FILED United States Court of Appeals UNITED STATES COURT OF APPEALS Tenth Circuit
FOR THE TENTH CIRCUIT July 28, 2020
Christopher M. Wolpert _________________________________ Clerk of Court UNITED STATES OF AMERICA,
Plaintiff - Appellee,
v. No. 19-3043 (D.C. No. 6:17-CR-10045-EFM-1) PATRICK STEIN, (D. Kan.)
Defendant - Appellant. _________________________________
ORDER AND JUDGMENT* _________________________________
Before HARTZ, EBEL, and MATHESON, Circuit Judges. _________________________________
In this direct criminal appeal, Defendant Patrick Stein challenges his
conviction for possession of child pornography, arguing the Government unlawfully
obtained the evidence on which this charge was based using a defective search
warrant. Having jurisdiction under 28 U.S.C. § 1291, we reject Stein’s arguments
and AFFIRM his conviction.
I. BACKGROUND
After an eight-month investigation, the Federal Bureau of Investigation
(“FBI”), in October 2016, arrested Stein and two other members of a militia group
* This order and judgment is not binding precedent, except under the doctrines of law of the case, res judicata, and collateral estoppel. It may be cited, however, for its persuasive value consistent with Fed. R. App. P. 32.1 and 10th Cir. R. 32.1. for conspiring to use a weapon of mass destruction against Muslim Somali
immigrants living in southwestern Kansas. Agents then obtained a warrant to search
Stein’s home, where they seized, among other things, a computer and several thumb
drives. While going through the contents of those electronic devices, agents came
across images of child pornography. They stopped their search, obtained a second
warrant authorizing the agents to search for child pornography and, in executing that
second warrant, discovered up to 149 images of child pornography on the computer
and two of the thumb drives seized from Stein’s home.
Based on those images, the United States charged Stein in this case with one
count of possessing child pornography in violation of 18 U.S.C. § 2252A(a)(5)(B)
and (b)(2). Stein unsuccessfully moved in this case to suppress the evidence seized
during the search of his home conducted pursuant to the first search warrant. He then
conditionally pled guilty to possession of child pornography, reserving his right to
appeal the denial of his suppression motion. See Fed. R. Crim. P. 11(a)(2). The
district court sentenced Stein to forty-four months in prison on the child pornography
conviction, to run consecutively to the 360-month sentence Stein received for his
convictions stemming from the conspiracy to use a weapon of mass destruction.
II. DISCUSSION
The focus of this appeal, then, is the validity of the warrant the FBI obtained to
search Stein’s home for evidence of the conspiracy to use a weapon of mass
destruction. Summarizing, that warrant authorized FBI agents to search for and seize
several categories of “fruits, evidence, and/or instrumentalities” of that criminal
2 activity, including tools and materials that could be used to make bombs, receipts for
the purchase of bomb-making materials, bomb-making instructions, including those
that are “computer-generated or stored,” “[a]ny writing or printed word items or
computer files . . . that may relate to terrorist individuals, explosives, bombs,
terrorism, or terrorist attacks,” information on individuals who may have contacted
Stein and his co-defendants “by use of the computer or by other means for the
purpose of conspiring to commit an act of terrorism,” computers, electronic storage
devices, and cell phones. (I R. 72-74.) In this appeal, Stein specifically challenges
the warrant’s authorization for agents to seize the computer and thumb drives on
which the FBI discovered images of child pornography.
A. Probable cause
The Fourth Amendment provides that “no Warrants shall issue, but upon
probable cause, supported by Oath or affirmation, and particularly describing the
place to be searched, and the persons or things to be seized.” U.S. Const. amend. IV.
Stein first contends that there was no probable cause to support the search warrant’s
authorization to search his home for computers and other electronic storage devices
in connection with the conspiracy to use a weapon of mass destruction.
