THOMAS B. McCOUN, III, Magistrate Judge.
THIS CAUSE is before the Court on
A summary of the evidence adduced at the hearing follows.
On July 21, 2012, Officer Matt Steiner, a patrol officer with Largo Police Department (LPD), was dispatched to the Defendant's residence. He arrived around 11:11 a.m. and spoke with Carolyn Olausen f/k/a Carolyn Thomas (herein, Ms. Olausen),
By Steiner's account, he saw only two websites visible on the HP desktop computer, and both contained images of child erotica. He did not see any images of child pornography. Access to the computer did not appear restricted. The officer, who lacked training in child pornography cases, thereafter deferred to other officers who arrived at the scene.
Nathan Dix, a detective with LPD, was off duty on this date but was summoned to the scene by Sergeant Shaw because of his experience in cyber crimes and child pornography cases.
According to Dix, Ms. Olausen stated that she arrived home the evening before, observed her husband get up from the area of the computer desk quickly, and act somewhat nervous. This was unusual. They went to bed. When she awoke the next day, she turned on the monitor, "restored" the browser, and observed eight to ten internet windows displaying child pornography. She described the images as she had to Steiner. She noted that there were two computers in the home office, the HP desktop and a Dell computer. There was also a Toshiba tablet in the office, but Ms. Olausen was unsure whether it even worked.
According to Dix, Ms. Olausen denied doing anything to manipulate the computer or to close out any items, but the officer did not see any evidence of the eight to ten computer pages she claimed to have observed. As a consequence, the detective believes she was either mistaken about what she observed or that she had closed out the tabs herself.
Dix, who was not experienced or trained to search "live memory," left the HP computer to be examined by the Florida Department of Law Enforcement (FDLE). Dix removed the hard drive from the Dell and began a forensic scan of video and image files. See Gov't Exh. 4. When FDLE agent Corey Monaghan arrived, he used a forensic tool to scan the HP computer. While Monaghan was running his scan, the officers had their first encounter with Defendant. Leaving his bedroom, Defendant approached the door to the home office where he was confronted by LPD Officer Jim Shinn. Prior to this, no one had spoken with Defendant. According to Dix, Defendant had been sleeping and no effort was made to wake him. As Defendant approached, he looked into the office area and at the officers. Shinn kept Defendant from entering the office and told Defendant he would explain what was going on in the livingroom. Monaghan followed them into the livingroom. Dix completed his scan of the Dell and began to work on the Toshiba. When Monaghan reentered the home office, he advised that the Defendant had "revoked" his consent to the search. Monaghan directed the searches stop and that the computers would be seized. In Dix's view, there was probable cause to believe there was child pornography on any of the computers. In his experience, child erotica and child pornography were often found together. Absent seizure, he believed there was a risk evidence would be destroyed.
On cross examination, Dix conceded that the officers acted without a search warrant and they made no effort to secure the home so that a search warrant could be obtained. He also conceded that he did not make any effort to obtain consent from the Defendant when he awoke and approached the office area, and that none of the searches at the scene revealed any evidence of child pornography.
Shinn was dispatched to Defendant's residence at about 1:41 p.m. His role was to provide security at the scene. When he entered, he was told Defendant was asleep and he was to alert the officers if Defendant got up. Shinn waited in the kitchen. He did not take any part in the search. Shinn saw Defendant leave his bedroom and approach the home office. Monaghan approached the Defendant and directed him to the living room. When the Defendant continued to walk to the office doorway, Shinn prevented his entry and told him he needed to speak with Monaghan in the living room. When the Defendant and Monaghan proceeded into the living room, the witness returned to the kitchen area. From there, he overheard Monaghan ask the Defendant for consent to search the computers and the Defendant responded, "yes." When Monaghan then asked for written consent, the Defendant asked to speak with his wife. Monaghan suggested he fill out the form and then he would see about Defendant speaking with his wife.
Monaghan, an FDLE agent active in cyber-crime investigations, was previously a detective with the LPD and federal task force agent. On July 21, 2012, he arrived at the Defendant's residence at about 12:55 p.m. He spoke with Dix, learned that Ms. Olausen had consented to a search of the computers and that Defendant was asleep. Monaghan then went to the office and began a search of the HP desktop using the osTriage forensic tool. While he did not find the computer restricted in any way when he arrived, he claimed that he later learned from Ms. Olausen that the computer was password-protected and that she and her husband had the password.
