Stanley R. Chesney v. State of Mississippi , 165 So. 3d 498 ( 2015 )


Menu:
  •       IN THE COURT OF APPEALS OF THE STATE OF MISSISSIPPI
    NO. 2013-KA-00207-COA
    STANLEY R. CHESNEY A/K/A STANLEY RAY                  APPELLANT
    CHESNEY A/K/A STANLEY CHESNEY
    v.
    STATE OF MISSISSIPPI                                    APPELLEE
    DATE OF JUDGMENT:              09/20/2012
    TRIAL JUDGE:                   HON. MARCUS D. GORDON
    COURT FROM WHICH APPEALED:     NESHOBA COUNTY CIRCUIT COURT
    ATTORNEYS FOR APPELLANT:       OFFICE OF STATE PUBLIC DEFENDER
    BY: GEORGE T. HOLMES
    HUNTER NOLAN AIKENS
    ATTORNEY FOR APPELLEE:         OFFICE OF THE ATTORNEY GENERAL
    BY: BRAD ALAN SMITH
    DISTRICT ATTORNEY:             MARK SHELDON DUNCAN
    NATURE OF THE CASE:            CRIMINAL - FELONY
    TRIAL COURT DISPOSITION:       CONVICTED OF FIVE COUNTS OF
    EXPLOITATION OF A CHILD AND
    SENTENCED TO THIRTY YEARS FOR
    COUNT I, TEN YEARS FOR COUNT II,
    AND TEN YEARS EACH FOR COUNTS III-
    V; WITH THE SENTENCES IN COUNTS I
    AND II TO RUN CONSECUTIVELY TO
    EACH OTHER BUT CONCURRENTLY
    WITH THE SENTENCES IN COUNTS III-V,
    ALL IN THE CUSTODY OF THE
    MISSISSIPPI DEPARTMENT OF
    CORRECTIONS
    DISPOSITION:                   REVERSED AND RENDERED - 05/19/2015
    MOTION FOR REHEARING FILED:
    MANDATE ISSUED:
    EN BANC.
    BARNES, J., FOR THE COURT:
    ¶1.    On December 19, 2011, Philadelphia, Mississippi Police Chief Richard Sistrunk was
    provided information concerning a possible identify theft. Upon further investigation, an
    informant, John Paul Dove, implicated Stanley Chesney (Chesney); so Chief Sistrunk
    obtained a search warrant from Municipal Judge Steven Cumberland for the residence of
    “Billy Chesney, Stanley Chesney and persons unknown” to recover “one computer with
    information on Sherri Stewart on identity theft.”
    ¶2.    Upon arriving at the Chesneys’ residence, Chief Sistrunk was informed by Chesney
    that his laptop computer was at a nearby computer repair store.1 The “Return” portion of the
    search warrant, listing what items were taken pursuant to the warrant, acknowledged: “Mr.
    Chesney directed us to Gator Computers in the city to retrieve his computer.” When the
    police went to execute the search warrant and recover the computer at Gator Computers, the
    clerk at the store, Matthew Kaulfers, alerted them to the presence of certain photographs in
    the computer’s “recycle bin” that he suspected depicted children performing sexual acts.2
    Kaulfers later claimed at trial that Chesney had dropped off the computer earlier that day and
    told Kaulfers he thought he was being investigated and the files in his recycle bin needed to
    be deleted. However, upon cross-examination, Kaulfers admitted that he could not actually
    remember when Chesney made those statements and that this information was not contained
    1
    Chief Sistrunk later stated during a motion-to-suppress hearing that Chesney also
    made a vague comment about “going to jail for some pictures,” but it does not appear that
    those comments caused law enforcement any concern at that time, and this testimony was
    not given in the presence of the jury.
    2
    The clerk later explained at trial that although he had not actually looked at the
    photos, the picture titles were sexually explicit in nature and indicated that minors were
    involved.
    2
    in his statement to police.
    ¶3.    Chesney’s computer was taken to the police department, and Chris Stokes, who
    worked on computers for the Philadelphia police, was asked to do a search of the computer.
    He quickly located photographs that possibly depicted child pornography. Stokes was then
    advised to stop the search, and Chief Sistrunk began the process of obtaining a second search
    warrant for those files, with the assistance of the Mississippi Attorney General’s cybercrime
    division. In the “Statement of Underlying Facts and Circumstances” to support the second
    warrant, Chief Sistrunk stated that Stokes had alerted him to “what could possibl[y] be
    photos of underage boys in the nude.” The statement made no mention of Kaulfers or his
    comments. Chief Sistrunk signed the affidavit, and Judge Cumberland signed the second
    search warrant.
    ¶4.    Pursuant to the second warrant, Deputy Commander Jay Houston of the cybercrime
    division searched Chesney’s computer and found five images depicting child pornography
    in the computer’s recycle bin. Chesney was brought in for questioning and subsequently
    confessed to possessing the photographic files, claiming that he had found the files on a disk
    at a relative’s house and admitted that he knew that child pornography was illegal.3
    ¶5.    Chesney was indicted on five counts of exploitation of a child.4 At trial, defense
    counsel moved to suppress the evidence because the first search warrant for identity theft was
    3
    Chesney insinuated in his statement to police that he had been sexually abused as
    a child and that he looked at the pictures to see if they depicted what had happened to him.
    He also claimed he had not viewed any child pornography in months.
    4
    See Miss. Code Ann. § 97-5-33(5) (Rev. 2014).
    3
    not based on credible or reliable information. A suppression hearing was conducted to
    determine whether probable cause existed to support the issuance of the first warrant. After
    the testimony, the circuit judge denied Chesney’s motion, and the trial resumed. The circuit
    court also denied defense counsel’s motion to have Chesney’s statement to police
    “suppressed as being involuntary due to the fact that the statements were not recorded.”
    ¶6.       Chesney was convicted on all counts by a Neshoba County Circuit Court jury and
    sentenced to forty years in the custody of the Mississippi Department of Corrections
    (MDOC). He received thirty years for Count I, and ten years for Count II, which was to run
    consecutively to the sentence in Count I. For Counts III-V, Chesney was sentenced to ten
    years for each count, with the sentences to run concurrently with the sentences in Counts I
    and II.
    ¶7.       Chesney filed a motion for a judgment notwithstanding the verdict or, alternatively,
    for a new trial. The circuit court denied his motion, and he now appeals. We find that
    Chesney’s first claim, regarding the failure to instruct the jury on the element of venue,
    warrants a reversal of the judgment and a remand for a new trial.
    ¶8.       We further conclude that Chesney’s second claim of error – that the circuit court erred
    in denying his motion to suppress evidence “because probable cause did not exist for the
