United States v. Jon Lackner

535 F. App'x 175
CourtCourt of Appeals for the Third Circuit
DecidedAugust 14, 2013
Docket12-2771
StatusUnpublished
Cited by1 cases

This text of 535 F. App'x 175 (United States v. Jon Lackner) is published on Counsel Stack Legal Research, covering Court of Appeals for the Third Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Jon Lackner, 535 F. App'x 175 (3d Cir. 2013).

Opinion

OPINION

VANASKIE, Circuit Judge.

At issue on this appeal is the validity of a search of a laptop computer undertaken by agents of the Federal Bureau of Investigation pursuant to search warrants issued by New Jersey and Pennsylvania authorities. The District Court denied Appellant Jon Lackner’s motion to suppress the inculpatory evidence revealed by the search, concluding that the FBI agents acted within the scope of the validly-issued warrants and that, in any event, they relied in good faith on the warrants, precluding suppression of evidence as a remedy. We agree with the District Court’s analysis. Accordingly, we will affirm the District Court’s judgment.

I.

We write primarily for the parties, who are familiar with the facts and procedural history of this case. Accordingly, we set forth only those facts necessary to our analysis.

In the Fall of 2008, Lackner, a resident of Cherry Hill, New Jersey, was the subject of an investigation undertaken by the Police Department of Bensalem, Pennsylvania as a result of internet communications between Lackner and a fictitious fourteen year-old girl named “Jessica.” The internet communications were sexual in nature and graphic, and included a live video transmission of Lackner masturbating while communicating with “Jessica.” When Lackner traveled to Bensalem on March 24, 2009 for the purpose of having sex with “Jessica,” he was arrested by Bensalem law enforcement officers.

Using the information gathered by the Bensalem authorities, Cherry Hill, New Jersey police officers procured a warrant to search Lackner’s residence. The affida *177 vit submitted in support of the search warrant application concluded that there was probable cause to believe that computers and other electronic devices, such as cameras and disks, constituted evidence of the crime of Endangering the Welfare of a Child, in violation of N.J. Stat. Ann. § 2C:24^4. The affidavit explained that the electronic devices would have to be searched by an analyst, and requested permission to turn these items over to Bensa-lem Police for further search. The New Jersey warrant explicitly permitted “any officer of any police department having jurisdiction” to search Lackner’s residence for computers and other electronic devices for “evidence of the crime of Endangering the Welfare of a Child.” (App.41).

Execution of the warrant resulted in the seizure of three computers (a Sony laptop, a Toshiba laptop, and a Dell desktop), three web cameras, and two flash drives. In addition, Lackner’s employer, Main Street Dental, gave police a desktop computer used by Lackner. All of the seized items were turned over to the Bensalem Police, which subsequently turned over the computers and other electronic evidence to the Pennsylvania State Police Computer Crime Lab.

Bensalem Police then applied for a second warrant, seeking permission to search “the items seized from Jon Lackner ... and Main Street Dental ... which are currently housed at Bensalem Township Police Headquarters.” (Supp.App.1.) The affidavit accompanying the warrant application listed nine electronic devices to be searched. The computers seized from Laekner’s house and the Main Street Dental computer were the last four items listed. The affidavit sought permission to search the nine devices “for images and/or data that involve the application or documentation of Unlawful Contact with a Minor and Criminal Use of a Communications Facility including but not limited to instant messaging archives, buddy lists, photographs, phone books/logs, text messages, emails, and documents relating to residency and computer ownership.” (Supp.App.8). Twice in its concluding paragraph the affidavit listed the nine devices in the same order.

The accompanying warrant issued by a Pennsylvania judicial officer described the “premises or persons” to be searched as the items taken from Lackner’s home and Main Street Dental, but the list of items to be searched omitted the last three devices identified in the concluding paragraph of the affidavit, including the Sony laptop. Although only six devices were specifically listed on the section of the warrant specifying the items to be searched, the Pennsylvania State Police examiner proceeded to search all nine devices identified in the affidavit accompanying the warrant application, including the Sony laptop. This initial search indicated that the Sony laptop did not contain evidence relating to “Jessica.”

In December of 2009, a federal grand jury in the Eastern District of Pennsylvania returned a five-count indictment, charging Lackner with federal offenses arising out of his interaction with “Jessica.” In October of 2010, shortly before trial was scheduled to commence, Lack-ner’s counsel claimed that discovery was incomplete, and requested a mirror image of the Sony laptop’s hard drive. The government acceded to this request, but only after the FBI conducted a forensic examination of the laptop.

During this examination, the FBI found a video of a 16 year-old girl exposing herself to Lackner, along with chat logs documenting Lackner’s directions to the girl while he watched and recorded her on his computer. In light of this development, a federal grand jury returned a superseding *178 indictment that added one count charging Lackner with using a minor to produce visual depictions of sexually explicit conduct, in violation of 18 U.S.C. § 2251(a), and one count charging Lackner with possession of child pornography, in violation of 18 U.S.C. § 2252(a)(4).

Before trial on the superseding indictment began, Lackner moved to suppress the evidence found on the Sony laptop. The District Court denied the Motion to Suppress on three grounds: (1) the search was authorized under the terms of the New Jersey warrant; (2) the search was valid under the Pennsylvania warrant because the Sony laptop had been omitted from the list of items to be searched as the result of a “clerical error,” and (3) the FBI had acted in good faith in believing that the Pennsylvania warrant authorized the search of the Sony laptop. After the motion to suppress was denied, Lackner successfully moved to sever the two additional counts of the superseding indictment and proceeded to trial on the original five counts. After a seven day jury trial, Lack-ner was convicted on all five counts.

Lackner subsequently pled guilty to the two counts added by the superseding indictment. As part of the plea agreement, the parties stipulated that Lackner would retain his right to appeal the District Court’s decision on the Motion to Suppress.

The District Court sentenced Lackner to 120 months’ imprisonment on counts one through five, and seven, and 180 months on count six, which charged Lackner with the use of a minor to produce visual depictions of sexually explicit conduct. All sentences were to be served concurrently. The District Court also imposed a five-year term of supervised release, a fine of $1,500, and a special assessment of $700. Lackner filed this timely appeal, limited to the District Court’s denial of his Motion to Suppress the evidence seized from the Sony laptop.

II.

The District Court had jurisdiction under 18 U.S.C.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Dewald
361 F. Supp. 3d 413 (M.D. Pennsylvania, 2019)

Cite This Page — Counsel Stack

Bluebook (online)
535 F. App'x 175, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-jon-lackner-ca3-2013.