Elawyers Elawyers
Ohio| Change

United States v. Javier Perez, 16-3365 (2017)

Court: Court of Appeals for the Third Circuit Number: 16-3365 Visitors: 35
Filed: Oct. 18, 2017
Latest Update: Mar. 03, 2020
Summary: NOT PRECEDENTIAL UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT _ No. 16-3365 _ UNITED STATES OF AMERICA v. JAVIER PEREZ, Appellant _ On Appeal from the United States District Court for the Eastern District of Pennsylvania (D.C. No. 2-14-cr-00611-001) District Judge: Honorable Jan E. DuBois _ Argued May 10, 2017 _ Before: AMBRO, RESTREPO, and COWEN, Circuit Judges. (Filed: October 18, 2017) Keith M. Donoghue, Esquire (Argued) Brett G. Sweitzer Leigh M. Skipper Federal Community Defender Of
More
                                                              NOT PRECEDENTIAL

                       UNITED STATES COURT OF APPEALS
                            FOR THE THIRD CIRCUIT
                                 _____________

                                     No. 16-3365
                                    _____________

                           UNITED STATES OF AMERICA

                                           v.

                                    JAVIER PEREZ,
                                             Appellant
                                    ______________

                    On Appeal from the United States District Court
                       for the Eastern District of Pennsylvania
                            (D.C. No. 2-14-cr-00611-001)
                       District Judge: Honorable Jan E. DuBois
                                   ______________

                                 Argued May 10, 2017
                                   ______________

             Before: AMBRO, RESTREPO, and COWEN, Circuit Judges.

                                (Filed: October 18, 2017)


Keith M. Donoghue, Esquire (Argued)
Brett G. Sweitzer
Leigh M. Skipper
Federal Community Defender Office
For the Eastern District of Pennsylvania
Suite 540 West – Curtis Center
601 Walnut Street
Philadelphia, PA 19106

      Counsel for Appellant
Louis D. Lappen, Esquire
Robert A. Zauzmer
Albert S. Glenn (Argued)
Office of the United States Attorney
615 Chestnut Street, Suite 1250
Philadelphia, PA 19106

       Counsel for Appellee

                                     ______________

                                        OPINION*
                                     ______________

RESTREPO, Circuit Judge.

       Javier Perez appeals from his conviction of possession of child pornography,

arguing that the initial motion to suppress evidence recovered in a general search of his

computer was denied in error, and that the Government’s presentation of child

pornography evidence at trial—although Perez offered to stipulate to every element

except identity—unduly prejudiced the jury. For the reasons that follow, we will affirm.

                                              I

       Because we write for the benefit of the parties, we set out only the facts necessary

for the discussion that follows. In October 2013, an FBI agent discovered a user of a

common peer-to-peer file-sharing network sharing a video of child pornography. The

FBI subsequently subpoenaed the user’s internet service provider for the account

information corresponding to the internet protocol (“IP”) address in question, and

discovered that the account belonged to Perez, located at a residence in Philadelphia.


       *
        This disposition is not an opinion of the full Court and, pursuant to I.O.P. 5.7,
does not constitute binding precedent.
                                             2
Using the child pornography that the agent had discovered being shared by a user at that

IP address, the FBI obtained a warrant authorizing a search and seizure of all computer

equipment at that physical address.

       In executing the warrant, the FBI discovered that five people lived in the

residence, including an individual who repaired computers out of the home. Among the

five residents and the computer repair business, the home contained 130 computers and

digital storage items, all of which the FBI seized. The only items ultimately found to

contain child pornography came from the basement in which Perez resided.

       To guide the subsequent human-conducted search of the desktop computer

recovered from Perez’s basement space, a forensic team duplicated the computer’s hard

drive, then ran software that scanned the entire drive and catalogued all of its contents by

file type. The scan checked for mismatches of file extensions and file contents—e.g.,

assessing whether an image file had been saved in a .doc format to obscure its true

content—and also checked images against databases of known child pornography.

Agents used the results of the forensic scan to guide a human search of web browsing

history, email, photos and videos, and files specifically identified as pertaining to missing

and exploited children. The human search involved some limits; with respect to emails,

for example, agents looked at metadata first and subsequently looked at message content

if the metadata prompted additional questions. With respect to pictures and videos,

agents looked at thumbnails first and then viewed expanded versions if the thumbnail

seemed to involve responsive material. The human search, however, included an



                                              3
inspection of the entire web history, including browsing, search queries, bookmarks, and

social media usage.