As explained by Monaghan, the osTriage tool is a forensic preview tool for searching live active files and allows the user to scan the computer's registry including internet history, and to scan for images of child pornography or child erotica. The thumb drive device is inserted directly into a computer and collects information which can later be downloaded onto a CD for further investigation. According to the log file created in this scan, the osTriage tool was used on the HP computer between 1:01 p.m. and 1:50 p.m. See Gov't Exh. 7. According to Monaghan, the search was terminated because Defendant withdrew his consent to search. The internet history obtained through this search reflects activity between 8:38 p.m. on July 20th and 11:08 a.m. on July 21, 2012. See Gov't Exh. 8.
While the computer scans were running, Defendant exited the bedroom and approached the office area. Monaghan exited the office and went to the living room and asked Defendant if they could talk there. Monaghan advised Defendant that the wife had called and said she found child pornography on the computer. Defendant denied viewing child pornography although he admitted he viewed adult pornography. Defendant was asked for consent to search the computers and he said "yes."
The information collected by the osTriage device was downloaded to a CD shortly thereafter and reviewed multiple times by Monaghan. Again, he saw no images of child pornography, only websites with names indicative of the same. When he finally reviewed certain websites in August, he found one with an image of child pornography and several others depicting child erotica. The last of the internet history also revealed that Ms. Olausen had "googled" the LPD. He found this contrary to her claim that she had not manipulated the computer in any way. Ms. Olausen later reported that she had called her brother after her discovery and then called LPD.
Monaghan sought to obtain a state-court authorized search warrant for the HP desktop computer. After being told by a state prosecutor that there was insufficient probable cause for such a warrant, he conducted additional investigation of some of the sites listed in the internet history and then made application for a federal search warrant, which was granted. See Gov't Exh. 5.
On cross examination, Monaghan indicated that the internet history reflects that the nnLolys site and the hdschoolteens site were accessed within a matter of seconds of each other on the evening of July 20, 2012. See Def. Exh 5. The internet history does not indicate how long the sites remained open. Monaghan agreed that it did not reflect the links listed on nnLollys were accessed. No officer could corroborate with any particularity from their scans Ms. Olausen's statement that she saw eight to ten web pages displayed on the HD desktop computer when she restored it on July 21, 2012.
Defendant argues that all evidence obtained from the search of the HP computer should be suppressed. Because the initial search of the computer via the osTriage tool and the subsequent seizure of the computer and removal of it from his home were without a warrant or his consent and otherwise unsupported by probable cause, the evidence was obtained in contravention of his Fourth Amendment rights. Thus, he argues that the evidence so obtained could not be used to obtain the search warrant, which, in this case, was unsupported by probable cause.
Here, the following principles guide the decision. "The Fourth Amendment recognizes a valid warrantless entry and search of premises when police obtain the voluntary consent of an occupant who shares, or is reasonably believed to share, authority over the area in common with a co-occupant who later objects to the use of evidence so obtained." Georgia v. Randolph, 547 U.S. 103, 106 (2006) (citing Illinois v. Rodriguez, 497 U.S. 177 (1990); United States v. Matlock, 415 U.S. 164 (1974)). In such circumstances, common Case 8:13-cr-00462-VMC-TBM Document 61 Filed 02/14/14 Page 11 of 16 PageID 424 authority rests on the "mutual use of the property by persons generally having joint access or control for most purposes...." Matlock, 415 U.S. at 171-72, n. 7. However, "a warrantless search of a shared dwelling for evidence over the express refusal of consent by a physically present resident cannot be justified as reasonable as to him on the basis of consent given to the police by another resident." Randolph, 547 U.S. at 120. It is axiomatic that a warrant not issue in the absence of probable cause. U.S. Const. Amend IV. Probable cause is a fluid concept involving an assessment of the totality of circumstances and an assessment of the probabilities in particular factual contexts. Illinois v. Gates, 462 U.S. 213, 232 (1983). "The task of the issuing magistrate is simply to make a practical, common-sense decision whether, given all the circumstances set forth in the affidavit before him, . . ., there is a fair probability that contraband or evidence of a crime will be found in a particular place." Id. at 238.
