United States v. Loera, No. 17-2180 (10th Cir. 2019)

Annotate this Case
Justia Opinion Summary

While executing a warrant to search defendant Jason Loera’s home for evidence of computer fraud, FBI agents discovered child pornography on four of Loera’s CDs. Despite discovering the pornography, the agents continued their search for evidence of computer fraud: one agent continued to search the CDs that were found to contain some child pornography and a second agent searched other electronic devices belonging to Loera, not including those particular CDs (Search 1). After the agents finished their on-site search, they seized a number of electronic devices that appeared to contain evidence of computer fraud, plus the four CDs that were found to contain child pornography, and then brought the seized items back to their office. One week later, one of the agents reopened the CDs that he knew contained some child pornography so that he could describe a few pornographic images in an affidavit requesting a (second) warrant to search all of the seized electronic devices for child pornography (Search 2). A magistrate judge issued the warrant, and, upon executing it through two searches, the agents found more child pornography. In the subsequent prosecution against him for possessing child pornography, Loera filed a motion to suppress the evidence seized pursuant to each search, arguing that the searches violated the Fourth Amendment. On denial of his motion, Loera pled guilty to receipt of child pornography but preserved his right to appeal that denial. Te Tenth Circuit affirmed the denial of Loera’s motion to suppress, holding, among other things, that the Fourth Amendment did not require police officers to stop executing an electronic search warrant when they discovered evidence of an ongoing crime outside the scope of the warrant, so long as their search remained directed at uncovering evidence specified in that warrant.

Download PDF
PUBLISH FILED United States Court of Appeals Tenth Circuit UNITED STATES COURT OF APPEALS May 13, 2019 FOR THE TENTH CIRCUIT _________________________________ Elisabeth A. Shumaker Clerk of Court UNITED STATES OF AMERICA Plaintiff - Appellee, No. 17-2180 v. JASON LOERA, Defendant - Appellant. _________________________________ Appeal from the United States District Court for the District of New Mexico (D.C. No. 1:13-CR-01876-JB-1) _________________________________ Jerry A. Walz, Walz and Associates, P.C., Albuquerque, New Mexico for DefendantAppellant. Kristopher N. Houghton, Assistant United States Attorney (John C. Anderson, United States Attorney, with him on the brief), Albuquerque, New Mexico for PlaintiffAppellee. _________________________________ Before LUCERO, EBEL, and PHILLIPS, Circuit Judges. _________________________________ EBEL, Circuit Judge. _________________________________ This appeal requires us to apply Fourth Amendment principles to a situation where a police officer executing a warrant to search an electronic storage device for evidence of one crime discovers evidence of other criminal activity. Here, while executing a warrant to search Jason Loera’s home for evidence of computer fraud, FBI agents discovered child pornography on four of Loera’s CDs. Despite discovering the pornography, the agents continued their search for evidence of computer fraud—one agent continued to search the CDs that were found to contain some child pornography and a second agent searched other electronic devices belonging to Loera, not including those particular CDs (Search 1). After the agents finished their on-site search, they seized a number of electronic devices that appeared to contain evidence of computer fraud, plus the four CDs that were found to contain child pornography, and then brought the seized items back to their office. One week later, one of the agents reopened the CDs that he knew contained some child pornography so that he could describe a few pornographic images in an affidavit requesting a (second) warrant to search all of the seized electronic devices for child pornography (Search 2). A magistrate judge issued the warrant, and, upon executing it through two searches, the agents found more child pornography. In the subsequent prosecution against him for possessing child pornography, Loera filed a motion to suppress the evidence seized pursuant to each search, arguing that the searches violated the Fourth Amendment. On denial of his motion, Loera pled guilty to receipt of child pornography but preserved his right to appeal that denial. Exercising jurisdiction under 28 U.S.C. § 1291, we affirm the denial of Loera’s motion to suppress. We hold, among other things, that the Fourth Amendment does not require police officers to stop executing an electronic search warrant when they discover evidence of an ongoing crime outside the scope of the 2 warrant, so long as their search remains directed at uncovering evidence specified in that warrant. I. BACKGROUND This case involves several police searches governed by the Fourth Amendment. The Fourth Amendment protects “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.” U.S. Const. amend. IV. Generally, for a search to be reasonable, it must be authorized by a warrant that “particularly” describes “the place to be searched, and the persons or things to be seized.” U.S. Const. amend. IV. Once officers obtain a sufficiently particular warrant, they must execute it according to the warrant’s terms. Horton v. California, 496 U.S. 128, 140 (1990). The following undisputed facts explain how the warrant-based searches in this case arose. In 2012, the FBI began investigating Jason Loera for illegally intercepting emails intended for then-sitting New Mexico Governor Susana Martinez and her staff in violation of 18 U.S.C. § 2511 (illegal interception) and 18 U.S.C. § 1030 (computer fraud) [collectively, “computer fraud”]. As part of that investigation (more details of which can be found in the district court’s opinion United States v. Loera, 59 F. Supp. 3d 1089, 1095–1108 (D.N.M. 2014)), FBI agents applied for and received a warrant to search Loera’s residence for computer fraud, including any such evidence residing on electronic devices or storage media (“the first warrant”). The first warrant authorized FBI agents to search and seize, in relevant part, “All records, in any form, relating to violations of [computer fraud], involving Jason 3 Loera.” ROA Vol. I at 37. The warrant defined the terms “records” and “information” as including: “all of the foregoing items of evidence in whatever forms and by whatever means they may have been created or stored, including any form of computer or electronic storage (such as hard disks or other media that can store data).” Id. at 39. In a separate provision, the warrant sought “Any computers, cell phones, and/or electronic media that could have been used as a means to commit the offenses described on the warrant.” Id. at 87. Finally, for any electronic device, whether it was used to commit the offenses or simply had relevant records stored on it, the warrant permitted the agents to search and seize evidence of who used, owned, or controlled the device, such as “configuration files . . . documents, browsing history . . . photographs, and correspondence . . . .” Id. at 38. A. The First Search On November 20, 2012, FBI agents including Agent Aaron Cravens and Special Agent Brian Nishida executed the first search warrant. They discovered a large volume of electronic media in Loera’s residence, including CDs, DVDs, laptop computers, external hard drives, a USB flash drive, an iPhone, and an iPad. Cravens and Nishida were responsible for “previewing” the CDs at Loera’s residence to ensure that the FBI seized only those CDs that contained information relevant to the authorized investigation. ROA Vol. II at 53, 58. The two agents split up the CDs between themselves and searched them separately. Cravens tried to view the files of the first CD using a program called FTK Imager, which would have allowed Cravens to limit his search to a particular type of 4 file, for example, only image, text, or audio files. However, the program did not work. Consequently, Cravens opened the CD on a computer and used the “thumbnail view” to preview the files stored on it, meaning, he saw small images of the files, the file names, and the file types in a vertical list that he had to scroll through to see in its entirety. Although Cravens believed he had