       Having discovered a number of images and videos of child pornography, as well

as internet browsing and search history that indicated the user of the computer had sought

out such images, the Government charged Perez with numerous offenses. In advance of

trial, he indicated that he planned to dispute only the identity of the person who had

engaged in the conduct at issue—noting that, because the basement did not even have a

door, anyone could have accessed the computer—and offered to stipulate to all non-

identity elements of the crimes, including that the media files were sexually explicit and

contained minor children. The Government declined the stipulation, and presented child

pornography to the jury after the District Court overruled Perez’s objections on the basis

of undue prejudice. The jury ultimately convicted Perez of possession, but not

distribution.

                                            II1

       The Fourth Amendment prohibits “[g]eneral warrants” that would allow

“exploratory rummaging in a person’s belongings.” Andresen v. Maryland, 
427 U.S. 463
, 479 (1976) (quoting Coolidge v. New Hampshire, 
403 U.S. 443
, 467 (1971)). To

guard against such general warrants, courts require “particularity,” which “prevents the

seizure of one thing under a warrant describing another.” Marron v. United States, 
275 U.S. 192
, 196 (1927). Particularity has three components: “First, a warrant must identify



       1
           We have jurisdiction under 28 U.S.C. § 1291.
                                             4
the specific offense for which the police have established probable cause. Second, a

warrant must describe the place to be searched. Third, the warrant must specify the items

to be seized by their relation to designated crimes.” United States v. Galpin, 
720 F.3d 436
, 445-46 (2d Cir. 2013) (citations omitted). Ultimately, the particularity requirement

intends that “nothing is left to the discretion of the officer executing the warrant.”

Marron, 192 U.S. at 196
.

       Courts—including our own—have struggled to adapt Fourth Amendment search

doctrines designed for physical spaces to digital contexts. Riley v. California, 
134 S. Ct. 2473
, 2493 (2014). Adapting the particularity requirement to searches of digitally stored

information presents one example of that problem. For one thing, the place to be

searched encompasses much more information in a search of digital storage than in one

of physical space, which appears to allow the plain view exception to undercut the

warrant requirement. Putting all information on a digital storage device that can hold

data “roughly equal to 16 billion thick books,” United States v. Ganias, 
824 F.3d 199
,

218 (2d Cir. 2016), in plain view whenever law enforcement officers have a valid warrant

to search for something that may exist in the storage substantially expands the aggregate

quantity of material encompassed by the exception. Conversely, because of individuals’

ability to “hide, mislabel, or manipulate files,” United States v. Stabile, 
633 F.3d 219
, 237

(3d Cir. 2011), “there may be no practical substitute for actually looking in many

(perhaps all)” files and locations during a search of digital storage. 
Id. at 239.
       To the extent that some courts have tried to address this tension, results have been

mixed. In 2009, the Ninth Circuit issued an en banc opinion with five principles to guide

                                              5
Magistrate Judges in issuing or approving warrants for digital storage spaces. United

States v. Comprehensive Drug Testing, Inc., 
579 F.3d 989
(9th Cir. 2009) (en banc)

(“CDT II”). Notably, the Ninth Circuit reissued the opinion about a year later as a per

curiam opinion, which differed little except that it moved the guidance protocols to a

(non-binding) concurrence. United States v. Comprehensive Drug Testing, Inc., 
621 F.3d 1162
(9th Cir. 2010) (en banc) (per curiam) (“CDT III”); 
id. at 1179-80
(Kozinski, C.J.,

concurring). As a result, subsequent Ninth Circuit panels have upheld broad warrants

authorizing searches of all of a target’s digital storage devices and media despite the

“absence of precautionary search protocols.” United States v. Schesso, 
730 F.3d 1040
,

1043 (9th Cir. 2013).

       Rejecting an attempt to jettison the plain view exception in the digital storage

context, the Seventh Circuit “simply counsel[s] officers and others involved in searches

of digital media to exercise caution to ensure that warrants describe with particularity the

things to be seized and that searches are narrowly tailored to uncover only those things

described.” United States v. Mann, 
592 F.3d 779
, 786 (7th Cir. 2010). The Sixth Circuit

has described computer searches as a “unique problem,” but it has declined to impose “a

specific search protocol,” instead applying “the Fourth Amendment’s bedrock principle

of reasonableness on a case-by-case basis.” United States v. Richards, 
659 F.3d 527
, 538

(6th Cir. 2011). The Tenth Circuit has suppressed incriminating digital evidence of child

pornography discovered by an agent searching a computer for evidence of drug sales,

declining to apply the plain view exception to the contents of digital files (as opposed to

the files themselves). United States v. Carey, 
172 F.3d 1268
, 1273 (10th Cir. 1999).

