United States v. Eric Thomas , 818 F.3d 1230 ( 2016 )


Menu:
  •                Case: 14-14680       Date Filed: 04/01/2016      Page: 1 of 29
    [PUBLISH]
    IN THE UNITED STATES COURT OF APPEALS
    FOR THE ELEVENTH CIRCUIT
    ________________________
    No. 14-14680
    ________________________
    D.C. Docket No. 8:13-cr-00462-VMC-TBM-1
    UNITED STATES OF AMERICA,
    Plaintiff-Appellee,
    versus
    ERIC THOMAS,
    Defendant-Appellant.
    ________________________
    Appeal from the United States District Court
    for the Middle District of Florida
    ________________________
    (April 1, 2016)
    Before HULL, JULIE CARNES, and CLEVENGER, * Circuit Judges.
    HULL, Circuit Judge:
    *
    Honorable Raymond C. Clevenger, III, United States Circuit Judge for the Federal
    Circuit, sitting by designation.
    Case: 14-14680     Date Filed: 04/01/2016     Page: 2 of 29
    After a jury trial, Eric Thomas, a federal prisoner, is serving a 96-month
    sentence, followed by a life term of supervised release, on his conviction for
    knowingly accessing with the intent to view child pornography. On appeal,
    Thomas challenges the district court’s denial of his motion to suppress evidence
    discovered on a HP desktop computer in his home. After a careful review of the
    record and with the benefit of oral argument, we affirm.
    I. PROCEDURAL OVERVIEW
    On September 25, 2013, following a police search of Eric Thomas’s home
    computers, a federal grand jury indicted Thomas for one count of knowingly
    accessing with the intent to view child pornography, in violation of 18 U.S.C.
    § 2252(a)(4)(B) and (b)(2). Thomas filed a motion to suppress evidence gathered
    from the HP desktop computer at his home. A magistrate judge held three hearings
    on the motion to suppress, on December 20 and 23, 2013 and February 5, 2014,
    and issued a report and recommendation (“R&R”), recommending a denial of
    Thomas’s motion. The district court adopted the R&R and denied the motion to
    suppress.
    After a three-day trial, the jury found Thomas guilty of knowingly accessing
    with the intent to view child pornography. On September 29, 2014, the district
    court sentenced him to 96 months’ imprisonment followed by a life term of
    supervised release. Thomas does not appeal his sentence but only his conviction
    2
    Case: 14-14680      Date Filed: 04/01/2016   Page: 3 of 29
    based on the denial of his suppression motion. We thus review the evidence
    adduced at the suppression hearings, the arguments on the suppression motion, and
    the district court’s ruling.
    II. MOTION TO SUPPRESS
    A.     December 20, 2013 Suppression Hearing
    At the December 20, 2013 hearing, Officer Matt Steiner of the Largo Police
    Department testified that he was the first officer to arrive at Thomas’s house on
    July 21, 2012. Officer Steiner stated that he arrived at approximately 11:11 a.m.,
    in response to a telephone report that there was child pornography on a computer
    within the home. He spoke to Caroline Olausen, Thomas’s then-wife, who had
    contacted the police.
    According to Officer Steiner, Olausen told him that, on the previous night,
    Thomas had appeared nervous and his heart was racing. That morning, Olausen
    discovered eight to ten child pornography websites on a computer in their shared
    home. She explained that she found the pictures after turning on the computer
    monitor and clicking “yes” when asked if she wanted to “restore the previous
    Internet Explorer session.” Olausen explained that the websites featured naked
    prepubescent and pubescent girls, some of whom were performing oral sex on
    adult men.
    3
    Case: 14-14680     Date Filed: 04/01/2016   Page: 4 of 29
    Officer Steiner testified that he learned that Thomas was sleeping, so he
    asked Olausen for consent to search the computers in the residence. Olausen told
    him that she and Thomas both used the computers, but Thomas used the computers
    more often than she did and used them for work purposes. Olausen then gave oral
    and written consent to search all of the electronic media in the residence, which
    included an HP desktop computer, a Dell desktop computer, a Toshiba tablet, and a
    Maxtor internal hard drive. She also consented in writing to the removal of “any
    property” from the home. Officer Steiner believed that Olausen had the authority
    to consent to a search and seizure because the computers were in an unlocked
    home office within the residence and Olausen used at least the HP desktop
    computer that had allegedly displayed the child pornography.
    According to Officer Steiner, when he approached the HP desktop computer,
    two websites were in plain view and he could use the mouse to move between the
    sites. The websites were called “NNLollys” and “HDSchoolTeens,” and both
    featured “pictures of young girls that had only their underwear on.” The girls were
    not engaged in any sexual activity. Officer Steiner did not have to type in a
    password to view the computer screen. Officer Steiner stated that he did not
    conduct any forensic analysis of the computers. After viewing the websites on the
    HP computer, he provided “scene security” and “officer safety” while other agents
    4
    Case: 14-14680     Date Filed: 04/01/2016   Page: 5 of 29
    performed forensic analyses of the electronic media. He departed from the
    Thomas residence at 1:37 p.m.