authority under the first warrant to view the entire contents of the CD, Cravens used the thumbnail-image view to fast-track his search. He would scroll past irrelevant files but “click[] on anything that didn’t appear correct, or any documents” to open them. Id. at 92. While Cravens was “scrolling down through the images or files . . . on the CDs, [he] found what looked like a nude child.” Id. at 60. He opened the file to confirm that it was an image of child pornography. After determining that it was, Cravens ejected the CD from his computer, set it aside, and alerted Agent Nishida and the FBI agent in charge of Loera’s case. Then, Cravens searched the rest of the CDs assigned to him for evidence of computer fraud. Cravens later found a child pornography image on a second CD. Just as he did with the first, Cravens set the CD aside after discovering the illegal images and did not open any other files on that CD. Agent Nishida took a different approach to his search. He previewed the files on his assigned CDs using the “details view” of Windows Explorer, meaning that he saw a list of files, file names, and last-modified dates of those files, but not pictures associated with the files. Id. at 157. For his search of the CDs, or “triage,” as he called it, Nishida would open two or three files on each CD and then determine from that sample whether the CD should be seized pursuant to the warrant. Id. at 160. If Nishida 5 found something he believed might be responsive to the warrant in the files that he sampled, he would set the CD aside to be reviewed off-site. As he was sampling files, Nishida found child pornography on two CDs. Unlike Cravens, Nishida did not cease his search of those CDs after discovering child pornography; he continued sampling files on the CDs to determine if they contained information that was responsive to the warrant. The FBI seized thirteen CDs in total from Loera’s residence: four contained child pornography images and nine contained evidence of computer fraud.1 In addition to the thirteen CDs, the FBI seized computers, external hard drives, an iPhone, and an iPad. B. The Second Search One week later, on November 27, 2012, Cravens decided to apply for a search warrant to search the items seized from Loera’s residence for child pornography. Cravens wanted to include in his warrant affidavit a detailed description of one child pornography image from each of the four CDs on which he and Nishida had found child pornography during their on-site preview. Consequently, Cravens opened each of the four CDs, viewing several images on each, to find child pornography images that he could accurately describe. Viewing the photos and drafting the affidavit took a total of two-and-a-half hours. However, Cravens testified before the district court that he did not spend “anywhere near the two-and-a-half hours” actually looking at photos on the CDs. Id. at 74-75. 1 There is no indication in the record whether the four CDs that contained child pornography also contained evidence responsive to the warrant. However, Loera does not challenge the FBI’s seizure of those CDs pursuant to the first warrant. 6 Cravens’ affidavit included two sections. In Section I, Cravens described his training and experience with computers and child pornography. In Section II, Cravens explained the details of the FBI’s investigation of Loera that led to the agent’s discovery of child pornography on the CDs in Loera’s residence. In particular, paragraph 21 described in general terms how Cravens discovered the child pornography: 21. In the process of executing this warrant, an FBI certified computer forensic examiner and a computer analysis response team (CART) technician previewed the loose media located during the search (e.g., thumb drives, CD-Rs, DVD-Rs, memory cards, etc.) for evidence relevant to the original unrelated investigation. During the preview, the examiners identified four writable CDs which appeared to contain images of child pornography. The CDs were seized and placed in the evidence control room at the local FBI office. ROA Vol. I at 120. In paragraph 23, Cravens explained that on November 27, 2012, he “reviewed the four CDs . . . that were believed to contain child pornography,” id. at 121, and that “[d]uring the review of the CDs, [he] observed multiple pictures of children many of which are in various states of dress,” id. Then, in paragraphs 24-27, Cravens provided a detailed description of one image from each CD that depicted a minor engaged in sexually explicit conduct. Cravens’ descriptions included the apparent age of the minor and the conduct depicted. On November 29, 2012, based on Cravens’ affidavit, a federal magistrate judge approved a warrant to search the thirteen CDs and six other electronic devices that were seized from Loera’s residence for child pornography (“the second warrant”). 7 C. Searches Pursuant to the Second Warrant Agent Nishida executed the second warrant on two separate dates. In December 2012, Nishida searched Loera’s laptop pursuant to both the first and second warrants, looking for evidence of computer fraud and child pornography. He discovered more than 730 child pornography images on Loera’s laptop. In April 2013, Nishida searched the four CDs seized from Loera’s residence for child pornography pursuant to the second warrant. He discovered approximately 330 images and two movies of child pornography on those CDs. D. Proceedings Below A federal grand jury indicted Loera on several counts of possessing child pornography that implicated the images found on both his laptop and his CDs. Loera filed a motion to suppress that child pornography evidence, and the district court denied the motion. Loera filed a motion for reconsideration, which the district court also denied. Following that denial, Loera pled guilty to one count of knowingly receiving child pornography in violation of 18 U.S.C. §§ 2252(a)(2), 2252(b)(1), and 2256, pursuant to a plea agreement, but he reserved the right to appeal the denial of his motions. On appeal, Loera argues that the district court should have suppressed the child pornography evidence discovered during the first search, the second search, and the searches conducted pursuant to the second warrant because, according to Loera, each search was unlawful. Loera argues that the first search exceeded the scope of the first warrant, the second search exceeded the scope of the first warrant, and the 8 last two searches, while authorized by the second warrant, were unlawful because that warrant was invalid. Additionally, Loera maintains that none of the exceptions to the warrant requirement apply to the searches in this case. We conclude that the first search was lawful, but we agree with Loera that the remaining searches were unlawful. Nevertheless, we AFFIRM the district court’s denial of Loera’s motion to suppress and motion to reconsider under the inevitable discovery doctrine. II. DISCUSSION A. Standard of Review “When reviewing the district court’s denial of a motion to suppress, we view the evidence in the light most favorable to the government and accept the district court’s factual findings unless they are clearly erroneous,” United States v. Grimmett, 439 F.3d 1263, 1268 (10th Cir. 2006), but “[t]he ultimate question of reasonableness under the Fourth Amendment is a legal conclusion that we review de novo.” Id. Accordingly, de novo review applies to the issues we address in this opinion, including, the scope of a search warrant, United States v. Angelos, 433 F.3d 738, 745 (10th Cir. 2006), the sufficiency of a search warrant, United States v. Danhauer, 229 F.3d 1002, 1005 (10th Cir. 2000), the applicability of the good-faith exception, id., and the applicability of the inevitable discovery doctrine, United States v. Christy, 739 F.3d 534, 540 (10th Cir. 2014). B. Validity of the Government’s Application for the First Warrant First, Loera argues that the FBI agents obtained the initial warrant to search his residence for evidence of computer fraud as a pretext to search instead for 9 evidence of child pornography. The district court disagreed, finding that the sole purpose of the first search was to uncover evidence of computer fraud. We affirm that conclusion. Loera’s pretext argument is based on a statement that Agent Nishida made in a report dated February 28, 2013, three months after the first and second searches were conducted. In that report, Nishida wrote: On November 