    issuance of the first search warrant” – is also meritorious. Chesney contends that all of the
    evidence implicating him in the instant crimes was obtained derivatively as a result of the
    first warrant. Thus, Chesney claims that the evidence is “fruit of the poisonous tree,” and
    “the appropriate remedy is to reverse and render his convictions and sentences.” We agree
    4
    with Chesney that the suppression of the “tainted” evidence would remove any legally
    sufficient basis to support his convictions. Therefore, we reverse and render the circuit
    court’s judgment.
    DISCUSSION
    I.     Whether the circuit court erred in failing to instruct the jury on the
    essential elements of the crime.
    ¶9.    Chesney contends that the circuit court committed fundamental plain error by failing
    to instruct the jury on the essential elements of the crime. Specifically, Chesney claims that
    the instruction failed to instruct the jury on the essential element of venue. Jury Instruction
    S-1 stated identically as to each of the five counts:
    The Court instructs the Jury that if you believe from the evidence in this case
    beyond a reasonable doubt that at the time and place charged in the Count [_]
    of the indictment and testified about, that the Defendant, Stanley R. Chesney,
    did willfully, unlawfully and feloniously have in his possession a visual
    depiction of an actual child engaging in sexually explicit conduct, then it is
    your duty to find the defendant guilty as charged in Count [_].
    ¶10.   Although the State argues this issue is procedurally barred due to Chesney’s failure
    to object to the instruction, the Mississippi Supreme Court has stated that “instructing the
    jury on every element of the charged crime is so basic to our system of justice that it should
    be enforced by reversal in every case where inadequate instructions are given, regardless of
    a failure to object at trial.” Boyd v. State, 
    47 So. 3d 121
    , 127 (¶22) (Miss. 2010) (quoting
    Shaffer v. State, 
    740 So. 2d 273
    , 282 (¶31) (Miss. 1998)). “[T]he failure to submit to the jury
    the essential elements of a crime amounts to plain error.” Pollard v. State, 
    932 So. 2d 82
    ,
    87 (¶11) (Miss. Ct. App. 2006) (citation omitted). “Venue is an indispensable element of any
    5
    criminal prosecution.” Hawkins v. State, 
    90 So. 3d 116
    , 119 (¶6) (Miss. Ct. App. 2012)
    (citing Smith v. State, 
    646 So. 2d 538
    , 541 (Miss. 1994)). Accordingly, we find this issue is
    not barred from consideration.
    ¶11.   In Rogers v. State, 
    95 So. 3d 623
    , 632 (¶30) (Miss. 2012), the Mississippi Supreme
    Court reversed a conviction and remanded for a new trial because the jury was not instructed
    “that it had to find from the evidence and beyond a reasonable doubt that the crime had
    occurred in Scott County, Mississippi.” Rather, the jury instruction provided that the jury
    had to find that the defendant committed the offense “at the time and place charged in Count
    Two of the indictment and testified about[.]” 
    Id. at 631-32
    (¶28). The supreme court
    concluded: “Given that venue is ‘essential’ to a criminal prosecution, and that venue may
    be raised for the first time on appeal, we find that such an obvious omission is fatal and
    requires reversal.” 
    Id. at 632
    (¶30) (internal citation omitted).
    ¶12.   We find the record supports Chesney’s claim.            Like Rogers, the written jury
    instructions in the present case provided that the jury had to find the crime occurred “at the
    time and place charged” in each count. Also, the indictment was not submitted to the jury
    for consideration, “and the ‘time and place testified about’ was far from definite.” 
    Id. at (¶28).
    Moreover, when reading the instructions to the jury, the circuit court did not include
    the portion of the written instruction quoted above; thus, nowhere was the jury instructed in
    open court that the location of the conduct was an element of the offense. While there was
    some proof of venue elicited during the trial,5 the jury was never instructed that it had to find
    5
    “Proof of venue, as any other element of an offense, must be made beyond a
    reasonable doubt.” Campbell v. State, 
    858 So. 2d 177
    , 179 (¶8) (Miss. Ct. App. 2003)
    6
    that the crimes occurred in Neshoba County. Accordingly, this issue warrants a reversal of
    the judgment and a remand for a new trial.
    II.      Whether the circuit court erred in denying Chesney’s motion to
    suppress the evidence obtained through the search warrant.
    ¶13.   At trial, defense counsel “move[d] to suppress all evidence gained and acquired as a
    result of [the first] search warrant.” Counsel argued that the affidavit and statement of facts
    by Chief Sistrunk, which had been provided to Judge Cumberland in order to obtain the
    original search warrant, failed to establish the informant’s reliability; thus, there were no
    grounds for a valid search warrant. The circuit court overruled Chesney’s motion to suppress
    the evidence.
    ¶14.   On appeal, Chesney reasserts that “probable cause did not exist for the issuance of the
    first search warrant”; therefore, “all evidence implicating [him] for the instant offenses was
    obtained derivatively as a result of this illegal warrant [and] must be suppressed as fruit of
    the poisonous tree.” He, therefore, contends that he “is entitled to have this Court reverse
    and render his convictions and sentences.” The State counters that there was sufficient
    “credible information” to justify the issuance of the first warrant.
    ¶15.   A “mixed standard of review” is employed when considering the circuit court’s denial
    of a motion to suppress. Gillett v. State, 
    56 So. 3d 469
    , 482 (¶21) (Miss. 2010) (citing Dies
    v. State, 
    926 So. 2d 910
    , 917 (¶20) (Miss. 2006)).
    Determinations of reasonable suspicion and probable cause are reviewed de
    (citing State v. Fabian, 
    263 So. 2d 773
    , 776 (Miss. 1972)). Kaulfers testified that the store
    where he worked was located in Neshoba County, Mississippi, and that the computer was
    brought to this location.
    7
    novo. However, this Court should take care both to review findings of
    historical fact only for clear error and to give due weight to inferences drawn
    from those facts by resident judges and local law enforcement officers. Thus,
    this Court is restricted to a de novo review of the trial judge’s findings using
    the applicable substantial evidence/clearly erroneous standard. Finally, this
    Court reviews the admission or exclusion of evidence for abuse of discretion.
    
    Id. (internal citations
    and quotation marks omitted).
    A.       Probable Cause
    ¶16.   Our supreme court has held that a court “may issue a [search] warrant based only upon
    probable cause, which is determined from the totality of the circumstances.” Batiste v. State,
    
    121 So. 3d 808
    , 859 (¶129) (Miss. 2013) (citing Hughes v. State, 
    90 So. 3d 613
    , 628 (¶43)
    (Miss. 2012)).
    The task of the issuing magistrate is simply to make a practical, common-sense
    decision whether, given all the circumstances set forth in the affidavit before
    him, including the veracity and basis of knowledge of persons supplying
    hearsay information, there is a fair probability that contraband or evidence of
    a crime will be found in a particular place.
    
    Id. (quoting Lee
    v. State, 
    435 So. 2d 674
    , 676 (Miss. 1983)) (internal quotation marks
    omitted). “[P]robable cause [for a search warrant] exists when the facts and circumstances
    within an officer’s knowledge are ‘sufficient to justify a man of average caution in the belief
    that a crime has been committed and that a particular individual committed it.’” Roach v.
    State, 
    7 So. 3d 911
    , 917 (¶11) (Miss. 2009) (quoting State v. Woods, 
    866 So. 2d 422
    , 426
    (¶11) (Miss. 2003)).
    ¶17.   In the present case, Chief Sistrunk’s affidavit for the search warrant contained the
    following “Underlying Facts and Circumstances”:
    On 08-23-11[,] Mrs. Stewart came to the [police department] to file a
    8
    complaint on identity theft. Mrs. Stewart stated that someone had stole[n] a
    picture of her off her Facebook page and created another Facebook on her.
    This person has since defrauded, slander[ed], used her identity in such a way[,]
    which became harmful to the job . . . which Mrs. Stewart held. I sent
    Facebook a subpeona and received back information on a[n] Amanda Warren.
    I have since received information from John Paul Dove from Meridian[,]
    M[ississippi,] stating that it was in fact a Stan Chesney who was using the
    name of Sherri Stewart. Mr. Dove stated it started back in 2010 with different
    users and then Sherri Stewart’s name with the same messages and pattern as
    before.
    (Emphasis added). The affidavit never described the information from Dove as being
    reliable or credible, despite the form’s requirement that it do so.6
    ¶18.   A confidential informant’s veracity may be demonstrated through “a statement of the
    affiant that the confidential informant has given credible information in the past.” Peden v.
    State, 
    132 So. 3d 631
    , 636 (¶16) (Miss. Ct. App. 2014) (quoting Cooper v. State, 
    93 So. 3d 898
    , 901 (¶8) (Miss. Ct. App. 2012)). At the hearing on the motion to suppress, Chief
    Sistrunk admitted to defense counsel that he had never met or spoken with the informant,
    Dove, prior to this incident.
    Q.     You have not spoken with Mr. Dove on the phone numerous times
    about other criminal cases that he’s provided information for?
    A.     No, sir. I don’t even know this gentleman.
    Q.     And he just spontaneously called you?
    A.     No. If I may, Ms. Stewart provided me with Mr. John Paul Dove’s
    name. And once I talked with Mr. Dove, he advised me how he came
    into contact and knew Mr. Chesney and how we arrived to the
    6
    The affidavit for the warrant directed the applicant that “[i]nformation obtained
    from informants must be described as reliable and the informants identified as credible
    persons. . . . [T]here must be shown enough of the underlying facts and circumstances from
    which the affiants conclude that the informants are credible and the information reliable.”
    9
    information that was provided in the affidavit.
    Q.       And you spoke with him on the phone one time[?]
    A.       Actually[,] I spoke with him on the phone twice, not numerous.
    ....
    Q.       And you talked with him a total of two times on the phone[?]
    A.       Tried to get him on the – first conversation, I wanted him to come to
    my office where I could speak with him, and he couldn’t. The second
    time over the telephone is when he provided the information how he
    came to know Mr. Chesney and the information given that I provided
    in the affidavit.
    ....
    Q.       And he has never – before your incident with Stanley Chesney, he has
    not provided information about any other criminal activities, has he?
    A.       Not that I’m aware of, no, sir.
    (Emphasis added).7 Judge Cumberland, who issued the search warrant, testified that he
    believed Chief Sistrunk had presented sufficient probable cause.
    ¶19.   The supreme court considered a similar situation in 
    Woods, 866 So. 2d at 425
    (¶7),
    428 (¶21), where it upheld a circuit court’s dismissal of charges against Steve Woods due to
    a “constitutionally defective” search warrant. The circuit judge in Woods had granted the
    defendant’s motion to suppress the evidence obtained through the search warrant,
    concluding:
    That a search warrant was issued for the purpose of searching the defendant’s
    residence on November 21, 2000. That this search warrant was issued solely
    based upon two telephonic conversations a metro narcotics agent had with a
    7
    Dove did not testify at the hearing.
    10
    confidential informant who had never previously supplied any information to
    any law enforcement agencies. That the agent failed to conduct an in person
    interview with the informant, or to otherwise make attempts to test her veracity
    or credibility other than conducting an NCC background check. Further, the
    agent failed to corroborate any of the information supplied by the informant
    through any independent investigatory means. For these reasons, the Court
    finds that, based upon the totality of the circumstances, the application for, and
    issuance of, the instant search warrant is constitutionally defective and that the
    warrant and the fruits thereof are suppressed and held for naught.
    