    Detective Nathan Dix testified that he was a cybercrimes detective for the
    Largo Police Department and an agent on the Federal Bureau of Investigation’s
    (“FBI”) Child Exploitation Task Force. He arrived at Thomas’s house at
    12:18 p.m., after Officer Steiner had begun the initial investigation. Detective Dix
    stated that he received a briefing and then examined the home office area and the
    HP desktop computer, which was easily accessible within the office. He
    concluded that there was child erotica, but no child pornography, on the two
    websites visible on the HP computer. Notably though, Officer Steiner testified that
    the “NNLollys” website visible on the computer had links to other websites with
    terms indicative of child pornography.
    Detective Dix spoke with Olausen after viewing the webpages. Olausen
    confirmed that she had provided consent to search the computers and repeated why
    she had contacted the police. According to Detective Dix, Olausen told him that
    she had arrived home earlier than expected the previous night. She saw Thomas
    get up “very quickly” from “the area of his computer desk.” He was acting
    nervous and strange, and when she hugged him his heart was pounding.
    Olausen continued that, when she woke up that morning, she turned on the
    monitor of the HP computer, restored the previous browsing history, and watched
    5
    Case: 14-14680     Date Filed: 04/01/2016   Page: 6 of 29
    eight to ten Internet windows appear. The windows contained child pornography,
    in Olausen’s opinion. She saw nude pictures of 4-to-13-year old children and
    some of the children were in “sex poses” or being “sexually abused.” In one
    instance, there was an image with “an adult male penis and a completely nude
    child’s vagina.” Detective Dix testified that the described images constituted child
    pornography. He assumed that there were only two webpages left open on the HP
    computer when the police arrived because Olausen had mistakenly closed some of
    the tabs or was wrong about how many webpages she had seen.
    Detective Dix further testified that Olausen stated that she and Thomas both
    used the computers, though “Thomas was the primary user of the computers
    because he worked from home and utilized them through his work.” Olausen
    explained that Thomas was normally “compulsive” about properly shutting down
    the computers, using pop-up-ware and spam filters, and deleting his Internet
    cookies. At the end of Detective Dix’s conversation with Olausen, Olausen again
    orally consented to a search of the computers and said that Thomas was asleep.
    After this conversation, Detective Dix returned to the home office and
    conducted a forensic search of the Dell desktop computer. He explained that he
    used a “forensic scan on-site preview tool to scan that hard drive for video and
    image files.” Eventually, Detective Corey Monaghan arrived in the room to scan
    the HP desktop computer using the “OS Triage” forensic search tool.
    6
    Case: 14-14680    Date Filed: 04/01/2016   Page: 7 of 29
    While Detective Dix was conducting the scan, Thomas woke up. Detective
    Dix saw Thomas walk toward the home office area, but Officer James Shinn
    intercepted him before he could enter. Officer Shinn told Thomas to go to the
    living room and he would explain what was happening. Detective Monaghan also
    left the home office to interview Thomas.
    Detective Dix testified that Detective Monaghan was gone from the home
    office for about 40 to 45 minutes. During that time, Detective Dix completed the
    forensic scan of the Dell computer and began scanning the Toshiba tablet. When
    Detective Monaghan returned, he told Detective Dix that Thomas had revoked
    consent and they had to stop the search. Both officers stopped their forensic search
    tools. They seized all of the electronic media in the residence. Detective Dix
    believed that there was probable cause to seize the evidence and that there was a
    “high risk that evidence could be destroyed or deleted” if left in the Thomas
    household. Detective Dix testified that he did not discover any child pornography
    pursuant to his preliminary forensic reviews of the Dell computer and Toshiba
    tablet.
    Officer James Shinn of the Largo Police Department testified that he arrived
    at the Thomas residence at 1:31 p.m. He was instructed by officers already present
    at the house that Thomas was sleeping in a bedroom and he should keep watch to
    7
    Case: 14-14680    Date Filed: 04/01/2016   Page: 8 of 29
    see if Thomas wakes up. Officer Shinn positioned himself so that he could see the
    bedroom.
    From his post, Officer Shinn observed Thomas leave the bedroom and walk
    toward the office. According to Officer Shinn, Detective Monaghan spoke to
    Thomas and asked Thomas to go to the living room. Thomas, however, continued
    walking toward the office, so Officer Shinn blocked the doorway to the office and
    told Thomas to speak to Detective Monaghan. Officer Shinn testified that he was
    concerned about Thomas going into the office because there were tools in that
    room that could be used as weapons.
    Thomas complied with Officer Shinn’s directions and went to the living
    room to talk to Detective Monaghan. Officer Shinn could hear Detective
    Monaghan and Thomas’s conversation from where he was standing. Officer Shinn
    testified that Detective Monaghan asked Thomas to consent to a search of the
    computers and Thomas replied, “Yes, that would be fine.” Detective Monaghan
    then asked Thomas to fill out a consent-to-search form. Thomas agreed and began
    writing on the form, but then stopped and asked to see his wife. Detective
    Monaghan replied that Thomas could speak to Olausen after they dealt with the
    form.
