pornography.

      2. Validity of the Seizure

      Tucker also contends that his parole agreement did not authorize the seizure

of his computer at the conclusion of the June 11 search. He argues that his parole

agreement does not mention seizures and cannot therefore authorize seizures. We

need not address Tucker’s argument, however, because the seizure was valid

under the plain-view doctrine.

      Normally, items to be seized pursuant to a warrant search must be

particularly described in the warrant. See United States v. Hargus, 128 F.3d

1358, 1362 (10th Cir. 1997). We assume without deciding that the same rule

applies in the parole search context. One exception to this requirement, however,

is the plain-view doctrine. Under that exception, law enforcement may seize

items not named in the warrant when three conditions are met. See United States

v. Naugle, 997 F.2d 819, 822 (10th Cir. 1993). First, the seizing officer must not

have “violated the Fourth Amendment in arriving at the place from which the

evidence could be plainly viewed.” Id. (quotation omitted). Second, the item

must be in plain view and its incriminating character must be “immediately

apparent.” Id. (quotation omitted). In other words, upon viewing the object, the


                                        -18-
officer must at that moment have probable cause 13 to believe the object to be

contraband or evidence of illegal activity. See id. at 823. Finally, the officer

must have a lawful right of access to the object. See id. at 822.

      The seizure of Tucker’s computer meets these conditions and thus is

justified under the plain-view doctrine. First, the officers had reasonable

suspicion that Tucker possessed child pornography in violation of his parole

agreement and federal law and thus were entitled to search Tucker’s home. See

supra Part III.A. Consequently, they did not violate the Fourth Amendment in

arriving at the place, his home, in which the computer was found in plain view.

Second, before taking control of Tucker’s computer, Detective Gruber noticed it

was connected to the Internet and that Tucker had recently visited a newsgroup

called “alt.sex.preteen.” This information, coupled with Groneman’s tip that

Tucker showed friend 2 child pornography on the computer, was sufficient to

establish probable cause to believe the computer contained child pornography.

See id. at 823 (observing that probable cause exists when the circumstances would

“warrant a man of reasonable caution in the belief that certain items may be


      13
         Officers were entitled to enter Tucker’s home and conduct a search
merely upon reasonable suspicion. Arguably, then, they only needed reasonable
suspicion that any item viewed was contraband or evidence of illegal activity or
parole violations in order to seize it under the plain-view doctrine. We need not
decide, however, whether lesser suspicion is required to justify plain-view
seizures during a parole search because we conclude infra that the officers
possessed probable cause.

                                        -19-
contraband” or evidence of a crime (quotation omitted)). Finally, the parole

agreement gave the officers the right to search any of Tucker’s property,

including the computer, and, thus, the officers had a lawful right of access to the

computer.

      3. Validity of the Forensic Examination

      Tucker’s final Fourth Amendment argument is that the forensic

examination of his computer on July 28, 1998 was unconstitutional. He argues

that the justification for a parole search ended after he was taken into custody,

since the officers no longer needed to monitor his conduct. Therefore, he

maintains, the examination cannot be justified as a parole search. The

government responds that Tucker’s parole was not officially revoked until

February 8, 2000, and that his computer could be searched pursuant to the parole

agreement until that time. We need not address the argument, however, because

officers procured a warrant to search Tucker’s computer. The warrant affidavit

recited Groneman’s tip, the information found in Gruber’s search of the computer

on June 11, Tucker’s statement on June 11 that the computer contained “things

that are going to cause me some problems,” and Tucker’s interview with officers

on June 12 in which he admitted his computer contained around 5,000 images of

child pornography. As such, there was more than enough to establish probable

cause to believe the computer contained child pornography. The warrant was


                                         -20-
valid, 14 and the forensic examination, conducted pursuant to the warrant, was

therefore reasonable under the Fourth Amendment.

IV. KNOWING POSSESSION OF CHILD PORNOGRAPHY

      Tucker contends the evidence that he knowingly possessed child

pornography was insufficient to support his conviction. We review the

sufficiency of the evidence supporting a guilty verdict de novo. See United States

v. Carter, 130 F.3d 1432, 1439 (10th Cir. 1997). We will not disturb the verdict

unless no rational trier of fact could have found the defendant guilty. See id.

This court “must view the evidence and the reasonable inferences to be drawn

therefrom in the light most favorable to the government.” United States v.

Haslip, 160 F.3d 649, 652 (10th Cir. 1998).

