U.S. v. Morgan, 04-5283.

Decision Date26 January 2006
Docket NumberNo. 04-5283.,04-5283.
Citation435 F.3d 660
PartiesUNITED STATES of America, Plaintiff-Appellee, v. Michael Wayne MORGAN, Defendant-Appellant.
CourtU.S. Court of Appeals — Sixth Circuit

James L. Cobb, Jr., Cincinnati, Ohio, for Appellant. Robert K. McBride, Assistant United States Attorney, Covington, Kentucky, for Appellee.

ON BRIEF:

James L. Cobb, Jr., Cincinnati, Ohio, for Appellant. Robert K. McBride, Assistant United States Attorney, Covington, Kentucky, Charles P. Wisdom, Jr., Assistant United States Attorney, Lexington, Kentucky, for Appellee.

Before: MOORE, ROGERS, and McKEAGUE, Circuit Judges.

OPINION

KAREN NELSON MOORE, Circuit Judge.

Defendant Michael Wayne Morgan ("Defendant" or "Morgan") entered a conditional guilty plea to a violation of 18 U.S.C. § 2252A(a)(5)(B), which prohibits possessing images depicting minors engaged in sexually explicit conduct. Morgan appeals the district court's denial of his motion to suppress evidence of child pornography that resulted from a search of a computer in his home because he argues that his wife did not have the requisite authority to consent to the search. Also before us is whether Morgan's sentence violated the Sixth Amendment in light of United States v. Booker, 543 U.S 220, 125 S.Ct. 738, 160 L.Ed.2d 621 (2005). For the reasons set forth below, we AFFIRM the denial of the motion to suppress, but VACATE Morgan's sentence and REMAND for resentencing.

I. BACKGROUND

On November 28, 2001, Cassie Morgan, Defendant's wife, contacted the Boone County Sheriff's Department ("BCSD") and spoke to Captain John Prindle regarding her suspicion that her husband, Defendant Michael Morgan, was viewing child pornography through the internet on a computer in their home. She told Captain Prindle that she had installed "SpectroSpy," a software program known as "spyware" that captures whatever appears on the screen of the computer every ten seconds, without her husband's knowledge. The next day, several BCSD officers responded to a domestic violence call from the Morgan home that resulted from Cassie Morgan confronting Defendant with her knowledge of the child pornography. Cassie Morgan told Detective Victor Lavender, one of the officers who responded to the call, that she had discovered that her husband had been viewing child pornography and that she had captured some of the images through the spyware she installed on the computer. Detective Lavender reviewed a consent to search form with Cassie Morgan; she consented and signed the form.

The computer was located in the basement, a common area of the Morgan residence to which Cassie Morgan had access. Cassie Morgan indicated to Detective Lavender that both she and her husband had access to the computer, and she told Captain Prindle that she occasionally used the computer,1 and that they did not have individual usernames or passwords. Although Cassie Morgan had her own computer for her primary use, she never told the officers about this computer.

Captain Prindle conducted an examination of the computer's hard drive, which revealed large numbers of files containing images of child pornography.2 Defendant downloaded these images from an internet newsgroup and saved them on the computer. Once the files were downloaded, they were not password-protected or encrypted. Although there was no password protection, the Defendant had installed an "Internet Eraser" program by which he intended to delete the images from the computer. The eraser program eliminated much of the evidence of Defendant's viewing of child pornography, but for some unknown reason, the program did not delete the approximately 148 images that Captain Prindle recovered from Defendant's computer.

On April 9, 2003, Defendant was charged with receiving child pornography that had been shipped in interstate commerce in violation of 18 U.S.C. § 2252A(a)(2). The Defendant initially pleaded not guilty. He then moved to suppress the evidence obtained without a search warrant, and his motion was denied. On November 10, 2003, the Defendant entered an oral conditional plea of guilty to possessing images depicting minors engaged in sexually explicit conduct in violation of 18 U.S.C. § 2252A(a)(5)(B), a lesser-included offense of the charged violation. The parties then orally agreed that the Defendant could appeal the district court's denial of his motion to suppress. The district judge informed the Defendant that he should file a written notice of the specific issues he wished to preserve on appeal. On November 17, 2003, the Defendant filed a notice stating that he was preserving for appeal "that his right to privacy while using his computer. . . was violated." Joint Appendix ("J.A.") at 110 (Specification as to Intended Appeal). Defendant filed no subsequent notice regarding other issues for appeal.

On February 27, 2004, the Defendant was sentenced to a twenty-eight-month term of imprisonment. On March 5, 2004, Defendant filed this appeal, and on March 26, 2004, Defendant moved for a stay of execution of his sentence pending this appeal. The district court denied this motion on April 1, 2004.

In this court, the Government filed a motion to stay further proceedings pending issuance of the mandate in United States v. Oliver, 397 F.3d 369 (6th Cir. 2005), as the outcome there would bear on Defendant's sentencing, and for permission to file a supplemental brief. This motion was granted, and on August 22, 2005, the Government filed a letter brief addressing Defendant's sentencing and the related Sixth Amendment issues. Defendant filed no response.

II. MOTION TO SUPPRESS
A. Standard of Review

In reviewing a denial of a motion to suppress, we review the district court's legal conclusions de novo and its findings of fact for clear error. United States v. Harris, 192 F.3d 580, 584 (6th Cir.1999).

B. Third-Party Consent and Apparent Authority

Where valid consent is given, a search is permissible under the Fourth Amendment even without a warrant or probable cause. Schneckloth v. Bustamonte, 412 U.S. 218, 219, 93 S.Ct. 2041, 36 L.Ed.2d 854 (1973). Such consent must be "freely and voluntarily given." Id. at 222, 93 S.Ct. 2041 (quoting Bumper v. North Carolina, 391 U.S. 543, 548, 88 S.Ct. 1788, 20 L.Ed.2d 797 (1968)). Valid consent may be given not only by the defendant but also by "a third party who possessed common authority over or other sufficient relationship to the premises or effects sought to be inspected." United States v. Matlock, 415 U.S. 164, 171, 94 S.Ct. 988, 39 L.Ed.2d 242 (1974).

We have held that even where third-party consent comes from an individual without actual authority over the property searched, there is no Fourth Amendment violation if the police conducted the search in good faith reliance on the third-party's apparent authority to authorize the search through her consent. United States v. Hunyady, 409 F.3d 297, 303 (6th Cir.2005) (citing United States v. Gillis, 358 F.3d 386, 390 (6th Cir.2004)). "Apparent authority is judged by an objective standard. A search consented to by a third party without actual authority over the premises is nonetheless valid if the officers reasonably could conclude from the facts available that the third party had authority to consent to the search." Id. (quoting Gillis, 358 F.3d at 390-91).

In this case, the computer was located in a common area to which Cassie Morgan had complete access, and she indicated to the officers who came to her home that she had access to and used the computer and that she and the Defendant did not have individual usernames or passwords. Cassie Morgan never informed the officers that there was another computer in the home. She also told Detective Lavender that she had installed the spyware software on the computer, which further supported the conclusion that she had access to the computer. Based on these facts, "`the officers reasonably could conclude from the facts available that [Cassie Morgan] had authority to consent to the search,'" see id., and this apparent authority remedies the constitutional error that would otherwise result from a warrantless search.

There is no evidence in the record regarding when during his search of the computer Captain Prindle found the Internet Eraser program. Even assuming that he found the program before he found the pornographic files, this would not undermine our conclusion that apparent authority permits this warrantless search under the Fourth Amendment. When we inquire into whether there was apparent authority to validate third-party consent to a warrantless search, we look at the facts available to the police at the time the search began. See Gillis, 358 F.3d at 391 (explaining that the officers' knowledge "at the time of the search" is the relevant inquiry) (emphasis added); United States v. Hawkins, No. 03-5794, 2005 U.S.App. LEXIS 642, at *7 (6th Cir. Jan. 12, 2005) (stating apparent authority test as "whether the officer reasonably could have concluded, from the facts available at the time, that the third party had authority to consent" (emphasis added)). If apparent authority existed at that time, later-discovered facts that might undermine the initial reasonable conclusion of third-party apparent authority are generally immaterial. Moreover, in this case, Captain Prindle's discovery of the eraser program would not necessarily call into question the conclusion that Cassie Morgan had the requisite authority to consent to the computer's search because at that time Captain Prindle did not know who installed the eraser program or why it was installed. Therefore, the discovery of the eraser program does not vitiate Cassie Morgan's apparent authority.

In arriving at this conclusion, we express no view as to whether Cassie Morgan had actual authority to consent to the search. Because apparent authority supports the constitutionality of the search, we need not consider the question of actual...

To continue reading

Request your trial
41 cases
  • United States v. Halliday
    • United States
    • U.S. Court of Appeals — Seventh Circuit
    • February 14, 2012
    ...the Congressional reports.”). Though not at issue in the case before it, the Sixth Circuit assumed the same. See United States v. Morgan, 435 F.3d 660, 662–63 (6th Cir.2006) (stating that the defendant entered a conditional plea to § 2252A(a)(5)(B), “a lesser-included offense of the charged......
  • Fuji Kogyo Co., Ltd. v. Pacific Bay Intern., Inc., 05-5854.
    • United States
    • U.S. Court of Appeals — Sixth Circuit
    • August 23, 2006
    ...being a byproduct" of that function. Ibid. II We review the legal conclusions of the district court de novo. United States v. Morgan, 435 F.3d 660, 663 (6th Cir.2006) (citing United States v. Harris, 192 F.3d 580, 584 (6th Cir.1999)). In this regard, "a district court's allocation of the bu......
  • U.S. v. Miller
    • United States
    • U.S. Court of Appeals — Third Circuit
    • June 2, 2008
    ...seems, the counts were based on the same acts, entering judgment on both the offenses would be improper." See also United States v. Morgan, 435 F.3d 660, 662-63 (6th Cir.2005) (noting that a defendant charged under § 2252A(a)(2), who pled guilty to violating § 2252A(a)(5)(B), had pled to "a......
  • U.S. v. Irving
    • United States
    • U.S. Court of Appeals — Second Circuit
    • January 28, 2009
    ...an item means to take possession of it, see Miller, 527 F.3d at 71 & n. 15; Davenport, 519 F.3d at 943; see also United States v. Morgan, 435 F.3d 660, 662-63 (6th Cir.2006) (referring briefly in dicta to possession of child pornography as a lesser-included offense of receipt). But see Miss......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT