United States v. Eric Bradley

488 F. App'x 99
CourtCourt of Appeals for the Sixth Circuit
DecidedJuly 5, 2012
Docket11-5198
StatusUnpublished
Cited by10 cases

This text of 488 F. App'x 99 (United States v. Eric Bradley) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Eric Bradley, 488 F. App'x 99 (6th Cir. 2012).

Opinion

MARTHA CRAIG DAUGHTREY, Circuit Judge.

Defendant Eric J. Bradley pleaded guilty to a charge of receiving visual depictions of minors engaged in sexually explicit conduct, in violation of 18 U.S.C. § 2252(a)(2), while reserving the right to appeal the district court’s denial of his motion to suppress evidence obtained from his personal laptop computer. Specifically, Bradley contends that the police violated the Fourth Amendment when they seized the laptop -without a warrant, without his consent, and in the absence of exigent circumstances. Because the district court did not clearly err when it determined that exigent circumstances existed, and because the manner and duration of the execution of the warrantless seizure was reasonable, we affirm the district court’s denial of Bradley’s motion to suppress.

FACTUAL AND PROCEDURAL BACKGROUND

The evidence supporting the decision to deny Bradley’s motion to suppress was summarized by the district court as follows:

This case arises from an investigation of the trading of child pornography online through Gnutella, a free, internet-based file sharing network. In October 2008, Attorney General Investigator Bell conducted an undercover investigation that targeted internet protocol (“IP”) ad *101 dresses that displayed hash values, commonly described as digital fingerprints, of known or suspected child pornography.
During the course of his investigation, Investigator Bell determined that a specific IP address in Fayette County had been observed displaying file names and hash values consistent with known or suspected child pornography, and that this IP address was assigned to a fire station located at 1098 South Cleveland Road in Lexington, Kentucky. After several unsuccessful attempts to connect to the publicly shared LimeWire folder of that computer, Bell filed an open records request with the Lexington Fire Department in an effort to match the dates he observed the computer running in LimeWire and displaying child pornography to the dates and shifts of any employees assigned to the fire station. He determined that all dates coincided with one specific crew assigned to the fire station.
Based on information from the Fire Department’s Division of Internal Affairs, Investigator Bell and Attorney General Investigator Kathryn Reed traveled to the fire station on June 30, 2009. Following their arrival, Bell obtained a consent form from the defendant, Eric J. Bradley, to load an image scan onto his computer in order to access any child pornography that might have been present. For reasons unknown, the program was unable to load, and Investigator Bell was not able to view any images of child pornography. Investigator Bell then asked for Bradley’s permission to examine his LimeWire. props file. Bradley verbally consented to that request and provided Investigator Bell with his password to access the data. After reviewing that section, Investigator Bell found the Globally Unique Identifier (“GUID”), which had been previously associated with downloading suspected child pornography files. Investigator Bell then asked to speak to Bradley privately. They went to another room at the station, and during their subsequent conversation, which occurred at approximately 2:30 p.m., Investigator Bell advised Bradley that he was seizing Bradley’s computer and applying for a search warrant. Investigator Bell explained that the matching GUID indicated that the computer had displayed known child pornography images over the internet. Bradley denied any knowledge of child pornography on the computer and stated that he was the sole user of the computer with the exception of his fourteen-year old son, and that he did not have internet service at his home.

United States v. Bradley, No. 09-136-JBC, 2010 WL 2471885, at *1-*2 (E.D.Ky. June 16, 2010) (footnote omitted). Bell made no attempt to obtain a search warrant for the seized computer that afternoon. Instead, he applied for and received a state search warrant for the computer the next day. The forensic examination of the laptop “revealed approximately 50 videos and over 100 photographs containing suspected child pornography.” Bradley, 2010 WL 2471885, at *2.

Bradley moved the district court to suppress all evidence obtained from the laptop computer, arguing that Bell had seized his computer without obtaining a search warrant and without Bradley’s consent and that no exception to the warrant requirement applied. The district court made three findings. First, the district judge concluded that Bell had probable cause to believe that Bradley’s computer held child pornography, based on the matching GUID numbers and Bradley’s statement that only he and his 14-year-old son had access to the computer. Id. Second, the *102 district court found that “Bell’s concern that Bradley would destroy the computer and/or any evidence it contained constituted exigent circumstances.” Id. at *3. Finally, the district court determined that the warrantless seizure of the laptop was “sufficiently limited in scope and timing” that the approximately 26-hour delay was not unreasonable. Id. at *4. Based on these findings, the district court found the warrantless seizure reasonable and denied Bradley’s motion to suppress. Id.

DISCUSSION

The Fourth Amendment to the United States Constitution protects the people “against unreasonable searches and seizures.” U.S. Const, amend. IV. A seizure of personal property is “per se unreasonable ... unless it is accomplished pursuant to a judicial warrant issued upon probable cause and particularly describing the items to be seized.” United States v. Place, 462 U.S. 696, 701, 103 S.Ct. 2637, 77 L.Ed.2d 110 (1983). If law enforcement authorities have probable cause to believe a container holds evidence of a crime and the “exigencies of the circumstances demand it,” seizure of the container pending issuance of a warrant to examine the contents is permitted. Id. (citing cases). However, “a seizure lawful at its inception can nevertheless violate the Fourth Amendment because its manner of execution unreasonably infringes possesso-ry interests protected by the Fourth Amendment’s prohibition on unreasonable seizures.” United States v. Jacobsen, 466 U.S. 109, 124, 104 S.Ct. 1652, 80 L.Ed.2d 85 (1984) (internal quotations omitted). The government has the burden of proving the legality of a warrantless search. United States v. Beal, 810 F.2d 574, 577 (6th Cir.1987) (citing United States v. Matlock, 415 U.S. 164, 177, 94 S.Ct. 988, 39 L.Ed.2d 242 (1974)).

Bradley has never challenged the district court’s finding that there was probable cause to believe that his laptop contained evidence of child pornography. 1

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State of Florida v. Reddick
District Court of Appeal of Florida, 2025
STATE OF FLORIDA v. JEFFREY DARTER
District Court of Appeal of Florida, 2022
State v. Jeremy J. Deen
Court of Appeals of Wisconsin, 2021
State of West Virginia v. Joshua S. Deem
West Virginia Supreme Court, 2020
United States v. Smith
919 F.3d 1 (First Circuit, 2019)
United States v. Knowles
207 F. Supp. 3d 585 (D. South Carolina, 2016)
United States v. Ammons
207 F. Supp. 3d 732 (W.D. Kentucky, 2016)
United States v. Gholston
993 F. Supp. 2d 704 (E.D. Michigan, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
488 F. App'x 99, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-eric-bradley-ca6-2012.