Colorado v. Swietlicki

Annotate this Case
Justia Opinion Summary

In 2014, a detective from the Douglas County Sheriff's Office (DCSO) responded to a middle school's report that twelve-year-old female student J.M. had posted a picture of herself drinking what appeared to be alcohol. Officials became worried that there was more to the posting, contacted police, and spoke to the student. DCSO was contacted by J.M.'s mother, stating that J.M. wanted to talk to them. J.M. and her mother separately participated in a series of video-recorded interviews. The interviews would reveal that the mother's then-fiancee, defendant-appellee John Swietlicki allegedly had regular sexual encounters, since the child was eight. J.M. J.M. told the detective that Swietlicki sometimes showed her pornography on his computer during these encounters. The mother corroborated various details pertinent to J.M.'s allegations. Swietlicki would ultimately be extradited back to Colorado to stand charges based on J.M.'s allegations. Police seized Swietlicki's laptop without a warrant until a search warrant issued. Once issued, police found that the laptop contained child pornography. Swietlicki moved to suppress all evidence found on the laptop, and the trial court granted the motion, finding that police lacked probable cause to seize the laptop. The State appealed the suppression motion. The Supreme Court reversed the trial court's suppression order, finding that the search was justified under the "plain view" exception to the warrant requirement.

Download PDF
1 2 3 4 5 6 7 8 9 0 1 2 3 4 Opinions of the Colorado Supreme Court are available to the public and can be accessed through the Judicial Branch’s homepage at http://www.courts.state.co.us. Opinions are also posted on the Colorado Bar Association’s homepage at http://www.cobar.org. ADVANCE SHEET HEADNOTE November 23, 2015 2015 CO 67 No. 15SA129, People v. Swietlicki—Warrantless Seizures—Plain View Exception— Fellow Officer Rule. In this interlocutory appeal, the supreme court reverses the trial court’s order 5 suppressing evidence found on defendant John Swietlicki’s laptop computer after 6 police seized the laptop without a warrant. 7 warrantless seizure was justified under the plain view exception to the warrant 8 requirement. 9 apparent” requirement of the plain view exception demands only that the seizing 0 officer have probable cause to associate the item with criminal activity without 1 conducting a further search. The supreme court also determines that the fellow officer 2 rule applies to probable cause determinations in the context of plain view seizures. The supreme court holds that the In so holding, the supreme court clarifies that the “immediately 1 2 3 4 5 The Supreme Court of the State of Colorado 2 East 14th Avenue • Denver, Colorado 80203 6 2015 CO 67 7 8 9 0 Supreme Court Case No. 15SA129 Interlocutory Appeal from the District Court Douglas County District Court Case No. 14CR95 Honorable Richard Caschette, Judge 1 Plaintiff-Appellant: 2 The People of the State of Colorado, 3 v. 4 Defendant-Appellee: 5 John Mikall Paul Swietlicki. 6 7 8 Order Reversed 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 en banc November 23, 2015 Attorneys for Plaintiff-Appellant: George H. Brauchler, District Attorney, Eighteenth Judicial District L. Andrew Cooper, Chief Deputy District Attorney Centennial, Colorado Attorneys for Defendant-Appellee: Douglas K. Wilson, Public Defender Matt Mulch, Deputy Public Defender Castle Rock, Colorado JUSTICE HOOD delivered the Opinion of the Court. ¶1 In this interlocutory appeal, the People challenge the trial court’s order suppressing evidence obtained from defendant Swietlicki’s laptop computer. Police seized the laptop without a warrant and held it until a search warrant issued, at which time they searched the laptop and found child pornography. Because the seizure was justified under the plain view exception to the warrant requirement, we reverse the suppression order. I. Facts and Procedural History ¶2 In January 2014, Detective Weaver of the Douglas County Sheriff’s Office (“DCSO”) responded to a middle school’s report regarding J.M., a twelve-year-old female student. School staff had begun questioning J.M. about a Facebook posting of J.M. drinking what seemed to be an alcoholic beverage. They quickly became worried there was more to the situation and contacted police. Upon his arrival, Detective Weaver spoke to J.M. but elicited no additional information. Later that day, J.M.’s mother called the DCSO to say J.M. wanted to talk. During the next two-and-a-half weeks, J.M. and her mother separately participated in a