    Id. at 425
    (¶7) (emphasis added).
    ¶20.   This Court later addressed this issue in Roebuck v. State, 
    915 So. 2d 1132
    (Miss. Ct.
    App. 2005). As in Woods and the present case, the defendant in Roebuck moved to suppress
    evidence obtained through the search warrant, arguing “that the underlying facts and
    circumstances portion of [the narcotics agent]’s affidavit did not contain a statement of
    reliability or a statement that the particular confidential informant had furnished reliable
    information in the past or was known to be reliable.” 
    Id. at 1136
    (¶9). The affidavit only
    stated that the informant told the agent that Adam Roebuck was manufacturing
    methamphetamine at a residence. It was also noted there had been complaints about the
    residence from other sources. Like the present case, the circuit court denied the defendant’s
    motion to suppress evidence. Upon review, this Court concluded in Roebuck that the
    narcotic agents had failed to provide the “issuing judge with some indicia of veracity or
    reliability supporting the confidential informant’s allegation[.]” 
    Id. at 1140
    (¶24). During
    the suppression hearing, the narcotics agent “did not mention that his confidential informant
    was credible or believable or that the informant had provided credible information in the past
    in the affidavit or the underlying facts and circumstances” to the issuing judge. 
    Id. at 1138
    11
    (¶18). “[S]imply repeating an informant’s allegation, without more, does not overcome the
    threshold requirements for probable cause.” 
    Id. at 1137
    (¶14). Accordingly, we reversed and
    rendered the judgment in Roebuck since, without the illegally obtained evidence, there was
    insufficient evidence to support the conviction. 
    Id. at 1141
    (¶28).
    ¶21.   Based on the holdings in Woods and Roebuck, we find that the threshold requirements
    for probable cause, to support the issuance of the original search warrant, were not met.
    Chief Sistrunk admitted that he had only spoken with Dove a couple of times and that he had
    never met him. There was nothing in the affidavit, its underlying facts and circumstances,
    or the testimony to establish that the information provided by the informant was credible or
    reliable; nor was there any testimony that Chief Sistrunk attempted to corroborate Dove’s
    statement through an additional independent investigation. The State’s only response to this
    issue is that Dove was not the sole source of information, noting that Sherri Stewart was the
    initial source. However, we find this insufficient to establish probable cause. Stewart merely
    filed a complaint with police that an unknown person had stolen her identity to establish a
    Facebook account. Chief Sistrunk testified that Stewart “didn’t have a clue who took her
    identity[.]” Therefore, Stewart’s information did not establish probable cause for a search
    warrant for Chesney’s computer.8 It is clear from the statement of facts submitted to support
    the affidavit that Chief Sistrunk was solely relying on Dove’s information.
    B.     Fourth Amendment and the “Fruit of the Poisonous
    Tree”/Exclusionary-Rule Doctrine
    8
    There is nothing in the record to indicate whether there was any evidence Chesney
    was responsible for the identity theft, the original cause for the search warrant.
    12
    ¶22.   Our inquiry does not end here, however. Finding that the first search warrant was
    invalid for lack of probable cause, we must now determine whether the resulting evidence
    obtained through the first warrant – including evidence obtained through the second search
    warrant and Chesney’s confession – should have been suppressed.
    ¶23.   The right to be free from unreasonable search and seizure is secured by the Fourth
    Amendment to the United States Constitution and Article 3, Section 23 of the Mississippi
    Constitution. Under the “fruit of the poisonous tree” doctrine, “tangible evidence obtained
    incident to an unlawful search or seizure” is considered to be inadmissible. Mosley v. State,
    
    89 So. 3d 41
    , 45 (¶13) (Miss. Ct. App. 2011) (citing Marshall v. State, 
    584 So. 2d 437
    , 438
    (Miss. 1991)).
    ¶24.   The United States Supreme Court discussed this exclusionary rule in Wong Sun v.
    United States, 
    371 U.S. 471
    , 484 (1963), stating that “evidence seized during an unlawful
    search could not constitute proof against the victim of the search.” (Citation omitted). The
    Wong Sun Court specifically noted that in addition to “physical, tangible materials obtained
    either during or as a direct result of an unlawful invasion[,] . . . the Fourth Amendment may
    protect against the overhearing of verbal statements as well as against the more traditional
    seizure of papers and effects.” 
    Id. at 485
    (citation omitted).
    [T]estimony as to matters observed during an unlawful invasion has been
    excluded in order to enforce the basic constitutional policies. Thus, verbal
    evidence which derives so immediately from an unlawful entry and an
    unauthorized arrest as the officers’ action in the present case is no less the
    “fruit” of official illegality than the more common tangible fruits of the
    unwarranted intrusion.
    
    Id. (internal citations
    omitted). These policies underlying the exclusionary rule do not “invite
    13
    any logical distinction between physical and verbal evidence” and “the danger in relaxing the
    exclusionary rules in the case of verbal evidence would seem too great to warrant introducing
    such a distinction.” 
    Id. at 486.
    ¶25.   The exclusionary rule discussed in Wong Sun has also been extended to evidence
    obtained through the issuance of a second valid search warrant. In United States v. Clark,
    
    531 F.2d 928
    , 932-33 (8th Cir. 1976), the United States Court of Appeals for the Eighth
    Circuit affirmed a district court’s ruling to suppress evidence obtained through a second valid
    search warrant, because it was “tainted” by an impermissible exploratory search of the
    defendant’s premises, which was ruled outside the scope of the valid first search warrant.
    The United States District Court for the District of New Mexico similarly suppressed
    evidence obtained through a second search warrant, finding it was a result of the
    “exploitation” of a document that had been illegally seized. United States v. Wick, 52 F.
    Supp. 2d 1310, 1327-28 (D. N.M. 1999).
    ¶26.   Further, in State v. Dalpiaz, 
    783 N.E.2d 976
    , 985 (¶38) (Ohio Ct. App. 2002), the
    Ohio Court of Appeals held: “Evidence seized during an unlawful search cannot constitute
    proof against the victim of the search; therefore, if the first search was unlawful, the evidence
    seized in the course of that search could not be used to support the issuance of the second
    search warrant.” See also State v. Jacob, 
    924 N.E.2d 410
    , 417-18 (¶¶31-32) (Ohio Ct. App.
    2009) (holding that evidence obtained pursuant to a second search warrant, which “was
    uncovered as a result of the earlier unlawful search,” must be suppressed as “fruit of the
    poisonous tree”). In this case, Chesney’s computer was initially seized pursuant to the first
    14
    search warrant, and the photographic evidence supporting Chesney’s convictions was viewed
    pursuant to the second search warrant.
    i.      Standing and Reasonable Expectation of
    Privacy
    ¶27.   We find it important to discuss an issue that was not raised by either party in their
    initial briefs – whether Chesney had standing to challenge the search and seizure of his
    computer files by police. See State v. Hicks, 
    806 So. 2d 261
    , 263 (¶6) (Miss. 2002) (holding
    that an appellate court “may sua sponte address the question of standing”) (citation omitted).
    We requested additional briefing by the parties as to whether Chesney had standing to assert
    a Fourth Amendment violation and had a reasonable expectation of privacy in the files and
    images on his computer after he had authorized a third party, Kaulfers, to work on his
    computer’s operating system.
    ¶28.   “Only those persons whose privacy is invaded by a search have standing to object to
    it under the exclusionary rule[.]” United States v. Colbert, 
    474 F.2d 174
    , 176 (5th Cir. 1973).
    In order to qualify as a “person aggrieved by an unlawful search and
    seizure[,]” one must have been a victim of a search or seizure, one against
    whom the search was directed, as distinguished from one who claims prejudice
    only through the use of evidence gathered as a consequence of a search or
    seizure directed at someone else.
    
