USA v. Walser, 01-8019

Citation275 F.3d 981
Decision Date28 December 2001
Docket NumberNo. 01-8019,01-8019
Parties(10th Cir. 2001) UNITED STATES OF AMERICA, Plaintiff-Appellee, v. RUSSELL LANE WALSER, Defendant-Appellant
CourtUnited States Courts of Appeals. United States Court of Appeals (10th Circuit)

Appeal from the United States District Court for the District of Wyoming (D.C. No. 00-CR-142-J) [Copyrighted Material Omitted] Michael G. Katz, Federal Public Defender, and Jenine Jensen, Assistant Federal Public Defender, Denver, Colorado, for Defendant-Appellant.

John R. Green, Interim United States Attorney, and David A. Kubichek, Assistant United States Attorney, District of Wyoming, Casper, Wyoming, for Plaintiff-Appellee.

Before SEYMOUR and HOLLOWAY, Circuit Judges, and VAN BEBBER,* Senior District Judge.

SEYMOUR, Circuit Judge.

Russell Lane Walser appeals the district court's denial of his motion to suppress evidence garnered in two searches of his personal computer. He also appeals the district court's imposition of a special condition of supervised release that prohibits him from using the Internet without prior permission from the United States Probation Office. For the reasons set out below, we affirm.

I

Viewing the evidence in the light most favorable to the government, as we must, see United States v. Simpson, 152 F.3d 1241, 1246 (10th Cir. 1998), the record reflects the following. On June 1, 2000, the manager of the Radisson Hotel in Casper, Wyoming, went to Room 617 to check on a smoke alarm sounding there. The room was unoccupied. In the course of shutting off the alarm, the manager noticed two small plastic bags containing what he believed to be cocaine and marijuana. He contacted the local police, who arrived on the scene and secured the room without entering it. The police ascertained that Mr. Walser, who was accompanied by Debbie Wilcox, had rented the room earlier that day. The police found Mr. Walser and Ms. Wilcox in the hotel parking lot, sitting in Mr. Walser's car. They spoke with Mr. Walser who, during that conversation, told them he had brought a computer with him and set it up in the room.1

Based on the information gleaned from the hotel manager, the police investigation, and the conversation with Mr. Walser, police sought and obtained a search warrant covering Room 617 and Mr. Walser's car. The warrant granted permission to search for:

Controlled substances, evidence of the possession of controlled substances which may include, but not be limited to, cash or proceeds from the sales of controlled substances, items, substances, and other paraphernalia designed or used in the weighing, cutting, and packaging of controlled substances, firearms, records, and/or receipts, written or electronically stored, income tax records, checking and savings records, records that show or tend to show ownership or control of the premises and other property used to facilitate the distribution and delivery [of] controlled substances.

App. vol. I, Exh. B.

Armed with the warrant, Special Agent Steve McFarland of the Wyoming Division of Criminal Investigation (DCI) and local police entered Mr. Walser's room to conduct the search. While there they found, among other things, plastic bags containing what was believed to be marijuana, drug paraphernalia (including a glass tube, a butane torch, a roach clip, and syringes), a digital scale, a computer, and a digital camera attached to the computer. The computer was on when the police first entered the room and the computer's "wallpaper" showed an image of Ms. Wilcox that appeared to have been taken in Room 617.2

Special Agent McFarland sat down at the computer and did a cursory search of the hard drive. Based on his experience and a 40-hour "Cybercop" course he had completed, he had reason to believe there might be ledgers of drug transactions or images of drug use (taken with the digital camera attached to the computer) saved on the computer's hard drive. He began his search in the "My Documents" folder and opened approximately ten JPEG files.3 These files contained images of adult pornography. Agent McFarland shut down the computer and seized it in anticipation of conducting a more thorough search at the DCI office.