series of video-recorded interviews. ¶3 J.M.’s interviews with Detective Weaver and a forensic interviewer occurred on January 21 and January 30, 2014, respectively. During these interviews, J.M. said John Swietlicki, her mother’s then-fiancé, had been having regular sexual contact with her since she was approximately eight years old. The contact included vaginal touching, oral sex, and vaginal intercourse. She claimed that the most recent encounters had occurred earlier that month—January 2014—while J.M.’s mother was on a business trip. 2 ¶4 J.M. said Swietlicki sometimes showed her pornography on his computers during these encounters. That pornography depicted “kids.” She described how Swietlicki used a “black and gray flash drive” to transfer pornography from his desktop computer to his laptop. Swietlicki used the laptop so that he and J.M. could view the pornography in locations other than the room off their garage, where Swietlicki kept his desktop computer. ¶5 During Detective Weaver’s interviews with J.M.’s mother, she corroborated various details surrounding J.M.’s allegations. For example, she acknowledged owning, and physically produced, lingerie matching the description of lingerie J.M. said Swietlicki had asked her to wear for him, and she confirmed the occurrence, travel route, and timing of a trip J.M. and Swietlicki took to California, which was one of the specific instances in which J.M. alleged abuse. ¶6 Although Swietlicki went into hiding shortly after the investigation began, he maintained contact with J.M.’s mother via text messages. J.M.’s mother said Swietlicki had asked her to send him photographs of the room off the garage. Swietlicki gave J.M.’s mother the password to his desktop computer located there, but she discovered the computer had been wiped clean. ¶7 She also disclosed that Swietlicki’s only current source of income was unemployment benefits and that his behavior during their five-year relationship suggested he had no other liquid assets to speak of. ¶8 A consent search of the couple’s house revealed Swietlicki’s laptop was missing. 3 ¶9 The district attorney filed sexual assault charges against Swietlicki and the court issued a nationwide warrant for his arrest. In March 2014, Deputy Jorgenson—a DCSO deputy assigned to the U.S. Marshals Task Force in Colorado—asked Deputy Clauss, a U.S. Marshal stationed in Wisconsin, to investigate whether Swietlicki was staying with relatives in Wisconsin. Deputy Clauss conducted surveillance on multiple relatives’ addresses and decided to interview Swietlicki’s cousin, Chad Saegert, first.1 On March 18, 2014, Clauss went to Saegert’s home and spoke with him. ¶10 Saegert said he’d had no contact with Swietlicki for approximately two years. However, after Deputy Clauss explained the charges against Swietlicki and notified Saegert that harboring a fugitive and lying to law enforcement are crimes, Saegert revealed Swietlicki was sleeping in Saegert’s bedroom. Deputy Clauss then arrested Swietlicki and took him to a local jail. ¶11 At Deputy Jorgenson’s request, Clauss returned to Saegert’s home forty-five to ninety minutes later to ask about Swietlicki’s vehicle. Saegert invited Clauss inside the house, where two other relatives were then present. Saegert pointed to a laptop sitting on a table and said the laptop was Swietlicki’s.2 ¶12 Deputy Clauss immediately called Deputy Jorgenson, who in turn contacted Detective Weaver, to ask about the laptop. At Weaver’s behest, Clauss seized the The cousin’s surname is spelled variously throughout record. We use the spelling from Deputy Clauss’s arrest reports. 1 Saegert also pointed out a cellphone, which was seized along with the laptop. The trial court’s suppression order applied to both the laptop and the cellphone, but the People have asked us to review the order with respect to the laptop alone. Accordingly, we do not address the cellphone. 2 4 laptop because of J.M.’s statements concerning child pornography. Weaver and Jorgenson brought Swietlicki and the laptop to Colorado after Swietlicki was cleared for extradition. DCSO later obtained a warrant, searched the laptop, and found child pornography on it. The People brought additional charges against Swietlicki based on this discovery. ¶13 Swietlicki moved to suppress all evidence found on the laptop. The trial court granted the motion, finding that the police lacked probable cause to seize the laptop. The court further found both the plain view and exigent circumstances exceptions to the warrant requirement inapplicable. ¶14 The People appeal under section 16-12-102(1), C.R.S. (2014), and C.A.R. 4.1. II. Standard of