    Id. (emphasis added)
    (citation omitted). “We determine the issue of standing after a two-part
    inquiry: (1) whether the defendant had a subjective expectation of privacy in the place
    searched; and (2) whether, from society’s perspective, that expectation was reasonable.
    Bankston v. State, 
    4 So. 3d 377
    , 380 (¶13) (Miss. Ct. App. 2008) (citing Powell v. State, 
    824 So. 2d 661
    , 663 (¶10) (Miss. Ct. App. 2002)).
    15
    ¶29.   The State argues that once Chesney gave his computer to Kaulfers for repair, and
    Kaulfers’s private search revealed the questionable file names, Chesney’s reasonable
    expectation of privacy was frustrated by the private search. The Supreme Court has noted:
    “Once frustration of the original expectation of privacy occurs, the Fourth Amendment does
    not prohibit governmental use of the now-nonprivate information[.]” United States v.
    Jacobsen, 
    466 U.S. 109
    , 117 (1984) (emphasis added). This implies that standing to bring
    a Fourth Amendment claim is lost once that information is made public by the private party.
    ¶30.   We agree that if the search and seizure of Chesney’s computer had occurred as a direct
    result of Kaulfers’s private search and subsequent notification of police, there would be no
    Fourth Amendment violation as Chesney’s reasonable expectation of privacy would be
    frustrated by his direction to Kaulfers to repair his computer and delete the files in question.
    However, those are not the facts before us. The police issued (what we have determined to
    be) an invalid search warrant, directing law enforcement to seize Chesney’s personal
    computer from his home in order to look for evidence of identity theft. The police obtained
    the computer from the repair shop only under the purported authority of the invalid search
    warrant.9 Therefore, if we disregard the comment made by Kaulfers to police regarding the
    file names on Chesney’s computer, law enforcement still intended to seize the computer from
    the repair shop to look for evidence of identity theft. Consequently, the illicit photographs
    9
    Although Chesney directed law enforcement to Gator Computers, we do not find
    that constitutes consent to a warrantless search. See United States v. Barth, 
    26 F. Supp. 2d 929
    , 940 (Tex. Dist. Ct. 1998) (finding that an owner’s consent to warrantless search was
    not voluntary, as he was told a search warrant had been issued, leading to the conclusion that
    withholding consent was meaningless).
    16
    were not obtained by the police as a direct result of Kaulfers’s private search. Chesney
    argues that addressing this issue is unnecessary “because police obtained evidence by
    physically intruding on Chesney’s constitutionally-protected area[.]” In this instance, we
    have to agree. Chesney was clearly the person against whom the government’s search and
    siezure was “directed.” See 
    Colbert, 474 F.2d at 176
    .
    ¶31.   Furthermore, even if we were to agree with the State that Kaulfers’s private search
    frustrated Chesney’s reasonable expectation of privacy in the computer’s contents, we find
    the police’s subsequent search of Chesney’s computer was a Fourth Amendment violation,
    as it exceeded the scope of Kaulfers’s private search. As the Supreme Court noted in
    Jacobsen:
    The Fourth Amendment is implicated only if the authorities use information
    with respect to which the expectation of privacy has not already been
    frustrated. In such a case the authorities have not relied on what is in effect a
    private search, and therefore presumptively violate the Fourth Amendment if
    they act without a warrant.
    
    Jacobsen, 466 U.S. at 117-18
    .
    ¶32.   In Walter v. United States, 
    447 U.S. 649
    , 651-52 (1980), private parties opened a
    package received in the mail and discovered 871 boxes of film. The private parties attempted
    unsuccessfully to view the film by holding it up to the light. As there were suggestive
    drawings and explicit descriptions of the contents on the outside of the boxes, the private
    parties contacted law enforcement. Without obtaining a warrant, agents from the Federal
    Bureau of Investigations (FBI) viewed the film, using a projector. The Supreme Court held
    that the viewing of the film by the FBI was unconstitutional, because the private parties had
    17
    not viewed the film. “The private search merely frustrated that expectation in part. It did not
    simply strip the remaining unfrustrated portion of that expectation of all Fourth Amendment
    protection. Since the additional search conducted by the FBI – the screening of the films –
    was not supported by any justification, it violated that Amendment.” 
    Id. at 659
    (footnotes
    omitted).10
    ¶33.   In a factually similar case, 
    Barth, 26 F. Supp. 2d at 937
    , the Texas district court
    concluded that law enforcement’s viewing of additional computer images (that contained
    child pornography), which had not been viewed in the private search conducted by the
    computer technician, implicated the defendant’s Fourth Amendment rights, as a subsequent
    10
    In contrast, the Supreme Court in Jacobsen held that “it hardly infringed
    respondents’ privacy” for law enforcement agents to reexamine the contents of a package
    unsealed and opened by Federal Express employees. 
    Jacobsen, 466 U.S. at 119
    . Law
    enforcement merely brushed aside a crumpled newspaper and picked up the tube, which the
    private parties had unsealed. 
    Id. The Court
    explained:
    Respondents could have no privacy interest in the contents of the package,
    since it remained unsealed and since the Federal Express employees had just
    examined the package and had, of their own accord, invited the federal agent
    to their offices for the express purpose of viewing its contents. The [law
    enforcement] agent’s viewing of what a private party had freely made
    available for his inspection did not violate the Fourth Amendment.
    