    At that point, according to Officer Shinn, Thomas started to equivocate
    about filling out the form. Thomas said that he would sign the form if he could
    8
    Case: 14-14680    Date Filed: 04/01/2016    Page: 9 of 29
    speak to Olausen. Detective Monaghan urged Thomas to “make a clear decision,”
    and when Thomas again asked to talk to Olausen, Detective Monaghan instructed
    him to make an “informed decision.” According to Officer Shinn, Thomas became
    increasingly upset and asked again to speak with Olausen. Officer Shinn tried to
    explain to him that Detective Monaghan was attempting to protect his rights by
    soliciting a clear answer concerning consent to search.
    Officer Shinn testified that Detective Monaghan left the living room to ask
    Olausen if she was willing to talk to Thomas. Detective Monaghan came back and
    informed Thomas that Olausen did not want to speak to him. Thomas then stated
    that his sister was a lawyer and he wanted to talk to her. At that point, Detective
    Monaghan stopped the conversation, and Officer Shinn escorted Thomas to the
    front patio. Officer Shinn thought the conversation between Thomas and Detective
    Monaghan lasted about five or six minutes.
    B.    December 23, 2013 Suppression Hearing
    Detective Monaghan was the sole witness at the second suppression hearing.
    Detective Monaghan testified that he was part of the Largo Police Department’s
    Investigative Services Division and worked on cybercrimes. He also worked on
    the FBI’s Innocent Images Task Force, investigating online child exploitation.
    According to Detective Monaghan, when he arrived at the Thomas residence
    at approximately 12:55 p.m., Detective Dix briefed him on what was happening
    9
    Case: 14-14680       Date Filed: 04/01/2016      Page: 10 of 29
    and informed him that Olausen had consented to a search of the computers.
    Detective Monaghan was under the impression that Thomas was asleep in a
    bedroom, so he proceeded to the office area. He observed that access to the HP
    computer was unrestricted and there were already two websites containing child
    erotica displayed on the computer monitor. At least one of the websites appeared
    to contain links to child pornography.
    Detective Monaghan stated that he initiated his use of the OS Triage forensic
    preview tool at approximately 1:01 p.m. The forensic tool completed a scan of the
    HP computer’s Internet history and computer registry within a minute. 1 Detective
    Monaghan reviewed the Internet history immediately and saw “websites with
    names indicative of child pornography” and browser history consistent with what
    Olausen had described. The OS Triage tool saved the Internet history results to a
    thumb drive.
    Detective Monaghan testified that he left the forensic search running and
    spoke to Olausen. Olausen told him that the images she saw on the computer were
    of “prepubescent” children. Olausen also stated that she used the HP computer to
    “Google” the Largo Police Department earlier that morning. Detective Monaghan
    1
    The OS Triage forensic preview tool was on a thumb drive, which Detective Monaghan
    plugged into the HP desktop computer. The tool immediately gathered information from the
    computer’s Internet history and registry. It also did a more time-consuming secondary scan of
    the computer for images, videos, and “key words that match[ed] a list within the software of
    names indicative of child pornography.” Detective Monaghan ultimately cancelled the
    secondary search before that portion of the scan was complete. The Internet history relied upon
    in the search warrant was available after the first scan.
    10
    Case: 14-14680     Date Filed: 04/01/2016   Page: 11 of 29
    hypothesized that the other six to eight child erotica/pornography websites Olausen
    had seen were not on the screen when the police arrived because Olausen had
    inadvertently closed the websites when she used Google that morning before
    calling the police. Finally, Olausen stated that the HP computer was password
    protected and she and Thomas shared access to the password.
    After Detective Monaghan turned his attention back to analyzing the Internet
    history, Thomas came out of the bedroom. Detective Monaghan testified that he
    left the home office and met Thomas in the living room to explain why the police
    were in the house. Thomas denied viewing child pornography, but admitted to
    accessing adult pornography, and immediately gave oral consent to search the
    computers in the home office.
    Detective Monaghan asked Thomas to sign a consent-to-search form to
    memorialize his oral consent. Thomas, instead of signing, asked to speak to
    Olausen. Detective Monaghan testified that he “again asked [Thomas] if he
    wanted to sign the consent to search.” Thomas responded a second time that he
    wanted to speak to his wife. Detective Monaghan walked away from Thomas to
    locate Olausen, who was waiting outside of the house. Olausen did not want to
    speak with Thomas, so Detective Monaghan returned to the living room to convey
    this information to Thomas. Thomas said that he would not sign the consent-to-
    search form until he talked to his wife.
    11
    Case: 14-14680        Date Filed: 04/01/2016       Page: 12 of 29
    After this ultimatum, Detective Monaghan attempted to “clarify” whether
    Thomas was consenting to the search, but Thomas continued to insist on talking to
    Olausen. Thomas also mentioned that his sister was an attorney and he wanted to
    speak to her. Detective Monaghan testified that, at that point, he determined that
    Thomas was revoking his oral consent. Detective Monaghan went to the office
    area and told Detective Dix that consent had been withdrawn, and he shut down the
    OS Triage tool. Data from the forensic scan showed that Detective Monaghan
    terminated the search at 1:50 p.m. Detective Monaghan stated that he seized the
    computer media and planned to obtain a search warrant. He did not want to leave
    the computers at the Thomas residence because, in his experience, the evidence
    would be destroyed.
