JOHN W. BROOMES, District Judge.
This matter came before the court on March 21, 2019, for an evidentiary hearing on Defendant's motion to suppress (Doc. 25.)
Defendant is charged with seven counts of intentional damage to a protected computer, 18 U.S.C. § 1030(a)(5)(A) and one count of threat to damage a protected computer, 18 U.S.C. § 1030(a)(7). On May 23, 2017, Jeffrey Ridgway, an investigator with the Hays Police Department, presented an application for a search warrant to Ellis County District Judge Glenn Braun. Ridgway sought a warrant for 714 1/2 Topeka Street, Larned, Kansas, to search for items that were evidence of a violation of K.S.A. 21-5839, specifically computers, laptops, cellular phones, tablets, or other mobile devices capable of being used to access the internet based Nex-Tech Classified system. Officers executed the search warrant for 714 1/2 Topeka Street on May 24. 714 Topeka Street is a residence that is modified into three apartments. (Doc. 25 at 1.) 714 1/2 Topeka is one of the three apartments at the residence. (Id.) Immediately after searching 714 1/2 Topeka Street, on May 24, 2017, Ridgway, presented a second application for a search warrant to Judge Braun. This warrant was to search the shed behind 714 Topeka Street. The second affidavit is nearly identical to the first affidavit. Therefore, the court will generally refer to both affidavits as "affidavit" throughout this order. Ridgway's affidavit included extensive statements regarding the investigation. Instead of quoting the relevant portions, the court will summarize the affidavit.
Nex-Tech provides internet services and runs a classified advertisement service that is known as Nex-Tech Classifieds. On March 31, 2017, Nex-Tech COO Michael Pollock reported to Ridgway that their service had been a victim of a Distributed Denial of Services (DDOS) attack. A DDOS occurs when "multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple comprised systems (for example, a botnet) flooding the targeted system with traffic." (Doc. 25, Exh. A at 2.) This results in preventing Nex-Tech customers from accessing the website. Ridgway conducted an investigation and reviewed Nex-Tech's records.
Notably, prior to the attacks, Nex-Tech received threats. On March 27, 2017, a user identified as "grass_is_green" sent two threats by a Nex-Tech e-form contact within just a few minutes. The first threat stated:
(Id., ¶ 141.) (spelling, capitalization, and grammar errors in original).
The second threat stated: "ip address 24.225.8.90 will be submitted at exostress. in for 24 hours if my demands are not met with in (sic) 12 hours, your choice, and remember you have been warned." (Id., ¶ 14 m.) The "grass_is_green" account was created on March 25 with an e-mail address of ntcsucks@mail.com and a contact number of xxx-xxx-1011.
On March 26, the user "water_is_blue" was created with an e-mail address of janentcsucks@mail.com. The city listed for the user is Larned, Kansas. Within the same hour of creating the user name, the user contacted another classified user and accessed the internet through Courthouse IP. That same evening, "grass_is_green" contacted other classified users from an electronic device accessing the internet by using the IP address 68.99.114.67. This IP address was the static IP address assigned to the Jordaan Memorial Library ("Library IP.")
On March 27, after sending the threats, "grass_is_green" sent another user a message by utilizing the Library IP to access the internet. Nex-Tech deactivated the "grass_is_green" account shortly after this message was sent. Later that morning, "water_is_blue" posted an advertisement for a 1200cc Suzuki Bandit motorcycle using the Library IP. On March 29, "water_is_blue" posted an advertisement for a PlayStation 3 using a different IP address. The contact phone number listed was xxx-xxx-1011. Shortly thereafter, the posting was rejected for violating the terms of service.
On March 30, "water_is_blue" posted an advertisement for a PlayStation 3 from the Library IP address. The contact phone number listed was xxx-xxx-1011. Again, the posting was rejected for violating the terms of service. "Water_is_blue" then contacted the help desk to inquire as to the reason for the rejection. Later that evening, from 8:50 to 9:10 p.m., a DDOS attack occurred which prevented customers from accessing the Nex-Tech classifieds web site. Between 9:02 and 9:07 p.m., the user "water_is_blue" called the Nex-Tech Help Desk and asked for an explanation as to why the advertisement was rejected. The call was disconnected when the technician tried to look up the notes and the website was down. Another DDOS attack occurred between 9:18 and 9:37 p.m. that prevented customers from accessing the website. "Water_is_blue" called the help desk again during this time. During the call, the user asked where the Nex-Tech websites were located, where the company was located, and left a call back number of xxx-xxx-1011.