14, 2012, SA Michael Boady requested that the above listed specimen or specimens be examined for evidence of intercepting a communication. For example, e-mail messages to or from the domain Susanna2010.com. In addition, SA Boady requested that the evidence also be examined for evidence of child pornography possession and receipt. ROA Vol. II at 191–92. Loera argues that this report proves that on November 14, 2012, six days before the first search, Agent Nishida received instructions to search Loera’s home and effects for evidence of child pornography. The district court made explicit factual findings to the contrary, which are supported by the record. First, the district court found that, had the FBI agents had suspicions that Loera possessed child pornography, agents would have included that information in their application for the first warrant. Second, Agent Nishida testified at the suppression hearing that the February 2013 report summarized two separate instructions from SA Boady: on November 14, 2012, Boady instructed Nishida to search for evidence of interception, and, later, Boady instructed Nishida to search for evidence of child pornography. Finally, both Cravens and Nishida testified at the suppression hearing that the purpose of the November 20 search was only to uncover 10 evidence of computer fraud, and the district court credited that testimony. Each of these facts supports the district court’s determination that the agents conducted the first search solely to look for evidence of computer fraud. And we are unpersuaded by Loera’s only evidence of pretext, the report written three months after the allegedly pretextual search.2 Thus, we conclude the FBI agents had no pretextual motivations for obtaining the first warrant, and we affirm the district on this issue. C. Reasonableness of the First and Second Searches Next, we determine that the first search of Loera’s residence was reasonable because it was directed solely at uncovering the items specified in the first warrant both before and after the officers discovered the child pornography evidence. However, we conclude that the second search was unreasonable because it was directed at uncovering evidence of child pornography. 1. Relevant legal principles The Fourth Amendment provides: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. 2 Alternatively, even if the agents had an additional motive for conducting the first search, that argument would fail as a matter of law under Whren v. United States, 517 U.S. 806, 813 (1996). 11 U.S. Const. amend. IV. It is now well-recognized that “the ultimate touchstone of the Fourth Amendment is ‘reasonableness.’” Brigham City v. Stuart, 547 U.S. 398, 403 (2006). “[R]easonableness generally requires the obtaining of a judicial warrant,” Riley v. California, 134 S.Ct. 2473, 2482 (2014), subject to only a few exceptions. The warrant must “particularly” describe “the place to be searched, and the persons or things to be seized,” U.S. Const. amend. IV. However, obtaining a sufficiently particular warrant is just the first step to conducting a reasonable search. The officers tasked with executing a sufficiently particular warrant must conduct their search “strictly within the bounds set by the warrant.” Bivens v. Six Unknown Named Agents of Fed. Bureau of Narcotics, 403 U.S. 388, 395 n.7 (1971) (quoting Marron, 275 U.S. at 196). The Supreme Court has held that, “[i]f the scope of [a] search exceeds that permitted by the terms of a validly issued warrant . . . the subsequent seizure [of evidence] is unconstitutional without more.” Horton v. California, 496 U.S. 128, 140 (1990). Determining whether a search exceeds the scope of its authorizing warrant is, like most inquiries under the Fourth Amendment, an exercise in reasonableness assessed on a case-by-case basis. Dalia v. United States, 441 U.S. 238, 258 (1979) (holding that the manner of a search is subject to “later judicial review as to its reasonableness”). The general Fourth Amendment rule is that investigators executing a warrant can look anywhere where evidence described in the warrant might conceivably be located. United States v. Ross, 456 U.S. 798, 824 (1982). For example: 12 Just as probable cause to believe that a stolen lawnmower may be found in a garage will not support a warrant to search an upstairs bedroom, probable cause to believe that undocumented aliens are being transported in a van will not justify a warrantless search of a suitcase. Probable cause to believe that a container placed in the trunk of a taxi contains contraband or evidence does not justify a search of the entire cab. Id. This limitation works well in the physical-search context to ensure that searches pursuant to warrants remain narrowly tailored, but it is less effective in the electronicsearch context where searches confront what one commentator has called the “needle-ina-haystack” problem. Orin S. Kerr, Digital Evidence and the New Criminal Procedure, 105 Colum. L. Rev. 279, 301 (2005). Given the enormous amount of data that computers can store and the infinite places within a computer that electronic evidence might conceivably be located, the traditional rule risks allowing unlimited electronic searches. To deal with this problem, rather than focusing our analysis of the reasonableness of an electronic search on “what” a particular warrant permitted the government agents to search (i.e., “a computer” or “a hard drive”), we have focused on “how” the agents carried out the search, that is, the reasonableness of the search method the government employed. See United States v. Burgess, 576 F.3d 1078 (10th Cir. 2009); United States v. Walser, 275 F.3d 981 (10th Cir. 2001); United States v. Carey, 172 F.3d 1268 (10th Cir. 1999). Our electronic search precedents demonstrate a shift away from considering what digital location was searched and toward considering whether the forensic steps of the search process were reasonably directed at uncovering the evidence specified in the search warrant. Shifting our 13 focus in this way is necessary in the electronic search context because search warrants typically contain few—if any—restrictions on where within a computer or other electronic storage device the government is permitted to search. See United States v. Christie, 717 F.3d 1156, 1165 (10th Cir. 2013) (holding that, so long as an electronic search warrant requires the government to “direct all of its search efforts” toward evidence relating to a specific crime, the warrant is sufficiently particular, even where it permits the government to search a “computer” for “all records” relating to the crimes of “murder, neglect, and abuse”). Because it is “unrealistic to expect a warrant prospectively [to] restrict the scope of a search by directory, filename or extension or to attempt to structure search methods,” Burgess, 576 F.3d at 1093 (alteration added), our ex post assessment of the propriety of a government search is essential to ensuring that the Fourth Amendment’s protections are realized in this context. Our precedent of Carey, Burgess, and Walser, to which we turn next, are instructive as to what constitutes a reasonable electronic search pursuant to a valid warrant. Carey is the only case in which we invalidated an electronic search for exceeding the scope of its authorizing warrant. See 172 F.3d at 1276. There, a police officer obtained a warrant to search files on the defendant’s computer for evidence “pertaining to the sale and distribution of controlled substances.” Id. at 1270. Prior to searching the computer, the officer first viewed the computer’s file directory, which showed numerous “JPG” files with sexually suggestive titles. Id. During his search, the officer came across a number of files that he did not recognize 14 and that he was unable to view on the computer that he was using. Id. at 1271. To view the files, the officer downloaded them onto a separate disk, inserted that disk into another computer, and then was immediately able to view a “JPG file” that depicted child pornography. Id. Rather than navigating away from the nonresponsive material, the officer “downloaded approximately two hundred fortyfour” more JPG files and then transferred them to nineteen disks, viewing five to seven images on each disk to determine that they all contained child pornography. Id. The whole process took about five hours. Id. at 1273. After he had catalogued the child pornography images in this manner, he