    Detective Monaghan testified that he later, on August 22, 2012, reviewed the
    results of the OS Triage forensic scan, looked at the websites listed in the Internet
    history, and discovered that at least one of the websites had an image of child
    pornography. On August 24, 2012, Detective Monaghan obtained a federal search
    warrant. 2 Detective Monaghan stated that he would have pursued a search warrant
    even without the forensic evidence. After Detective Monaghan obtained the search
    2
    The State Attorney’s Office advised Detective Monaghan that the evidence he gathered
    at the house and from the forensic scan were insufficient to obtain a search warrant for any state
    offense.
    12
    Case: 14-14680     Date Filed: 04/01/2016   Page: 13 of 29
    warrant, he conducted a complete forensic analysis of the HP computer and found
    about 860 images of child pornography.
    After the testimony concluded, Thomas argued that, under Georgia v.
    Randolph, 
    547 U.S. 103
    , 
    126 S. Ct. 1515
    (2006), he negated Olausen’s consent to
    search the computers, and therefore the officers acted illegally when they removed
    the thumb drive of forensic evidence and the computers from his home without his
    consent. Thomas also claimed that all of the evidence obtained pursuant to the
    federal search warrant was fruit of the poisonous tree, as the warrant application
    included the results of the OS Triage forensic scan.
    The government responded that the withdrawal of consent does not require
    police officers to give back the evidence they have already gathered. It
    emphasized that Detective Monaghan obtained a search warrant based solely on
    the information stored on the thumb drive and did not search the HP computer
    again until he had the warrant. Additionally, the government asserted that there
    was probable cause to seize the computers, and the officers did not need a warrant
    because there were legitimate concerns that Thomas would destroy the evidence if
    they left the computers at the residence.
    C.    February 5, 2014 Oral Argument on Motion to Suppress
    When the magistrate judge called for additional argument on the suppression
    motion, Thomas broadened his position and claimed that Randolph should be
    13
    Case: 14-14680     Date Filed: 04/01/2016   Page: 14 of 29
    expanded to require police officers to obtain both spouses’ consent before
    searching a shared home when both spouses are present. Thomas also argued that:
    (1) the officers did not have probable cause to seize the HP computer because
    Olausen’s tip was unsubstantiated at the time of the seizure and the officers did not
    observe any child pornography on the HP computer; (2) Thomas “veto[ed]”
    Olausen’s consent, so the police could not rely on her signed consent form
    authorizing them to seize any item in the house to justify removing the HP
    computer; (3) the police could not justify the seizure based on a disappearing-
    evidence exception to the warrant requirement because they had ample time to
    secure the premises and obtain a search warrant if they were truly concerned about
    the destruction of evidence; and (4) the warrant affidavit, even as written, did not
    establish probable cause because Detective Monaghan visited the websites over a
    month after Thomas allegedly opened them, and the contents may have changed
    during that time, or Thomas may have accessed the websites inadvertently.
    The government argued three theories in support of the search and seizure.
    First, the government claimed that Olausen’s consent allowed the officers to search
    and seize the computers and take the thumb drive. Second, the government
    contended that the exigent circumstances exception to the warrant requirement
    allowed them to seize the computers to prevent Thomas from destroying the
    evidence. Third, the government stated that under the plain view doctrine, officers
    14
    Case: 14-14680      Date Filed: 04/01/2016   Page: 15 of 29
    can seize obviously incriminating items without a warrant when they have lawful
    access to the items. It argued that there was no dispute that the officers were
    lawfully within the Thomas residence, and it maintained that it was clear that the
    computers contained incriminating evidence based on (1) Olausen’s statements,
    which were consistent on key points, (2) the visible child erotica websites, and
    (3) the initial results of the OS Triage forensic scan.
    D.    R&R and District Court’s Ruling
    The magistrate judge filed an R&R, recommending denial of Thomas’s
    motion to suppress. The magistrate judge found that Olausen “shared authority
    and access over the home, the home-office area, and the computers found therein.”
    The magistrate judge also found that Thomas “verbally consented to the search of
    the computers when first asked but shortly thereafter balked at signing a written
    consent to search form.” The forensic data that Officer Monaghan relied on to
    obtain the search warrant had been downloaded for nearly 50 minutes before
    Thomas withdrew his consent to search.
    Based on these factual findings, the magistrate judge determined that the
    officers had Olausen’s consent to enter the house and search and seize the
    computers. Olausen’s consent was valid because she shared control of the home
    and the computers, and even if she did not, the officers had a reasonable good-faith
    belief that she had the authority to consent to a search. Therefore, the search and
    15
    Case: 14-14680        Date Filed: 04/01/2016       Page: 16 of 29
    seizure of data from the HP computer was consistent with the Fourth Amendment.
    The magistrate judge concluded that Thomas’s later revocation of consent did not
    require suppression of the evidence the officers had already lawfully obtained:
    “neither the information obtained by the osTriage device nor the information
    developed from review of that information was the fruit of the poisonous tree.”
    The magistrate judge further found that the officers lawfully seized and HP
    computer and removed it from Thomas’s house.3 According to the magistrate
    judge, there was probable cause to believe that there was child pornography on the
    HP computer based on the totality of: (1) Olausen’s statement that she saw images
    that constituted child pornography; 4 (2) the officers’ observation of child erotica on
    the computer with links to websites indicative of child pornography; (3) the
    Internet history displayed by the OS Triage device, which suggested that a user
    visited child pornography or child erotica websites the previous night;
    (4) Thomas’s admission that he viewed adult pornography; and (5) Detective
    Monaghan’s experience with child pornography investigations. Furthermore,
    3
    The magistrate judge found that there was not probable cause to seize Thomas’s other
    electronic media. However, there was nothing to suppress as a result of this finding because the
    police did not discover child pornography on the Dell computer or Toshiba tablet during their
    initial search of the Thomas residence, and they did not search the Dell or Toshiba again after the
    seizure.
    4
    The magistrate judge remarked that Olausen’s written statement concerning her
    discovery of child pornography on the HP computer, which she provided to Officer Steiner
    during the search, was “fairly consistent” with what each officer testified she said in
    conversation.
    16
    Case: 14-14680       Date Filed: 04/01/2016      Page: 17 of 29
    given the portable nature of the computer and its contents, and the fact that Thomas
    was aware of the nature of the police investigation, the magistrate judge concluded
    that it was reasonable for the officers to fear that the evidence would be destroyed
    and seize the HP computer without a warrant.
    Finally, after finding that the search and seizure were lawful, the magistrate
    judge concluded that probable cause supported the search warrant, and the 860
    images of child pornography were admissible. After Thomas filed objections and
    the government responded, the district court adopted the magistrate judge’s R&R
    and denied Thomas’s motion to suppress. This appeal followed.
    III. DISCUSSION
    On appeal, Thomas argues that Olausen did not have the authority to consent
    to a forensic search of the HP computer, and, in the absence of her consent, the
    police did not have a lawful ground for conducting a warrantless forensic scan of
    the computer. Accordingly, Thomas maintains that the results of the forensic
    search and all of the evidence discovered after the police obtained a search warrant
    (based on an affidavit including the results of the OS Triage scan) must be
    suppressed as fruit of the poisonous tree. Thomas also argues that Randolph was
    wrongly decided and should be revisited. 5
    5
    Additionally, Thomas appears to argue, in a single sentence unsupported by any
    citations, that Olausen’s consent was invalid because it was not informed. Thomas asserts that
    Olausen was unaware when she consented to a search of the computers that the police would use
    17
    Case: 14-14680       Date Filed: 04/01/2016       Page: 18 of 29
    A.     Standard of Review
    The denial of a motion to suppress is a mixed question of fact and law.
    United States v. Laist, 
    702 F.3d 608
    , 612 (11th Cir. 2012). We review questions of
    law de novo and questions of fact for clear error, construing the facts in the light
    most favorable to the prevailing party below. 
    Id. We will
    reverse for clear error
    only when we are “left with a definite and firm conviction that a mistake has been
    committed.” United States v. Rothenberg, 
    610 F.3d 621
    , 624 (11th Cir. 2010)
    (quotation marks omitted).
    B.     Third-Party Consent Rule
    The Fourth Amendment guarantees people the right to be “secure in their
    persons, houses, papers, and effects, against unreasonable searches and seizures.”
    U.S. Const. amend. IV. Without a warrant, “a search is reasonable only if it falls
    within a specific exception to the warrant requirement.” Riley v. California, 573
    U.S. ___, ___, 
    134 S. Ct. 2473
    , 2482 (2014). One exception is that a warrantless
    search is lawful when a person with actual or apparent authority voluntarily
    consents to law enforcement officers conducting a search. United States v.
    a forensic tool to reach back into the Internet browser history. Thomas’s one conclusory
    sentence, however, is insufficient to raise the issue of knowing consent by Olausen. See United
    States v. Jernigan, 
    341 F.3d 1273
    , 1283 n.8 (11th Cir. 2003) (“[A] party seeking to raise a claim
    or issue on appeal must plainly and prominently so indicate . . . . At the very least, he must
    devote a discrete, substantial portion of his argumentation to that issue.”). We also note that
    Thomas did not raise this argument below.
    18
    Case: 14-14680       Date Filed: 04/01/2016       Page: 19 of 29
    Watkins, 
    760 F.3d 1271
    , 1279 (11th Cir. 2014); Bates v. Harvey, 
    518 F.3d 1233
    ,
    1243 (11th Cir. 2008).
    When two people share common authority over “premises or effects,” the
    consent of one person “is valid as against the absent nonconsenting person with
    whom the authority is shared.” United States v. Matlock, 
    415 U.S. 164
    , 170, 94 S.
    Ct. 988, 993 (1974). The Supreme Court has explained that it is reasonable to
    recognize that any co-inhabitant can consent to a search of a jointly-controlled area
    because the co-inhabitants assume “the risk that one of their number might permit
    the common area to be searched.” 
    Id. at 171
    n.7, 94 S. Ct. at 993 
    n.7.
    In order to determine whether a person has the authority to consent to a
    search of shared property, courts ask whether there is “mutual use of the property
    by persons generally having joint access or control for most purposes.” 
    Id. Another formulation
    of this standard is whether the defendant has placed the items
    in question “in an area over which others do not share access and control.”
    
    Randolph, 547 U.S. at 135
    , 126 S. Ct. at 1535 (Roberts, C.J., dissenting).6
    C.     Randolph Rule
    In Georgia v. Randolph, the Supreme Court added an exception to this third-
    party consent rule, providing that when a physically present co-inhabitant
    expressly refuses to consent to a police search, such refusal is dispositive,
    6
    Both parties cite Chief Justice Robert’s Randolph dissent in their briefs, and Thomas
    uses this formulation.
    19
    Case: 14-14680      Date Filed: 04/01/2016    Page: 20 of 29
    regardless of the consent of a fellow co-inhabitant. 
    Id. at 114-17,
    126 S. Ct. at
    1523-25. In that case, Defendant Randolph’s wife called law enforcement to their
    shared home after a domestic dispute and informed the officers that there were
    “items of drug evidence” in the house. 
    Id. at 107,
    126 S. Ct. at 1519. Both the
    defendant and his wife were present when the police asked to search the home. 
    Id. The wife
    consented, but the defendant unequivocally refused. 
    Id. The law
    enforcement officers searched the house and discovered cocaine. 
    Id. The Supreme
    Court suppressed the drug evidence, holding that the warrantless search was
    invalid as to Defendant Randolph. 
    Id. at 114-17,
    126 S. Ct. at 1523-25. It
    provided that “a physically present co-occupant’s stated refusal to permit entry
    prevails, rendering the warrantless search unreasonable and invalid as to him.” 
    Id. at 106,
    126 S. Ct. at 1519.
    The Supreme Court in Randolph also addressed the situation presented in
    this appeal: what to do when a co-tenant is asleep when the police knock on the
    door and another co-tenant gives consent to enter and search the 
    residence. 547 U.S. at 121
    , 126 S. Ct. at 1527. The Supreme Court responded to this scenario by
    stating that it was “drawing a fine line” with the Randolph rule, and that “if a
    potential defendant with a self-interest in objecting is in fact at the door and
    objects, the co-tenant’s permission does not suffice for a reasonable search,
    whereas the potential objector, nearby but not invited to take part in the threshold
    20
    Case: 14-14680     Date Filed: 04/01/2016    Page: 21 of 29
    colloquy, loses out.” 
    Id. Thus, the
    Supreme Court expressly declined to require
    police to wake a sleeping co-tenant. See 
    id. D. Applicability
    of the Randolph Rule to Personal Effects
    The Supreme Court crafted the Randolph rule in the context of the search of
    a residence. Both Thomas and the government acknowledge that it is an open
    question whether Randolph applies to searches of personal effects, such as
    computers. Indeed, federal appeals courts have split on this issue. Compare
    United States v. King, 
    604 F.3d 125
    , 135-37 (3d Cir. 2010) (holding that Randolph
    does not apply to searches of personal effects and that the police can search
    personal effects with one user’s consent, even if the other user objects), with
    United States v. Murphy, 
    516 F.3d 1117
    , 1124 (9th Cir. 2008) (“[T]here is no
    reason that the rule in Randolph should be limited to residences.”).
    We need not settle the issue here, though. We see no error in the district
    court’s finding that, in seeking a search warrant, Detective Monaghan relied on
    information obtained before Thomas even objected and attempted to revoke
    Olausen’s consent to search the HP computer. See 
    Laist, 702 F.3d at 612
    .
    Detective Monaghan did not continue searching after Thomas expressed
    uncertainty about signing the written consent form, so assuming that Olausen had
    the authority to consent to a search in the first place, the law enforcement officers
    complied with the Randolph rule.
    21
    Case: 14-14680   Date Filed: 04/01/2016   Page: 22 of 29
    Therefore, whether the applicable rule for searching personal effects is the
    Randolph rule or the general principle that anyone with shared control over the
    property can consent to a search (regardless of the other’s party’s objection), the
    only issue in this case is whether Olausen had actual or apparent authority to
    consent to a forensic search of the computer, even though Thomas had taken steps
    to prevent her from viewing his Internet history. We answer this question in the
    affirmative.
    E.    Olausen’s Authority to Consent
    When the police obtained Olausen’s consent to search the HP computer and
    undertook the forensic scan, they knew that: (1) the computer was easily accessible
    and located in an unlocked room in the Thomas’s shared residence; (2) Olausen
    had access to the computer and had used it that morning; and (3) Olausen and
    Thomas shared the password to access the computer. Based on this information, it
    appeared that Olausen had control and authority over the HP computer, and could
    consent to a forensic search. See 
    Matlock, 415 U.S. at 170
    , 94 S. Ct. at 993.