On March 31, a third attack occurred that prevented customers from accessing the website for one hour and resulted in a loss of revenue to Nex-Tech. Two more attacks occurred that day against the Nex-Tech classifieds site. Two attacks also occurred against Nex-Tech's corporate website which resulted in Nex-Tech being unable to "monitor circuits and network equipment for many public safety entities (hospitals, law enforcement, fire stations, etc.) and medical alert customers." (Doc. 25, Exh. A at ¶ 14bb.) On April 6, the Nex-Tech Classifieds' server was accessed by an electronic device accessing the internet from the Library IP.
Upon a search of Nex-Tech's records, it was discovered that user "larned_seller" listed the contact number of xxx-xxx-1011, during a November 2014 communication with another user. The account "larned_seller" was created in November 2014. The user "larned_seller" also provided the address of 714 1/2 Topeka Street in Larned, Kansas, in order to facilitate an exchange of items purchased from "larned_seller."
Ridgway determined that the 714 ½ Topeka address was owned by John Golightley. John Golightley's driver's license listed a home address on Mark Avenue in Larned. Defendant's driver's license, dated March 3, 2017, listed an address of 714 1/2 Topeka. The distance between the Library and the Topeka residence is approximately 100 yards. The distance between the Courthouse and the Topeka residence is approximately 200 yards.
Additionally, on June 29, 2011, Robert Blackwell, previously an officer with the Edwards County Sheriff's Office, completed a written statement concerning Defendant. In that statement, Blackwell stated that Defendant informed him that he had built a device, "best described as a make-shift satellite dish, capable of broadcasting a wireless signal out an incredibly long range. [Defendant] explained he used this device to access the" County's Courthouse wireless network. (Id. at ¶ 27b.)
Judge Braun authorized the search warrant. The items to be seized included the following:
(Doc. 25, Exh. A at 1.)
At the hearing, Ridgway testified that a meeting was held with the officers who would be participating in the execution of the search warrant. The items to be seized were discussed and it was made clear that only these items were to be seized. The officers then executed the search warrant for 714 1/2 Topeka. The return indicates that the items seized include a laptop, cellular phone, flash drives, modem, and other items. (Doc. 30, Exh. 1-A.)
During the execution of the search warrant for 714 1/2 Topeka, officers also discovered a "battery type device" located in the front room of Defendant's residence. (Doc. 25, Exh. B. at ¶ 28.) There was a cable attached to the device which exited Defendant's residence and eventually went underground. It then resurfaced at the southwest corner of a metal shed located on 714 Topeka Street, Larned, Kansas, and entered the shed. There was a solar panel on the shed's roof. An officer was informed by the property's owner, John Golightley, that the shed was used by Defendant and that the owner did not have access to the shed.
Ridgway included the new information on a search warrant for the shed at 714 Topeka Street. Judge Braun authorized the search of the shed. The officers executed the warrant on the same day, May 24, but did not seize any property. (Doc. 30, Exh. 2-A.)
Defendant moves to suppress the evidence seized pursuant to the warrant on the basis that it lacked probable cause, a sufficient nexus to the crime, and particularity.
The Fourth Amendment to the United States Constitution provides that:
U.S. Const. amend. IV. The validity of a warrant is not determined by "nit-picking" discrete portions of the application. Rather, the test is whether, under the totality of the circumstances presented in the affidavit, the issuing judge had a "substantial basis" for determining that probable cause existed. Illinois v. Gates, 462 U.S. 213, 238-39 (1983); United States v. Harris, 369 F.3d 1157, 1165 (10th Cir. 2004) ("In determining whether a search warrant was supported by probable cause, we review `the sufficiency of the affidavit upon which a warrant [wa]s issued by looking at the totality of the circumstances and simply ensuring `that the [issuing] magistrate had a substantial basis for concluding that probable cause existed.'" (internal citation omitted)). The court gives great deference to a search warrant that was reviewed and signed by an experienced judge. See United States v. Leon, 468 U.S. 897, 914 (1984); United States v. Price, 265 F.3d 1097, 1101 (10th Cir. 2001).