      Tucker maintains that he did not possess child pornography but merely

viewed it on his Web browser. 15 He concedes, however, that he knew that when

      14
         Below, Tucker argued that the search warrant was overbroad since it
authorized a general search of the computer. He does not renew the argument on
appeal, and we will not address it.
      15
         Tucker makes a related argument that the images he viewed on his Web
browser were not child pornography under the statute because they were not
“stored” on his computer. 18 U.S.C. § 2252A(a)(5)(B) only criminalizes
possession of “child pornography.” Child pornography is defined in 18 U.S.C.
§2256(8) to be “any visual depiction, including . . . computer or computer-
generated image or picture, . . . of sexually explicit conduct” engaged in by
minors. “Visual depiction” in turn is defined in § 2256(5) to “include[]
undeveloped film and videotape, and data stored on computer disk . . . which is
capable of conversion into a visual image.” (emphasis added). Thus, Tucker
argues the images found on his computer cannot be considered a visual depiction

                                        -21-
he visited a Web page, the images on the Web page would be sent to his browser

cache file and thus saved on his hard drive. Yet, Tucker contends that he did not

desire the images to be saved on his hard drive and deleted the images from his

cache file after each computer session. There is no merit to this argument.

      18 U.S.C. § 2252A(a)(5)(B) provides that any individual who

      knowingly possesses any book, magazine, periodical, film, videotape,
      computer disk, or any other material that contains 3 or more images
      of child pornography that has been . . . transported in interstate . . .
      commerce . . . shall be punished.

The statute does not define possession, but in interpreting the term, we are guided

by its ordinary, everyday meaning. See Johns v. Stewart, 57 F.3d 1544, 1555

(10th Cir. 1995). Possession is defined as “the holding or having something

(material or immaterial) as one’s own, or in one’s control.” Oxford English

Dictionary (2d ed. 1989); see also United States v. Simpson, 94 F.3d 1373, 1380

(10th Cir. 1996) (defining “knowing possession” in drug context as encompassing

situations in which an individual “knowingly hold[s] the power and ability to




because they were not data actually stored on his computer but only temporarily
displayed on his computer monitor. The argument is not convincing. Section
2256 does not require a visual depiction to be stored data. Rather, the definition
merely says that one type of visual depiction is data stored on computer. See id. §
2256(5) (providing that the definition of visual depiction “includes . . . data
stored on a computer disk” (emphasis added)). Even if the definition required
that a visual depiction be data stored on a computer, the images Tucker viewed
were contemporaneously stored on his hard drive when his Web browser saved
the images to a cache file.

                                        -22-
exercise dominion and control” over the narcotics (quotation omitted)). Tucker

contends that because he did not personally save, or “download,” the images to

his hard drive, he had no control over them. We agree with the district court,

however, that Tucker had control over the files present in his Web browser cache

files.

         Customs Agent Daufenbach testified that an individual could access an

image in a cache file, attach it to an email, post it to a newsgroup, place it on a

Web site, or print a hard copy. He stated, “Just like as with any other data file,

you could do almost anything with it.” Agent Hooper similarly testified that an

individual could “view [an image in the cache]. He could rename it. He could

copy it to a floppy disk. He could email it to somebody. He could modify the

file. . . . Anything he could do with any other file he could do with these files.”

This unrebutted testimony conclusively demonstrates Tucker had control over

images stored in his cache and thus possessed them.

         Tucker argues, however, that he did not voluntarily cache the files. Rather,

he maintains, his Web browser “sav[ed] the images against his will.” Tucker

likens his situation to the classic case of Martin v. State, in which the defendant

was charged with appearing drunk in public after involuntarily being carried into

public by the police. See 17 So. 2d 427, 427 (Ala. Ct. App. 1944). The Martin

court held that voluntariness was a necessary element to the crime. See id. The


                                          -23-
analogy is not apt. The defendant in Martin did not drink with the understanding

that he would be taken out in public. Tucker, however, intentionally sought out

and viewed child pornography knowing that the images would be saved on his

computer. Tucker may have wished that his Web browser did not automatically

cache viewed images on his computer’s hard drive, but he concedes he knew the

Web browser was doing so. Tucker continued to view child pornography

knowing that the pornography was being saved, if only temporarily, on his

computer. In such circumstances, his possession was voluntary. Since he knew

his browser cached the image files, each time he intentionally sought out and

viewed child pornography with his Web browser he knowingly acquired and

possessed the images. 16

V. CONCLUSION

      Tucker’s conviction is AFFIRMED. 17

      16
          We offer no opinion on whether the mere viewing of child pornography
on the Internet, absent caching or otherwise saving the image, would meet the
statutory definition of possession. We likewise do not address the question
whether an individual could be found guilty of knowingly possessing child
pornography if he viewed such images over the Internet but was ignorant of the
fact that his Web browser cached such images.
      17
         Tucker contends that a conviction under § 2252A(a)(5)(B) for simply
viewing child pornography runs afoul of the First, Fifth, and Eighth Amendments.
Though not entirely clear from the briefs, Tucker’s contention appears to be an
as-applied challenge to § 2252A(a)(5)(B). Assuming for the sake of argument
that the criminalization of the viewing of child pornography is unconstitutional,
Tucker’s challenge must fail because he was not convicted for simply viewing
child pornography, but for viewing images of child pornography with the

                                        -24-
knowledge that the images were thereby saved on his computer. To the extent
Tucker presents a facial overbreadth challenge, the briefs do not present a legal
argument supported by citation to relevant authority. We will thus not consider
the argument.

                                        -25-