                                             6
Two years later, however, the same Court declined to suppress child pornography

discovered by an agent who “proceeded to rummage through the hard drive for more

images of child pornography despite the fact that he did not possess a warrant to conduct

such a search,” because it was “persuaded the search was reasonable.” United States v.

Walser, 
275 F.3d 981
, 987 (10th Cir. 2001).

         Factual circumstances often complicate the problem. Often, as here, the initial

search is undertaken by a computer program rather than a human. Searches of digitally

stored data often implicate the rights of other individuals not included in the warrant—

which happens more often and to more people with the increased prevalence of cloud

storage. Leaving aside the intermingling of responsive and non-responsive data of a

named individual, cloud storage often intermingles the data of an individual named in the

warrant with the data of an individual not even under suspicion. See CDT 
III, 621 F.3d at 1166
; see also 
Richards, 629 F.3d at 552
(6th Cir. 2011) (Nelson Moore, J., concurring in

the judgment); see also 
Schesso, 730 F.3d at 1049
.

         Federal courts have yet to strike a tenable doctrinal balance between protecting the

constitutional rights of criminal suspects whose digital storage law enforcement agents

intend to investigate and the practical challenges facing those same agents seeking

specific information in the proverbial digital haystack. Neither has Congress struck a

statutory balance nor the Executive branch via regulation. We do not attempt to do so

today.

                                        *      *      *



                                               7
       We “review[] the District Court’s denial of a motion to suppress for clear error as

to the underlying factual findings and exercise[] plenary review of the District Court’s

application of the law to those facts.” United States v. Perez, 
280 F.3d 318
, 336 (3d Cir.

2002). In the absence of statutes and doctrine that better address rapidly evolving

technology, the manner of searching digital storage is circumscribed by objective

reasonableness rather than specific search protocols. 
Stabile, 633 F.3d at 239
.

       Here, Perez did not argue that the law enforcement agents exceeded the scope of

the warrant, nor could he have. Unlike cases of agents exceeding the scope of a warrant

authorizing a search for evidence of one type of criminal activity by rummaging for

evidence of other types of activities, the warrant here specifically described the target of

the search. Perez did not argue even that the initial computer scan—by which law

enforcement agents preliminarily scanned the entire contents of the hard drive—was

unreasonable. Instead, he merely argued overbreadth as to the execution of the warrant,

and would have preferred that the agents searched the digital storage in a particular order.

As the agents stayed within the scope of the warrant and employed a search protocol

guided by an initial scan whose propriety Perez does not dispute, the District Court did

not err in denying the motion to suppress.

                                             III

       Perez, as noted, also disputes the District Court’s decision to allow the

Government to present graphic evidence of child pornography to the jury. We review a

District Court’s determination after engaging in a Rule 403 balancing for abuse of

discretion. United States v. Sampson, 
980 F.2d 883
, 886 (3d Cir. 1992). Perez argues

                                              8
that, because he disputed only identity, the Government’s refusal to accept his stipulation

and presentation of child pornography amounted to undue prejudice. Recent precedent

forecloses this line of argument. “The government is entitled to prove its case free from a

defendant’s preference to stipulate the evidence away.” United States v. Finley, 
726 F.3d 483
, 492 (3d Cir. 2013). Finley arose in the same factual circumstances as here—a

defendant in a child pornography case offered to stipulate to all elements except

identity—and is binding on subsequent panels. Perez himself recognizes this, allowing

that “precedent of this Court is presently to the contrary,” Appellant’s Br. at 18, and

merely asks to preserve the issue for certiorari or collateral review. Perez may consider

the issue preserved, and we affirm the District Court.

                                             IV

       For the foregoing reasons, we will affirm the District Court’s denial of Perez’s

motion to suppress and its decision to allow the Government to present evidence of child

pornography at trial.




                                              9

Source:  CourtListener

Can't find what you're looking for?

Post a free question on our public forum.
Ask a Question
Search for lawyers by practice areas.
Find a Lawyer