Probable cause exists when "the facts presented in the affidavit would warrant a man of reasonable caution to believe that evidence of a crime will be found at the place to be searched." Harris, 369 F.3d at 1165 (quoting United States v. Hernandez-Rodriguez, 352 F.3d 1325, 1330 (10th Cir. 2003)). The Tenth Circuit has adopted the general rule that probable cause requires a "nexus between [the contraband to be seized] or suspected criminal activity and the place to be searched." United States v. Rowland, 145 F.3d 1194, 1203 (10th Cir. 1998) (quoting United States> v. Corral-Corral, 899 F.2d 927, 937 (10th Cir. 1990)).
Defendant argues that the affidavit does not provide facts that a DDOS attack occurred nor does it state facts that would allow a reasonable person to conclude that the crime was carried out by Defendant or in his home on Topeka. (Doc. 25 at 6.)
K.S.A. 21-5839.
Defendant is correct that the probable cause finding cannot be based on wholly conclusory statements. See Gates, 462 U.S. at 239. This court must disregard any conclusory statements in reviewing a warrant for probable cause. Id. Although the affidavit makes several references to DDOS attacks, the affidavit does not solely rely on the assertion that an attack occurred. Rather, there are several factual statements that support a finding that those attacks did occur.
The affidavit states that there were two threats to Nex-Tech that stated the "grass_is_green" user was going to bring the website down if certain ads were not restored. Only three days after those threats were issued, Nex-Tech Classifieds' site experienced a DDOS attack. The affidavit states that website traffic prevented customers from accessing the website. The affidavit sets forth facts concerning additional attacks to the Nex-Tech corporate website which resulted in an inability to monitor circuits and network equipment for many public safety entities. The affidavit clearly defined an attack as flooding the bandwidth on a website that is done by a botnet, which is a network of private computers infected with malicious software and controlled without the owners' knowledge. (Doc. 25, Exh. A at 2.)
These facts were sufficient to provide the state court judge with probable cause to believe that a violation of K.S.A. 21-5839 had occurred.
Defendant argues that the connection between the different registered users is weak and that the information regarding the address used in 2014 and the police report in 2011 is stale. Based on the facts set forth in the affidavit, there is strong evidence of a connection between the users "banditnut598", "grass_is_green", and "water_is_blue." This is evidenced by Defendant's chart contained at page 10 of his brief. (Doc. 25 at 10.) The accounts all accessed the internet using the Library IP and the Courthouse IP. They all had the same phone number and all placed similar ads for the same items. Therefore, it is reasonable for the state court judge to infer that these users were the same individual. Defendant, however, argues that the larned_seller account connection is weak and the information stale. One common fact connecting the larned_seller account with the other three user accounts is the phone number. But this is not the only connection tying the user accounts together. As set forth in the affidavit, larned_seller is associated with the address 714 1/2 Topeka. All three other user accounts accessed the internet from the Library and the Courthouse. This is significant as those locations are only 100 and 200 yards, respectively, from 714 1/2 Topeka. Therefore, in addition to sharing the same phone number, user larned_seller's address is within only 200 yards, at most, of the location of the wireless access points through which the three other users were accessing the internet. This fact makes it reasonable to infer that all four users are the same individual.
Based on that inference, it was reasonable to infer that evidence of the crime would be found at the Topeka Street address. This address was given by larned_seller in order to sell an item to another user. The address is also only 100 yards from the Library and 200 yards from the Courthouse, which are the locations where the internet network was accessed. Additionally, Defendant has stated in the past that he accessed the internet from the Courthouse using a device that he built. Although this information was from 2011, Defendant's driver's license, which was dated in 2017, identified his home address as the Topeka address. It is reasonable to infer, based on recent activities of the three user names at Nex-Tech, that Defendant continues to use some type of device to access the internet from the Library and the Courthouse's networks. Moreover, although Defendant argues that laptops and cell phones are transient, it was entirely reasonable for the state court judge to infer that the computers, phones, or other internet capable devices used in the alleged offense would be located in the Topeka residence.
