MARC E. JOHNSON, Judge.
Defendant appeals the denial of his motion to suppress the evidence. For the reasons that follow, we affirm.
Defendant, Casey Aston, was charged in a bill of information on October 29, 2008, with one count of possession of pornography involving juveniles in violation of La. R.S. 14:81.1(A)(3). He pled not guilty and filed several pretrial motions, including a motion to suppress evidence. A hearing on the motion to suppress was held on September 19, 2011, November 10, 2011, and January 9, 2012. The trial judge took the matter under advisement and subsequently denied the motion on March 1, 2012. Defendant filed a writ application with this Court challenging the trial court's ruling, which was denied. State v. Aston, 12-279 (La.App. 5 Cir. 3/28/12) (unpublished writ disposition).
Thereafter, on May 29, 2012, the State amended the bill of information to one count of attempted possession of pornography involving juveniles in violation of La. R.S. 14:27 and 14:81.1(A)(3). On that same date, Defendant withdrew his not guilty
At the suppression hearing, Sergeant Terry Wright of the Bedford County Sheriff's Department in Virginia testified that he was assigned to the Internet Crimes Against Children Task Force. He initiated an investigation on February 12, 2008, to identify and locate individuals who were trading images of child pornography over the internet using the "Gnutella Peer to Peer Network," a file sharing system. To accomplish that task, Sgt. Wright used a software program called the "Wyoming Tool Kit," which is not available for use by the general public. That software allowed Sgt. Wright to identify files as child pornography through a "secured hash algorithm" or "SHA" value, a mathematical code made up of a series of numbers and/or letters that act like a digital fingerprint of a file.
Once he set up the software, Sgt. Wright was presented with an "internet protocol" or "IP" address of a file in a computer that contained possible child pornographic images that were set to be shared with the public. Sgt. Wright explained that an IP address was assigned to a computer user by an internet service provider and that it functioned much like a physical address posted outside a house so the post office could deliver mail there. He learned that the internet service provider of the IP address at issue was Cox Communications. After issuing an administrative subpoena to Cox, Sgt. Wright learned that the subscriber for the IP address was "Tom Aston" in Louisiana. At that point, Sgt. Wright forwarded the case to the Louisiana Attorney General's Office.
Sgt. Wright testified that he was able to partially download the file in the instant case and that he recognized the "SHA" value of that file because he had seen it on previous occasions. When he viewed the file, which was a minute and a half long, it depicted a female child in diapers estimated to be under the age of three, and a male subject, who took the child who was lying on a bed, removed her diaper, and after several attempts, penetrated the child's vagina with his penis.
Randall Gohn, an investigator with the high tech crime unit of the Louisiana Attorney General's Office, Department of Justice, testified that another investigator in his office, Gary Maranto, was given information from Bedford County in Virginia regarding an IP address that was leased in Louisiana and had been seen to have child pornography. Mr. Gohn supervised Mr. Maranto's investigation. The complaint was reviewed, and the file was found to be child pornography. They then located the address, which was 3100 Tennessee Avenue in Kenner, and verified that it was an inhabited dwelling that was currently occupied. At that point, they obtained a search warrant and executed it.
During the search, Defendant was found in his bedroom. He was advised of his rights, after which he gave a written statement. In his statement, Defendant admitted he had downloaded pornography, but that he had not "masturbated to anything younger than 16." He stated that he "[d]ownloaded kiddie porn just to see . . . what they really were." Defendant also stated he had "downloaded younger, just to see though (youngest was 9)." He also described the search terms he used to find child pornography, and he acknowledged that those files were in his shared folder. Defendant stated that no threats or promises
At the conclusion of the hearing, the trial court gave the parties time to brief their arguments. Defendant made the same arguments he makes on appeal; specifically, he argued that he had a reasonable expectation of privacy in the files on his personal computer, the administrative subpoena issued by the Commonwealth of Virginia was invalid because Louisiana citizens have expansive rights and a neutral magistrate did not "pass on the validity and probable cause prior to issuance" of the subpoena, and the actual search warrant should not have been issued because all the information in it was secondhand. The trial judge subsequently denied Defendant's motion to suppress the evidence in its entirety.
