United States v. Joseph Keck, Jr.

2 F.4th 1085
CourtCourt of Appeals for the Eighth Circuit
DecidedJune 29, 2021
Docket19-3534
StatusPublished
Cited by4 cases

This text of 2 F.4th 1085 (United States v. Joseph Keck, Jr.) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eighth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Joseph Keck, Jr., 2 F.4th 1085 (8th Cir. 2021).

Opinion

United States Court of Appeals For the Eighth Circuit ___________________________

No. 19-3534 ___________________________

United States of America

Plaintiff - Appellee

v.

Joseph Keck, Jr.

Defendant - Appellant ____________

Appeal from United States District Court for the Eastern District of Arkansas - Little Rock ____________

Submitted: January 14, 2021 Filed: June 29, 2021 ____________

Before LOKEN, GRASZ, and KOBES, Circuit Judges. ____________

GRASZ, Circuit Judge.

Joseph Keck was convicted in the district court1 on five child-pornography- related counts. See 18 U.S.C. §§ 2251(d); 2252(a)(2), (a)(4)(B). Without a warrant, federal agents seized Keck’s electronic devices from his van. A later warrant-

1 The Honorable James M. Moody, Jr., United States District Judge for the Eastern District of Arkansas. supported search of those devices revealed that Keck had downloaded and shared child pornography. The district court denied Keck’s suppression motion, holding that the warrantless seizure of the devices was justified. The court listed several alternative Fourth-Amendment theories to support its decision.

Keck appeals that ruling, arguing that the warrantless seizure of his devices was unconstitutional and unjustified. He also argues that the evidence was insufficient to support his conviction. For the reasons stated below, we affirm.

I. Background

In 2016, the Swiss federal police told the Federal Bureau of Investigation that an internet protocol (“IP”) address in Arkansas was distributing child pornography on a file sharing website known as GigaTribe. The FBI tied the IP address to Matthew Fee. Agents then questioned him. Fee, a former local law enforcement officer who was then at a police academy, pointed the FBI agents to his future father- in-law, Joseph Keck. Fee’s fiancée Danika (Keck’s daughter) did too.

Keck worked as a long-haul trucker and stayed at the Fees’ house periodically when he was in town. Several years earlier, Keck had spent thirty days in jail and paid a $16,000 fine for a child-pornography conviction.

When the agents first made contact with the Fees on a Friday night, the couple consented to the seizure and search of their personal electronic devices. Those searches came up empty. The following Monday, the FBI discovered that another jurisdiction was investigating Keck for child-pornography-related crimes. The Fees told the agents that they expected Keck to return to their house that afternoon.

The lead agent on the case asked his supervisor and the FBI’s in-house legal counsel for advice. He was advised that (1) the FBI could lawfully seize Keck’s electronic devices without a warrant to prevent Keck from destroying them, and (2) the agents needed to do so as soon as Keck returned to town. -2- When Keck arrived at the Fees’ house on Monday, two FBI agents were there waiting for him. They pulled their vehicles next to Keck’s van in the Fees’ driveway, got out, and questioned him. Keck told them he had come from Atlanta and had slept at a West Memphis, Arkansas hotel. The agents told Keck they needed his electronic media.

Keck gathered his devices—including two laptops, a cell phone, a portable hard drive, and a memory card—from his van. Initially, he only turned over two devices. But after the agents told him that lying to the FBI during an investigation is a felony, he went back to the van and got the rest. During the encounter, the agents did not yell or threaten Keck, and he could not see their guns.

After obtaining a search warrant for Keck’s devices, the FBI’s examination revealed twelve file-sharing accounts associated with Keck’s computers. An Oklahoma-based FBI investigation had previously linked one of those accounts to child pornography. Another account had used an IP address from the West Memphis hotel where Keck told the agents he had stayed the night before they seized his devices. One of the laptops contained a folder, which in turn contained sub-folders with thousands of downloaded child pornography videos and images.

The government charged Keck with five crimes: two counts of receiving child pornography, and one count each of possessing, advertising, and attempting to distribute child pornography. See 18 U.S.C. §§ 2251(d); 2252(a)(2), (a)(4)(B). Keck moved to suppress the evidence recovered from his electronic devices. The district court denied that motion without written order, reasoning that the warrantless seizure was justified by (1) the consent exception, (2) the exigent-circumstances exception, or (3) the inevitable-discovery doctrine. At trial, the jury returned a guilty verdict on all counts. The district court sentenced Keck to 300 months of imprisonment and five years of supervised release.

-3- II. Analysis

On appeal, Keck first argues that the district court wrongly denied his suppression motion because no exception to the Fourth Amendment’s warrant requirement applies. He next argues that the evidence against him is insufficient to support his conviction for the attempted distribution of child pornography.

A. Suppression Motion

In the context of a motion to suppress, we review the district court’s factual findings for clear error and its legal conclusions de novo. See United States v. McCoy, 847 F.3d 601, 605 (8th Cir. 2017). We affirm the denial unless it “is unsupported by substantial evidence, is based on an erroneous view of the applicable law, or in light of the entire record, we are left with a firm and definite conviction that a mistake has been made.” United States v. Farnell, 701 F.3d 256, 260–61 (8th Cir. 2012) (quoting United States v. Rodriguez-Hernandez, 353 F.3d 632, 635 (8th Cir. 2003)). We may affirm on any ground supported by the record. See United States v. Murillo-Salgado, 854 F.3d 407, 414 (8th Cir. 2017).

The Fourth Amendment protects against “unreasonable searches and seizures[.]” U.S. Const. amend. IV. While the “ultimate touchstone” of any Fourth Amendment analysis is “reasonableness,” Brigham City v. Stuart, 547 U.S. 398, 403 (2006), the Supreme Court has long held that a warrant is required for all searches and seizures, unless an exception to the warrant-requirement applies. See Groh v. Ramirez, 540 U.S. 551, 559–60 (2004).

One such exception, long-recognized by the Court, is the automobile exception. See Carroll v. United States, 267 U.S. 132, 149 (1925); Collins v. Virginia, 138 S. Ct. 1663, 1669–70 (2018) (explaining the two rationales behind the exception: the “ready mobility” of vehicles and their “pervasive regulation”). The automobile exception is a categorical one: “Probable cause to believe that an automobile contains contraband or evidence of criminal activity has long been held -4- to justify a warrantless search of the automobile and seizure of the contraband.” United States v. Shackleford, 830 F.3d 751, 753 (8th Cir. 2016).

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. John Nock
Eighth Circuit, 2025
United States v. Louis Rabbitt, Jr.
142 F.4th 1085 (Eighth Circuit, 2025)
United States v. Odell Hampton
Eighth Circuit, 2025
United States v. Herbert Green
39 F.4th 510 (Eighth Circuit, 2022)

Cite This Page — Counsel Stack

Bluebook (online)
2 F.4th 1085, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-joseph-keck-jr-ca8-2021.