then “returned” to his “original task of looking for evidence of drug transactions.” Id. at 1271. The Carey court held that this was an unlawful, general exploratory search because, although it was permissible for the officer to open the first JPG file to see if it was responsive to the warrant, id. at 1273 n.4, his opening of the remaining files exceeded the bounds of the authorizing warrant, id. at 1276. The Carey court’s holding turned on four facts: (1) the officer spent five hours, a significant amount of time, specifically perusing the trove of nonresponsive material, id. at 1273; (2) the nonresponsive files were characteristically distinct and set apart from the other files on the computer (such that they could have been avoided) because each file was labeled “JPG,” many had sexually suggestive titles, and the officer had to download them to open them, id. at 1274; (3) the officer did not discover the files inadvertently (at least after his first look), id. at 1273; and (4) a more narrowly tailored search was possible—the officer could have gone back to searching for drug-related documents 15 much sooner than he did, id. at 1273. Importantly, we did not condemn the officer’s decision to return to searching for drug-related documents after discovering the child pornography, but, instead, we condemned his “temporar[y] abandon[ment]” of the original search to conduct a “five hour search of the child pornography files.” Id. at 1273. Next, we turn to Walser and Burgess, both of which upheld electronic searches in which the investigator discovered incriminating, nonresponsive material while executing a search warrant but then navigated away from it. In United States v. Walser, the police obtained a warrant to search the defendant’s hotel room for electronically stored records of “evidence of the possession of controlled substances.” 275 F.3d 981, 983–84 (10th Cir. 2001). A police officer searched the room pursuant to the warrant and found a laptop and a digital camera. Id. at 984. The agent seized the laptop, removed it from the hotel room, and then conducted a drug-specific search of the laptop, looking for “ledgers of drug transactions or images of drug use.” Id. In order to find those things, the agent employed a particularized search method that “selectively proceeded to the ‘Microsoft Works’ sub-folder on the premise that[,] because Works is a spreadsheet program, that folder would be most likely to contain records relating to the business of drug trafficking.” Id. at 986. It was while searching the contents of the Works folder that the officer came across a file labeled “bstfit.avi” and opened it. Id. at 984. When he viewed the contents, he discovered that the file contained child pornography images. Id. at 986–87. He then immediately ceased his search. Id. 16 We upheld the officer’s search as reasonable because we determined that, by using a particularized search method, the officer avoided conducting the kind of “sweeping, comprehensive search of a computer’s hard drive” that Carey prohibited. Id. at 986. The defendant in Walser argued that the agent exceeded the scope of the warrant by opening the “AVI file,” a video file, because “it could not possibly have contained the type of evidence the [a]gent was authorized to search for, namely, records of drug transactions or still images of drug use.” Id. at 987. We rejected that argument by interpreting Carey to excuse an officer’s discovery of child pornography during a search for “relevant records in places where such records might logically be found” so long as the officer does not conduct a supervening search specifically directed at finding pornography evidence. Id. at 986. Applying that rule, we held in Walser that the officer’s opening the “bstfit.avi” file was permissible because (1) he was looking in a folder that was “most likely to contain records relating to the business of drug trafficking” when he opened it, and (2) he did not conduct an intervening search directly focused on child pornography like the agent in Carey. Id. Based on those facts, we concluded that the “search was reasonable and within the parameters of the search warrant” and that the evidence found as a result of it did not need to be suppressed. Id. at 987. Finally, in United States v. Burgess, 576 F.3d 1078 (10th Cir. 2009), we again upheld an electronic search that uncovered evidence of child pornography as reasonable and within the scope of its authorizing warrant. There, police obtained a warrant to search a motorhome for, among other things, “computer records” that 17 would tend to show “conspiracy to sell drugs.” Id. at 1083. The warrant incorporated the affidavit on which it was based, which stated that the affiant “knows that persons involved in trafficking or the use of narcotics often keep photographs of coconspirators or photographs of illegal narcotics in their vehicle.” Id. Based on the warrant, officers searched two hard drives and a laptop found in the motorhome. Id. An agent searched one of the hard drives by using a program called EnCase, which copies the contents of a hard drive over to a computer to prevent file corruption. Id. at 1083–84. EnCase allows an investigator to “preview” reduced-sized photos of each image file as they are being copied. Id. at 1084, 1094. The agent took advantage of this feature and viewed each image file on the hard drive as it was being copied. Id. at 1084. After viewing 200-300 digital images, mostly personal photos, the agent saw an image that looked like child sexual exploitation. Id. He then closed the preview program and sought a warrant to search all of the defendant’s electronic storage devices for evidence of child pornography. Id. Upon conducting that search, the agent found more than one hundred thousand illegal images. Id. The defendant asked the district court to suppress the child pornography evidence because, he argued, the agent’s use of the “preview” program exceeded the scope of the warrant because he did not employ a particularized search method like the agent in Walser but instead looked through each image file contained on the hard drive. We determined that the agent’s use of the “preview” program was reasonable and did not exceed the scope of the warrant for two reasons. First, we noted that, 18 because the warrant did not expressly limit the file types that the agent was allowed to search, for example, by limiting the search to text files (.doc, .wpd, .txt, etc.), the agent was well within the scope of the warrant when he decided to view all of the image files on the hard drive using the preview program. Id. at 1092. Second, we determined that there was no reasonable way for the agent to conduct a more narrowly tailored search because, when the object of a search is likely to be an image file, as it was in Burgess, “there may be no practical substitute for actually looking in many (perhaps all) folders and sometimes at the documents contained within those folders.” Id. at 1094. Reading these cases together, we determine that four features of the unconstitutional search in Carey demonstrate that it was unreasonably directed at uncovering evidence of child pornography, rather than directed at the evidence specified in the warrant, and distinguish it from the reasonable searches in Walser and Burgess: (1) the length of time the searching officer spent looking at the incriminating, nonresponsive evidence (five hours in Carey versus less than one minute in Walser and Burgess); (2) the fact that the nonresponsive files were set apart from the responsive files saved on the storage device (JPG files downloaded onto separate disks in Carey versus generic files intermingled all in one place in Burgess); (3) the manner in which the evidence was discovered (purposefully in Carey versus inadvertently in Walser and Burgess);3 and (4) the breadth of the search method 3 We acknowledge that in Horton v. California, 496 U.S. 128, 130 (1990), the Supreme Court held that, in physical searches, “even though inadvertence is a 19 employed (the wide detour in Carey versus the narrowly tailored search in Walser). Contrary to Loera’s assertion, these cases do not require that officers stop searching upon discovering evidence of a crime outside the scope of the warrant. Such a rule would prohibit what the Fourth Amendment expressly permits—reasonable searches based upon a warrant supported by probable cause. We have never required that. This conclusion brings