THOMPSON, Circuit Judge.
After a district judge denied Gary Farlow's motion to suppress the fruits of an allegedly illegal search of his home computer, Farlow pled guilty to one count of Unlawful Transportation of Child Pornography, 18 U.S.C. § 2252A(a)(1). His guilty plea was conditioned on his ability to bring this appeal broadly challenging the denial of his motion to suppress. Farlow's appeal raises some interesting arguments, but in the end they cannot carry the day: for the reasons that follow, we affirm the denial of his motion to suppress, and his conviction therefore stands.
From February through April 2007, a person using the AOL screen name "FarlowMeCasa" contacted a putative 14-year-old AOL user who was actually Detective Peter Badalucco, a member of New York's Nassau County Police Department. FarlowMeCasa sent several explicit messages to Badalucco, including proposals to meet in person for sex; Badalucco believed these messages constituted the crimes of disseminating indecent materials to minors in the first degree (N.Y. Penal Law § 235.22) and endangering the welfare of a child (N.Y. Penal Law § 260.10). Also, on March 8 FarlowMeCasa sent Badalucco an image of a bodybuilder, saying it was an image of himself; this act, though apparently not criminal, will be relevant later.
While FarlowMeCasa was sending these messages, Badalucco was looking into the person behind the screen name. He subpoenaed AOL for FarlowMeCasa's subscriber information, and AOL informed him that the account belonged to Gary Farlow of Litchfield, Maine. On April 13, Badalucco contacted Maine-based Detective Laurie Northrup to obtain and execute a search warrant of Farlow's residence. Northrup determined that a Gary Farlow, born in 1945, indeed resided in Litchfield, Maine. She also determined that Farlow had been convicted of public lewdness in 1974, disorderly conduct in 1997 (a crime that had originally been charged as indecent conduct), and indecent conduct in 2002.
Based on Farlow's criminal history and his alleged attempts to solicit sex from Badalucco (who, again, had presented himself as a 14-year-old), Northrup prepared an application for a search warrant. A Maine state judge signed off on the warrant, authorizing police to search Farlow's home for the following:
The warrant specified that "all of" this material "constitute[s] evidence of the" New-York-state crimes noted above.
On April 23, 2007, the Maine State Police executed the search warrant, appearing at Farlow's home while he was chatting online with Badalucco. The police seized Farlow's computer and "other electronic equipment." A police search of the computer using a forensic program to open image files in a gallery view
On August 4, 2009, Farlow moved to suppress the fruits of the search authorized by the first warrant (including the second warrant). He argued that the first warrant facially authorized an essentially unfettered search of his computer and therefore failed the Fourth Amendment's probable-cause and particularity requirements. Additionally, he argued, the actual search of his computer could not be saved by various exceptions to the warrant requirement, and even if the warrant had been valid the search had still exceeded the scope of its authorization. Finally, he requested an evidentiary hearing to explore the propriety of the warrant and search. The government responded that the warrant was in fact limited "to computers, computer equipment and computer records or data that are evidence of two specific crimes." Further, the government argued, the search itself "complied, as it must, with the terms of the warrant." In any event, it said, "images of child pornography unavoidably came within [the searching officer's] plain view" during a reasonable search for the bodybuilder image and were therefore exempted from the warrant requirement. And because both the warrant and the search were plainly
A magistrate judge tasked with reviewing Farlow's suppression motion penned a report and recommendation suggesting that the district court deny the motion. The magistrate judge determined that the warrant was founded on probable cause, it was sufficiently particular, it authorized the search as conducted, no hearing was necessary, and suppression was not appropriate. In a separate written opinion dated December 3, 2009, a district judge adopted and affirmed the magistrate judge's recommendation in full.
After several continuances, on November 9, 2010 Farlow entered a guilty plea on one count of the indictment, conditioned on his right to appeal the denial of his suppression motion. Following one more false start (Farlow moved to withdraw his plea; the motion was denied), Farlow was sentenced to ten years in prison followed by supervised release for life.
