                       UNITED STATES, Appellee

                                    v.

               Steven L. CONKLIN, Airman First Class
                     U.S. Air Force, Appellant

                              No. 05-0220

                         Crim. App. No. 35217

       United States Court of Appeals for the Armed Forces

                       Argued November 8, 2005

                        Decided July 27, 2006

GIERKE, C.J., delivered the opinion of the Court, in which
EFFRON and ERDMANN, JJ., joined. BAKER, J., filed a dissent in
which CRAWFORD, J., joined.

                                 Counsel

For Appellant: Captain Anthony D. Ortiz (argued); Colonel
Carlos L. McDade, Lieutenant Colonel Craig S. Cook, and Major
Sandra K. Whittington (on brief); Captain L. Martin Powell.

For Appellee: Major Mathew Ward (argued); Lieutenant Colonel
Gary F. Spencer, Major Michelle M. McCluer, Major John C.
Johnson, and Captain C. Taylor Smith (on brief).

Military Judge:   Sharon A. Shaffer


       This opinion is subject to revision before final publication.
United States v. Conklin, No. 05-0220/AF


     Chief Judge GIERKE delivered the opinion of the Court.

     Evidence derivative of an unlawful search, seizure, or

interrogation is commonly referred to as the “fruit of the

poisonous tree” and is generally not admissible at trial.1       In

this case we address the question of whether consent to a

subsequent search is the antidote to the poison created by an

earlier unlawful search.2       Although the subsequent consent may be

a good treatment for the poison, it is not a panacea.       Here, we

hold that Appellant’s consent did not purge the taint of the

earlier unlawful search.

     We granted review of two issues presented by Appellant.3

Because of our resolution of Issue I (unlawful search and

seizure), it is unnecessary to address Issue II (the legal

sufficiency of evidence).



1
  Nardone v. United States, 308 U.S. 338, 341 (1939).
2
  See Wong Sun v. United States, 371 U.S. 471, 488 (1963)
(defining the question as whether the derivative evidence, “‘has
been come at by exploitation of that illegality or instead by
means sufficiently distinguishable to be purged of the primary
taint’” (quoting John MacArthur Maguire, Evidence of Guilt 221
(1959))).
3
  This Court granted review of the following issues:

      I.   WHETHER THE MILITARY JUDGE ERRED IN ADMITTING
           EVIDENCE AT TRIAL THAT WAS OBTAINED AS A DIRECT
           RESULT OF AN ILLEGAL SEARCH OF APPELLANT’S
           PERSONAL COMPUTER.

      II. WHETHER THE EVIDENCE PRESENTED BY THE
          PROSECUTION AT TRIAL WAS LEGALLY INSUFFICIENT TO
          SUPPORT APPELLANT’S CONVICTION FOR POSSESSING
          CHILD PORNOGRAPHY.

                                      2
United States v. Conklin, No. 05-0220/AF


     Appellant was a nineteen-year-old Airman First Class who

was assigned as a student at Keesler Air Force Base,

Mississippi.    He was a trainee whose room was subject to

routine, random inspections by the Military Training Leaders

(MTLs) assigned as supervisors of the students.      On April 26,

2001, Staff Sergeant (SSgt) Roy, an MTL, was conducting

inspections.    SSgt Roy testified that, as a “Phase IV” trainee,

Appellant was subject only to inspections designed to ensure

that his room was neat and orderly and maintained in compliance

with regulations.4     In conducting the “neat and orderly

inspection” of Appellant’s room, she inadvertently disturbed the

keyboard of Appellant’s personal computer causing the monitor to

activate.    The “wallpaper” that was then displayed on the

computer screen contained a photograph of an actress wearing a

fishnet top through which her breasts were visible.      A Keesler

Air Force Base Instruction5 prohibited the “open display of

pictures, statues, or posters which display the nude or

partially nude human body.”       SSgt Roy testified that such a

picture could result in a minor “write up” for violating the

base regulation.



4
  See Air Education and Training Command, Instr. 36-2216,
Technical Training Administration of Military Standards and
Discipline Training Table A2.2.14 (May 2, 2000).
5
  Keesler Air Force Base Instr. 32-6003, Dormitory Security and
Living Standards for Non-Prior Service Airmen 4.2.3 (Aug. 30,
2003) [hereinafter KAFBI 32-6003].