us in line with every circuit that has confronted this issue. See United States v. Stabile, 633 F.3d 219, 240 (3d Cir. 2011) (upholding denial of motion to suppress where officers continued warrant-authorized search of the defendant’s computer for financial crimes after discovering child pornography); United States v. Williams, 592 F.3d 511, 521–24 (4th Cir. 2010) (upholding search where the officer continued his warrant-authorized search of the defendant’s computer for evidence of “making threats and computer harassment” after discovering child pornography); United States v. Miranda, 325 F.App’x 858, 859–60 (11th Cir. 2009) (per curiam) (unpublished) (upholding search where officer continued his warrant-authorized search for evidence of counterfeit software after discovering child pornography); United States v. Wong, 334 F.3d 831, 834 (9th Cir. characteristic of most legitimate ‘plain view’ seizures, it is not a necessary condition.” However, because Carey, Walser, and Burgess, each of which succeeded Horton in time, considered the subjective intentions of the searching officers where that information was available, we continue to include inadvertence as a factor to consider when deciding whether an electronic search fell within the scope of its authorizing warrant or outside of it. The fundamental differences between electronic searches and physical searches, including the fact that electronic search warrants are less likely prospectively to restrict the scope of the search, justify our inclusion of that factor. See Horton, 496 U.S. at 139 (abandoning inadvertence as a necessary condition for a legitimate plain view seizure). 20 2003) (upholding denial of motion to suppress where the officer continued his warrant-authorized search of the defendant’s computer for, among other things, “[a]ny maps, receipts, or writings, depicting Churchill County Nevada” after discovering child pornography). Although officers do not have to stop executing a search warrant when they run across evidence outside the warrant’s scope, they must nevertheless reasonably direct their search toward evidence specified in the warrant. What that looks like depends on the particular facts of a given case. Narrowly tailored search methods that begin looking “in the most obvious places and [then] progressively move from the obvious to the obscure,” Burgess, 576 F.3d at 1094, should be used where possible but are not necessary in every case. In cases like this one, where the electronic storage device is not well-organized and the most practical way to search it is through an itemby-item review, “there may be no practical substitute for actually looking in many (perhaps all) folders and sometimes at the documents contained within those folders.” Id. In such a case, however, the searching officer must respond appropriately to what he or she sees. The reasonableness of a search evolves as the search progresses and as the searching officer learns more about the files on the device that he or she is searching. An analogy to the physical realm is helpful here. Imagine a warrant authorizes police officers to search a “residence” for evidence of “firearms and ammunition.” Under that warrant, it would be reasonable for a police officer to search the medicine cabinet in the bathroom for a minute or two to see if a small gun or ammunition is 21 hidden there, however, it would be unreasonable for the officer to spend two hours reading the labels on each bottle of medicine in the cabinet. On the other hand, if the warrant had authorized the officer to search the residence for evidence of “illegal drug trafficking and manufacture,” an intensive search of the medicine cabinet would be reasonable. In both cases, the medicine cabinet is fair game to search, but the intensity level of the permitted search differs depending on the evidence to be seized. The same is true for electronic searches. While in some cases many (perhaps all) electronic areas of a computer will be fair game to search, the level of intensity that officers are permitted to spend searching those areas will differ depending on whether the area appears to contain responsive material. This is true even when officers come across evidence of incriminating, nonresponsive material. In all cases, the ultimate test is the one mandated by the Fourth Amendment: whether the search was “reasonable” under the circumstances. In the case of a computer search, “reasonableness” requires officers to take into account the flexibility of computers and the multiple configurations to which they may be adapted. As the computer search continues and as the executing officer obtains more information about how a suspect used his computer, that too may inform the reasonableness of the continuing search. We now apply these principles to the November 20 and 27 searches conducted in this case. 22 2. November 20 search was reasonable Loera argues that, although the first warrant permitted the FBI agents to search his CDs for evidence of computer fraud, the officers’ search exceeded the scope of the first warrant when they continued searching after discovering evidence of child pornography. We disagree. The searches that Agent Cravens and Agent Nishida each conducted of Loera’s CDs on November 20 were reasonable and conducted within the scope of the first warrant because at all times each was reasonably directed at discovering evidence of computer fraud. Therefore, the first search did not violate the Fourth Amendment and thus did not warrant suppression of the evidence discovered during that search. The agents’ searches on November 20 resemble the searches in Walser and Burgess more than they resemble the search in Carey, both before and after they discovered the child pornography evidence. First, both agents here spent very little time looking at the child pornography images they discovered. They noticed them, alerted a supervisor, and then moved on to the rest of the images on the same CD (in Nishida’s case), or the other CDs (in Cravens’ case), looking for evidence of computer fraud. Both responses were reasonable because, as mentioned above, the agents were not required to stop searching altogether. And both responses demonstrate an effort to navigate away from the nonresponsive material and toward files that they believed were more likely to contain material responsive to the warrant. Second, the files on the CDs that the agents previewed were not characteristically distinct or set apart from the other files, in contrast to Carey. Agent Cravens testified that, when he put a CD into his computer to see the files that it 23 contained, the computer pulled up a generic list of those files. The record does not indicate that there were any folders or distinctive titles setting clearly apart the nonresponsive child pornography files from the other files on the disk. Loera bears the burden of proof on his suppression motion, and he has offered no evidence on this point. Third, the agents discovered the child pornography files inadvertently on November 20. Fourth, both agents’ search methods were reasonably narrow under the circumstances, considering the fact that the CDs did not seem particularly organized. Given that the warrant permitted the agents to search the CDs for “photographs,” “documents,” and “configuration files,” it was reasonable for Nishida and Cravens to search all file types on the CDs (image, video, and text) for evidence of computer fraud rather than to narrow that search to one particular file type. The agents’ searches on November 20 were reasonable because they fell within the scope of the first warrant both before and after they discovered the child pornography evidence. We reverse the district court’s ruling to the contrary. 