1. Probable cause existed to believe Stein had a computer, it would be found in his home, and it would contain evidence related to the conspiracy to use a weapon of mass destruction
Stein asserts that the affidavit the FBI submitted to obtain the search warrant
for Stein’s home lacked sufficient information from which the magistrate judge
issuing the warrant could have concluded that there was probable cause to believe
3 Stein possessed a computer or other electronic storage device, such devices would be
found in his home, and they would contain information regarding the conspiracy to
use a weapon of mass destruction.1 See Wayne R. LaFave, Search and Seizure: A
Treatise on the Fourth Amendment § 3.7(d) (5th ed. updated Oct. 2019) (noting
probable cause to support a search warrant requires that there be “a sufficient nexus
between (1) criminal activity, and (2) the things to be seized, and (3) the place to be
searched”); see also United States v. Knox, 883 F.3d 1262, 1277 (10th Cir. 2018) (“In
order for an affidavit to establish probable cause there must be a nexus between the
[item] to be seized and the place to be searched” (internal quotation marks, alteration
omitted)).
The magistrate judge’s probable cause determination involved “a practical,
common-sense decision whether, given all the circumstances set forth in the affidavit
before him, . . . there is a fair probability that contraband or evidence of a crime will be
found in a particular place.” Illinois v. Gates, 462 U.S. 213, 238 (1983). We review de
novo the district court’s decision rejecting Stein’s challenge to the search warrant.
See United States v. Wagner, 951 F.3d 1232, 1246 (10th Cir. 2020). However, “we
afford great deference” to the issuing magistrate judge’s determination that there was
probable cause to support the search warrant, asking on appeal “only whether, under
the totality of the circumstances presented in the affidavit, the judge had a substantial
1 In the district court, Stein characterized this problem, not as a lack of probable cause, but instead as the search warrant being overly broad. The district court, however, treated this issue as one involving probable cause. So does Stein on appeal. 4 basis for determining that probable cause existed.” Id. (internal quotation marks,
alteration omitted). In making that determination on appeal, we view the evidence in
the light most favorable to the Government. See id. at 1243.
Free access — add to your briefcase to read the full text and ask questions with AI
FILED United States Court of Appeals UNITED STATES COURT OF APPEALS Tenth Circuit
FOR THE TENTH CIRCUIT July 28, 2020
Christopher M. Wolpert _________________________________ Clerk of Court UNITED STATES OF AMERICA,
Plaintiff - Appellee,
v. No. 19-3043 (D.C. No. 6:17-CR-10045-EFM-1) PATRICK STEIN, (D. Kan.)
Defendant - Appellant. _________________________________
ORDER AND JUDGMENT* _________________________________
Before HARTZ, EBEL, and MATHESON, Circuit Judges. _________________________________
In this direct criminal appeal, Defendant Patrick Stein challenges his
conviction for possession of child pornography, arguing the Government unlawfully
obtained the evidence on which this charge was based using a defective search
warrant. Having jurisdiction under 28 U.S.C. § 1291, we reject Stein’s arguments
and AFFIRM his conviction.
I. BACKGROUND
After an eight-month investigation, the Federal Bureau of Investigation
(“FBI”), in October 2016, arrested Stein and two other members of a militia group
* This order and judgment is not binding precedent, except under the doctrines of law of the case, res judicata, and collateral estoppel. It may be cited, however, for its persuasive value consistent with Fed. R. App. P. 32.1 and 10th Cir. R. 32.1. for conspiring to use a weapon of mass destruction against Muslim Somali
immigrants living in southwestern Kansas. Agents then obtained a warrant to search
Stein’s home, where they seized, among other things, a computer and several thumb
drives. While going through the contents of those electronic devices, agents came
across images of child pornography. They stopped their search, obtained a second
warrant authorizing the agents to search for child pornography and, in executing that
second warrant, discovered up to 149 images of child pornography on the computer
and two of the thumb drives seized from Stein’s home.
Based on those images, the United States charged Stein in this case with one
count of possessing child pornography in violation of 18 U.S.C. § 2252A(a)(5)(B)
and (b)(2). Stein unsuccessfully moved in this case to suppress the evidence seized
during the search of his home conducted pursuant to the first search warrant. He then
conditionally pled guilty to possession of child pornography, reserving his right to
appeal the denial of his suppression motion. See Fed. R. Crim. P. 11(a)(2). The
district court sentenced Stein to forty-four months in prison on the child pornography
conviction, to run consecutively to the 360-month sentence Stein received for his
convictions stemming from the conspiracy to use a weapon of mass destruction.
