Judith C. Herrera, UNITED STATES DISTRICT JUDGE.
This matter is before the Court on Defendant's Motion to Suppress Evidence Obtained in Violation of the Fourth Amendment Under United States v. Ackerman [Doc. 90] in which he asks the Court to suppress all evidence obtained either directly or indirectly as a result of the National Center for Missing and Exploited Children ("NCMEC") opening his emails and the attachments thereto. Defendant argues that under United States v. Ackerman, 831 F.3d 1292 (10th Cir. 2016), NCMEC is a government entity or agency, and therefore its warrantless searches of his emails violated his rights under the Fourth Amendment, and all evidence obtained thereafter is "fruit of the poisonous tree." The Government filed a response [Doc. 93] and Defendant filed a reply [Doc. 114]. On April 24-25, 2018 and June 12, 2018, the Court held an evidentiary hearing on the motion to suppress, at which Defendant was present and the Government presented evidence in the form of witness testimony and exhibits. On July 3, 2018, both parties filed written closing arguments. Docs. 123 and 124. After considering the evidence, the briefs, and the arguments of counsel, the Court concludes that the motion to suppress should be denied.
Defendant Donald Alvin Tolbert (hereafter, "Tolbert") has a 2006 state court conviction on two counts of criminal sexual contact of a child under age thirteen, among other charges. Tolbert served a term of years in prison until November of 2009, at which point he began serving concurrent terms of probation and parole. In 2010, the state arrested Tolbert for violating the terms of his probation and parole and reincarcerated him for 330 days. Then, the state released Tolbert a second time, subject to conditions of probation. As part of his release, Tolbert agreed to various standard conditions of probation, including allowing any probation or parole officer to visit him at his home or place of employment at any time, and permitting a warrantless search by the officer if he or she had reasonable cause to believe the search would produce evidence of a parole violation. Ex. A at 6-7. As a convicted sex offender, Tolbert also promised to provide all of his email addresses, usernames, and passwords to his probation officer. Ex. A at 3. Further, he agreed that any computer or electronic device to which Tolbert had access could "be examined for inappropriate content [which expressly included child pornography] at any time." Ex. A at 3.
On September 1, 2012, five emails with a total of fifteen attachments were sent through American Online ("AOL") by a user with the email address ddt123abc@aol.com — an email address allegedly belonging to Tolbert. See Exs. D1-D5 (NCMEC Cyber Tipline Report IDs 1576684, 1576685, 1576686, 1576688, and 1576689). Three of these emails were sent to a user with the email address
AOL's software also automatically prevented the five emails and their attachments from reaching their intended recipients, then terminated and saved a snapshot of the user's account. Trans. 4/25/18 at 8, 15. The entire process was fully automated, meaning no AOL employee opened or read the emails or attachments
On September 5, 2012, NCMEC
NCMEC then forwarded the CyberTip reports containing those emails and attachments, as well as the results of its public record searches, to the New Mexico Attorney General's Office, Internet Crimes Against Children ("ICAC") division. See, e.g., Ex. D1 at 216. The ICAC is the clearinghouse for CyberTips with a connection to New Mexico. Trans. 4/24/18 at 164. An analyst with the Attorney General's Office reviewed the CyberTips, including the hash-matched images, and ran open source searches regarding the associated IP address to determine that the source of the emails is in New Mexico. Id. at 168-170. Then, the analyst refers the CyberTips to the Special Agent in Charge, who assigns them to law enforcement for further investigation. Id. at 171. Certain types of cases, including those involving registered sex offenders on probation, take high priority. Id. at 172-73, 194-96.
On September 7, 2012, Special Agent Owen Pena of the AG's office was assigned to conduct an investigation regarding the five CyberTips relating to "Donald Alvin Tolbert." Trans. 4/24/18 at 180, 183, 193. By using open source searches on the IP address associated with the email addresses donnieisagod@aol.com and ddt123abc@aol.com listed in the CyberTip reports, Pena verified the geographical connection between the IP address and Albuquerque, New Mexico. Id. at 182-83. Using that information, Pena obtained grand jury subpoenas duces tecum for information associated with the IP address from ISP CenturyLink as well as information from AOL regarding the two email addresses. Id. at 183; Ex. J. AOL's response to the subpoena resulted in information linking
Pena contacted Christina Altamirano, an agent with Homeland Security Investigations specializing in internet crimes against children and sexual exploitation crimes. Trans. 5/25/18 at 67-69; Trans. 4/24/18 at
After the Tenth Circuit released the Ackerman decision, the Rio Rancho police department obtained a new search warrant for the two computers without the benefit of the contents of the emails and the attached videos and images. Trans. 5/25/18 at 105. The computers were reexamined, and child pornography images and videos were again found on those machines. Id. at 76-77. In an interview, Margaret Tolbert told police that she and Defendant were the only ones with access to those computers. Id. at 79.