Review ¶15 “When reviewing a suppression order, we defer to the trial court’s findings of fact if they are supported by competent evidence in the record.” People v. Sotelo, 2014 CO 74, ¶ 18, 336 P.3d 188, 191. “We review the trial court’s legal conclusions de novo and reverse if the trial court applied an erroneous legal standard or came to a conclusion of constitutional law that is not supported by the factual findings.” Id. III. Analysis ¶16 We begin by discussing the Fourth Amendment as it applies to warrantless seizures of containers. We next analyze the plain view exception to the warrant requirement in this context. We conclude that the warrantless seizure of Swietlicki’s 5 laptop did not violate the Fourth Amendment3 because it was justified under the plain view exception. A. Warrantless Seizures of Containers Under the Fourth Amendment ¶17 The Fourth Amendment to the United States Constitution prohibits “unreasonable searches and seizures” of personal property. U.S. Const. amend. IV. Warrantless seizures of personal property are presumptively unreasonable, and hence invalid, under the Fourth Amendment. Illinois v. McArthur, 531 U.S. 326, 330 (2001); People v. Gothard, 185 P.3d 180, 183 (Colo. 2008). This general rule holds true where the property seized is a closed container the contents of which remain concealed. United States v. Place, 462 U.S. 696, 700–01 (1983); see also Horton v. California, 496 U.S. 128, 133–34 (1990); United States v. Jacobsen, 466 U.S. 109, 113–14 (1984). We have previously characterized computers as containers for purposes of search and seizure law. E.g., People v. Gall, 30 P.3d 145, 153 (Colo. 2001) (finding “container rationale” of prior Fourth Amendment cases “equally applicable to nontraditional, technological ‘containers’” such as the laptop computers at issue there); cf. People v. Herrera, 2015 CO 60, ¶ 31, 357 P.3d 1227, 1232–33 (analogizing a text message folder to a closed The trial court granted Swietlicki’s motion to suppress under both the Fourth Amendment to the United States Constitution and Article II, Section 7, of the Colorado Constitution, and the People couch their argument in terms of both provisions. Although we occasionally have recognized differences in scope between the two provisions, e.g., Eddie’s Leaf Spring Shop & Towing LLC v. Colo. Pub. Utils. Comm’n, 218 P.3d 326, 333–34 (Colo. 2009), they are coextensive for purposes of this case, see id. at 333 (“The Colorado and U.S. Constitutions are generally coextensive with regard to warrantless searches and seizures.”). Thus, for simplicity, we reference only the Fourth Amendment in this opinion; however, our decision applies equally to Article II, Section 7. 3 6 container). However, because the Fourth Amendment demands only reasonableness, the warrant requirement applicable to such container seizures is subject to “certain reasonable exceptions.” See Kentucky v. King, 131 S. Ct. 1849, 1856 (2011). ¶18 The People argue that one such exception—plain view—applies here.4 B. The Plain View Exception Justified Seizing the Laptop ¶19 Under the plain view exception, a warrantless seizure of a container is reasonable for Fourth Amendment purposes if police observed the container in plain view and if the seizure satisfies three requirements: (1) the police were lawfully in the position from which they viewed the container, (2) the incriminating nature of the container was immediately apparent, and (3) the police had a lawful right of access to the container. See Minnesota v. Dickerson, 508 U.S. 366, 375 (1993); People v. Koehn, 178 P.3d 536, 537 (Colo. 2008). ¶20 The trial court found, and Swietlicki concedes, that the first and third requirements were satisfied but decided that the incriminating nature of the laptop was not immediately apparent. We disagree. 1. “Immediately Apparent” Means Probable Cause ¶21 Both Swietlicki and, to a lesser extent, the trial court emphasize the phrase “immediately apparent” in analyzing plain view. Thus, before turning to the merits, we take this opportunity to clarify the “immediately apparent” language first enunciated in Coolidge v. New Hampshire, 403 U.S. 443, 466 (1971) (plurality opinion), and frequently The People also argue that the exigent circumstances exception to the warrant requirement applies in this case. However, because our conclusion with respect to the plain view exception is dispositive, we do not address exigent circumstances. 