3. November 27 search was unreasonable Loera also argues that Agent Cravens’ subsequent search on November 27, 2012, of the four seized CDs that contained child pornography violated the Fourth Amendment because Cravens was “[i]ntentionally searching for evidence of a crime outside the scope of the [f]irst [w]arrant prior to obtaining a new warrant.” Aplt. Br. 29. In making this argument, Loera accepts that the first warrant permitted the government to seize the four CDs that were found to contain some child pornography and to search them for evidence of computer fraud. Therefore, Loera challenges Cravens’ November 27 24 search only for exceeding that permission. Accordingly, we confine our analysis to whether the second search exceeded the scope of the first warrant. The district court concluded that it did and that neither exigent circumstances nor any other exception to the warrant requirement justified that search. We agree and conclude that the district court correctly excised the evidence obtained during the November 27th search from Cravens’ affidavit for the second warrant. Several of the district court’s factual findings support that result. The district court found that “Cravens was not searching for evidence of electronic fraud” on November 27 but instead was searching for child pornography. Dist. Ct. Op. at 144. The district court based this finding on Cravens’ testimony at the suppression hearing that he reopened Loera’s CDs on November 27 specifically “[t]o write a description of an image on the disc” so that he could “obtain a second warrant for child pornography.” ROA Vol. II at 72. That admission is the most probative fact in the record that Cravens’ search was directed at finding child pornography. The district court also found that Cravens had the four CDs for a total of two-and-ahalf hours that day, during which time he searched the CDs and drafted the second affidavit. Although the record does not indicate how long Cravens searched the CDs, he testified at the suppression hearing that he looked at several images on each CD— “more than just a couple” but “[m]ost likely less than a dozen.” ROA Vol. II at 143. Whatever the amount of time, Cravens’ devoted it exclusively to nonresponsive material. Rather than navigate away from the child pornography images when he found them, Cravens explicitly navigated toward such images. Based on these findings, we 25 agree with the district court that, in contrast with the agents’ searches on November 20, Agent Cravens’ search on November 27 was unreasonable because it was directed at uncovering evidence of child pornography. The government argues that two exceptions save Cravens’ search from violating the Fourth Amendment: the plain view doctrine and the foregoneconclusion exception. We disagree. For its plain view argument, the government asserts that the law permitted Agent Cravens to take a “second look” at the child pornography images on Loera’s CDs because members of the FBI had already seen the images in plain view during a lawful search, and, therefore, his “second look” was no further invasion of Loera’s privacy than the initial, lawful viewing. The government points to a Fourth Circuit case, United States v. Jackson, 131 F.3d 1105 (4th Cir. 1997), where a law enforcement officer had consent to search a residence for a fugitive. Id. at 1107. While looking for the fugitive in the basement, the officer observed some suspicious metal items on the floor. Id. He did not pause to examine those items at that time, but he instead proceeded to finish his sweep for the fugitive. Id. Once finished, he went back to take a closer look at the objects on the floor, this time recognizing them as drug paraphernalia. Id. More officers arrived and took a look at the paraphernalia, eventually using the presence of those items to obtain a search warrant for the house, which uncovered a gun and large quantities of drugs. Id. at 1108. That further search was held to have been constitutional under the plain-view doctrine. Id. There are too many factual distinctions between Jackson and this case to permit Cravens’ second look under the plain view doctrine. First, as government counsel 26 admitted at oral argument, there is no evidence in the record that Cravens looked at the same photos on November 27 that the officers viewed on November 20. Second, seven days elapsed between the first and second searches in this case, not a matter of minutes. Third, Cravens’ “second look” led him to peruse more than just the child pornography images, so we cannot say that the November 27 search did not cause a further invasion of Loera’s privacy. The plain view doctrine permits the warrantless seizure of evidence of criminal activity when police officers observe the evidence during a lawful search. United States v. Naugle, 997 F.2d 819, 822 (10th Cir. 1993). That doctrine cannot be used to justify Cravens’ November 27 search. The government also argues that Cravens’ “second look” was justified under what it has termed the “foregone-conclusion exception” to the warrant requirement. This doctrine comes from several of our plain view cases where we have permitted the warrantless search of containers in plain view whose contents “are a foregone conclusion” because the container is “not closed,” “transparent,” or, if it is closed, “its ‘distinctive configuration . . . proclaims its contents’” nonetheless. United States v. Corral, 970 F.2d 719, 725 (10th Cir. 1992). We have also held that the doctrine applies “where the police have already seen the contents of a seized container prior to conducting the search, [because] there is no significant additional invasion of privacy involved in searching the container.” Id. at 725. We reject this argument for the same reasons as the government’s plain view argument. Here, Cravens knew to a near certainty that the seized and re-searched CDs contained some child pornography, but he had no idea what else they contained. And, again, there is no evidence that 27 Cravens had previously seen the child pornography images that he viewed on November 27. Thus, Cravens’ November 27 search was unlawful because it exceeded the scope of the first warrant and none of the exceptions to the warrant requirement apply. D. Reasonableness of the Searches Conducted Under the Second Warrant Additionally, Loera argues that the child pornography evidence that Agent Nishida discovered when he executed the second warrant should have been suppressed because the second warrant was not supported by probable cause and no exceptions to the warrant requirement apply. We agree that the second warrant was not supported by probable cause and that the good faith exception is inapplicable here. However, the inevitable discovery doctrine supports the district court’s denial of Loera’s motion to suppress, and we affirm on that basis. 1. Second warrant was not supported by probable cause We review whether a magistrate properly issued a search warrant by determining whether there was a “substantial basis” for probable cause in the affidavit submitted in support of the warrant. Illinois v. Gates, 462 U.S. 213, 236 (1983). Because we find that the November 27 search was unlawful, we must excise from the affidavit that Cravens filed in support of the second warrant all of the descriptions of child pornography that he unlawfully obtained during the second search and then determine whether “there was probable cause absent that information.” United States v. Sims, 428 F.3d 945, 954 (10th Cir. 2005). The district court determined that the 28 second warrant remained supported by probable cause without the tainted descriptions. We disagree. While “probable cause does not demand the certainty we associate with formal trials,” Gates, 462 U.S. at 246, “[s]ufficient information must be presented to the magistrate to allow that official to determine probable cause; his action cannot be a mere ratification of the bare conclusions of others,” id. at 239 (emphasis added). For example, “[a] sworn statement of an affiant that ‘he has cause to suspect and does believe that’ liquor illegally brought into the United States is located on certain premises” is not sufficient to support a finding that probable cause exists to search the premises. Id. The child pornography descriptions that Agent Cravens obtained during the unlawful second search appear in paragraphs 24-27 of Cravens’ affidavit. Once we excise those descriptions, all that remains substantively is Cravens statement that, “During the preview, the examiners identified four writable CDs which appeared to contain images of child pornography.” ROA Vol. I at 120. This sentence does not support a finding of probable cause. In United States v. Pavulak, the Third Circuit reviewed an affidavit to support a warrant to search for child pornography that contained language very similar to the bare-bones description left in the affidavit in our case, 700 F.3d 651, 661 (3d Cir. 2012). The warrant affidavit in Pavulak stated that an informant had seen the defendant “viewing child pornography” of females “between 16 and 18 years old,” without providing any further details about what the images depicted. Id. at 657. The Third Circuit held that the affidavit lacked probable cause because it did not 29 allow the magistrate judge “to independently evaluate whether the contents of the alleged images [met] the legal definition of child pornography.” Id. at 661. We find that analysis persuasive here. Agent Cravens’ remaining statement that the CDs “appeared to contain images of child pornography” provides no detailed description of what the images depicted such that a magistrate could independently assess whether the images meet the legal definition of child pornography. ROA Vol. I at 120. Therefore, the affidavit supporting the second warrant lacked probable cause absent the tainted information. We reverse the district court’s contrary conclusion. 