SUE E. MYERSCOUGH, District Judge.
This matter comes before the Court on Defendant Donald Dorosheff's Amended Motion to Suppress Evidence (d/e [21])
In his Motion, Defendant challenges the legality of the search of his residence, including his electronics, that led to law enforcement's recovery of images that form the basis of the charges in the Indictment in this case (d/e [1]). On March 20, 2017, the Court held a hearing on Defendant's Motion.
Defendant's Motion concerns two warrants: one issued on February 20, 2015, in the Eastern District of Virginia (hereinafter the "NIT warrant," described below), and the other issued on March 1, 2016, in this district (hereinafter the residence warrant). Defendant seeks to suppress evidence obtained during the search of his residence on several grounds. Defendant argues: (1) the residence warrant affidavit failed to set forth sufficient facts to establish probable cause; (2) the good faith exception did not apply because the residence warrant was facially deficient and the executing officer could not reasonably rely on it; (3) the residence warrant affidavit was based on evidence obtained during a search pursuant to the NIT warrant, whose affidavit also failed to set forth sufficient facts to establish probable cause; and (4) the NIT warrant violated Federal Rule of Criminal Procedure 41(b).
The charges in this case arise from an investigation of a website called Playpen, a global online forum through which registered users distributed and accessed child pornography. Government's Response to Defendant's Motion to Suppress Evidence (d/e [18]) at 2 (Government's Response). Playpen operated on the Tor network, which allows users to maintain anonymity by masking the user's actual Internet Protocol (IP) address by bouncing user communications around a network of relay computers called nodes.
In January 2015, the FBI seized the Playpen website and allowed it to continue to operate at a government facility in the Eastern District of Virginia from February 20, 2015 through March 4, 2015. The FBI obtained a warrant (the NIT warrant) from the Eastern District of Virginia to monitor the site users' communications and to deploy a Network Investigative Technique (NIT) on the site, in order to attempt to identify registered users.
Using the NIT, the FBI identified an IP address associated with Playpen user "Grite" and traced it to Defendant. On March 1, 2016, Judge Schanzle-Haskins issued a search warrant (the residence warrant) to FBI Special Agent David Harmon.
On March 3, 2016, agents executed the residence warrant at Defendant's home. The search yielded 1,114 images and 1 video of confirmed child pornography. Government's Response at 6. On October 5, 2016, a four-count indictment was filed against Defendant, charging him with two counts of Receiving Child Pornography in violation of 18 U.S.C. § 2252A(a)(2)(A) and (b)(1) and two counts of Possession of Child Pornography in violation of 18 U.S.C. § 2252A(a)(5)(B) and (b)(2). The indictment also asserted a forfeiture claim against Defendant for two laptops, five flash drives, and one media card.
The Fourth Amendment to the Constitution guarantees the "right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures." U.S. Const. amend. IV. In the absence of certain circumstances that are not applicable in this case, it is a violation of the Fourth Amendment for a police officer to search a defendant's residence without a warrant. A court may issue a search warrant only upon a finding that there is probable cause to believe that a crime has been committed and that the person in question has committed that crime.
An affidavit establishes probable cause when, based on the totality of the circumstances, the affidavit sets forth sufficient evidence that would cause a reasonable person to believe that a search will uncover evidence of criminal activity.
Special Agent Harmon sought the residence warrant after the NIT warrant led to the discovery that a user named "Grite" was accessing the Playpen site. Officers determined that Grite's IP address, obtained from the NIT, was operated by AT&T. In response to the Government's subpoena, AT&T revealed that the subscriber was Defendant, the service address was Defendant's home address, and Defendant had received service from AT&T since December 2012. The NIT program also determined that the computer's Host Name was Donald, which is Defendant's first name. Officers confirmed with building management at Defendant's address that Defendant had resided alone in the apartment for the last three years. These facts, set forth in the residence warrant affidavit, support a finding of probable cause.
Defendant argues that the year-old information from the NIT on which the residence warrant affidavit is based is stale and accordingly does not support probable cause.
The staleness of an affidavit is determined on a case-by-case basis.
In the child pornography context, the time at which information becomes stale is much later than in other criminal contexts. This is because viewers of child pornography tend to maintain their collections for long periods of time, due to the difficulty in obtaining images, the ability to trade them, and their personal value.
Given the retention tendencies of viewers of child pornography, including the ongoing criminal activity of continuously holding and repeatedly viewing the images, the passage of one year from Defendant's access of child pornography in 2015 to the issuance of the residence warrant on March 1, 2016, is not critical. This interval was not so long as to dispel a reasonable belief that a search of Defendant's residence would uncover evidence of illegal activity.
Defendant argues that probable cause is undermined by the affidavit's failure to show that Defendant had exclusive control over the premises to be searched or that no other individual used his internet account. Defendant argues that there was a reasonable probability that someone else could have used Defendant's home or internet service to access child pornography.
Exclusive control of the premises or internet service is not required for probable cause.
Here, the Government established that Defendant lives alone by consulting with the management of Defendant's residence. Further, Defendant offers no evidence to suggest that any other individual had access to his residence, computer, or internet service at the time his IP address accessed Playpen. The connection between the IP address used to access the child pornography in this case and Defendant's name and address registered to the corresponding internet account was sufficient to support a finding of probable cause.
The Government argues that even if the residence warrant affidavit did not establish probable cause, the good faith exception applies. When a warrant is not supported by probable cause and the resultant search accordingly violates a defendant's constitutional rights, suppression is inappropriate where the executing officer reasonably relied on the warrant.
The good faith exception does not apply in cases where the issuing judge "wholly abandoned his judicial role" by failing to perform his "neutral and detached function" and instead acted "merely as a rubber stamp for the police."
The Court finds that the good faith exception applies to the residence warrant in this case even if it was not supported by probable cause. There is no evidence that the executing officer did not reasonably rely on the warrant. Nor is there any indication that Judge Schanzle-Haskins was anything but detached and neutral in issuing the warrant. Defendant has not alleged misconduct by any involved officer.
To the contrary, the affidavit may reasonably be read to support a finding of probable cause. The affidavit sets forth the purpose of the warrant, key definitions, an explanation of how the Playpen website and the Tor network operate, a summary of Playpen's illegal content, the investigation's identification of user "Grite," profile characteristics of those who view child pornography, and search methodology. Also attached are descriptions of the location to be searched and of the information to be seized. The breadth and depth of the information in the affidavit makes reasonable a probable cause finding.
Defendant also asserts that the NIT warrant also lacked probable cause. Because the residence warrant affidavit included information obtained from the NIT, Defendant suggests that the NIT warrant affidavit's alleged failure to establish probable cause stripped the residence warrant of its basis to support probable cause under the fruit of the poisonous tree doctrine.
Several courts have found that the NIT warrant was supported by probable cause.
The affidavit described Playpen as a global online forum through which registered users distributed and accessed child pornography. The affidavit describes the site's contents including details about its forum structure, which was organized by type of sexual interest, gender, and age. The affidavit explained that images and videos on Playpen were highly categorized according to the victim's age and gender and the sexual content of the file.
The affidavit further explained that Playpen required users to register an account by creating a username and password. The affidavit noted the emphasis Playpen placed on anonymity in registration. Playpen told users not to register a real email address and that they should not post identifying information in their profile. Playpen further advised users to turn off their JavaScript and disable sending of the "refer" header.
The affidavit also stated that Playpen operated on the Tor network, which allows users to maintain anonymity by masking the user's actual Internet Protocol (IP) address by bouncing user communications around a network of relay computers called nodes. To access the Tor network, a user must install Tor software by downloading either an add-on to their web browser or the free "Tor browser bundle."
The affidavit explained that Playpen operated as a "hidden service" website on the Tor network, which means the website's IP address is hidden and replaced with a Tor-based web address. The affidavit stated that a user cannot access a hidden service such as Playpen unless he or she knows the particular web address.
The affidavit further described how NIT would work, what it could do, and why it was useful. The affidavit stated that NIT could help FBI agents locate administrators and users of Playpen. NIT was an additional set of computer instructions that would be downloaded to a user's computer along with typical Playpen content that would be downloaded through normal operations of the site. The instructions would cause a user's computer to transmit the following specified information to a government-controlled computer: (1) the actual IP address of the user's computer; (2) a unique identifier to distinguish the data from that collected from other computers; (3) the identification of the computer's operating system; (4) data on whether NIT had already been delivered to the computer; (5) the computer's Host Name; (6) the computer's active operating system username; and (7) the computer's Media Access Control (MAC) address. The actual IP address could then be associated with an internet service provider (ISP) and a particular ISP customer, while the type of operating system, the Host Name, the active operating system username, and the MAC address helped to distinguish the user's computer from other computers located at the user's premises.
These facts set forth in the NIT warrant affidavit supported probable cause.
Defendant has not argued that the NIT warrant violates Fed. R. Crim. P. 41(b), which authorizes a magistrate judge to issue a warrant under five circumstances. The Government concedes that the NIT warrant likely violated Rule 41(b), and many of the courts that have addressed whether the NIT warrant violated Rule 41(b) found that the warrant did.
Rule 41(b)(1) authorizes a magistrate to issue a warrant to search a person or property in the magistrate's district. Although the NIT was deployed from the Eastern District of Virginia, the search it initiated took place in the user's computer, which could have been located in any district in the country. Furthermore, while the user can be said to have virtually entered the Eastern District of Virginia when he accessed Playpen, the data obtained from the user's computer did not virtually enter the Eastern District of Virginia merely upon the user's accessing Playpen. Rather, the data did not enter the Eastern District of Virginia until it was pulled from the user's computer by the NIT program. Because the data would not otherwise have accompanied the user to the Eastern District of Virginia when he accessed Playpen, the magistrate's authority under Rule 41(b)(1) does not support the NIT warrant.
Neither does Rule 41(b)(2) apply. Rule 41(b)(2) authorizes a magistrate to issue a warrant that will be executed outside the magistrate's district if the person or property to be searched is located within the district when the warrant is issued. This authority does not apply to the NIT warrant because the property to be searched, users' computers, were located across the United States when the warrant was issued. Rule 41(b)(2) granted the magistrate authority to issue a warrant to search the computers only of Playpen users whose computers were located in the Eastern District of Virginia.
Rule 41(b)(3) is limited to cases involving terrorism and Rule 41(b)(5) is restricted to the District of Columbia, therefore, these authorities do not apply here.
Finally, Rule 41(b)(4) authorizes a magistrate to issue a warrant to install a device to track the movement of a person or property. Because the NIT program initiates a search of computer data and does not track movement, Rule 41(b)(4) does not apply.
Therefore, none of the authorities granted to the magistrate judge in Rule 41(b) authorized the issuance of the NIT warrant.
Despite the NIT warrant's Rule 41(b) violation, suppression of the evidence obtained as a result of the execution of the warrant is not warranted. Although technical or ministerial violations of Rule 41 do not give rise to suppression unless the defendant demonstrates that he suffered prejudice as a result of the violation, the NIT warrant violated a substantive provision of Rule 41.
The good faith exception, which is most commonly applied to warrants lacking probable cause, also may apply to a warrant issued in violation of Rule 41(b).
In
The good faith exception prevents suppression of evidence obtained pursuant to the NIT warrant.
Courts that have reviewed the NIT warrant are split as to whether the issuing magistrate had authority under Rule 41(b).
Further, because nothing before the Court indicates that the executing officers did not act in good faith reliance on the validity of the warrant or that they acted culpably or deliberately in violating Rule 41, suppression is not warranted because it would not deter police misconduct and it would remove relevant and reliable evidence from the public.
Nor does the Rule 41 violation indicate that the issuing judge was not "detached and neutral." There is no indication that the magistrate deliberately violated Rule 41, nor that the officers misled the magistrate in their application.
The Court therefore finds that suppression is inappropriate despite the NIT warrant's Rule 41(b) violation.
Based on the evidence and arguments presented by the parties, the Court finds that neither of the warrants in this case lacked probable cause. Although this Court joins numerous others in finding that the NIT warrant was issued in violation of Rule 41(b), the Court finds that suppression is not an appropriate remedy for that violation. Defendant's Amended Motion to Suppress (d/e [21]) is accordingly DENIED.