4 7 reiterated in our plain view cases. A naked reading of this phrase could fairly lead to the conclusion that, for the incriminating nature of an object to be “immediately apparent,” the seizing officer must experience a split-second revelation—a product not of thought but of reflex—in which he knows, at the moment he lays eyes upon the object, that the object is incriminating. But more than three decades of jurisprudence conclusively forecloses such an interpretation. ¶22 Instead, the Supreme Court has long equated this language to probable cause. E.g., Dickerson, 508 U.S. at 375. We have done the same. E.g., Herrera, ¶ 26, 357 P.3d at 1231. More specifically, what has been required is that the seizing officer have “probable cause to associate the item with criminal activity without conducting a further search.” People v. Glick, 250 P.3d 578, 585 (Colo. 2011); accord Dickerson, 508 U.S. at 375; United States v. Gordon, 741 F.3d 64, 71 (10th Cir. 2014). See also 2 Wayne R. LaFave, Search & Seizure: A Treatise on the Fourth Amendment § 4.11(d), at 1028 (5th ed. 2012) (“It must be emphasized that the ‘immediately apparent’ requirement relates only to probable cause, not certainty. That is, if the police are able to establish probable cause that the object is a fruit, instrumentality or evidence of a crime without [searching it], this is all that is required . . . .”). ¶23 In Texas v. Brown, the Court explicitly disapproved contrary interpretations, noting first that “the use of the phrase ‘immediately apparent’ was very likely an unhappy choice of words, since it can be taken to imply that an unduly high degree of certainty as to the incriminatory character of evidence is necessary,” before holding that probable cause is all that the “immediately apparent” prong requires. 460 U.S. 730, 741– 8 42 (1983) (plurality opinion) (citations omitted); id. at 748–50 (Stevens, J., concurring in judgment) (agreeing that probable cause is the applicable standard). ¶24 Even before Brown was announced, this court arrived at the same conclusion, stating that the immediately apparent requirement “clearly implies that justification for the warrantless seizure is nothing more and nothing less than probable cause to believe that the article to be seized is connected with criminal behavior.” People v. Franklin, 640 P.2d 226, 229 (Colo. 1982). Over time, we have retained the “immediately apparent” language and added the interchangeable term “reasonable belief” to the mix. See, e.g., People v. Alameno, 193 P.3d 830, 834 (Colo. 2008) (“[P]olice must have had a reasonable belief that the evidence seized was incriminating. This . . . requirement is met if the incriminating nature was ‘immediately apparent’ to the officer, which means that the officer had probable cause to associate the item with criminal activity without conducting a further search.” (citing People v. Pitts, 13 P.3d 1218, 1222 (Colo. 2000))). Nonetheless, the clear import of our plain view cases is that the “immediately apparent” requirement of the plain view exception means nothing more than the police must possess probable cause without conducting a further search. See, e.g., Herrera, ¶ 26, 357 P.3d at 1231; People v. Brant, 252 P.3d 459, 464 (Colo. 2011); Glick, 250 P.3d at 585; People v. Smith, 13 P.3d 300, 308 (Colo. 2000); People v. Dumas, 955 P.2d 60, 64 n.9 (Colo. 1998). ¶25 In sum, the second prong of the plain view exception requires only that the seizing officer have probable cause to associate the object with criminal activity without 9 conducting a further search. Neither the “immediately apparent” nor “reasonable belief” phrasing carries independent meaning. 2. Deputy Clauss Had Probable Cause to Seize the Laptop ¶26 We now consider whether Deputy Clauss had probable cause in this case. The trial court determined that Deputy Clauss lacked probable cause to seize Swietlicki’s laptop. The People argue the fellow officer rule imputed the police’s collective knowledge to Clauss and that such collective knowledge established probable cause. We agree with the People. a. The Fellow Officer Rule Applied ¶27 “The fellow officer rule provides that a law enforcement officer who does not personally possess a sufficient basis to [take action] nevertheless may do so if (1) he acts at the direction [of] or as a result of communications with another officer, and (2) the police as a whole possess a sufficient basis to [take the action].” People v. Arias, 159 P.3d 134, 139 (Colo. 2007); see also Grassi v. People, 2014 CO 12, ¶ 13, 320 P.3d 332, 336 (“[T]he fellow officer rule operates to impute information that the police possess as a whole to an individual officer.”). The rule “allow[s] law enforcement agencies to work together as a team,” Arias, 159 P.3d at 139, and “reflects the ‘realities of modern police work,’ . . . recognizing that different