In his sole assignment of error, Defendant contends the trial court erred in denying his motion to suppress all computer evidence. He maintains there were three separate searches and that all three were illegal. First, Defendant asserts that Sgt. Wright's initial "search" of computers for possible child pornography was unlawful because he had a reasonable expectation of privacy in the electronic information stored on his computer. Second, Defendant contends the administrative subpoena issued by the Commonwealth of Virginia to Cox Communications for his subscriber information was unlawful because it was done without consent or probable cause. And, third, Defendant maintains that the actual search of his residence after investigators obtained a search warrant was unlawful because the search warrant was based solely on the word of Sgt. Wright, an out-of-state policeman, without an independent investigation by the Louisiana Attorney General's Office.
Initially, it is noted that Defendant previously filed a writ application with this Court challenging the trial judge's denial of the motion to suppress. This Court denied the writ "on the showing made." State v. Aston, 12-279 (La.App. 5 Cir. 3/28/12) (unpublished writ disposition). The "showing" in Defendant's writ application consisted of the argument contained in the writ application, the motion to suppress, the minute entry reflecting the ruling, the notice of intent to seek supervisory review, and the motion for stay.
On appeal, defendant makes the same arguments that he made in his writ application to this Court. The prior denial of a supervisory writ does not preclude reconsideration of an issue on appeal, nor does it prevent the appellate court from reaching a different conclusion. State v. Castleberry, 98-1388 (La.4/13/99); 758 So.2d 749, 755, cert. denied, 528 U.S. 893, 120 S.Ct. 220, 145 L.Ed.2d 185 (1999). The transcripts of the suppression hearing and the exhibits introduced during the hearing, which are a part of the appellate record, were not attached to Defendant's writ application and, thus, were not previously considered. Thus, we do not find the "law of the case" doctrine applicable to this case.
In a hearing on a motion to suppress, the State bears the burden of establishing the admissibility of evidence seized without a warrant. State v. Butler, 01-907 (La.App. 5 Cir. 2/13/02); 812 So.2d 120, 124. The trial court's denial of a motion to suppress is afforded great weight and will not be set aside unless the preponderance of the evidence clearly favors suppression. Id.
Defendant first argues that Sgt. Wright's initial investigation where he "searched" computers for possible child pornography was unlawful because he did not give up any expected right of privacy in electronic information stored within his computer. The State responds that Defendant did not have a right to privacy in the contents of his computer since he made it available to the world by way of a peer-to-peer file-sharing network.
A defendant does not have Fourth Amendment privacy rights in computer files that he or she has shared on file-sharing networks such as Gnutella. In State v. Daigle, 11-1209 (La.App. 3 Cir. 5/2/12); 93 So.3d 657, writ denied, 12-1255 (La.11/16/12); 102 So.3d 30, the defendant pled guilty to one count of pornography with juveniles. On appeal, he argued that the detective violated his right to privacy by using the Wyoming Tool Kit to examine the SHA values for files the defendant freely shared with other "BearShare" clients. Citing federal jurisprudence, the Third Circuit found that the defendant had no Fourth Amendment privacy rights in computer files he shared on file sharing networks such as Gnutella, regardless of whether the defendant had logged onto the Gnutella network through clients such as "Lime[W]ire, Morpheus, BearShare, or Shareaza." Id., 93 So.3d at 665.
Similarly, in State v. Dunham, 12-826 (La.App. 1 Cir. 12/21/12); 111 So.3d 1095, 1098-99, the defendant was found guilty of eight counts of pornography involving juveniles. On appeal, he argued that the use of technology unavailable to the public to search his computer constituted an illegal, warrantless search. However, citing Daigle, the First Circuit found that the defendant's right to privacy was not violated by the trooper's use of "GNU Watch" to examine the SHA values for files the defendant had already elected to freely share with other "LimeWire" users. [See also U.S. v. Stults, 575 F.3d 834, 843 (8th Cir. 2009), cert. denied, 559 U.S. 915, 130 S.Ct. 1309, 175 L.Ed.2d 1093 (2010), where the court held a defendant has no reasonable expectation of privacy in files retrieved from his personal computer where the defendant installed and used a file-sharing program; and, U.S. v. Ganoe, 538 F.3d 1117, 1127 (9th Cir.2008), cert. denied, 556 U.S. 1202, 129 S.Ct. 2037, 173 L.Ed.2d 1122 (2009), which held a defendant has no reasonable expectation of privacy in his computer when he installs and uses file-sharing software, which opens his computer to anyone else with the same freely available program.]