Five days later, on June 6, Agent McFarland resumed his search of the computer at the Casper DCI office. In conducting the search, Agent McFarland followed a specific methodology. He first checked the "Recycle Bin" and found no relevant files.4 He next used the "Windows Explorer" search mechanism to search the computer's hard drive. Through this technique, he opened the "Program Files" folder. Agent McFarland testified that based on his training and personal experience, most of the files containing evidence of drug transactions (i.e. address books, spreadsheets, databases) would be found there. He looked for and located a sub-folder containing Microsoft Works, a spreadsheet program. That folder contained approximately ninety files and four sub-folders. Agent McFarland opened the second file from the top, named "bstfit.avi."5 When he did so, the "Compupic" program started-up and a "thumbnail" image of the file appeared on the left side of the Explorer window.6 Looking at the thumbnail, Agent McFarland saw images of girls engaged in sexual acts with men. Believing this to be child pornography, he enlarged the thumbnail and confirmed his belief.

Agent McFarland immediately ceased his search of the computer hard drive and contacted another agent in the DCI who had greater experience in computer forensics and child pornography. That agent told Agent McFarland to shut down the computer and submit an affidavit for a new search warrant specifically authorizing a search for evidence of possession of child pornography. Agent McFarland did so and obtained the warrant under which he conducted the search that produced the evidence in the present case.

Following a hearing at which the district court denied Mr. Walser's motion to suppress the evidence discovered in the searches of his computer, Mr. Walser pled guilty to one count of possession of child pornography and the court sentenced him to twenty-seven months imprisonment and three years supervised release. As a condition of that release, the district court required that Mr. Walser not have access to the Internet without prior permission of the probation office.

II

Mr. Walser first maintains that DCI Special Agent McFarland lacked probable cause to seize the computer from the hotel room at the time of the original search. Mr. Walser acknowledges that he made no specific objection on this basis to the district court. We review issues not raised below for plain error. Fed. R. Crim. P. 52(b). To notice plain error under Rule 52(b), the error must:

(1) be an actual error that was forfeited; (2) be plain or obvious; and (3) affect substantial rights, in other words, in most cases the error must be prejudicial, i.e., it must have affected the outcome of the trial . . . . Given plain error that affects substantial rights, an appellate court should exercise its discretion and notice such error where it either (a) results in the conviction of one actually innocent, or (b) seriously affect[s] the fairness, integrity or public reputation of judicial proceedings.

United States v. Keeling, 235 F.3d 533, 538 (10th Cir. 2000) (internal citation and quotation omitted). We apply the plain error rule less rigidly when reviewing a potential constitutional error. United States v. Jefferson, 925 F.2d 1242, 1254 (10th Cir. 1991).

This court and other circuits have approved the seizure and storage of property when the facts of the case supported a finding that exigent circumstances existed. In United States v. Hargus, 128 F.3d 1358, 1363 (10th Cir. 1997), we held that the seizure of an entire file cabinet was acceptable when such seizure was motivated by the impracticability of on-site sorting, among other factors. See also United States v. Henson, 848 F.2d 1374, 1383-84 (6th Cir. 1988); United States v. Tamura, 694 F.2d 591, 597 (9th Cir. 1982). The other concern relative to conducting such computer searches lies in the fact that computer evidence is vulnerable to tampering or destruction. See United States v. Campos, 221 F.3d 1143, 1147 (10th Cir. 2000) (quoting affidavit of FBI agent).

In the case before us, the size of the computer's hard drive over 22 Gigabytes combined with the importance that the search take place in a controlled laboratory setting, where proper forensic expertise and equipment would be available, provided sufficient exigency to support the district court's decision when analyzed under the plain error standard. We therefore hold that the district court's failure to sua sponte grant Mr. Walser's motion to suppress on grounds that the seizure of his computer lacked probable cause does not rise to the level of plain error.

Mr. Walser also argues that in opening an AVI file while conducting a search for records of drug transactions, Agent McFarland exceeded the scope of the warrant. For that reason, Mr. Walser contends the district court erred when it denied his motion to suppress evidence of the June 6 search of his computer. We review the denial of a motion to suppress for clear error. See United States v. Griffin, 7 F.3d 1512, 1516 (10th Cir. 1993). Reasonableness of a search is reviewed de novo. See United States v. Eylicio-Montoya, 18 F.3d 845, 848 (10th Cir. 1994).

In United States v. Carey, 172 F.3d 1268, 1275 n.7 (10th Cir. 1999), this court recognized the particular Fourth Amendment issues surrounding the search and seizure of computer equipment. See also Campos, 221 F.3d at 1148. The advent of the electronic age and, as we see in this case, the development of desktop computers that are able to hold the equivalent of a library's worth of information, go beyond the established categories of constitutional doctrine. Analogies to other physical objects, such as dressers or file cabinets, do not often inform the situations we now face as judges when applying search and...