officers who perform distinct duties are nevertheless working collaboratively in the same case,” Grassi, ¶ 17, 320 P.3d at 337 (quoting People v. Hazelhurst, 662 P.2d 1081, 1087 (Colo. 1983)). When the scope of an investigation expands to include officers not at the scene of an alleged crime, the rule 10 “operates to integrate those outside officers and make them part of the coordinated investigation.” Id. at ¶ 14, 320 P.3d at 336. ¶28 We have applied the fellow officer rule to find probable cause for (1) an arrest, Hazelhurst, 662 P.2d at 1086–87, (2) a search warrant, People v. Reed, 56 P.3d 96, 100 (Colo. 2002), and (3) a blood draw, Grassi, ¶¶ 23–24, 31, 320 P.3d at 338, 340. We see no reason why it should not apply to plain view seizures too. See id. at ¶ 15 n.7, 320 P.3d at 336 n.7 (noting that the fellow officer rule applies equally to arrests and searches “[because] both scenarios require probable cause”); Arias, 159 P.2d at 139 (stating generally that “[t]he fellow officer rule may be used to find . . . probable cause”); see also People v. Jauch, 2013 COA 127, ¶ 36, __ P.3d __ (finding “no principled reason” to exclude plain view seizures from the scope of the fellow officer rule).5 Federal courts have regularly applied the rule, which they call the “collective knowledge” doctrine, to find probable cause for plain view seizures. See, e.g., United States v. Conlan, 786 F.3d 380, 384, 388 & n.17 (5th Cir. 2015) (upholding plain view seizure of laptop and cellphones by an officer lacking probable cause where detective who instructed the officer to seize the laptop and cellphones had probable cause); United States v. Banks, 514 F.3d 769, 776 (8th Cir. 2008) (upholding plain view seizure of defendant’s gun case, based on probable cause to believe the case held a gun and was therefore evidence of the crime of being a felon in possession of a gun, where seizing officers did not know defendant was a felon but another officer with whom the seizing officers were communicating did know defendant was a felon); United States v. Wells, 98 F.3d 808, 810 (4th Cir. 1996) (same, except involving a gun instead of a gun case); United States v. Menon, 24 F.3d 550, 562–63 (3d Cir. 1994) (upholding plain view seizure of documents where seizing officer did not recognize the documents’ evidentiary character but brought them to a different officer in the house who did recognize their evidentiary character); United States v. Rose, 695 F.2d 1356, 1358–59 (10th Cir. 1982) (upholding plain view seizure of barrel ends cut off submachine guns where officer who first discovered them did not know what they were but asked other officers who then recognized them as potential evidence of a crime); Jauch, ¶ 37 (collecting cases). 5 11 ¶29 Turning to the facts of this case, then, the fellow officer rule provided Deputy Clauss with probable cause to seize Swietlicki’s laptop if (1) he acted at the direction of or as a result of communications with another officer, and (2) the police as a whole possessed probable cause to seize the laptop. Arias, 159 P.2d at 139. The first requirement is clearly established here. Clauss called the Colorado officers, was told to seize the laptop, and then seized it—this sequence of events epitomizes “act[ing] at the direction [of] or as a result of communications with another officer.” See id. ¶30 Swietlicki’s appeal to the “pursuant to a coordinated investigation” alternative phrasing of the first prong in Grassi does not change our conclusion. See Grassi, ¶ 21, 320 P.3d at 338 (“[T]he fellow officer rule imputes information . . . if (1) [the] officer acts pursuant to a coordinated investigation . . . .”). For one, Grassi explicitly couples the two phrases: the requirement that an officer act “at the direction [of] or as a result of communications with another officer” simply “ensur[es] that he acted pursuant to a coordinated investigation.” Id. at ¶ 15, 320 P.3d at 336 (first alteration in original). And for another, even if more were required, the record here would suffice. After Deputy Jorgenson contacted him, Deputy Clauss located several of Swietlicki’s relatives, conducted surveillance on multiple residences, gathered and analyzed information to form the opinion that Saegert was the relative most likely to be harboring Swietlicki, and then found and arrested Swietlicki. These facts refute Swietlicki’s contention that Clauss “was not involved in the investigation” and more than satisfy the first prong of the fellow officer rule. 12 ¶31 Because the first requirement was met, the fellow officer rule justified Deputy Clauss’s plain view seizure of the laptop so long as the police as a whole had probable cause to associate the laptop with criminal activity. We now consider whether they did. b. Police Had Probable Cause to Believe the Laptop Contained Child Pornography ¶32 A prolonged warrantless seizure of a closed container is unreasonable unless police have “probable cause to believe that [the] container holds [or itself is] contraband or evidence of a crime.” See Place, 462 U.S. at 701. “Probable cause is a flexible standard deriving from a common sense concept of reasonableness.” People v. Grazier, 992 P.2d 1149, 1153 (Colo. 2000). Because “[p]robability, not certainty, is the touchstone of reasonableness under the Fourth Amendment,” Gall, 30 P.3d at 149, probable cause is measured not by “a ‘more likely true than false’ level of certitude,” but by a “commonsense, nontechnical standard of reasonable cause to believe,” People v. Melgosa, 753 P.2d 221, 225 (Colo. 1988) (quoting Brown, 460 U.S. at 742 (plurality opinion)). It is determined based on an objective assessment of the totality of the facts and circumstances known at the time of the seizure. See People v. Coates, 266 P.3d 397, 400 (Colo. 2011); Grazier, 992 P.2d at 1154. Based on this assessment, there must be “a fair probability that contraband or evidence of a crime will be found in a particular place.” See Illinois v. Gates, 462 U.S. 213, 238 (1983). ¶33 Before the seizure in this case, J.M. disclosed that Swietlicki (1) had been sexually assaulting her for approximately four years, beginning when she was eight years old and ending about two months before the seizure of the computer; (2) sometimes 13 showed her child pornography on his desktop and laptop computers during the assaults; and (3) used a “black and gray flash drive” to transfer the pornography from the desktop to the laptop so the pornography could be viewed in different locations. The trial court found J.M.’s statements reliable. ¶34 These facts supplied probable cause to believe child pornography would be found on Swietlicki’s laptop in Colorado. See United States v. Vallimont, 378 F. App’x 972, 974 (11th Cir. 2010) (per curiam) (finding that child-victim’s statements that defendant had child pornography on his computer supplied probable cause to believe the computer held child pornography). And Swietlicki does not argue to the contrary. It is illegal to possess child pornography. § 18-6-403(3)(b.5), C.R.S. (2015); see also 18 U.S.C. § 2252 (2012); Wis. Stat. § 948.12 (2015). ¶35 The question, then, is whether this probable cause remained sufficient to seize a laptop belonging to Swietlicki that was located not in Colorado, but in Wisconsin. See People v. Kerst, 181 P.3d 1167, 1172 (Colo. 2008) (explaining, in the context of assessing the affidavit underlying a warrant, that probable cause requires a nexus between the “criminal activity, the things to be seized, and the place [where the things are found]”). We conclude it did. ¶36 Unlike the trial court, we do not view the officers’ lack of a physical description of the laptop or their inability to conclusively prove the laptop came from Colorado as precluding probable cause. At the time of the seizure, in addition to J.M.’s disclosures, police had the following information: (1) the laptop in Wisconsin belonged to Swietlicki, (2) the laptop on which J.M. viewed child pornography was missing from Swietlicki’s 14 Colorado residence, (3) Swietlicki’s desktop computer had been wiped clean, (4) Swietlicki had asked J.M.’s mother to send him pictures of the room off the garage, and (5) Swietlicki had limited disposable funds. ¶37 These facts support a fair probability that child pornography would be found on the laptop in Wisconsin. First, this information supplied “reasonable cause to believe” the Wisconsin laptop and Colorado laptop were one and the same. See Melgosa, 753 P.2d at 225. Police knew the Wisconsin laptop belonged to Swietlicki and that the laptop he had possessed in Colorado was missing from his Colorado residence. They also knew Swietlicki’s only source of income was unemployment disbursements—a fact that suggests he had limited disposable funds with which to purchase a new computer. Although it is possible that Swietlicki bought a new laptop between his flight from Colorado and the seizure in Wisconsin, the alternative possibility that he simply brought the Colorado laptop with him reflects a more “common-sense conclusion[] about human behavior.” See People v. Crippen, 223 P.3d 114, 117 (Colo. 2010) (explaining that the concept of probable cause is founded on such conclusions). ¶38 Second, police reasonably could have believed Swietlicki had not removed child pornography from