In Biglow, the Tenth Circuit identified a non-exhaustive list of factors relevant to the nexus determination, including: "(1) the type of crime at issue, (2) the extent of a suspect's opportunity for concealment, (3) the nature of the evidence sought, and (4) all reasonable inferences as to where a criminal would likely keep such evidence." Id. at 1279. As discussed, this is a crime that is committed by a device that is capable of accessing the internet. The evidence sought is a computer or related device and all reasonable inferences would suggest that computers or related devices are often kept in the home. Therefore, considering the facts in the affidavit and all reasonable inferences that can be made from those facts, the court finds that there is a sufficient nexus between the suspected criminal activity and the place to be searched.
In the event that the affidavit lacked probable cause, the court concludes that "the affidavit's information nonetheless provided sufficient indicia of probable cause to justify the officers [sic] good-faith reliance." Campbell, 603 F.3d at 1233. It is presumed that an officer acts in good-faith reliance when executing a search warrant. United States v. Augustine, 742 F.3d 1258, 1262 (10th Cir. 2014). "This presumption, though not absolute, `must carry some weight.'" United States v. Harrison, 566 F.3d 1254, 1256 (10th Cir. 2009). When an affidavit "describes circumstances which would warrant a person of reasonable caution in the belief that the articles sought are at a particular place," the Tenth Circuit has found "objectively reasonable reliance on an affidavit's establishment of a nexus." United States v. Ejiofor, 753 F. App'x 611, 616-17 (10th Cir. 2018) (citing Augustine, 742 F.3d at 1263). Because the affidavit included facts that connected the 714 1/2 Topeka house to the user accounts, and because it is reasonable to believe that computers and other internet accessible devices could be found in Defendant's home, the court finds that the officers acted in good-faith reliance on the sufficiency of the warrant.
Finally, Defendant argues that the warrant is not sufficiently particular because it sought a "massive swath of digital content from Michael's home." (Doc. 25 at 14.)
The Fourth Amendment requires not only that warrants be supported by probable cause, but that they "particularly describ[e] the place to be searched, and the persons or things to be seized." U.S. Const. amend. IV. The particularity requirement "ensures that the search will be carefully tailored to its justifications, and will not take on the character of the wide-ranging exploratory searches the Framers intended to prohibit." Maryland v. Garrison, 480 U.S. 79, 84 (1987).
United States v. Leary, 846 F.2d 592, 600 (10th Cir. 1988) (internal citations omitted).
Defendant cites United States v. Carey, 172 F.3d 1268, 1275 (10th Cir. 1999), in support of the position that this warrant is deficient in not placing a "meaningful limit" on the type of media seized. (Doc. 25 at 15.) Carey, however, was addressing a search warrant which allowed the officers "to search the files on the computers for `names, telephone numbers, ledger receipts, addresses, and other documentary evidence pertaining to the sale and distribution of controlled substances.'" Carey, 172 F.3d at 1270 ("Mr. Carey complains: (1) search of the computers exceeded the scope of the warrant, (2) he did not consent to the search of his apartment, and (3) seizure of the computers was unlawful because the officers lacked probable cause. We address only the first issue.") The warrant at issue here did not pertain to the actual searching of the electronic devices. Defendant has not cited to any authority that suggests that the language used in this warrant, which specifies devices that can access the internet or devices that are capable of storing data relating to the access of the internet, is too broad. Nor has Defendant identified language that would be sufficient here. Both Ridgway and Detective Shirley-Williams testified that there is no way to further limit the language because they are unable to determine what type of device was used in this instance to commit the crime at issue. The court finds that the "description is as specific as the circumstances and the nature of the activity under investigation permit." Leary, 846 F.2d at 600. Therefore, this warrant complies with the Fourth Amendment.
Defendant's motion to suppress (Doc. 25) is DENIED IN PART AND GRANTED IN PART. The speaker, Ear Force DSS2 Dolby Surround Sound Processor, is suppressed. Defendant's motion to suppress all other evidence seized during the execution of the warrant at 714 1/2 Topeka is denied.
IT IS SO ORDERED.