JOSÉ A. CABRANES, Circuit Judge:
The question presented is whether a search warrant affidavit that relied upon evidence generated by an automated software program provided a substantial basis for a magistrate judge's conclusion that there was probable cause that child pornography would be found on defendant's computer.
We hold that the affidavit at issue sufficiently established probable cause and that defendant's motions to suppress were properly denied.
The judgment of the United States District Court for the District of Vermont (Christina Reiss, Chief Judge) is affirmed.
Defendant Derek Thomas appeals from the denial of his motions to suppress the searches of his residence and his computer. Thomas pleaded guilty to the production of child pornography, in violation of 18 U.S.C. § 2251(a),
Thomas was arrested as part of a joint federal and state law enforcement investigation in Vermont during 2011 and 2012, known as "Operation Greenwave," into potential child pornography offenses committed through the use of peer-to-peer ("P2P") file-sharing software.
Traditionally, law enforcement officers seek to detect child pornography offenses by manually sending out search queries for illicit material over P2P networks, one-by-one. CPS automates this process by canvassing these public P2P networks, identifying files that contain child pornography, cataloguing this information, and providing law enforcement officers with a list of the online users who are sharing these files over P2P networks.
In order to use CPS products, law enforcement must attend and successfully complete a three-day training course. During the course, law enforcement officers are instructed on how to search for child pornography with P2P file-sharing software using both the manual method and the automated CPS method. The officers are then taught how to compare the results, to demonstrate the reliability of the software. Id. If a law enforcement officer completes the course, TLO will allow that officer to use the CPS software in his or her jurisdiction. Id.
In late 2011, Detective Gerard Eno of the South Burlington Police Department was investigating child exploitation offenses. The particular focus of his investigation was offenders who were using P2P file-sharing software to exchange child pornography files. Id. at *7, 11. Detective Eno, who had completed TLO's training course and was licensed by the company to operate its software in Vermont, used CPS to identify an IP address that had offered to share images and video files that were tagged as being potentially child pornography. Detective Eno confirmed that the files indeed constituted child pornography by cross-referencing them with other databases and file-share systems.
Using the IP address obtained through CPS, Detective Eno traced the computer to a physical address in Vermont, which turned out to be where defendant Derek Thomas lived. Special App. 41. After conducting a period of surveillance on this
The magistrate judge issued the requested search warrant. Id. at 42. Law enforcement agents executed a search on the residence and on Thomas's computer. Id. at 42-43. Child pornography files were thereafter found on the computer. Id. at 43.
Thomas filed four separate motions to suppress the evidence seized pursuant to these searches. Following a consolidated suppression and Franks hearing,
Relevant here, the District Court found that the Fiore Affidavit adequately disclosed the fact that law enforcement used automated software in conducting its investigations and that Thomas's challenge to the reliability of the automated software was unsupported by any evidence. The District Court also found that the primary function of CPS is simply to produce lists of otherwise public information.
The question before us is whether, under the totality of the circumstances, the Fiore Affidavit provided a substantial basis for the magistrate judge's conclusion that there was probable cause that child pornography would be found on a computer in Thomas's residence.
The standard of review for evaluating the district court's ruling on a suppression motion is clear error as to the district court's findings of historical facts, but de novo as to ultimate legal conclusions, such as the existence of probable cause. United States v. Raymonda, 780 F.3d 105, 113 (2d Cir.2015).
Probable cause "is a fluid concept — turning on the assessment of probabilities in particular factual contexts — not readily, or even usefully, reduced to a neat set of legal rules." Maryland v. Pringle, 540 U.S. 366, 370-71, 124 S.Ct. 795, 157 L.Ed.2d 769 (2003) (citation omitted). Indeed,
When reviewing a challenged warrant, we "accord considerable deference to the probable cause determination of the issuing magistrate." Walczyk v. Rio, 496 F.3d 139, 157 (2d Cir.2007). This degree of deference derives from a concern that "[a] grudging or negative attitude by reviewing courts toward warrants will tend to discourage police officers from submitting their evidence to a judicial officer before acting." United States v. Ventresca, 380 U.S. 102, 108, 85 S.Ct. 741, 13 L.Ed.2d 684 (1965). Accordingly, the task of a reviewing court is simply to ensure that the totality of the circumstances afforded the magistrate "a substantial basis" for making the requisite probable cause determination. Illinois v. Gates, 462 U.S. 213, 238, 103 S.Ct. 2317, 76 L.Ed.2d 527 (1983).