Likewise, Defendant in the present case did not have a Fourth Amendment right to privacy in the contents of his computer, which he made available to the world by way of a peer-to-peer file-sharing network. Thus, we find Sgt. Wright's search of computers using Wyoming Tool Kit was not illegal.
Defendant next argues the administrative subpoena issued by the Commonwealth of Virginia to Cox Communications for his subscriber information was unlawful because it was done without consent or probable cause. He asserts that the administrative subpoena issued by Virginia authorities to Cox "was not passed on by any judge," and that Sgt. Wright obtained his subscriber information in a manner that would not be lawful in Louisiana.
At the suppression hearing, Sgt. Wright testified that he drafted an administrative subpoena to Cox Communications and received a response which stated that the subscriber for the IP address in question was "Tom Aston" in Louisiana, after which he forwarded the case to the Louisiana
A defendant only has standing to challenge a subpoena issued without a showing of probable cause as an infringement of his Fourth Amendment right when he is able to claim a justifiable, reasonable, or legitimate expectation of privacy in the item seized. State v. Bone, 12-34 (La.App. 5 Cir. 9/11/12); 107 So.3d 49, 63, writ denied, 12-2229 (La.4/1/13); 110 So.3d 574, citing Smith v. Maryland, 442 U.S. 735, 99 S.Ct. 2577, 61 L.Ed.2d 220 (1979). Defendant argues he had an expectation that the name and physical address related to his IP address would be kept private, based on a contract between him and Cox.
In United States v. Kennedy, 81 F.Supp.2d 1103, 1110 (D.Kan.2000), the court found the defendant's constitutional rights were not violated when the internet service provider divulged his subscriber information to the government because he had no reasonable expectation of privacy in the information. The court reasoned that when the defendant entered into an agreement for internet services with Road Runner, a high speed internet service provider, he knowingly revealed all information connected to his IP address. As such, the court explained that the defendant could not claim to have a Fourth Amendment privacy interest in his subscriber information.
Additionally, in U.S. v. Cox, 190 F.Supp.2d 330, 332 (N.D.N.Y.2002), the court expressly determined that a criminal defendant has no Fourth Amendment privacy interest in subscriber information given to an internet service provider. In explaining its ruling, the court cited Smith v. Maryland, 442 U.S. at 743-44, 99 S.Ct. at 2582, wherein the United States Supreme Court stated that "a person has no legitimate expectation of privacy in information he voluntarily turns over to a third party." [See also, U.S. v. Perrine, 518 F.3d 1196, 1205 (10th Cir.2008) (the defendant has no Fourth Amendment privacy expectation in the subscriber information he gave to his internet service providers); and U.S. v. Sherr, 400 F.Supp.2d 843, 848 (D.Md.2005) ("The courts that have already addressed this issue . . . uniformly have found that individuals have no Fourth Amendment privacy interest in subscriber information given to an ISP.")]
Accordingly, we find that Defendant did not have a reasonable expectation of privacy with respect to subscriber information he gave to Cox, his internet service provider.
Finally, Defendant asserts that the actual search of his residence after investigators obtained a search warrant was unlawful because it was based on an invalid search warrant that was obtained solely on the word of Sgt. Wright, an out-of-state policeman, without an independent investigation by the Louisiana Attorney General's Office.
As a general rule, searches and seizures must be conducted pursuant to a validly executed search warrant or arrest warrant. State v. Holmes, 08-719 (La.App. 5 Cir. 3/10/09); 10 So.3d 274, 278, writ denied, 09-816 (La.1/8/10); 24 So.3d 857. A search warrant may be issued only upon probable cause established to the satisfaction of a magistrate, by the affidavit of a credible person, particularly describing the person or place to be searched and the things to be seized. State v. Lee, 05-2098 (La.1/16/08); 976 So.2d 109, 122, cert. denied, 555 U.S. 824, 129 S.Ct. 143, 172 L.Ed.2d 39 (2008). Probable cause for the issuance of a search warrant exists when the facts and circumstances, within the affiant's knowledge and of which he has reasonably trustworthy information, are sufficient to support a reasonable belief that an offense has been committed and that evidence or contraband may be found at the place that is to be searched. Id. at 122 (quotations omitted).