I find no Fourth Amendment violation in connection with the LPD's warrantless entry and initial search of the computers as above described. Such was justified based on the voluntary verbal and written consent given by Ms. Olausen to both search and seize items from the home. On this record, she shared authority and access over the home, the home-office area, and the computers found therein. Even if such were not the case, LPD officers could have reasonably and in good faith concluded that she had such shared authority and access in the circumstances presented them. See Illinois, 497 U.S. at 188-89. I also conclude that the search and seizure of data from the HP computer prior to Defendant refusing to sign a written consent form was done consistent with the Fourth Amendment as well. On the evidence presented, Defendant verbally consented to the search of the computers when first asked but shortly thereafter balked at signing a written consent to search form. By the time Monaghan concluded that he no longer had Defendant's consent, the HP computer had been scanned and information had been downloaded for nearly 50 minutes. Defendant's revocation of consent does not require the suppression of evidence already lawfully obtained. See United States v. Megahed, No. 8:07-cr-342-T-26MAP, 2009 WL 722481, at *3 (M.D. Fla. Mar. 18, 2009) (citing United States v. Ponder, 444 F.2d 816, 818 (5th Cir. 1971); Mason v. Pulliam, 557 F.2d 426, 429 (5th Cir. 1977); United States v. Ward, 576 F.2d 243, 244-45 (9th Cir. 1978)).
Given the conclusion that the initial search of the HP computer was supported by valid consent, it follows that Monaghan was free to copy the data obtained by use of the osTriage onto a CD for further review without the necessity of obtaining a warrant to Case 8:13-cr-00462-VMC-TBM Document 61 Filed 02/14/14 Page 13 of 16 PageID 426 authorize such. As urged by the government, a valid consent to search carries with it the right to examine and photocopy. See Ponder, 444 F.2d at 818 (citations omitted). Thus, I find no Fourth Amendment violation in Monaghan's subsequent review of the internet history or in his follow-up investigation examining certain of the suspicious URLs revealed by that history. Stated otherwise, neither the information obtained by the osTriage device nor the information developed from review of that information was the fruit of the poisonous tree. Monaghan was free to use that information in support of his probable cause application submitted to the magistrate judge.
The seizure of the HP computer and its removal from the home is slightly more problematic. Ultimately, however, even if it were improper, a finding I do not make here, the seizure itself is of little consequence given that the computer was not searched again until after a search warrant was obtained.
As here established, the LPD officers did not have a warrant or Defendant's consent to remove the computers from his residence. By Defendant's argument, they did not have probable cause to believe that images of child pornography would be found on any of the computers. Nor were there exigent circumstances warranting the removal of the computers from the home where, as here, they could have secured the computers at the residence and sought a search warrant. Thus, Defendant contends that LPD was without any lawful basis to seize the computers. On the other hand, the government justifies the seizure by urging that the officers had probable cause to believe there were images of child pornography on the computers and seizure was necessary to avoid the destruction of evidence that likely would Case 8:13-cr-00462-VMC-TBM Document 61 Filed 02/14/14 Page 14 of 16 PageID 427 have occurred had they been left at the scene.
I find that the totality of information and circumstances known to Monaghan at the time he seized the HP computer was sufficient to lead a reasonable officer to conclude that evidence of child pornography would likely be found on the HP computer.
Similarly, I conclude that the circumstances presented also support that Monaghan's Case 8:13-cr-00462-VMC-TBM Document 61 Filed 02/14/14 Page 15 of 16 PageID 428 belief that evidence would be lost or destroyed should they leave the HP computer at the scene while a search warrant was pursued was also reasonable. Recognized situations in which exigent circumstances exist include the risk of loss, destruction, removal or concealment of evidence. United States v. Santa, 236 F.3d 662, 669 (11th Cir. 2000) (citing United States v. Blasco, 702 F.2d 1315, 1325 (11th Cir. 1983)). "The test of whether exigent circumstances exist is an objective one. `[T]he appropriate inquiry is whether the facts . . . would lead a reasonable, experienced [officer] to believe that the evidence might be destroyed before a warrant could be secured.'" Santa, 236 F.3d at 669 (quotation and citation omitted). Here, given the portable nature of the computer and its contents, and recognizing that Defendant was fully aware of the police presence and the nature of their investigation, I find it reasonable that the officers were concerned with the possible loss or destruction of evidence and justified in the seizure of the HP computer and its removal to the LPD for safe-keeping pending their obtaining a warrant.
Finally, I find no merit in Defendant's contention that the search warrant authorizing the search of the HP computer was unsupported by probable cause. By any fair reading, the facts set forth in the affidavit in support of the warrant are more than adequate to support the conclusion that images of child pornography would be found upon a search of the HP computer.
Accordingly, for the foregoing reasons, I RECOMMEND that the