We have previously held that "to suppress evidence obtained pursuant to an affidavit containing erroneous information, the defendant must show that: (1) the claimed inaccuracies or omissions are the result of the affiant's deliberate falsehood or reckless disregard for the truth; and (2) the alleged falsehoods or omissions were necessary to the issuing judge's probable cause or necessity finding." United States v. Rajaratnam, 719 F.3d 139, 146 (2d Cir.2013) (quoting United States v. Canfield, 212 F.3d 713, 717-18 (2d Cir.2000)) (internal quotation marks and brackets omitted). In the case of omissions, we explained that "the ultimate inquiry is whether, after putting aside erroneous information and correcting material omissions, there remains a residue of independent and lawful information sufficient to support a finding of probable cause or necessity." Id. (quoting Canfield, 212 F.3d at 718) (internal quotation marks and brackets omitted). In general, it is strong evidence that the Government did not deliberately falsify information in the affidavit, or act with "reckless disregard for the truth," when the alleged omission would have strengthened, rather than weakened, the Government's showing of probable cause. See id. at 155.
Here, Thomas asserts that the evidence recovered from his computer must be suppressed because the Government omitted two crucial items of information from the affidavit that the magistrate relied upon in issuing the relevant search warrants: (1) the fact that CPS, a third-party software source, generated the information upon which the Government relied; and (2) information regarding the reliability of the CPS software.
Thomas asserts that the Fiore Affidavit did not adequately disclose or describe the use of CPS to generate the evidence that the Government relied upon in its warrant application.
Both challenges are without merit. The fact that the software was created by a third-party is immaterial here. The software, as explained below, merely aggregates existing public information, and so its provenance has no bearing on the probable cause determination. Indeed, defendant presents no case law or other authority for his assertion that law enforcement was required to explicitly state the non-governmental nature of the software's creator. In any case, the District Court concluded that the affidavit at issue did adequately disclose "the use of third party software to identify the IP address of a target computer and to monitor and log Internet and local network traffic from that IP address." Thomas, 2013 WL 6000484, at *8.
In the same vein, Thomas provides no case law or other authority to support his argument that the Government was required to disclose the commercial name of the software used to uncover evidence of his crime. We have never held that the anonymity of a source of information destroys the veracity of an affidavit, especially where the source is known, disclosed, and described, with only its name withheld.
Moreover, just as an informant's name can be presented anonymously in an affidavit, see id., so too can a company's name. Probable cause determinations can hang solely on the veracity of an informant, but not on that informant's name. So too, the primary relevance of automating third-party software lies not in its name, but in its functionality.
Finally, we cannot conclude that any omission here was made deliberately or with "reckless disregard for the truth" when it is clear that full disclosure of the relevant information would only have strengthened the search warrant application. Rajaratnam, 719 F.3d at 155. In fact, during the proceedings in the District
Thomas also asserts that the affidavit failed to establish the reliability of the CPS software at issue, drawing a parallel to the drug-sniffing dog in Florida v. Harris, ___ U.S. ___, 133 S.Ct. 1050, 185 L.Ed.2d 61 (2013). There, the Supreme Court held that a drug-sniffing dog's satisfactory performance in a certification or training program is a sufficient basis to trust his alert and thus establish probable cause. Thomas contends that no such certification or testing was done on the CPS software, thereby calling into question the subsequent probable cause determination generated by law enforcement's use of CPS.
Thomas' reliability challenge fails for several reasons. First, his analogy to a drug-sniffing dog is inapposite. Employing a drug-sniffing dog to establish probable cause involves numerous steps, each of which is susceptible to error: (1) the training of the dog to identify illicit substances; (2) the dog's ability to follow its training in identifying a particular illicit substance; (3) the dog appropriately signaling to law enforcement that an illicit substance is present; and (4) a law enforcement agent's ability to properly interpret that signal. Moreover, any such error along this chain is not always discernible to law enforcement, as dogs contain certain sensory abilities that are far superior to those of humans.
By contrast, the CPS software merely automates the aggregation of public information — a task that could otherwise be performed manually by law enforcement, albeit at a slower and less efficient pace.
In any case, we discern no error — much less, clear error — in the District Court's finding that CPS was a reliable tool that could serve as the basis of a search warrant affidavit.
Based upon an examination of the totality of the circumstances, there existed sufficient "indicia of reliability" to permit a reasonable person to conclude that probable cause existed in these circumstances. Illinois v. Gates, 462 U.S at 233, 103 S.Ct. 2317. Law enforcement verified and corroborated the information received from CPS through a hash-value analysis,
We hold that probable cause was sufficiently established in the affidavit at issue and that Thomas's motions to suppress were thus properly denied.
For the reasons set forth above, we
18 U.S.C § 2251(a).