                                      3
United States v. Conklin, No. 05-0220/AF


     Not sure what she should do, SSgt Roy contacted a senior

noncommissioned officer, Technical Sergeant (TSgt) Schlegel.

TSgt Schlegel had previously been involved in an inspection

where he found child pornography on a computer.       TSgt Schlegel

testified that he had consulted with the Air Force Office of

Special Investigations (AFOSI) and had been informed that it was

“legal according to [the] Military Rules of Evidence” for him to

examine files on a computer if he found pornography openly

displayed on the computer.       Following that previous guidance,

TSgt Schlegel went to Appellant’s room and opened and examined

other files in his computer.       In so doing, he found files on the

hard drive showing nude pictures of females that TSgt Schlegel

estimated to be between fifteen and nineteen years of age.

Eventually he found a folder labeled “porn.”       Opening that

folder, he found another folder called “Teen” that contained

files of nude young females.

     TSgt Schlegel and SSgt Roy then reported the results of

their efforts to their commander who told them to contact the

AFOSI.   After being briefed by the MTLs, two AFOSI agents

located Appellant at the dining facility, identified themselves

to him, and asked for his consent to search his room and his

computer for child pornography.        Appellant gave his consent and,

not surprisingly, the agents located the various images

discovered earlier in the day by TSgt Schlegel.       In a subsequent



                                      4
United States v. Conklin, No. 05-0220/AF


interview with the AFOSI agents, Appellant explained that he had

copied several discs which he had received from another airman.

Most of the images on the discs were of adults, but some did

appear to be of girls between the ages of thirteen and

seventeen.    He stated that he intended to delete those images,

but had failed to do so.

     At trial, Appellant moved to suppress the images discovered

and his statements to the AFOSI agents.    He argued that SSgt Roy

and TSgt Schlegel went beyond the bounds of an inspection and

that the actions of TSgt Schlegel were actually a subterfuge for

a search.    The military judge denied the motion holding that the

unique training environment at Keesler Air Force Base justified

more intrusive “inspections” than would be allowable in a non-

training environment.

     Appellant was subsequently convicted, contrary to his

pleas, of possession of child pornography in violation of the

Child Pornography Prevention Act of 1996 (CPPA).6     He was

sentenced to a bad-conduct discharge, reduction to the lowest

enlisted paygrade, and confinement for six months.7

      In its review of the case pursuant to Article 66,




6
  18 U.S.C. § 2252A (2000).
7
  The convening authority remitted the punitive discharge
pursuant to a decision of the Air Force Clemency and Parole
Board.



                                      5
United States v. Conklin, No. 05-0220/AF


Uniform Code of Military Justice (UCMJ),8 the Air Force Court of

Criminal Appeals disagreed with the military judge’s conclusion

that the activities of the MTLS were legitimate military

inspections.9    The court below found that, although the

observance of the partially nude image on the “wallpaper” was

the result of a proper inspection, the subsequent examination of

files located on Appellant’s hard drive went beyond the scope of

the inspection and became a search into an area where Appellant

had a reasonable expectation of privacy.10    Nevertheless, the

Court of Criminal Appeals determined that Appellant’s subsequent

consent to the search by the AFOSI agents waived his privacy

interest and legitimized the subsequent search and seizure of

the computer by those agents.11

      The case now comes to us for review.    We agree with the

court below that the originally lawful and proper inspection

became an unlawful search when TSgt Schlegel began examining

files on the computer that were not in plain view.    We next

consider whether the subsequent consent overcame the taint of

the previously unlawful Government conduct.    Here, we part

company with the lower court and hold that subsequent consent to

search is just one of the factors that goes into the analysis.

8
   10 U.S.C. § 866 (2000).
9
   United States v. Conklin, No. ACM J5217, 2004 CCA LEXIS 290, at
*13-*15, 2005 WL 11587, at *3-*6 (A.F. Ct. Crim. App. Dec. 30,
2004) (unpublished).
10
    2004 CCA LEXIS 290, at *15, 2005 WL 11587, at *5.
11
    2004 CCA LEXIS 290, at *15-*16, 2005 WL 11587, at *5.

                                      6
United States v. Conklin, No. 05-0220/AF


As we examine all the relevant factors and the circumstances

surrounding the law enforcement activity in this case, we

conclude that the taint of the unlawful inspection is not

sufficiently attenuated by Appellant’s subsequent consent to

search provided to the AFOSI agents.

                            I.   The Inspection

     The initial entry into Appellant’s room by SSgt Roy was a

valid military inspection conducted in accordance with the

applicable base regulations and the Military Rules of Evidence

(M.R.E.).    The base inspection program was comprehensive and

reasonably directed at ensuring unit fitness and proper

standards.12    The image of the scantily clad female on

Appellant’s “wallpaper” was in plain view when discovered by the

inspector.     At this point it would have been appropriate for the

inspector to secure the computer as evidence13 of an apparent

violation of the base regulation prohibiting the display of the

“nude or partially nude human body.”14

     It was certainly appropriate for SSgt Roy to contact a

senior, more experienced MTL for advice on how best to proceed

after her discovery of the image.          However, we agree with the

Air Force Court of Criminal Appeals that the actions of the more



12
   See M.R.E. 313(b).
13
   Id. (“Unlawful weapons, contraband, or other evidence of
crime located during an inspection may be seized.”).
14
   KAFBI 32-6003 para 4.2.3.

                                      7
United States v. Conklin, No. 05-0220/AF


experienced MTL exceeded the authorized scope and purpose of the

proper inspection.15

     SSgt Roy was acting pursuant to applicable base regulations

that required the inspection of dormitory rooms at least once a

week to “ensure standards of cleanliness, order, decor, safety

and security are maintained”16 when she inadvertently activated

Appellant’s computer and noticed the wallpaper that appeared on

the screen.    The regulations deal with the “plain view”

situation by requiring that unauthorized items, including

unauthorized pornography, “be confiscated [and] brought to the

attention of the Chief MTL/MTF [Military Training Facility]

Commander.17   The image of the partially nude woman that SSgt Roy

observed was “in plain view.”18       Her decision to report her

discovery up the chain of command was fully in accordance with

the inspection regime.

     TSgt Schlegel determined, based on his discussions with

AFOSI in a similar situation, that it was proper to open the

files on the computer that was left on and that was not

protected by a password.       In that similar situation, TSgt

Schlegel concluded that he should treat the contents of a



15
   Conklin, 2004 CCA LEXIS 290, at *15, 2005 WL 11587, at *5.
16
   Dep’t of the Air Force, 81 TRG Pamphlet 36-2201, Military
Training, at 9 (July 5, 1999) [hereinafter 81 TRG Pamphlet 36-
2201].
17
   Id.
18
   M.R.E. 316(d)(4)(C).

                                      8
United States v. Conklin, No. 05-0220/AF


computer as if they were in a desk drawer and he felt free to

open the files on the computer.

       The desk drawer analogy is troublesome for two reasons.

First, the inspection is a “neat and orderly” inspection

designed to ensure standards of cleanliness, order, decor,

safety and security.      Opening desk drawers could be appropriate

under such an inspection scheme to ensure, for example, that

hazardous or unsanitary materials were not being improperly

stored.    It is difficult to understand, however, how opening

files on a computer could serve a similar “neat and orderly”

purpose.    Second, even if the drawer analogy was appropriate,

the regulation discusses how drawers are to be inspected.      It

states:

       When inspecting drawers (dresser, nightstand, desk,
       etc.), MTLs will check for clutter. If there is a
       non-transparent plastic container in a drawer or
       anywhere in the dorm room with small items within, it
       will not be opened and searched unless the owner is
       present. If the container is transparent and
       unauthorized items can be observed by sight, the
       container is inspectable, i.e., if a wall locker key
       is observed in a transparent container, a security
       violation has occurred.19

       If we assume that the computer is to be treated as a

drawer, we must then decide how a file on the computer is to be

treated.    The contents of the file are not viewable without

opening the file.     Indeed, the existence of the file is not

viewable without taking several steps beyond the “wallpaper”

19
     81 TRG Pamphlet 36-2201, at 10.

                                      9
United States v. Conklin, No. 05-0220/AF


that was in plain view.      Accordingly, we conclude that, even if

the drawer analogy was appropriate, the files on the computer

should have been treated as the contents of a non-transparent

container.    Taking the drawer analogy to its logical result

leads us to the conclusion that TSgt Schlegel’s actions in

opening the files went beyond what was authorized for non-

transparent containers.

     The fact that the inspection exceeded its authorized

purpose and scope would not be determinative if Appellant had no

reasonable expectation of privacy in the files on his personal

computer located in his dormitory room.     In dealing with the

computer privacy question, we have held that a servicemember has

an expectation of privacy in the contents of a personal computer

in his or her home.20     On the other hand, we have concluded that

there is a more limited expectation of privacy in a government

computer located in a government office environment.21     We have

not addressed the privacy interests involved on these precise

facts:   a personally owned computer located on base in a

dormitory room that was shared with another individual.

Although we have recognized a privacy interest in assigned




20
  United States v. Maxwell, 45 M.J. 406, 418 (C.A.A.F. 1996).
21
  United States v. Tanksley, 54 M.J. 169, 172 (C.A.A.F 2000),
overruled in part on other grounds by United States v. Inong, 58
M.J. 460, 465 (C.A.A.F. 2003).

                                     10
United States v. Conklin, No. 05-0220/AF


military dwellings,22 we have held that “the threshold of a

barracks/dormitory room does not provide the same sanctuary as

the threshold of a private home.”23

      Justice Harlan, in his concurring opinion in Katz v. United

States,24 articulated what has become the test used in evaluating

the question of a reasonable expectation of privacy.   He

concluded that there “is a twofold requirement, first that a

person have exhibited an actual (subjective) expectation of

privacy and, second, that the expectation be one that society is

prepared to recognize as ‘reasonable.’”25

      In applying that standard to this case, we conclude that

Appellant did have a subjective expectation of privacy in the

files stored on the hard drive of his computer and that military

society would recognize such an expectation as reasonable.    We

therefore agree with the Court of Criminal Appeals that an

individual sharing a two-person dormitory room has a reasonable

expectation of privacy in the files kept on a personally owned




22
   United States v. Middleton, 10 M.J. 123, 132 (C.M.A. 1981) (a
locked wall locker is in a zone of privacy protected by the
Fourth Amendment).
23
   United States v. McCarthy, 38 M.J. 398, 403 (C.M.A. 1993)
(barracks room does not afford the same protections from arrest
as a private home).
24
   389 U.S. 347, 360 (1967) (Harlan, J., concurring).
25
   Id. at 361; see also United States v. Monroe, 52 M.J. 326, 330
(C.A.A.F. 2000) (citing Minnesota v. Olson, 495 U.S. 91, 95
(1990)).

                                     11
United States v. Conklin, No. 05-0220/AF


computer.26     We next turn to that court’s conclusion that,

despite the unlawful inspection, the evidence seized by the

AFOSI agents was admissible as the result of Appellant’s

voluntary consent to the search of his room and computer.27

          II.    The Consent Search and Attenuation of Taint

     After TSgt Schlegel completed his unauthorized search of

Appellant’s computer and its files, the MTLs contacted their

commander who told them to inform the AFOSI.         After talking with

the MTLs, two AFOSI agents and SSgt Wilcox, a third MTL present

during the inspection, found Appellant at the dining hall.28

Without telling him of the results of TSgt Schlegel’s

examination of his computer, they requested his permission to

search his room and his computer.          He granted consent and signed

a form to that effect.      Based on this consent, the Court of

Criminal Appeals held that:

      Once the appellant gave his consent to search his
      room and his computer, he waived any reasonable

26
   Conklin, 2004 CCA LEXIS 290, at *12, 2005 WL 1157 at *4. We
note that the base regulations which are the basis for the
inspections in this case are silent about personal computers.
Accordingly, we voice no opinion today regarding a situation
where regulations dealing with personal computers, barracks use,
and privacy interests might exist.
27
   Conklin, 2004 CCA LEXIS 290, at *16, 2005 WL 1157 at *5.
28
   The timing of events is not clear from the record. The AFOSI
agent testified that he recalled being contacted between 0900
and 0930. That is contradicted by TSgt Schlegel’s testimony in
which he recalled getting involved between 1045 and 1050.
Appellant executed the consent to search form at 1230.
Accordingly, it is apparent that something less than three hours
elapsed from the time of the inspection to the time that
Appellant was contacted by AFOSI.