2. Good-faith exception inapplicable to these facts Next, we consider whether the good faith exception to the exclusionary rule from United States v. Leon, 468 U.S. 897, 918 (1984), applies when police execute a search warrant that is based on information obtained through an unlawful predicate search. Disagreeing with the district court, we conclude that it does not. The Supreme Court’s opinion in Leon and our opinion in United States v. Scales, 903 F.2d 765, 768 (10th Cir. 1990), dictate that the good faith exception does not apply in a case like the one before us because the illegality at issue stems from unlawful police conduct, rather than magistrate error, and therefore the deterrence purposes of the Fourth Amendment are best served by applying the exclusionary rule. In United States v. Leon, the Supreme Court modified the exclusionary rule “so as not to bar the use in the prosecution’s case in chief of evidence obtained by officers acting in reasonable reliance on a search warrant issued by a detached and 30 neutral magistrate but ultimately found to be unsupported by probable cause,” 468 U.S. at 900. The Court reasoned that the purpose of the exclusionary rule is to deter police misconduct and in such a case “there is no police illegality and thus nothing to deter.” Id. at 920. In this circuit, “Leon’s good faith exception applies only narrowly, and ordinarily only when an officer relies, in an objectively reasonable manner, on a mistake made by someone other than the officer.” United States v. Cos, 498 F.3d 1115, 1132 (10th Cir. 2007) (declining to apply good faith exception to warrantless search of apartment where officers mistakenly believed the person that consented to the search had the authority to do so); United States v. Herrera, 444 F.3d 1238, 1251 (10th Cir. 2006) (declining to apply good faith exception to state trooper who conducted a warrantless inspection of a truck based on the officer’s mistaken belief the truck was a commercial vehicle subject to such inspection). Thus, Leon is inapplicable here where the mistake—the unconstitutional second search—was the fault of the officer, not the magistrate. We considered whether Leon applied to a warrant affidavit based on tainted evidence in Scales, 903 F.2d at 768. There, we held that Leon did not apply to excuse a law enforcement officer’s reliance on a search warrant where the facts in the warrant affidavit were obtained through an unlawful predicate seizure. In that case, DEA agents seized a suitcase that they believed contained drugs. Id. at 767. Then, they took the suitcase to a drug-sniffing canine team that signaled the suitcase did contain drugs. Id. Finally, after having had the suitcase in their possession for twenty-four hours, the agents applied for and obtained a warrant to search the 31 suitcase based on the probable cause provided by the canine alert. Id. Upon conducting the search, the agents discovered more than 2,000 grams of cocaine in the suitcase. Id. The defendant moved to suppress the cocaine evidence, arguing that the agents’ initial seizure of the suitcase was unlawful because it was unsupported by probable cause. Id. at 767. The district court in Scales denied the motion, finding that, even if the seizure of the suitcase was unlawful, the good faith exception ratified the agents’ behavior. Id. We reversed, holding that Leon was inapplicable “[b]ecause the DEA agents were not acting in reliance on a search warrant when they seized the luggage and held it for more than twenty-four hours.” Id. at 768. Our holding was informed by the reasoning in Leon that “Penalizing the officer for the magistrate’s error, rather than his [or her] own, cannot logically contribute to the deterrence of Fourth Amendment violations.” Id. at 768 (quoting Leon, 468 U.S. at 921) (alteration in original). Because the contraposition is also true—that penalizing an officer for his or her own error does contribute to deterrence—we determined that the exclusionary rule must apply to the agents’ unlawful pre-warrant seizure of the suitcase. Id. Scales and Leon control our outcome here. Cravens conducted an unlawful search of Loera’s CDs on November 27 in the absence of a warrant. He included the tainted fruit that he uncovered during that search in the affidavit that he submitted in support of the second warrant. Cravens’ warrant affidavit was facially valid, and therefore the magistrate did not error by issuing a warrant based upon it. Instead, the constitutional error came from Agent Cravens. 32 The government argues that Cravens acted in good faith because he “transparently informed the magistrate judge of the steps he had taken to obtain the descriptions he included in his affidavit.” Aple. Br. at 40. Cravens’ affidavit provided some information about the first search. It explained that, while executing the first search warrant, the FBI agents identified four CDs that contained child pornography and seized them. Then, Cravens wrote: On November 27, 2012, the writer, an FBI certified CART Technician, reviewed the four CDs, each of which are designated in attachment A, that were believed to contain child pornography. During the review of the CDs, the writer observed multiple pictures of children many of which are in various state of dress including the following images . . . . ROA Vol. I at 50. However, that information was not sufficient to allow the magistrate to determine the constitutionality of the second search such that the magistrate can be said to have endorsed Cravens’ pre-warrant conduct. Furthermore, even if it was, that would not affect our outcome. Tenth Circuit precedent dictates that the good faith exception does not apply at all when a warrant affidavit is based on tainted evidence from a prior, unlawful search. Four other circuits have likewise concluded that Leon is inapplicable when an officer executes in good faith a search warrant that is based on unlawfully-obtained evidence. United States v. Scott, 731 F.3d 659, 664 (7th Cir. 2013) (holding that evidence discovered pursuant to a warrant based on illegally-obtained evidence will be inadmissible unless other, untainted information in the affidavit establishes probable cause); United States v. Mowatt, 513 F.3d 395, 405 (4th Cir. 2008) (holding that “Leon only prohibits penalizing officers for their good-faith reliance on 33 magistrates’ probable cause determinations” and that the exclusionary rule operates to penalize officers for any unconstitutional conduct preceding a magistrate’s involvement); United States v. McGough, 412 F.3d 1232 (11th Cir. 2005) (refusing to apply good faith exception where an unlawful entry into the defendant’s apartment led to the officer’s request for a search warrant); United States v. Vasey, 834 F.2d 782, 789 (9th Cir. 1987) (holding that good faith exception did not apply to a warrant that was based on information obtained in an illegal warrantless search because “[t]he constitutional error was made by the officer . . ., not by the magistrate”). At least two commentators support this analysis as well. See Wayne R. LaFave, Search & Seizure: A Treatise on the Fourth Amendment § 1.3(f) (5th ed. 2016) (explaining that, because courts rarely require affiants to prove that they obtained the evidence listed in an affidavit lawfully, “there is no reason why that process should, via Leon, shield that activity from full scrutiny at the suppression hearing”); Craig M. Bradley, The “Good Faith Exception” Cases: Reasonable Exercise in Futility, 60 Ind. L.J. 287, 302 (1985) (quoting Leon, 468 U.S. at 914) (“When the magistrate issued the warrant, he did not endorse past activity; he only authorized future activity. . . . [T]he function of