II. DISCUSSION
The focus of this appeal, then, is the validity of the warrant the FBI obtained to
search Stein’s home for evidence of the conspiracy to use a weapon of mass
destruction. Summarizing, that warrant authorized FBI agents to search for and seize
several categories of “fruits, evidence, and/or instrumentalities” of that criminal
2 activity, including tools and materials that could be used to make bombs, receipts for
the purchase of bomb-making materials, bomb-making instructions, including those
that are “computer-generated or stored,” “[a]ny writing or printed word items or
computer files . . . that may relate to terrorist individuals, explosives, bombs,
terrorism, or terrorist attacks,” information on individuals who may have contacted
Stein and his co-defendants “by use of the computer or by other means for the
purpose of conspiring to commit an act of terrorism,” computers, electronic storage
devices, and cell phones. (I R. 72-74.) In this appeal, Stein specifically challenges
the warrant’s authorization for agents to seize the computer and thumb drives on
which the FBI discovered images of child pornography.
A. Probable cause
The Fourth Amendment provides that “no Warrants shall issue, but upon
probable cause, supported by Oath or affirmation, and particularly describing the
place to be searched, and the persons or things to be seized.” U.S. Const. amend. IV.
Stein first contends that there was no probable cause to support the search warrant’s
authorization to search his home for computers and other electronic storage devices
in connection with the conspiracy to use a weapon of mass destruction.
1. Probable cause existed to believe Stein had a computer, it would be found in his home, and it would contain evidence related to the conspiracy to use a weapon of mass destruction
Stein asserts that the affidavit the FBI submitted to obtain the search warrant
for Stein’s home lacked sufficient information from which the magistrate judge
issuing the warrant could have concluded that there was probable cause to believe
3 Stein possessed a computer or other electronic storage device, such devices would be
found in his home, and they would contain information regarding the conspiracy to
use a weapon of mass destruction.1 See Wayne R. LaFave, Search and Seizure: A
Treatise on the Fourth Amendment § 3.7(d) (5th ed. updated Oct. 2019) (noting
probable cause to support a search warrant requires that there be “a sufficient nexus
between (1) criminal activity, and (2) the things to be seized, and (3) the place to be
searched”); see also United States v. Knox, 883 F.3d 1262, 1277 (10th Cir. 2018) (“In
order for an affidavit to establish probable cause there must be a nexus between the
[item] to be seized and the place to be searched” (internal quotation marks, alteration
omitted)).
The magistrate judge’s probable cause determination involved “a practical,
common-sense decision whether, given all the circumstances set forth in the affidavit
before him, . . . there is a fair probability that contraband or evidence of a crime will be
found in a particular place.” Illinois v. Gates, 462 U.S. 213, 238 (1983). We review de
novo the district court’s decision rejecting Stein’s challenge to the search warrant.
See United States v. Wagner, 951 F.3d 1232, 1246 (10th Cir. 2020). However, “we
afford great deference” to the issuing magistrate judge’s determination that there was
probable cause to support the search warrant, asking on appeal “only whether, under
the totality of the circumstances presented in the affidavit, the judge had a substantial
1 In the district court, Stein characterized this problem, not as a lack of probable cause, but instead as the search warrant being overly broad. The district court, however, treated this issue as one involving probable cause. So does Stein on appeal. 4 basis for determining that probable cause existed.” Id. (internal quotation marks,
alteration omitted). In making that determination on appeal, we view the evidence in
the light most favorable to the Government. See id. at 1243.
Doing so here, we conclude there was a substantial basis included in the
supporting affidavit for the magistrate judge issuing the search warrant for Stein’s
home to determine that there was a fair probability that digital evidence of the
conspiracy—including computer-generated or stored bomb-making instructions,
computer files related to terrorist individuals, explosives, bombs, terrorism or
terrorist attacks, and information on individuals who may have contacted Stein and
his co-defendants for the purpose of conspiring to commit an act of terrorism—would
be found in Stein’s home.
The affidavit indicated that Stein’s co-conspirators downloaded bomb-making
instructions from the internet, watched bomb-making videos on YouTube, and used
computers to research targets for their bombs. In addition, Stein procured fertilizer
for the bomb and was assigned the task of acquiring a rock tumbler which was
needed for the bomb-making. These activities could be expected to produce a digital
trail. So, too, could Stein’s surveillance of several possible targets, in light of the
group’s desire “to get photos and videos of the” possible target locations. (I R. 63
¶ 23.)