    Id. Noting the
    relevancy of the fact that the “respondents’ privacy interest in the contents
    of the package had been largely compromised,” the Jacobsen Court held: “Under these
    circumstances, the package could no longer support any expectation of privacy[.]” 
    Id. at 121.
    However, in the present case, Kaulfers did not view the contents of Chesney’s files;
    so the files were not “freely available” for inspection by the police. Furthermore, Kaulfers
    did not “invite” police to the computer store to view the contents of Chesney’s computer.
    They were there under the purported authority of the invalid warrant.
    18
    police search must be “limited in scope to the private party’s search.” 
    Id. ¶34. Kaulfers
    testified that he only looked at the file names in the recycle bin. Law
    enforcement admitted that Stokes, the technician employed by police, viewed the actual
    files/photographs before the police obtained the second search warrant. Therefore, based on
    the holdings in Walter and Barth, we find that the search of the computer files by the police
    prior to obtaining the second search warrant was a violation of Chesney’s Fourth Amendment
    rights.
    ¶35.      Accordingly, under the specific facts of this case, we find that Chesney had standing
    to challenge the search and seizure of his computer under the Fourth Amendment and that
    he had a reasonable expectation of privacy in its contents.
    ii.     Independent-Source Doctrine
    ¶36.      In Murray v. United States, 
    487 U.S. 533
    , 536-37 (1988), the Supreme Court
    expounded on the exclusionary rule, stating:
    [T]he exclusionary rule also prohibits the introduction of derivative evidence,
    both tangible and testimonial, that is the product of the primary evidence, or
    that is otherwise acquired as an indirect result of the unlawful search, up to the
    point at which the connection with the unlawful search becomes “so
    atten[]uated as to dissipate the taint[.]”
    (Emphasis added) (quoting Nardone v. United States, 
    308 U.S. 338
    , 341 (1939)). Murray
    involved whether evidence of marijuana found in a warehouse, which was obtained through
    a valid search warrant based on an illegal warrantless search, should have been suppressed.
    
    Id. at 535.
    As the agents already had the warehouse under surveillance prior to their
    warrantless entry and strongly suspected drugs were located on the premises, the Murray
    19
    Court vacated the district court’s denial of the defendant’s motion to suppress and remanded
    “for determination [of] whether the warrant-authorized search of the warehouse was an
    independent source of the challenged evidence,” as the district court did not “explicitly find
    that the agents would have sought a warrant if they had not earlier entered the warehouse.”
    
    Id. at 543-44
    (emphasis added).
    ¶37.   Thus, there are instances where evidence seized through a second search warrant, that
    was based on an invalid initial warrant or illegal search, has been ruled admissible. In State
    v. Dasen, 
    155 P.3d 1282
    , 1285-86 (¶¶14-18) (Mont. 2007), the Montana Supreme Court held
    that evidence returned to a defendant due to an invalid search warrant, but which was
    subsequently reseized through a second search warrant, was admissible, concluding:
    [T]he information provided to secure the second warrant was information the
    State obtained prior to the first search warrant, as well as information
    obtained from additional sources not connected to or derived from the first
    search. The State submitted the same information used to secure the first
    search warrant, which was obviously obtained without the information gained
    in the first search. Further, the few new pieces of information submitted were
    independently obtained as well, such as details provided by one of the victim's
    grandmother[s], and information concerning a wire transfer known to the State
    prior to the first search. Finally, while the first search was a factor in
    obtaining the second search warrant, in that the invalidity of the first search
    necessitated a second warrant, the State nevertheless possessed sufficient
    independent information to “purge the taint” of the first search.
    
    Id. at 1286
    (¶21) (emphasis added); see also McKinney v. State, 
    582 S.E.2d 463
    , 465 (Ga.
    Ct. App. 2003) (citation omitted) (Because evidence seized as a result of a second search
    warrant was not “obtained by exploitation of the original defective search warrant,” it was
    “separate and distinguishable . . . so as to be ‘purged of the primary taint.’”); State v. Zesiger,
    
    65 P.3d 314
    , 318 (¶14) (Utah Ct. App. 2003) (finding that “[a]ny taint on the evidence from
    20
    the first illegal search was cured by the fact that the State did not use any information gained
    from the illegal search in its affidavit for the second search warrant” (emphasis added)).
    ¶38.   Although the State did not initially challenge Chesney’s argument that all of the
    evidence was derivative of the first search warrant, this Court also requested additional
    briefing on the issue of whether Kaulfers’s statement to police – that he had located files that
    appeared to be child pornography – could constitute “independent probable cause to support
    the temporary seizure of the computer for the purpose of obtaining a search warrant for the
    alleged images.” In his response, Chesney claims Kaulfers’s comments were insufficient to
    justify the seizure of his computer. The State, however, argues that Kaulfers’s statements
    “would give a ‘man of reasonable caution a belief that there was a practical, non-technical
    probability that five images of child pornography were present on’ Chesney’s computer.”
    (Quoting United States v. Gereb, 
    547 F. Supp. 2d 658
    , 662 (W.D. Tex. 2008)).
    ¶39.   Unlike Dasen, McKinney, and Zesiger, we find there was no independent source of
    information for the second search warrant in the present case. Chief Sistrunk’s statement
    attached to the application for the second warrant said that the computer files were found by
    Stokes, the computer technician for the police. Therefore, the second warrant, and resulting
    search of the computer, was expressly related to the evidence secured through the execution
    of the first warrant. Further, even if Chief Sistrunk’s statement had referenced the statement
    by Kaulfers, which it did not, we note that there is nothing to indicate Kaulfers would have
    independently come forward with the information regarding the photographs. In fact, Chief
    Sistrunk testified that Kaulfers made a brief comment regarding the possible content of the
    21
    pictures and, when questioned further, “he didn’t want to say a whole lot[.]”11 Consequently,
    we find nothing to “purge the taint” of the invalid first search warrant from the second
    warrant.
    iii.    Good-Faith Exception and Inevitable-
    Discovery Doctrine
    ¶40.   We also find that this case does not fall under the well-recognized exceptions to the
    exclusionary rule: the good-faith exception and the inevitable-discovery doctrine. Under the
    good-faith exception, the State may admit “evidence obtained by officers acting in reasonable
    reliance on a search warrant issued by a detached and neutral magistrate but ultimately found
    to be invalid.” Magee v. State, 
    73 So. 3d 1183
    , 1189 (¶21) (Miss. Ct. App. 2011) (citing
    United States v. Leon, 
    468 U.S. 897
    , 918-21 (1984)). However, the good-faith exception
    does not apply in instances where “the [search] warrant is based on an affidavit so lacking
    in indicia of probable cause that official belief in its existence is entirely unreasonable[.]”
    