The facts establishing probable cause for the warrant must be contained within the four corners of the affidavit. State v. Green, 02-1022 (La.12/4/02); 831 So.2d 962, 969. An affidavit supporting a search warrant is presumed to be valid and the defendant has the burden of proving that the representations made in the affidavit are false. State v. Dee, 09-712 (La.App. 5 Cir. 2/23/10); 34 So.3d 892, 899, writ denied, 10-705 (La.10/29/10); 48 So.3d 1097.
The issuing magistrate must make a practical, common sense decision whether, given all the circumstances set forth in the affidavit, a fair probability exists that evidence of a crime will be found in a particular place. Green, 831 So.2d at 969. The magistrate's determination of probable cause to issue a search warrant is entitled to significant deference on review, and "marginal cases should be resolved in favor of a finding that the issuing magistrate's judgment was reasonable." State v. Rodrigue, 437 So.2d 830, 833 (La.1983). Further, if the magistrate finds the affidavit sufficiently detailed and reliable to show probable cause, the reviewing court should interpret the affidavit in a realistic and common sense fashion, being aware that it is normally prepared by non-lawyer police officers in the midst and haste of a criminal investigation. Green, 831 So.2d at 969. Within these guidelines, courts should strive to uphold warrants in order to encourage their use by police officers. Id. The reviewing court must ensure that under the totality of the circumstances, the issuing magistrate had a "substantial basis" for concluding that probable cause existed. Id.
In the instant case, the application for search warrant set forth in pertinent part:
In U.S. v. Stults, 575 F.3d at 840, the court found the affidavit in support of the search warrant was based on probable cause. The court noted the information in the affidavit showed that through a peer-to-peer computer file sharing program, the agent was able to access and download files directly from the defendant's computer that contained child pornography images, and as a result, a fair probability existed that contraband would be found at the defendant's residence in his personal computer. Id., 575 F.3d at 843-44. Also, in U.S. v. Vosburgh, 602 F.3d 512, 526-27 (3rd Cir.2010), cert. denied, ___ U.S. ___, 131 S.Ct. 1783, 179 L.Ed.2d 656 (2011), the court noted that several courts have held that evidence that the user of a computer employing a particular IP address possessed or transmitted child pornography can support a search warrant for the physical premises linked to that IP address.
In the present case, the information contained in the affidavit shows that Sgt. Wright located a computer used in sharing images of child pornography, compared the file listing and the corresponding SHA values to a list of SHA values previously identified as child pornography, examined the file and confirmed that it was child pornography, located the IP address linked to that computer, and determined that the IP address was assigned to "Tom Aston" at 3100 Tennessee Avenue in Kenner. Thus, we find the search warrant at issue was based on probable cause.
Defendant argues that the affidavit in support of the search warrant was insufficient because it was based solely on Mr. Maranto's summary of Sgt. Wright's investigation, and not on Mr. Maranto's own personal knowledge or investigation.
An affidavit may be based on hearsay, but "it must set forth the underlying circumstances and details sufficient to provide a factual basis by which the magistrate might find reliable both the informant and the information given by him." State v. Tomasetti, 381 So.2d 420,
In accordance with La.C.Cr.P. art. 920; State v. Oliveaux, 312 So.2d 337 (La. 1975); and State v. Weiland, 556 So.2d 175 (La.App. 5th Cir.1990), we have reviewed the record for errors patent. We note that the trial court did not impose the mandatory statutory fine. At the time of Defendant's offense, the penalty for possession of pornography involving juveniles required a fine of "not more than ten thousand dollars."
Although this Court has held that a statute providing for a fine of "not more than" a specified amount does require the imposition of a fine, the matter is not free from doubt. State v. Kerlec, 06-838 (La.App. 5 Cir. 4/11/07); 957 So.2d 810, 815, writ denied, 07-1119 (La.12/7/07); 969 So.2d 626. Additionally, we recognize that Defendant's sentence resulted from a guilty plea. Mindful that the appellate court should refrain from employing errors patent review to set aside guilty pleas about which a defendant makes no complaint and that result in disposition of the case favorable to the defendant, we decline to exercise our authority to correct the illegally lenient sentence. See State v. McGee, 09-102 (La.App. 5 Cir. 9/29/09); 24 So.3d 235, 242.
For the foregoing reasons, Defendant's conviction and sentence are affirmed.