    The fact that Thomas was the primary user of the computer, worked from
    home, and typically deleted his Internet history, used pop-up-ware and spam
    filters, and usually fully shut down the HP computer (although he did not on the
    night in question) were insufficient to show that Olausen lacked the requisite
    common authority to provide consent. Despite Thomas’s security measures,
    22
    Case: 14-14680     Date Filed: 04/01/2016   Page: 23 of 29
    Olausen had “joint access or control [over the computer] for most purposes,” and
    Thomas did not isolate his Internet use in a manner that prevented Olausen from
    accessing it all together. See 
    Randolph, 547 U.S. at 135
    , 126 S. Ct. at 1535
    (Roberts, C.J., dissenting); 
    Matlock, 415 U.S. at 171
    n.7, 94 S. Ct. at 993 
    n.7.
    We find it particularly significant that Thomas did not protect his Internet
    history from Olausen by maintaining a separate login name and password or by
    encrypting his files. See United States v. Stabile, 
    633 F.3d 219
    , 232-33 (3d Cir.
    2011) (holding that there was valid consent to search and seize computer hard
    drives when the defendant did not password-protect the computers and the
    computers were located in a common area of the house); United States v. King,
    
    604 F.3d 125
    , 137 (3d Cir. 2010) (determining that a defendant who placed his
    hard drive in a shared computer that lacked password protection assumed the risk
    that the other user would consent to a search); Trulock v. Freeh, 
    275 F.3d 391
    , 403
    (4th Cir. 2001) (holding that the defendant did not assume the risk that other users
    of a shared computer would permit a third-party to search his password-protected
    files); see also United States v. Andrus, 
    483 F.3d 711
    , 718-20 (10th Cir. 2007)
    (stating that password protection and the location of the computer are factors in
    determining who has authority to consent to a forensic search of the computer).
    Without separate passwords, encryption, or like measures, Olausen and Thomas
    shared access to the HP computer and all of its data, and by doing so, assumed the
    23
    Case: 14-14680      Date Filed: 04/01/2016    Page: 24 of 29
    risk that the other would allow the police to view the computer’s contents. See
    Matlock, 415 U.S. at at 171 
    n.7, 94 S. Ct. at 993
    n.7.
    F.    Heightened Privacy Interest
    We also hold that Olausen had the authority to consent to a forensic search
    of the HP computer even in recognition that the Supreme Court, in Riley v.
    California, noted a heightened privacy interest in cell phones—which the Supreme
    Court called “minicomputers.” The Riley Court held that the search-incident-to-
    arrest exception to the warrant requirement does not empower law enforcement
    officers to search the contents of an arrestee’s cell phone. Riley, 573 U.S. at ___,
    134 S. Ct. at 2484-85. It noted that the typical search incident to arrest turns up a
    limited quantity of evidence—namely, those items that are on the arrestee’s person,
    such as a wallet—whereas the search of cell phone data could reveal more
    information than an “exhaustive search of a house.” Id. at ___, 134 S. Ct. at 2489-
    91.
    While this reasoning played a central role in the Supreme Court’s analysis of
    the search-incident-to-arrest rule, we find it less critical to our analysis because the
    Supreme Court has already approved of exhaustive searches in the consent-based
    search context. In Matlock itself, for example, the Supreme Court upheld the
    consent-based search of a home, including the defendant’s bedroom and 
    closet. 415 U.S. at 166-67
    , 
    177, 94 S. Ct. at 991
    , 996. Again, the touchstone of the third-
    24
    Case: 14-14680       Date Filed: 04/01/2016      Page: 25 of 29
    party consent rule is assumption of the risk, and a person sharing access to a
    computer, just as a person sharing access to a home, exposes himself to a police
    search based on another’s consent.
    G.     Summary: Fruits of the Search Warrant were Admissible
    We hold that Olausen had authority to consent to the forensic search of the
    shared HP computer in her home, and thus there was no Fourth Amendment
    violation when Detective Monaghan conducted the OS Triage forensic scan based
    on Olausen’s consent. Even assuming arguendo that Randolph applied to the
    search, there was no Fourth Amendment violation because the officers stopped
    their search when Thomas seemed to object.
    Furthermore, the only information Detective Monaghan relied on in
    obtaining the search warrant was data collected prior to Thomas’s objection.
    Therefore, we hold that all of the fruits of the search following the issuance of the
    warrant were admissible.7
    H.     Overturning or Extending Randolph
    As a final note, we address Thomas’s argument that Randolph was wrongly
    decided. Thomas believes that Randolph should be overturned and replaced with a
    flexible rule that analyzes objective indicia of the defendant’s intent to keep
    7
    Because we find Olausen’s consent to the forensic search was valid until Thomas
    objected, we need not examine whether any other warrant exception, such as plain view or
    disappearing evidence, would have allowed the police to search the HP computer.
