United States v. Michael Karrer

460 F. App'x 157
CourtCourt of Appeals for the Third Circuit
DecidedFebruary 1, 2012
Docket11-2642
StatusUnpublished
Cited by4 cases

This text of 460 F. App'x 157 (United States v. Michael Karrer) is published on Counsel Stack Legal Research, covering Court of Appeals for the Third Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Michael Karrer, 460 F. App'x 157 (3d Cir. 2012).

Opinion

OPINION OF THE COURT

HARDIMAN, Circuit Judge.

Michael Karrer appeals his judgment of conviction for possession of child pornography under 18 U.S.C. § 2252(a)(4)(B) after the District Court refused to suppress evidence found pursuant to a search warrant he claims was general, overbroad, and lacking in probable cause. We will affirm.

I

Because we write solely for the parties, who are well acquainted with the case, we recount only the essential facts and procedural history.

Pennsylvania State Trooper Glenn Bard began investigating Karrer after monitors at Neopets, a children’s website with virtual pets and online chat functionality, noticed “inappropriate communication” from a 37-year-old male registered user. 1 *159 Working with a Neopets security consultant, Bard discovered that Karrer’s various Neopets accounts originated from one computer and that Karrer had a MySpace page. Upon viewing Karrer’s MySpace profile photograph, Bard recognized him from a 2003 investigation for unlawful contact with a minor. Using Karrer’s internet protocol (IP) address and the Pennsylvania driver’s license database, Bard determined that Karrer lived at the Pittsburgh address from which the Neo-pets communications originated.

On May 13, 2008, Bard applied for a warrant to search Karrer’s residence for evidence of unlawful contact with a minor in violation of 18 Pa. Cons.Stat. § 6318. 2 In his application, Bard requested authorization to search and seize

[a]ll computer internal and peripheral storage devices, (such as fixed disks, external hard disks, floppy disk drives, and diskettes, tape drives, tapes, and optical storage devices), peripheral input / output devices (such as keyboards, printers, hardware, including, but not limited to, any equipment which can collect, analyze, create, display, convert, store, conceal, or transmit electronic, magnetic, optical or similar computer impulses or data ... [and][a]ny computer processing units, scanners, plotters, video display monitors, and optical readers), and related communication devices such as modems, cables, and connections, recording equipment, as well as any devices, mechanisms, or parts that can be used to restrict access to computer hardware.

In addition to the broad array of computer-related items, Bard sought authorization to search for and seize “[a]ny cellular phones, smart phones, (IE blackberry, iPhone, and so on) and personal data assistants which can be used for the purpose of accessing the internet, chat programs, or e-mail applications.” Bard attached a seven-page affidavit detailing his experience in computer forensics and his investigation of Karrer’s Neopets communications. He explained that in light of the numerous ways in which evidence on computers can be masked, hidden, or deleted, “it is very often necessary to take all computer hardware and software found at the suspected location.” Bard also expressed the intent to transport the computer-related items from Karrer’s residence to an off-site location for a thorough forensic search.

The Magistrate Judge issued a warrant granting Bard permission to search for and seize all computer-related items and *160 cell phones listed in his affidavit. The warrant listed the “date(s) of violation” as November 2007 through May 2008 and expressly incorporated the affidavit by reference. It also erroneously indicated that the seized items would be “searched for evidence relating to the possession and/or distribution of child pornography.”

Later that day, Bard and Trooper Scott Lucas executed the warrant at Karrer’s address. In Karrer’s bedroom, Lucas identified a computer and a Motorola KLM cellular phone. According to Lucas, he searched the phone because it was capable of transmitting “text-type communications” and e-mails and accessing the Internet. Lucas decided to view the phone’s photos folder because cell phones often store remnants of Internet-based communications as image files in that type of folder. When Lucas accessed the photos folder, he immediately saw what he believed to be a male hand touching a young girl’s genitals. Lucas showed the photo to Bard and stopped searching the cell phone. Lucas also seized Karrer’s computer but did not search it at Karrer’s residence.

Bard and Pennsylvania State Police Supervisor Corporal Robert Erderly approached Karrer to discuss the image found on his cell phone. They told Karrer they wished to record a conversation with him but that he was under no obligation to speak with them and could stop the discussion at any time. They also read Karrer the Miranda warnings. During the conversation, Karrer admitted that he had taken three photographs of his four-year-old niece, that he had touched her genitals, and that he had chatted with minor girls on the Internet. He further confessed that his computer and a separate CD contained sexually explicit photographs of a girl he met on MySpace. Karrer then gave the officers his signed consent to view the CD images. Based on the information they had gathered, the officers obtained a second search warrant for child pornography 3 and notified local police of Karrer’s potential offenses against his four-year-old niece.

Upon searching Karrer’s computer, cell phone, and CD, police located sexually explicit conversations with minors and photographs of minors “in various states of undress,” which were eventually used to indict him on three criminal counts. Count One charged Karrer with violating 18 U.S.C. § 2251(a), which criminalizes sexual exploitation of a minor “for the purpose of producing [a] visual depiction of such conduct.” Counts Two and Three alleged receipt and possession of child pornography in violation of 18 U.S.C. § 2252(a)(2) and (4)(B), respectively. After Karrer’s motion to suppress was denied by the District Court, he entered a conditional guilty plea to Count Three, reserving his right to challenge “whether the search warrant was invalid because it was not supported by probable cause, because it violated the particularity requirement, or because it was overly broad.” Thereafter, Karrer was sentenced to 120 months’ imprisonment and a life term of supervised release pursuant to his plea agreement. He timely appealed.

II

The District Court had jurisdiction under 18 U.S.C. § 3231, and we have jurisdiction under 28 U.S.C. § 1291. When reviewing a district court’s suppression ruling, we review its factual findings for clear error and exercise plenary review *161 over its legal conclusions. E.g., United States v. Tracey,

Free access — add to your briefcase to read the full text and ask questions with AI

Related

People v. Reyes
2020 IL App (2d) 170379 (Appellate Court of Illinois, 2020)
United States v. Dewald
361 F. Supp. 3d 413 (M.D. Pennsylvania, 2019)
Wheeler v. State
135 A.3d 282 (Supreme Court of Delaware, 2016)
Church of Universal Love & Music v. Fayette County
892 F. Supp. 2d 736 (W.D. Pennsylvania, 2012)

Cite This Page — Counsel Stack

Bluebook (online)
460 F. App'x 157, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-michael-karrer-ca3-2012.