    Id. at (¶22)
    (emphasis added). Here, we find any reliance by the police on the underlying
    facts to support probable cause for the first warrant was “entirely unreasonable.” Chief
    Sistrunk obtained and executed the original search warrant based on Dove’s accusations,
    even though Chief Sistrunk later acknowledged he had never met Dove and Dove had never
    provided any information to law enforcement prior to this event. A similar situation was
    addressed in 
    Dalpiaz, 783 N.E.2d at 987-88
    (¶49), with the appellate court concluding:
    [T]he inquiry is not simply whether the officers thought they were doing the
    11
    An arrest warrant issued for Kaulfers a day before the trial commenced for failure
    to appear, which is contained in the record, is another indication he was reluctant to be
    involved.
    22
    right thing, but whether a reasonably well-trained officer would have known
    that the search was illegal. . . . [A] brief perusal of the affidavit would suffice
    for an officer to realize that the issue of the informants’ reliability had not been
    addressed. Just as a brief perusal of the boilerplate language contained in the
    same affidavit indicates that such a statement of informant reliability is a
    necessity.
    More recently, in an unpublished opinion, the Montana United States District Court noted:
    “Reasonably well-trained officers would have known of the need to corroborate a vague,
    anonymous, second-hand tip. . . . Suppression here is warranted to further the goal of
    deterrence of future unlawful police conduct, and to effectuate the guarantee of the Fourth
    Amendment against unreasonable searches and seizures.” United States v. Embry, No. CR-
    14-21-BLG-SPW-CSO, 
    2014 WL 1809388
    , at *13 (D. Mont. May 7, 2014). Additionally,
    as the original search, which resulted in the seizure of Chesney’s computer, was unlawful,
    the good-faith exception also would not apply to the second search warrant.
    ¶41.   The State alternatively argues in its supplemental brief that “this Court may rely on
    the inevitable-discovery doctrine[.]” The inevitable-discovery doctrine states that “results
    of an unreasonable search will be admissible if it can be shown that this evidence would have
    ultimately been discovered by constitutionally permissible means.” Pugh v. State, 
    101 So. 3d
    682, 689 (¶29) (Miss. Ct. App. 2012) (citing Nix v. Williams, 
    467 U.S. 431
    , 444 (1984)).
    The State argues that “Kaulfers’[s] disclosures to Chief Sistrunk inside Gator Computers
    support the reasonable probability that Chesney’s computer and the child pornography stored
    on its hard drive would have been lawfully discovered.” However, as we have already
    discussed in the preceding issue, there was no evidence that Kaulfers would have
    independently contacted and informed the police of the computer files, without the alleged
    23
    authority of the first search warrant. Thus, we find nothing to indicate the child pornography
    on Chesney’s computer would inevitably have been discovered through constitutionally
    permissible means.
    iv.    Inadmissibility of Evidence Obtained
    Through Both Search Warrants
    ¶42.   Consequently, the evidence obtained as a result of the improper search warrants and
    unlawful search – including the evidence of Chesney’s telling police where his computer was
    located, the verbal evidence of the computer store employee’s comments concerning the
    pictures on Chesney’s laptop, and the five photographs obtained through the second search
    warrant – should have been excluded. As the Supreme Court stated in Wong Sun, evidence
    obtained through an illegal search, both physical and verbal, cannot “constitute proof against
    the victim of the search.” Wong 
    Sun, 371 U.S. at 484-85
    ; see also 
    Clark, 531 F.2d at 933
    (affirming the suppression of evidence obtained in second valid warrant, as it was “tainted”
    by impermissible initial search); 
    Roebuck, 915 So. 2d at 1141
    (¶26) (reversing conviction as
    “fingerprint exemplars taken pursuant to the invalid search warrant provided the only means
    by which the State could connect [the defendant] to the methamphetamine lab . . . [and]
    evidence seized pursuant to the illegal search warrant must be suppressed as the fruit of the
    poisonous tree”).
    v.     Inadmissibility of Chesney’s Confession
    ¶43.   We further find Chesney’s statement to law enforcement should have been excluded.12
    12
    Chesney’s counsel moved to suppress all evidence obtained as a result of the
    insufficient search warrant, and he additionally requested suppression of Chesney’s
    statement because it was not recorded. Although defense counsel did not reassert the
    24
    At the suppression hearing, the circuit judge found Chesney’s confession was voluntary.
    Chesney was given a Miranda13 warning prior to questioning, and there was no evidence of
    duress during the interrogation, although Chief Sistrunk did acknowledge that Chesney
    appeared nervous. However, while his statement may have been voluntarily given, Chesney
    only confessed to possessing the child pornography when confronted by police with
    information about what had been discovered on his laptop. Chief Sistrunk testified: “Once
    the pictures were confirmed by Mr. Houston, I then went back to the office and advised Mr.
    Chesney of what we did find, at which time he then g[a]ve us an oral statement of how the[]
    pictures got there.”
    ¶44.   In Patterson v. State, 
    413 So. 2d 1036
    , 1038 (Miss. 1982), our supreme court held:
    [A] confession obtained by confrontation of an accused with articles indicating
    the commission of a crime obtained as a result of an illegal search renders the
    contemporaneous confession inadmissible. Likewise, where the confession
    comes so closely in time subsequent to the confrontation that the lapse has not
    attenuated the taint of illegality, proof of the confession may not be given.14
    In State v. Young, 
    974 So. 2d 601
    (Fla. Dist. Ct. App. 2008), the appellate court considered
    a case involving circumstances similar to the present case. In Young, the defendant’s
    computer, which contained evidence of child pornography, had been improperly seized from
    the defendant’s private work office without his consent. 
    Id. at 610.
    He was subsequently
    inadmissibility of the confession based on a Fourth Amendment violation, we do not find
    this to be a waiver of this issue, as the circuit court had already ruled that the search warrants
    were supported by probable cause.
    13
    Miranda v. Arizona, 
    384 U.S. 436
    (1966).
    14
    The Patterson court found the confession at issue to be admissible, as the statement
    was made prior to the illegal search. 
    Patterson, 413 So. 2d at 1039
    .
    25
    interrogated by law enforcement, and he made “incriminating statements related to child
    pornography.” 
    Id. at 608.
    Law enforcement presented the defendant with a printout of
    websites he had visited, and he was aware during his interrogation that officers had been in
    his office. In affirming the trial court’s grant of the motion to suppress, the district court
    stated that it could not conclude that the defendant’s “willingness to give incriminating
    statements was unaffected by the illegal search” and that the state had failed to point “to any
    event or circumstance that broke the chain of illegality.” 
    Id. at 614;
    see generally Annot.,
    “Fruit of the Poisonous Tree” Doctrine Excluding Evidence Derived from Information
    Gained in Illegal Search, 
    43 A.L.R. 3d 385
    (1972 & Supp. 2014) (explaining that “fruits”
    doctrine applies to confession obtained via illegal search).
    ¶45.   In this case, Chesney’s statement was given contemporaneously with his being
    informed that child pornography had been discovered on his computer. There was no
    intervening event to attenuate the taint of the illegal search. As in Young, Chesney’s
    statement to police should have been suppressed as evidence, as there was no event to break
    the “chain of illegality.”
    CONCLUSION
    ¶46.   We find that the circuit court should have granted Chesney’s motion to suppress the
    evidence of the photographs and Chesney’s statement to police, as they were both “fruit of
    the poisonous tree.” As a result, there is no legally sufficient evidence to support Chesney’s
    convictions. Without the evidence of the computer files/photographs and Chesney’s
    26
    confession, there was no other basis for the charges.15 As we concluded in Roebuck:
    [F]inding the evidence against [the defendant] legally insufficient after
    suppression of the fruits of the illegal search warrant, this Court is not at
    liberty to reverse and remand for a new trial. In such an instance, “[t]he
    prosecution cannot complain of prejudice, for it has been given one fair
    opportunity to offer whatever proof it could assemble.” [Burks v. United
    States, 
    437 U.S. 1
    , 16 (1978)]. In White v. State, 
    735 So. 2d 221
    (Miss. 1999),
    the Mississippi Supreme Court determined that when, as a result of the
    suppression of evidence obtained illegally, the evidence against the accused
    cannot sustain a conviction, the proper remedy is to reverse and render. See
    