To continue reading

Request your trial
101 cases
  • Commonwealth v. Henley
    • United States
    • United States State Supreme Judicial Court of Massachusetts
    • August 5, 2021
    ...avoids searching files of types not identified in the warrant," Dorelas, 473 Mass. at 502, 43 N.E.3d 306, quoting United States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001), cert. denied, 535 U.S. 1069, 122 S.Ct. 1943, 152 L.Ed.2d 847 (2002), requires some clarification. Although general o......
  • U.S. v. Kimler, No. 02-3097.
    • United States
    • United States Courts of Appeals. United States Court of Appeals (10th Circuit)
    • July 7, 2003
    ...the collection of DNA samples discretionary and thus subject to the conditions set out in USSG § 5D1.3(b). See United States v. Walser, 275 F.3d 981, 987-88 (10th Cir.2001), cert. denied, 535 U.S. 1069, 122 S.Ct. 1943, 152 L.Ed.2d 847 However, since statutes trump guidelines when the two co......
  • United States v. Alabi
    • United States
    • U.S. District Court — District of New Mexico
    • April 30, 2013
    ...the Fourth Amendment.” MTS Reply at 5–6 (citing United States v. Carey, 172 F.3d 1268, 1275 (10th Cir.1999); United States v. Walser, 275 F.3d 981, 986 (10th Cir.2001)). Oguntoyinbo argues that Kyllo v. United States, rather than supporting a finding that there was not an unreasonable searc......
  • Reid v. Pautler
    • United States
    • U.S. District Court — District of New Mexico
    • July 31, 2014
    ......Ordering a probationer to submit to drug tests as a probation condition is within a judge's judicial purview. See United States v. Walser, 275 F.3d 981, 987 (10th Cir.2001) ( “Courts are given broad discretion in the imposition of conditions of supervised release”). Further, Judge ......
  • Request a trial to view additional results
8 books & journal articles
  • When Rummaging Goes Digital: Fourth Amendment Particularity and Stored E-mail Surveillance
    • United States
    • University of Nebraska - Lincoln Nebraska Law Review No. 90, 2021
    • Invalid date
    ...to seize, and because it referred to a statute rather than particular criminal activities themselves). 233. See United States v. Walser, 275 F.3d 981, 986 (10th Cir. 234. 547 U.S. 90 (2006). 235. Id. at 97. 236. Id. 237. Id. 238. See id.; see also Paul Ohm, Response, Massive Hard Drives, Ge......
  • The Fourth Amendment and Computers
    • United States
    • State Bar of Georgia Georgia Bar Journal No. 14-5, February 2009
    • Invalid date
    ...537 U.S. 802 (2002). [31] 275 F.3d at 463. [32] 172 F.3d 1268 (10th Cir. 1999). [33] Id. at 1274; see also United States v. Walser, 275 F.3d 981, 985 (10th Cir. 2001) (after discovering child pornography on computer being searched for other reasons, police sought and obtained new search war......
  • A. James Spung, from Backpacks to Blackberries: (re)examining New Jersey v. T.l.o. in the Age of the Cell Phone
    • United States
    • Emory University School of Law Emory Law Journal No. 61-1, 2011
    • Invalid date
    ...authorities] execute a search for evidence on a computer.”177 ThisSee discussion supra Part III.A.1.United States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001); accord Leary, supra note 126, at 1085–86 (noting that physical objects necessarily limit the scope of an invasion—as in T.L.O. and......
  • Sentencing Court Discretion and the Confused Ban on Internet Bans
    • United States
    • University of Washington School of Law Journal of Law, Technology & Arts No. 9-4, June 2014
    • Invalid date
    ...v. Wiedower, 634 F.3d 490, 492 (8th Cir. 2011); United States v. Rearden, 349 F.3d 608, 620 (9th Cir. 2003); United States v. Walser, 275 F.3d 981, 987 (10th Cir. 5. See generally United States v. Miller, 665 F.3d 114, 126-27 (5th Cir. 2011) (interpreting 18 U.S.C. § 3853 (2008)). 6. See, e......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT