G.R. SMITH, Magistrate Judge.
Defendant, charged with the receipt, distribution, and possession of child pornography, has moved to suppress all evidence seized from his residence and personal computer pursuant to a search warrant issued by this Court. As his "primary" ground for suppression, defendant contends that state agents "illegally obtained" a subpoena authorizing Comcast Communication to divulge the name and physical address for the subscriber of an Internet Protocol ("IP") address that had offered a large number of child pornography images for downloading. Doc. 40 at 3. Because the subscriber information from Comcast "was compelled by unlawful means," id. at 26, and because that information was central to the probable cause basis for the search warrant, defendant contends that the search "infringed his constitutionally protected privacy interests." Id. at 12.
On August 1, 2014, an FBI agent applied for a warrant to search 1110 Montgomery Street, Apartment B, Savannah, Georgia and to seize images of child pornography stored on any computer at that residence. Doc. 31-1 at 1, 3. The 20-page affidavit presented in support of the warrant related that Liberty County, Georgia Detective Charles Woodall, a member of the Southeast Georgia Child Exploitation Task Force (SEGCETF), had observed that a computer operating on IP address 98.244.189.89 was offering large numbers of suspected child pornography files for distribution.
The affidavit further related that another SEGCETF member, Det. Joe Heath, had also downloaded files from that same IP address. Doe. 31-1 at 19 ¶ 33. One of the detectives (apparently Heath) then "submitted a subpoena which he served on Comcast Communication." Id. Pursuant to that subpoena, Comcast identified the subscriber for the IP address as Zachary Herrmann and furnished the subscriber's physical address. Id. at 19 ¶ 34.
During the execution of the search warrant issued for that residence, the agents spoke to defendant Torres, who admitted that he, not the Comcast subscriber, was the person who had been downloading child pornography. Doe. 31-2 (arrest warrant affidavit) at 4, ¶ 13. Defendant indicated that all of the images and videos he had downloaded were stored on a laptop computer that he had owned for many years and that was located in his bedroom. Id. ¶ 14. After seizing and searching that computer, agents confirmed that it contained child pornography.
Again, defendant's primary claim is that the subpoena used by state agents to obtain the subscriber information for IP address 98.244.189.89 was "illegally obtained." The government contends that defendant has no "standing" to object to the acquisition of the subscriber information from Comcast, because whether the acquisition of that information was proper or not, "no privacy interest of his own was violated." Doc. 42 at 2.
"Fourth Amendment rights are personal rights which, like some other constitutional rights, may not be vicariously asserted." Alderman v. United States, 394 U.S. 165, 174 (1969). The test for whether a defendant's personal rights are violated depends on "whether the disputed search and seizure . . . infringed an interest of the defendant which the Fourth Amendment was designed to protect." Rakas v. Illinois, 439 U.S. 1281, 140 (1978). For nearly half a century, the Supreme Court has held that a defendant must assert a legitimate expectation of privacy — "one that society is prepared to recognize as reasonable" — in order to claim the protections of the Fourth Amendment. Smith v. Maryland, 442 U.S. 735, 740 (1979). "What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection." Katz v. United States, 389 U.S. 347, 351 (1967).
In reliance on Katz, the Supreme Court held in Smith v. Maryland that the warrantless installation of a pen register (on telephone company property) to record the telephone numbers dialed from a suspect's residence did not constitute a "search" with the meaning of the Fourth Amendment. Id. at 742. "[A] person has "no legitimate expectation of privacy in information he voluntarily turns over to third parties." Id. at 743-44. Because the user of a telephone voluntarily conveys information about the numbers he dials to the phone company, he can claim no Fourth Amendment privacy protection in that information and assumes the risk of its disclosure to the government.
The Smith analysis applies here and defeats defendant's privacy claim as to the subscriber information Comcast disclosed to the state agents. "Every federal court to address this issue has held that subscriber information provided to an Internet Provider is not protected by the Fourth Amendment's privacy expectation." United States v. Perrine, 518 F.3d 1196, 1204 (10th Cir. 2008) (collecting cases); United States v. Wheelock, 772 F.3d 825, 828-29 (8th Cir. 2014) (Fourth Amendment did not prohibit Comcast from conveying subscriber information to government authorities, as defendant had no reasonable expectation of privacy in the information he revealed to a third party); United States v. Cray, 673 F.Supp.2d 1368, 1375 (S.D. Ga. 2009) (defendant had no legitimate privacy interest in subscriber information he furnished to his Internet provider).
Defendant (understandably) spends little time discussing Fourth Amendment principles but instead focuses his argument on the state agents' failure to comply with a state statute governing the issuance of subpoenas.
Undergirding defendant's argument is the unstated but implicit assumption that the judicially-crafted exclusionary rule — designed to remedy violations of a defendant's constitutional rights — applies to information gained in violation of state statutory provisions pertaining to the issuance of subpoenas. But as the Eighth Circuit recently held, a law enforcement officer's failure to comply with a state statute authorizing an administrative subpoena for subscriber information of an IP address used to distribute child pornography "would not warrant suppression of the evidence gained because federal courts in a federal prosecution do not suppress evidence that is seized by state officers in violation of state law, so long as the search complied with the Fourth Amendment." Wheelock, 772 F.3d at 830; see also 1 Wayne R. LaFave, Search and Seizure § 1.5(c) at 228-30 (5th ed 2012) ("if either federal or state officers conduct a search that is illegal under the law of the state where undertaken, the fruits thereof are not constitutionally barred from evidence in the federal courts.").
Defendant has thus shown no basis for the excision of the subscriber information from the search warrant affidavit. His alternative claim that, even with this information, the affidavit is "facially insufficient" is frivolous. Doc. 31 at 2. Using a publicly available peer-to-peer file sharing network, agents accessed and downloaded numerous images of child pornography offered for distribution by a computer operating at a particular IP address. They then determined, using other publicly available information, that this IP address was registered to Comcast Cable Communications. Presented with a subpoena (the validity of which is immaterial to this analysis), Comcast disclosed that the subscriber resided at a particular Savannah, Georgia address. That the affidavit furnished a sufficient probable cause basis for the issuance of a search warrant for that residence is beyond debate. The search of defendant's residence and computer was conducted pursuant to lawful warrant issued by this Court, and he has offered no basis for the suppression of the evidence seized pursuant to that warrant. And because defendant's statements to the agents during the execution of the search warrant were not the tainted fruit of an illegal search, those statements are admissible at his trial.
Defendant's motion to suppress is without merit and should be