                                     12
United States v. Conklin, No. 05-0220/AF


       expectation of privacy he might have enjoyed. Thus,
       although we reach our conclusion by a different route
       than the military judge, we agree that the appellant
       was not entitled to have the evidence suppressed.29

       Therefore, the question for this Court is whether

Appellant’s consent to search cured the earlier violation.              The

granting of consent to search may sufficiently attenuate the

taint of a prior violation.       For example, we have held that the

voluntary consent to a urinalysis was not tainted by an earlier,

unwarned interrogation.30      On the other hand, the granting of

consent to search does not cure all ills.           “If appellant’s

consent, albeit voluntary, is determined to have been obtained

through exploitation of the illegal entry, it can not be said to

be sufficiently attenuated from the taint of that entry.”31

       The voluntariness of Appellant’s consent is not at issue.

The only question facing us is whether Appellant’s consent was

an independent act of free will.           In Brown v. Illinois32 the

Supreme Court analyzed three factors to determine if Miranda33

warnings were sufficient to remove the taint of an unlawful

search and allow the admission of a subsequent confession.              The

Court held that the question of whether such a confession is an

act of free will must be answered on the facts of each case

looking at the temporal proximity of the unlawful police

29
     Conklin, 2004 CCA LEXIS 290, at *16-*17, 2005 WL 11587, at *5.
30
     United States v. Murphy, 39 M.J. 486, 489 (C.M.A. 1994).
31
     United States v. Khamsouk, 57 M.J. 282, 290 (C.A.A.F. 2002).
32
     422 U.S. 590, 603-04 (1975).
33
     Miranda v. Arizona, 384 U.S. 436 (1966).

                                     13
United States v. Conklin, No. 05-0220/AF


activity and the subsequent confession, the presence of

intervening circumstances, and the purpose and flagrancy of the

official misconduct.34     In Khamsouk,35 we were unanimous in

adopting the Brown three-pronged approach in examining the

effects of an unlawful arrest upon a subsequent search, although

our application of that approach was less than unanimous.36

      The Fifth Circuit, in a case almost identical to the case

we face, followed the Brown test.          “To determine whether the

defendant’s consent was an independent act of free will,

breaking the causal chain between the consent and the

constitutional violation, we must consider three factors:         (1)

the temporal proximity of the illegal conduct and the consent;

(2) the presence of intervening circumstances; and (3) the

purpose and the flagrancy of the initial misconduct.”37

     Applying this three-prong test to the facts at hand, we

determine that all three favor Appellant.         First, in terms of

the temporal proximity of the illegal conduct and the consent,

less than three hours elapsed between the time that TSgt

Schlegel began opening files on Appellant’s computer and the

time that Appellant consented to the search.         Indeed, it appears

that everything happened on a single day before lunch.

34
   Brown, 422 U.S. at 603-04.
35
   Khamsouk, 57 M.J. at 282.
36
   Indeed, the Khamsouk opinion resulted in something
exceptionally unusual in this Court’s jurisprudence -- five
separate opinions. Id. at 283-307.
37
   United States v. Hernandez, 279 F.3d 302, 307 (5th Cir. 2002).

                                     14
United States v. Conklin, No. 05-0220/AF


      Second, there were no intervening circumstances sufficient

to remove the taint from the initial illegal search.       Yes,

different agents were involved, but they were fully briefed by

the MTLs who conducted the inspection/search.       Additionally, one

of the MTLs involved in the initial visit to Appellant’s room

accompanied the AFOSI agents in their search for Appellant.

Simply stated, the AFOSI agents would not have been interested

in talking to Appellant but for the information relayed to them

as a direct result of the unlawful search that had just taken

place.   There were no intervening events or circumstances that

would sever the causal connection between the two searches.

      Turning to the third factor in our analysis of the

independent nature of the two searches, we examine the

Government’s conduct.      Although we find no bad motive or intent

on behalf of the Government agents in this case, we do find that

their actions were unnecessary and unwise.       TSgt Schlegel chose

to expand the scope of a legitimate inspection into private

files stored on a personal computer.       There were a variety of

legitimate options open to him.        He might have secured the room

and the computer and charged Appellant for the open display of

the nude image.     He might have presented the facts to his

commander and sought search authorization or other guidance.         He

might have asked the advice of a staff judge advocate.




                                     15
United States v. Conklin, No. 05-0220/AF


     Although we are hesitant to call TSgt Schlegel’s actions

“flagrant,” they were certainly unwise, avoidable, and

unlawful.38   The actions of the AFOSI agents exploited the

original illegality.      Upon being informed of the material found

on Appellant’s computer, they did nothing in the way of

independent investigation.       Instead, they immediately sought out

Appellant.    Finding him in the on-base dining facility at the

noon meal, they escorted him outside and requested his consent

to search.

      In applying the Brown factors to the facts of this case, we

return to the Fifth Circuit’s analysis.      In Hernandez, a police

officer felt the bag of a passenger who had boarded a bus, while

the bag was in the luggage compartment underneath the bus.39

Feeling something suspicious, he then boarded the bus and asked

the passenger for permission to search the bag.40      She gave

consent, and he opened the bag discovering drugs inside.41        The

Fifth Circuit noted that the first two factors of the Brown test

weighed in favor of the defendant, because the consent was


38
   In evaluating the nature of the senior MTL’s conduct in this
case, we are mindful of the fact that his inspection of a
personal computer on a different occasion has been the subject
of appellate criticism. See United States v. Astley-Teixera,
No. ACM 35161, 2003 CCA LEXIS 246, at *27, 2003 WL 22495794, at
*10 (A.F. Ct. Crim. App. Oct. 21, 2003) (a different panel of
the Air Force Court facing facts virtually identical to those
presented here, found the inspection unlawful and reversed).
39
   279 F.3d at 305.
40
   Id.
41
   Id.

                                     16
United States v. Conklin, No. 05-0220/AF


obtained immediately following the illegal manipulation of the

bag and there were no intervening circumstances.42        It concluded

that the officer’s conduct in manipulating the bag was not

flagrant, noting that it might not have been considered a search

under Fifth Circuit precedent at the time of the officer’s

action, but it concluded that the drugs seized were inadmissible

because “the causal connection between the violation and the

consent was not broken.”43

       We are confronted with a very similar situation here, and

like the Fifth Circuit, we conclude that there was a causal

connection between the illegal search and the act of obtaining

consent.    The illegal search is the only factor that led

directly to the request for consent from Appellant and the

subsequent search of his computer.         The exploitation of the

information obtained from the illegal search was flagrant even

if the search itself was not.        Since Appellant’s consent was

“obtained through exploitation of the illegal [search], it can

not be said to be sufficiently attenuated from the taint of that

[search].”44    Appellant’s consent was not “an independent act of

free will”45 sufficient to cure the poisonous effects of the

unlawful search.



42
     Id. at 308-09.
43
     Id. at 309.
44
     Khamsouk, 57 M.J. at 290.
45
     Hernandez, 279 F.3d at 307.

                                     17
United States v. Conklin, No. 05-0220/AF


                       III.    The Exclusionary Rule

      The fundamental purpose of the exclusionary rule is to

deter improper law enforcement conduct.        Were we to hold that

Appellant’s consent to search requested by agents as a direct

result of, and almost immediately after, an unlawful search was

sufficient to dissipate the taint of the unlawful conduct, we

might well be encouraging unlawful conduct rather than deterring

it.   We have not discovered, nor has the Government argued, any

exception to the exclusionary rule that applies to the facts of

this case.    Accordingly, we conclude that the military judge

erred in not granting Appellant’s motion to suppress.

      The decision of the United States Air Force Court of

Criminal Appeals is reversed.        The findings of guilty and

sentence are set aside.       The record is returned to the Judge

Advocate General of the Air Force.         A rehearing may be ordered.




                                     18
United States v. Conklin, No. 05-0220/AF


     BAKER, Judge, with whom CRAWFORD, Judge, joins

(dissenting):

     The question presented is whether the consent Appellant

gave to Air Force Office of Special Investigations (AFOSI)

agents to search his computer vitiated the taint of the initial

unlawful search of the same computer.

     The exclusionary rule is a “judicially prescribed remedial

measure” that is not intended to apply in all instances where

evidence is acquired following an illegal search.   Segura v.

United States, 468 U.S. 796, 804 (1984).    The rule recognizes

that while government agents should not profit from illegal

searches, they should also not “‘be placed in a worse position

than [they] would otherwise have occupied.’”    United States v.

Haynes, 301 F.3d 669, 681-82 (6th Cir. 2002) (quoting Murray v.

United States, 487 U.S. 533, 542 (1988)).

     The rule should not apply in circumstances where the

connection between a first unlawful search and the discovery of

evidence in a second search is “‘so attenuated as to dissipate

the taint’” of earlier government misconduct.   Segura, 468 U.S.

at 805 (quoting Nardone v. United States, 308 U.S. 338, 341

(1939)).   A second search is sufficiently attenuated from a

prior unlawful search if the government can show “‘there was

some significant intervening time, space, or event’” between the
United States v. Conklin, No. 05-0220/AF


two searches.   Haynes, 301 F.3d at 682 (quoting United States v.

Buchanan, 904 F.2d 349, 356 (6th Cir. 1990)) (citation omitted).

     A suspect’s voluntary consent to a second search by law

enforcement may be an attenuating event that removes the taint

of a prior illegal search, so long as the consent is

“sufficiently an act of free will to purge the primary taint of

the unlawful invasion.”   Brown v. Illinois, 422 U.S. 590, 599

(1975) (citation and quotation marks omitted); see also United

States v. Beason, 220 F.3d 964, 967 (8th Cir. 2000) (consent to

a search is a sufficient act of free will to purge the primary

taint).   In United States v. Khamsouk, this Court, borrowing

from Brown, applied a three-factor analysis to determine whether

an appellant’s consent to search his bags was an act of free

will and sufficiently attenuated from a prior illegality.      57

M.J. 282, 291-94 (C.A.A.F. 2002).    These factors included:

“‘the temporal proximity of the arrest and the confession,

particularly, the presence of intervening circumstances, and the

purpose and flagrancy of the official misconduct.’”    Id. at 291

(quoting Brown, 422 U.S. at 604).

     Applying the Brown factors to the specific circumstances of

the initial search in this case, I conclude that the second

search was sufficiently attenuated and Appellant’s consent

vitiated the taint of the first unlawful search.   Therefore, I

respectfully dissent.


                                 2
United States v. Conklin, No. 05-0220/AF


Temporal Proximity

     The government bears the burden of demonstrating that an

act of subsequent consent was voluntary and sufficiently a

product of free will to purge the primary taint of the unlawful

invasion.   Khamsouk, 57 M.J. at 291.   Courts look to a variety

of factors in addressing this question, including the

characteristics of the accused, whether the accused understands

his or her right to refuse consent, the accused’s knowledge of

the prior illegality, and the nature of the detention, if any.

See United States v. Jones, 234 F.3d 234, 242-43 (5th Cir.

2000); Haynes, 301 F.3d at 682-84.    No factor is dispositive and

each case must be addressed on its own merits and facts.

Khamsouk, 57 M.J. at 290-91.

     In this case, the record reflects that Appellant was not

privy to the initial unlawful search, and that he was instead

approached in the dining facility by two AFOSI agents about

three hours later.   Appellant was not in custody.   The agents

were aware of the prior search and the evidence identified

during the search but they did not conduct the first search

themselves.   Significantly, the record does not reflect that

Appellant was informed of the prior search and its result before

he gave consent to a second search.

     Thus, unlike the circumstances in United States v.

Hernandez, 279 F.3d 302, 305 (5th Cir. 2002), the request for


                                 3
United States v. Conklin, No. 05-0220/AF


consent by the AFOSI agents did not immediately follow the

Fourth Amendment violation.   Appellant did not know of the prior

unlawful act, and thus did not face “the sense of futility” and

psychological disadvantages that might arise if the individual

concludes that the “‘cat is already out of the bag[.]’”

Commonwealth v. Peleeki, 818 N.E. 2d 596 600 (Mass. App. Ct.

2004) (quoting Darwin v. Connecticut, 391 U.S. 346, 351 (1968)

(Harlan, J., concurring in part and dissenting in part)).

     Further, Appellant was advised that the purpose of the

search was to look for child pornography, and thus, he was aware

of the context of the consent request.    In addition, he was

advised of his right to withhold consent and he acknowledged his

understanding of this right in writing.    Based on these

circumstances, I conclude this factor weighs heavily in favor of

the Government.   See United States v. McGill, 125 F.3d 642, 644

(8th Cir. 1997) (consent an act of free will where suspect was

informed and understood his right to withhold consent); see also

United States v. Ramos, 42 F.3d 1160, 1164 (8th Cir. 1994)

(taint from initial unlawful search purged when suspect gave

consent after given oral and written instruction that he did not

have to provide consent).




                                 4
United States v. Conklin, No. 05-0220/AF


Intervening Circumstances

        I agree with the majority that there were no intervening

circumstances between the unlawful search and Appellant’s

subsequent consent to the second search.