his laptop prior to the time it was seized. Swietlicki’s actions in wiping clean his desktop computer and asking for photographs of the room off the garage suggest he had attempted to quickly remove incriminating materials from Colorado before taking flight. Taking the laptop with him to Wisconsin would have furthered this objective without necessitating the immediate deletion of files from the laptop itself. Moreover, we agree with the People that the nature of the suspected 15 criminal activity—possession of child pornography—supplements the reasonableness of such a belief. See id. at 118 (explaining that the question of whether information supporting probable cause has become stale must account for factors including “the nature of the criminal activity at issue”). The Tenth Circuit, for instance, has repeatedly noted that “common sense and the cases” support the observation that possessors of child pornography hoard and rarely dispose of their materials because the illegality of and social stigma surrounding such materials make them difficult to obtain. See, e.g., United States v. Burkhart, 602 F.3d 1202, 1206–07 (10th Cir. 2010); United States v. Potts, 586 F.3d 823, 828–29, 830 (10th Cir. 2009); United States v. Perrine, 518 F.3d 1196, 1205– 06 (10th Cir. 2008).6 Although insufficient on its own, this recognized propensity is the Indeed, there is a “widespread view among the courts . . . that ‘collectors . . . of child pornography value their sexually explicit materials highly, “rarely if ever” dispose of such material, and store it “for long periods” in a secure place . . . .’” United States v. Richardson, 607 F.3d 357, 370 (4th Cir. 2010) (quoting United States v. Lacy, 119 F.3d 742, 746 (9th Cir. 1997), and collecting cases). In the context of assessing probable cause, numerous federal and state courts have observed that these characteristics make it uniquely probable that a possessor of child pornography will retain his or her illicit material. See, e.g., United States v. Prideaux-Wentz, 543 F.3d 954, 958–59 (7th Cir. 2008) (recognizing that “the staleness argument takes on a different meaning in the context of child pornography because of the fact that collectors . . . rarely, if ever, dispose of their collections,” but finding that the “at least four year[] old” information relied on in that case was too stale to support probable cause); United States v. Riccardi, 405 F.3d 852, 860–61 (10th Cir. 2005) (finding probable cause for seizure of computer based on fiveyear-old Kinkos receipt located near the computer because it showed defendant had ability and desire to convert photos to digital format and because of child pornography collector characteristics); State v. Shields, 69 A.3d 293, 297, 301–03 (Conn. 2013) (finding probable cause for seizure of computers based in part on child pornography collector characteristics, including the fact that “[child pornography] images . . . are stored on the computers of the sender and receiver, and are rarely destroyed or deleted because of their emotional and economic value”); State v. Fuller, 332 P.3d 937, 948–49 (Utah 2014) (finding probable cause for search warrant based on prior internet search, stating “[w]hen a defendant is suspected of possessing child pornography, the staleness 6 16 type of “practical consideration[]” that may be accounted for in ascertaining probable cause. See Mendez v. People, 986 P.2d 275, 280 (Colo. 1999). ¶39 Based on our objective assessment of the facts and circumstances known at the time of the seizure, we conclude that the seizure of Swietlicki’s laptop was supported by probable cause. We further conclude that the fellow officer rule imputed knowledge of this probable cause to Deputy Clauss. Since Clauss observed the laptop in plain view from a lawful vantage point, had probable cause to believe the laptop was associated with criminal activity, and had a lawful right of access to the laptop, the plain view exception rendered his warrantless seizure of the laptop reasonable for Fourth Amendment purposes. IV. Conclusion ¶40 We hold that the warrantless seizure of Swietlicki’s laptop was reasonable for Fourth Amendment purposes because it was justified under the plain view exception to the warrant requirement. Consequently, we reverse the trial court’s suppression order and remand for further proceedings. determination is unique because it is well known that images of child pornography are likely to be hoarded by persons interested in those materials” (alteration in original) (quoting United States v. Irving, 452 F.3d 110, 125 (2d Cir. 2006))). 17

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.