The affidavit further indicated that Stein and his co-conspirators
communicated by cell phones, often using the “phone-based application” Zello,
which allowed the conspirators to speak to one another “as if their cellular telephones
5 were push-to-talk walkie-talkies.” (I R. 51 ¶ 2 & n.1.) Further, in September 2016,
Stein indicated that the group should “begin discussing project strategies via an
encrypted mobile messaging application.” (I R. 66 ¶ 29.)
As the district court noted, the FBI’s affiant
identified many instances where Stein used electronic devices to communicate with his co-conspirators via the internet. While much of this activity was conducted on Stein’s phone, it was reasonable to infer that some of the online activity could have been done on a computer, as well. Furthermore, the affidavit established that, based on the affiant’s training and experience, such electronic communications are sometimes automatically downloaded to electronic devices with internet access and can be recovered from the device’s “cache.”
(I R. 407.) That might also be true of any digital surveillance photos Stein may have
taken. See United States v. Reichling, 781 F.3d 883, 887 (7th Cir 2015) (recognizing
that it is “common knowledge . . . that images sent via cell phones . . . may be readily
transferred to other storage devices”).
This information, viewed in the light most favorable to the Government, see
Wagner, 951 F.3d at 1243, provided a substantial basis for the magistrate judge
issuing the search warrant to determine that there was probable cause—a fair
possibility—that Stein had digital evidence of the conspiracy. Furthermore, it was
reasonable for the magistrate judge to infer, from this information, that there was a
fair possibility that this digital evidence would be on electronic devices found in
Stein’s home. Cf. Peffer v. Stephens, 880 F.3d 256, 272 (6th Cir. 2018) (noting
computers “are personal possessions often kept in their owner’s residence and
therefore subject to the [Sixth Circuit’s] presumption that a nexus exists between an
6 object used in a crime and the suspect’s current residence”). See generally United
States v. Biglow, 562 F.3d 1272, 1279 (10th Cir. 2009) (considering “the nature of
the evidence sought” and “all reasonable inferences as to where a criminal would
likely keep such evidence”).
The Government asks, in the alternative, that we affirm by applying United
States v. Leon, 468 U.S. 897 (1984)’s good-faith exception. We do so, ruling that
even if the magistrate judge’s probable cause determination was wrong, an objective
officer could still have relied in good faith on that probable cause determination. See
id. at 922. In reaching that conclusion, we reject Stein’s characterization of the
warrant as “so lacking in indicia of probable cause to search for computers and other
electronic storage devices as to render official belief in its existence entirely
unreasonable.” (Aplt. Br. 27).
2. Franks issue
Invoking Franks v. Delaware, 438 U.S. 154 (1978), Stein next argues that the
FBI was able to obtain the search warrant authorizing the search of Stein’s home for
computers and other electronic devices only by intentionally or recklessly omitting
four material facts from the affidavit submitted in support of the search warrant
application.2 See Harte v. Bd. of Comm’rs, 864 F.3d 1154, 1162 (10th Cir. 2017)
(per curiam) (recognizing Franks applies to deliberate or reckless material omissions
2 On the basis of this argument, the district court granted Stein a Franks hearing and, at Stein’s suggestion, took judicial notice of the transcripts of the Franks hearing conducted in the weapons-of-mass-destruction prosecution. 7 in affidavit for search warrant, as well as deliberately or recklessly false statements
included in affidavit). Those four omitted facts, Stein contended, show that he did
not own or use a computer. Reviewing de novo, see United States v. Garcia-
Zambrano, 530 F.3d 1249, 1254 (10th Cir. 2008), we conclude, as did the district
court, that the four omitted facts were not material because, even considering the
omitted information, there remained probable cause to believe digital evidence of the
conspiracy to use a weapon of mass destruction would be found on electronic devices
in Stein’s home. See United States v. Herrera, 782 F.3d 571, 575 (10th Cir. 2015)
(“If . . . the affidavit contains intentional, knowing, or reckless omissions, a court
must add in the omitted facts and assess the affidavit in that light.”).