    25
    Case: 14-14680       Date Filed: 04/01/2016       Page: 26 of 29
    materials private, not a bright-line rule based on the defendant’s ability to object to
    a search. As Thomas acknowledges, however, Randolph is binding precedent, and
    we are not free to overturn it and fashion a new rule in its place. See United States
    v. Thomas, 
    242 F.3d 1028
    , 1035 (11th Cir. 2001) (stating the well-known rule that
    we are bound to follow Supreme Court precedent “unless and until the Supreme
    Court itself overrules th[e] decision”).8
    Thomas also appears to argue that Randolph should be extended to require
    the police to wake a sleeping but present co-occupant when there is evidence that
    the co-occupant is the primary user of the effect (here a computer) or area to be
    searched. We decline to extend Randolph in this fashion when the Supreme Court
    made clear that Randolph was a narrow rule, simple and formulaic in application.
    See 
    Randolph, 547 U.S. at 122
    , 126 S. Ct. at 1528. The Supreme Court expressly
    declined to require “the police to take affirmative steps to find a potentially
    objecting co-tenant before acting on the permission they . . . already received.” 
    Id. at 122,
    126 S. Ct. at 1527.
    However, even if there should come a time when the Supreme Court extends
    or overrules Randolph in the manner Thomas desires, as we explain below, our
    result today would stand under the independent source doctrine, which provides
    the basis for an independent and alternative ruling here.
    8
    Thomas raises this argument primarily to preserve it for further review.
    26
    Case: 14-14680       Date Filed: 04/01/2016      Page: 27 of 29
    IV. INDEPENDENT SOURCE DOCTRINE
    Under the independent source doctrine, when law enforcement officers use
    evidence gathered after an arguable violation of the Fourth Amendment to secure a
    warrant, this Court applies a two-part test to determine whether the evidence seized
    pursuant to the warrant is admissible. United States v. Albury, 
    782 F.3d 1285
    ,
    1291 (11th Cir. 2015). First, this Court excises from the affidavit filed in support
    of the warrant application any information gained from the illegal search and
    determines whether the remaining information supports a finding of probable
    cause. 
    Id. Probable cause
    exists where, under the totality of the circumstances,
    there is a fair probability that contraband or evidence of a crime will be found in a
    particular place. 
    Id. If the
    remaining information supports a finding of probable
    cause, this Court next determines whether the officers’ decision to seek the warrant
    was prompted by what they saw during the illegal search. 
    Id. If the
    warrant would
    have been sought without the illegality, then the evidence seized pursuant to the
    warrant is admissible. 
    Id. at 1291-92.
    As the government argued below and now on appeal, the evidence seized
    from Thomas’s computer pursuant to the search warrant was admissible under the
    independent source doctrine.9 Thomas does not contend that Olausen lacked
    9
    The district court did not address the independent source doctrine, but “we may affirm
    the denial of a motion to suppress on any ground supported by the record.” United States v.
    Caraballo, 
    595 F.3d 1214
    , 1222 (11th Cir. 2010).
    27
    Case: 14-14680     Date Filed: 04/01/2016   Page: 28 of 29
    authority to invite the police into the home and show them the two websites that
    were on the computer screen. He objects only to Olausen’s authority to consent to
    a forensic search of the HP computer. Thus, we excise from the warrant the results
    of the OS Triage scan and the information that Detective Monaghan later gathered
    from analyzing the results. See 
    id. at 1291.
    Removing these facts from the affidavit, there was still enough evidence to
    support a finding of probable cause. See 
    id. The affidavit
    provided that:
    (1) Olausen observed her husband acting nervous and then discovered images
    qualifying as child pornography on the HP computer; (2) the police observed on
    the computer two websites containing child erotica, one of which had links with
    names indicative of child pornography; and (3) based on training and experience,
    the majority of people who view child pornography also collect child erotica, such
    that the presence of child erotica suggests the presence of child pornography.
    Based on these facts, there was a fair probability that child pornography
    would be found on the HP computer. See 
    id. The officers
    may not have been able
    to corroborate Olausen’s statement that she originally viewed eight to ten websites
    containing child pornography, but her statement was sufficiently reliable.
    Specifically, she risked incriminating herself by contacting the police about illegal
    images on a computer she used and, as the magistrate judge found, her written and
    oral statements were always consistent on key points. Further, that Olausen saw
    28
    Case: 14-14680     Date Filed: 04/01/2016   Page: 29 of 29
    eight to ten images that morning but only two were left when the police arrived
    was not inconsistent. Rather, Olausen admitted that she used Google to locate the
    Largo Police Department’s contact number, which apparently left only two of the
    websites open.
    As to the second prong of the independent source doctrine, Agent Monaghan
    testified at the suppression hearing that he would have sought a search warrant in
    this situation, regardless of the results of the OS Triage scan. Thus, law
    enforcement would have sought the search warrant even without the fruits of the
    allegedly illegal forensic search, and the evidence ultimately obtained pursuant to
    the warrant was admissible under the independent source doctrine. See 
    id. at 1291-
    92.
    V. CONCLUSION
    For all of the foregoing reasons, we affirm the judgment of the district court.
    AFFIRMED.
    29