    id. at 224
    (¶10). Accordingly, we must do the same.
    
    Roebuck, 915 So. 2d at 1141
    (¶28); see also Trejo v. State, 
    76 So. 3d 702
    , 709 (¶14) (Miss.
    Ct. App. 2010) (finding that without the evidence of the cocaine obtained through an
    unlawful search, the evidence was insufficient to support the verdict and “[t]he proper
    remedy . . . is for the Court to reverse and render”) (quoting Readus v. State, 
    997 So. 2d 941
    ,
    944 (¶13) (Miss. Ct. App. 2008)).
    ¶47.   Accordingly, we must reverse and render the circuit court’s judgment. While the
    nature of Chesney’s crimes is abhorrent, the protection provided by the Fourth Amendment
    is not dependent on the nature of the criminal activity. As the United States Court of Appeals
    for the Ninth Circuit has cautioned:       “Given the current environment of increasing
    government surveillance and the long memories of computers, we must not let the nature of
    the alleged crime, child pornography, skew our analysis or make us ‘lax’ in our duty to guard
    15
    Even if Chesney’s confession were admissible, there would be no corroborating
    evidence to support a conviction. See Stephens v. State, 
    911 So. 2d 424
    , 435 (¶34) (Miss.
    2005) (citing Hodge v. State, 
    823 So. 2d 1162
    , 1166 (¶12) (Miss. 2002)) (A defendant’s
    confession to a crime “is not sufficient to support a felony conviction unless it is
    corroborated by independent evidence of the corpus delicti.”). Although Kaulfers testified
    at trial about the questionable file names on Chesney’s computer, he claimed never to have
    viewed the photographs; therefore, he could not testify as to their content.
    27
    the privacy protected by the Fourth Amendment.” United States v. Gourde, 
    440 F.3d 1065
    ,
    1074 (9th Cir. 2006) (agreeing with the dissent’s proposition, but finding no Fourth
    Amendment violations).
    ¶48.   Based on our holding, Chesney’s remaining issues are rendered moot.
    ¶49. THE JUDGMENT OF THE NESHOBA COUNTY CIRCUIT COURT IS
    REVERSED AND RENDERED. ALL COSTS OF THIS APPEAL ARE ASSESSED
    TO NESHOBA COUNTY.
    LEE, C.J., GRIFFIS, P.J., ISHEE, ROBERTS AND FAIR, JJ., CONCUR.
    JAMES, J., CONCURS IN PART AND IN THE RESULT WITHOUT SEPARATE
    WRITTEN OPINION. MAXWELL, J., CONCURS IN PART AND DISSENTS IN
    PART WITHOUT SEPARATE WRITTEN OPINION. CARLTON, J., DISSENTS
    WITH SEPARATE WRITTEN OPINION. IRVING, P.J., DISSENTS WITHOUT
    SEPARATE WRITTEN OPINION.
    CARLTON, J., DISSENTING:
    ¶50.   I would reverse and remand for a new trial due to error on the issue of venue. See
    Rogers v. State, 
    95 So. 3d 623
    , 632 (¶30) (Miss. 2012) (burden of proof rests upon the State
    to prove venue beyond a reasonable doubt to the jury, not the trial judge, and an omission
    from the instructions on this essential jury question requires reversal).
    ¶51.   In this case, like in Rogers, the failure to instruct the jury so it could determine the
    essential element of venue was fatal and requires reversal. 
    Id. at (¶¶30-31).
    This error is
    dispositive. Therefore, I submit that we must remand for a new trial and should exercise
    restraint by refraining from comment on the remaining assignments of error since we have
    no power to issue advisory opinions for the retrial of this case. See Nelson v. State, 
    72 So. 3d
    1038, 1045 (¶22) (Miss. 2011).
    28