Purpose and Flagrancy

        The third “purpose and flagrancy” factor identified in

Brown presents a closer question and is the key to this case.

As this Court has recognized, the third Brown factor is

particularly important because it comes closest to the

exclusionary rule’s primary purpose:    “‘the deterrence of police

conduct that violates Fourth Amendment rights.’”    Khamsouk, 57

M.J. 291-92 (quoting Stone v. Powell, 428 U.S. 465, 486 (1976)).

        The exclusionary rule has “never been interpreted to

proscribe the introduction of illegally seized evidence in all

proceedings or against all persons.”    Stone, 428 U.S. at 486.

Rather, the Supreme Court has sought to strike a balance between

society’s interest in the “‘determination of truth at trial’”

and the “‘incremental contribution that might [be] made to the

protection of Fourth Amendment values’” through application of

the rule.    Khamsouk, 57 M.J. at 292 (quoting Stone, 428 U.S. at

488).    These values, of course, protect society as a whole and

not just those brought before the bar of justice.

        The Supreme Court has sought to find this proportionality

by distinguishing between cases where police intentionally


                                   5
United States v. Conklin, No. 05-0220/AF


violate what they know to be a constitutional command, and

evidence that is a product of good faith misunderstanding of the

relevant constitutional requirements, as well as technical,

trivial, or inadvertent violations.   Brown, 422 U.S. at 610-12

(Powell, J., joined by Rehnquist, J., concurring in part).    As

Justice White summarized:

     [D]eserving of exclusionary treatment are searches and
     seizures perpetrated in intentional and flagrant disregard
     of Fourth Amendment principles. But the question of
     exclusion must be viewed through a different lens when a
     Fourth Amendment violation occurs because the police have
     reasonably erred in assessing the facts, mistakenly
     conducted a search authorized under a presumably valid
     statute, or relied in good faith upon a warrant not
     supported by probable cause.

Illinois v. Gates, 462 U.S. 213, 261 n.14 (1983)(White, J.,

concurring in the judgment).

     In short, the rule is best applied when its “‘remedial

objectives are thought most efficaciously served.’”   Khamsouk,

57 M.J. at 292 (quoting Penn. Board of Probation and Parole v.

Scott, 524 U.S. 357, 363 (1998) (quoting Stone, 428 U.S. at 486;

United States v. Calandra, 414 U.S. 338, 348 (1974))).

     In my view, the conduct of the dorm inspectors and AFOSI

agents in this case falls somewhere between the exclusionary

extremes; it represents neither flagrant conduct nor a merely

technical or trivial violation of the Fourth Amendment.   On the

one hand, the dorm inspectors conducting the initial unlawful

search, Technical Sergeant (TSgt) Schlegel, Staff Sergeant


                                6
United States v. Conklin, No. 05-0220/AF


(SSgt) Roy, and SSgt Wilcox, were lawfully within the dorm room

conducting a health and welfare inspection.   The search was

precipitated by their identification of adult pornography in

plain view.   Significantly, TSgt Schlegel previously sought

legal advice from AFOSI in a similar incident, and he relied

upon this advice before searching Appellant’s computer.    The

advice was erroneous, but neither TSgt Schlegel nor the AFOSI

agents pursued a purposeful policy of violating rights with the

intention of later obtaining cleansing consents.   Rather, the

unlawful search in this case was not part of a policy to

circumvent servicemembers’ rights.   Moreover, the search did not

occur in the home, where the Fourth Amendment comes closest to

black letter law, but rather in the context of a military

barracks and an inspection search where case law reveals

evolving principles of privacy and careful contextual

applications of Fourth Amendment principle.   See, e.g., United

States v. Jackson, 48 M.J. 292, 293-94 (C.A.A.F. 1998).

     Based on these circumstances, I conclude that Appellant’s

voluntary consent, given without knowledge of the prior search,

vitiated the taint of the unlawful search, even if the AFOSI

agents’ motive in requesting Appellant’s consent was supplied by

the prior unlawful search.   Further, applying the concepts of

proportionality essential to justice embodied in the

exclusionary rule, the legal policy purposes of the exclusionary


                                 7
United States v. Conklin, No. 05-0220/AF


rule would not otherwise be served through application of the

rule in this case.




                                8