Farlow now appeals, arguing that we must suppress the evidence of child pornography because: (1) the warrant allowed a search that was overbroad given the narrow scope of the government's probable cause; (2) the computer search unlawfully exceeded even the broad scope of the warrant; (3) the plain-view and good-faith exceptions to the warrant requirement do not apply; and (4) even if we disagree with him on the first three issues, we should nevertheless remand for a hearing on the validity of the warrant and search. The government responds (among other things) that there was probable cause to believe Farlow had committed New-York-state indecency crimes, the warrant was tailored to allow police to search for evidence of those crimes, and the police reasonably executed such a search to produce that evidence given the ease of disguising computer files. In reviewing the denial of Farlow's suppression motion, we apply clear-error review to any factual disputes and consider legal issues de novo, United States v. Materas, 483 F.3d 27, 32 (1st Cir.2007); we review the denial of an evidentiary hearing for abuse of discretion, United States v. Mitchell-Hunter, 663 F.3d 45, 53 (1st Cir.2011).
We begin with Farlow's argument that the first warrant was not supported by probable cause. "Probable cause exists when, given all the circumstances set forth in the affidavit[,] . . . there is a fair probability that contraband or evidence of a crime will be found in a particular place." United States v. Crespo-Ríos, 645 F.3d 37, 42 (1st Cir.2011) (alteration in original) (internal quotation marks omitted). Farlow claims that "the Government had no probable cause to collect any electronic image other than the single nonpornographic image of a bodybuilder." The government responds that Farlow's focus on the bodybuilder image is too myopic: "Farlow's proposal that [Badalucco] meet him in person for sex" and "his prior convictions for . . . deviant behavior" provided probable cause for a much broader search.
We agree with the government: the affidavits submitted in support of the warrant established a fair probability that Farlow's computer and other digital devices held much more evidence than just the bodybuilder image. Most notably, Farlow could have saved transcripts or screenshots of his sexual-solicitation chats with Badalucco, and these could have been stored on any form of digital media—CDs, DVDs, flash drives, disconnected hard drives, and so on. Probable cause therefore supported a warrant authorizing police to search broadly for evidence directly related to Farlow's New York crimes, and the warrant here did just that. For essentially the same reason—the likelihood that
That leaves the question whether the police stayed within the warrant's bounds when executing the search. Farlow says no: the police could (and should) have employed a limited search only for the bodybuilder image, using the image's "hash value"—a sort of digital fingerprint tied not only to a specific file but also to that file's precise location on a computer.
The problem for Farlow is that we have rejected the idea that government agents should so narrowly restrict their searches of digital devices. "When searching digital media for `chats' and other evidence of enticement"—like the bodybuilder image—"government agents cannot simply search certain folders or types of files for keywords." Crespo-Ríos, 645 F.3d at 43 (emphasis added). The same goes for other specific identifying information—like hash values. This is because computer files are highly manipulable. Id. at 43-44. A file can be mislabeled; its extension (a sort of suffix indicating the type of file) can be changed; it can actually be converted to a different filetype (just as a chat transcript can be captured as an image file, so can an image be inserted into a word-processing file and saved as such). See id. Any of these manipulations could change a document's hash value. And in any event a limited hash-value search would not have turned up any chat transcripts (which, again, can be saved as image files) or other evidence of Farlow's New York crimes.
Because the warrant and search were valid here, suppression is not warranted. And because that conclusion renders irrelevant the reason for Farlow's requested evidentiary hearing—to assess the propriety of the police's eschewing a hash-value search—we affirm the district court's denial of such a hearing. United States v. Panitz, 907 F.2d 1267, 1273-74 (1st Cir. 1990) (holding that a district court does not abuse its discretion by denying an evidentiary hearing in a criminal case where no material facts are in dispute).