the magistrate is to determine ‘whether a particular affidavit establishes probable cause,’ not whether the methods used to obtain the information in that affidavit were legal.”). However, five other circuits have concluded that the good faith exception can apply where an affidavit supporting a search warrant is tainted by illegally-obtained evidence in at least some limited circumstances. Three of those circuits apply the 34 good faith exception if the predicate search, although ultimately determined to be unlawful, was arguably lawful under the binding precedent in effect at the time of the search. United States v Bain, 874 F.3d 1, 22–23 (1st Cir. 2017) (applying good faith exception because binding precedent did not “clearly classify” as unlawful the conduct that invalidated the predicate search); United States v. Hopkins, 824 F.3d 726 (8th Cir. 2016) (applying good faith exception because the reasonableness of the illegal predicate search was “close enough to the line of validity” to make an officer’s belief in the validity of the warrant objectively reasonable); United States v. Holley, 831 F.3d 322, 326–27 (5th Cir. 2016) (also applying “close enough to the line of validity” test). Two other circuits apply the good faith exception in these types of cases when (1) the predicate search was arguably reasonable and (2) the warrant affidavit truthfully conveyed the circumstances of the illegal predicate search to the magistrate judge. United States v. McClain, 444 F.3d 556, 566 (6th Cir. 2005) (applying Leon because the reasonableness of the predicate search was a close call and the warrant affidavit “fully disclosed” the circumstances surrounding the initial warrantless search); United States v. Thomas, 757 F.2d 1359 (2d Cir. 1985) (applying good faith exception because officer’s affidavit fully described the unlawful, prewarrant canine sniff that supplied probable cause for the warrant and there was “nothing more the officer could have or should have done” to be sure his search was legal). We cannot read Leon or Scales to support the rules adopted by these courts. When a magistrate issues a warrant based on illegally obtained evidence, typically the manner in which the affidavit evidence is obtained is not before the magistrate, and the 35 magistrate is not asked explicitly to endorse the evidence-gathering procedure. Even though some disclosure of the evidence-gathering technique may have occurred, that is not ordinarily the focus of an application for a warrant. Thus, we are unwilling to read a warrant as ratifying the information-gathering process of a search that preceded it. In any event, we are bound by Scales, which appears to us to have been correctly decided. Therefore, the district court erred by finding that the good faith doctrine applied to the searches Agent Nishida conducted in execution of the second warrant. 3. Inevitable discovery doctrine supports denial of Loera’s motion Finally, we consider whether the government would have inevitably discovered the child pornography evidence on Loera’s electronic devices. Loera argues that, because there was no probable cause to support the second warrant, all evidence discovered as a result of the execution of the second warrant should have been suppressed. The issue before us, then, is whether the FBI agents would have inevitably discovered the roughly 330 child pornography images on Loera’s CDs and 730 child pornography images on Loera’s laptop that Nishida found when he executed the second warrant. We conclude that they would have. Accordingly, we affirm the district court’s denial of Loera’s motion to suppress. When evidence is obtained in violation of the Fourth Amendment, that evidence need not be suppressed if agents inevitably would have discovered it through lawful means independent from the unconstitutional search. United States v. Christy, 739 F.3d 534, 540 (10th Cir. 2014). The government is required to prove by a preponderance of the evidence that the unlawfully-obtained evidence would have been 36 discovered through lawful means. Id. The “lawful means” need not be a second, independent investigation. Id. Rather, the inevitable discovery doctrine will apply if there was “one line of investigation that would have led inevitably to the obtaining of a search warrant by independent lawful means but was halted prematurely by a search subsequently contended to be illegal.” Id. (citations omitted). The key to applying this doctrine is to place the government officers in the “same positions they would have been in had the impermissible conduct not taken place,” and, from that vantage point, to ask whether the government would have inevitably discovered the evidence lawfully. Nix v. Williams, 467 U.S. 431, 447 (1984). Here, the district court’s supportable findings demonstrate by a preponderance of the evidence that the FBI would have inevitably discovered the child pornography evidence on Loera’s electronic devices through lawful means independent from Agent Cravens’ unlawful second search. On November 26 (the day before the second search), the government lawfully had in its possession Loera’s computers, external hard drives, iPhone, iPad, and thirteen CDs (nine without child pornography and four with child pornography).4 The government had the authority under the first warrant to search Loera’s electronic devices—most importantly his laptop and CDs—for evidence of computer fraud. The district court issued an explicit factual finding that, had the second warrant never been obtained, Agent Nishida would “have searched [Loera’s 4 As mentioned above, although Loera challenges the first search of these four CDs, he does not separately challenge their seizure were we to determine, as we have, that the first search was constitutional. 37 laptop] for evidence of electronic mail hijacking and computer fraud pursuant to the [f]irst [w]arrant.” Dist. Ct. Op. at 24. The district court further found that, as part of that search, lawfully conducted pursuant to the parameters of the first warrant, Agent Nishida would have searched the electronic folders where he discovered child pornography when he executed the second warrant, including, the “My Documents” folder, the “Bookmarks” tab of Loera’s internet browser, and a folder saved on the Desktop titled “Allmyfiles.txt.” Id. at 24–25. The district court also accepted Nishida’s statement that, had he found child pornography images on the laptop during a search conducted solely pursuant to the first warrant, he would have “alerted the case agent so that [he] could get a search warrant for child pornography.” Id. at 25. The laptop, including the specific files referenced above, contained over 730 images and 40 movies involving child pornography. Id. at 24. To take one specific example, the “Allmyfiles.txt” file, which the district court found Nishida would have lawfully opened pursuant to the first warrant, contained files called “Spycam 9yr Undress.” Id. Such information would have been sufficient to establish probable cause to support a warrant to search all of the electronic devices belonging to Loera that the government had in its possession, including the four CDs that Agent Cravens searched unlawfully on November 27. That fact, combined with Agent Nishida’s indication that he would have sought a warrant, allows us to conclude that the inevitable discovery doctrine applies in this case such that the evidence discovered pursuant to the second warrant did not need to be suppressed. 38 III. CONCLUSION For the foregoing reasons, we AFFIRM the orders of the district court denying the defendant’s motion to suppress and motion for reconsideration. 39
Primary Holding

The Fourth Amendment did not require police officers to stop executing an electronic search warrant when they discovered evidence of an ongoing crime outside the scope of the warrant, so long as their search remained directed at uncovering evidence specified in that warrant.


Disclaimer: Justia Annotations is a forum for attorneys to summarize, comment on, and analyze case law published on our site. Justia makes no guarantees or warranties that the annotations are accurate or reflect the current state of law, and no annotation is intended to be, nor should it be construed as, legal advice. Contacting Justia or any attorney through this site, via web form, email, or otherwise, does not create an attorney-client relationship.

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.