The first omitted fact—that Stein told an FBI informant, in April 2016, that the
informant should not make any plans on a computer because Stein did not want there
to be any record—indicated only that, at least early in the conspiracy, Stein did not
want the informant to use a computer to make a record of the conspiracy’s plans, not
that Stein was not himself using a computer. Furthermore, later in the conspiracy,
Stein’s two co-defendants, with his knowledge, used computers and accessed the
internet to research bomb making and to look for possible targets for the
conspirators’ bombs.
The second and third omitted facts indicated that, in August 2016, Stein asked
the informant if he knew anyone who had a “decent laptop they wanna get rid of”
and, three days later, Stein told the informant that he had “been in desperate need of a
computer for some time,” because he was having to conduct all his online activity on
8 his phone. (I R. 35-36.) Stein argues that these two omitted statements established
that he had no computer. But, as the district court recognized, these statements
indicated that Stein was actively seeking to obtain a computer at that time, two
months before his arrest and the search of his home. These two omitted facts, then,
further support probable cause to believe that, by the time of his arrest, two months
later, there was a fair probability that Stein had obtained the computer he desperately
needed.
The fourth omitted fact was that, three weeks before Stein was arrested, the
informant, in September 2016, while discussing with a third person the best way to
contact Stein, stated that Stein does everything on his phone because he does not
have a computer or internet. There is no indication, however, that this statement by
the informant was based on anything other than what Stein had told the informant
over one month earlier, in August 2016. This omitted fact did little to establish that
Stein still had no computer at that time, three weeks before his arrest.
For these reasons, then, we agree with the district court that, even if the FBI
had included these four omitted facts in its affidavit submitted in support of the
search warrant, there was still probable cause to believe there would be digital
evidence of the conspiracy on a computer or some other electronic storage device
found in Stein’s home in October 2016.
B. Stein waived his challenges to the particularity of the warrant
For the first time on appeal, Stein argues that the search warrant failed to state
with sufficiently particularity “the types of electronic media or computer files that
9 fall within its scope,” and failed “to limit the scope of the search for electronic
devices and files to the crime charged,” the conspiracy to use a weapon of mass
destruction. (Aplt. Br. 19, 22.) Stein, however, never made these arguments to the
district court.
Stein contends that he did preserve these arguments for appeal because he
made a broad particularity argument in the district court. But in the district court,
Stein argued instead that the search warrant was too broad because it allowed agents
to seize all sorts of common household items that could be used to make a bomb,
including, for example, glassware, stirring sticks, hammers, drill bits, staplers,
batteries, screws, nails, staples and the like. That is substantively different than the
particularity argument Stein now asserts for the first time on appeal, challenging the
breadth of the search that the warrant permitted of the seized computers and other
electronic devices. See United States v. Warwick, 928 F.3d 939, 944-45 (10th Cir.
2019) (rejecting contention that argument first raised on appeal was preserved by a
broad reading of the suppression motion before the district court).
Rule 12, Fed. R. Crim. P., provides that a motion to suppress evidence must be
made prior to trial, or it is waived, absent the defendant showing good cause for his
failure to raise the issue pretrial in the district court. See Rule 12(b)(3)(C), (c)(3).
That waiver rule also applies when, as here, a defendant makes a motion to suppress
to the district court, but then raises a new suppression argument for the first time on
appeal. See Warwick, 928 F.3d at 944. Here, Stein does not attempt to show good
cause why he failed to make in the district court the particularity argument he now
10 asserts on appeal, challenging the breadth of the search of the seized electronic
devices the warrant permitted. See id. We, therefore, cannot consider that new
argument. See United States v. Bowline, 917 F.3d 1227, 1229-37 (10th Cir. 2019),
cert. denied, 140 S. Ct. 1129 (2020).3
III. CONCLUSION
For the foregoing reasons, then, we reject Stein’s challenges to the search
warrant that led FBI agents to discover child pornography on Stein’s computer and
thumb drives and AFFIRM his conviction for possession of that child pornography.
Entered for the Court
David M. Ebel Circuit Judge
3 A second reason why we cannot address Stein’s particularity argument raised for the first time on appeal is that Stein entered a conditional guilty plea, see Fed. R. Crim. P. 11(a)(2), preserving only his right to appeal the denial of the suppression motion that he made to the district court and otherwise waiving his right to appeal. See United States v. White, 584 F.3d 935, 946-48 (10th Cir. 2009); United States v. Anderson, 374 F.3d 955, 957-58 (10th Cir. 2004).