Altamirano testified in some detail, and with credibility, about the steps that she would have taken and the investigation she would have conducted if the CyberTips in this case had come to her without the opened emails and attachments (photos and videos) for her to examine. See Trans. 4/25/18 at 80-97. Altamirano explained that even without the emails and attachments, she still would have conducted an investigation that would have ended in obtaining the emails and attachments, as well as connecting them to Tolbert. Id. For example, Altamirano could have used the fact that AOL obtained a hash value match to obtain a search warrant for the emails and their attachments, as well as to obtained the name and address of the user associated with that account. Id. at 81-83. She also explained that once she had a name and address of the AOL account user, she could use law enforcement and open source databases to find out more information about that person. In this case, that information would have led Altamirano to Tolbert, and information about his prior criminal case. Id. at 83-86. Altamirano also admitted that she had never actually done this, as all of the NCMEC CyberTips she had worked with in the past contained opened emails and/or attachments. Id. at 99-100.
Tolbert moves to suppress "all evidence obtained directly or indirectly as a result of NCMEC's warrantless search." Doc. 90 at 9. He reasons that under the Tenth Circuit's decision in United States v. Ackerman, 831 F.3d 1292 (10th Cir. 2016), NCMEC is a government entity or agent and therefore was required to obtain a warrant prior to performing searches by opening his emails and their attachments. He contends that all evidence obtained as a result of the warrantless searches is "fruit of the poisonous tree" and must be suppressed.
In its opposition to the motion to suppress, the Government relies on numerous arguments in support of the conclusion that the exclusionary rule does not apply.
The Court concludes that despite the fact that NCMEC opened the emails and attachments without a warrant, the evidence should not be suppressed because both the good faith and the inevitable discovery exceptions to the warrant requirement apply here. Having reached that conclusion, the Court will not reach the other arguments raised by the parties.
The Fourth Amendment to our Constitution protects persons against unreasonable searches and seizures in their "persons, houses, papers, and effects." U.S. Const. amend. IV. "The basic purpose of this Amendment ... is to safeguard the privacy and security of individuals against arbitrary invasions by governmental officials." Camara v. Mun. Court of City & Cnty. of S.F., 387 U.S. 523, 528, 87 S.Ct. 1727, 18 L.Ed.2d 930 (1967). "The exclusionary rule has traditionally barred from trial physical, tangible materials obtained either during or as a direct result of an unlawful" search or seizure. Wong Sun v. United States, 371 U.S. 471, 485, 83 S.Ct. 407, 9 L.Ed.2d 441 (1963).
On August 5, 2016, the Tenth Circuit issued its opinion in United States v. Ackerman, 831 F.3d 1292 (10th Cir. 2016). Like the Defendant in this case, defendant Ackerman used AOL as an internet service provider (ISP) to send and receive email. By comparing the hash values generated from the images in Ackerman's email to AOL's library of known hash values for child pornography, the company's automated filter identified one of the images attached to Ackerman's email as child porn. AOL instantly stopped delivery of the message and closed Ackerman's account.
Once AOL identified a hash value match in Ackerman's email, the company forwarded a report to NCMEC's online CyberTipline. AOL's report included Ackerman's email along with all four attached images. A NCMEC analyst opened the email, viewed each of the attached images, and confirmed that all four (not just the one AOL's automated filter identified) appeared to be child pornography. After the analyst determined that Ackerman was the likely owner of the account, NCMEC alerted law enforcement agents in the area where he lived. A federal grand jury indicted Ackerman on charges of possession and distribution of child pornography.
There were two issues raised in the Ackerman case. First, Ackerman alleged that NCMEC's actions amounted to an unreasonable search of his email and its attachments because no one sought a warrant and no one invoked any recognized lawful basis for failing to seek one. Because the Fourth Amendment only protects
As to the first issue, the Tenth Circuit held that the NCMEC is a governmental entity. The Court based this conclusion on five considerations. First, the court noted that NCMEC has law enforcement powers, and those powers extend well beyond those enjoyed by private citizens. NCMEC's two primary authorizing statutes — 18 U.S.C. § 2258A and 42 U.S.C. § 5773(b) — mandate its collaboration with federal (as well as state and local) law enforcement in over a dozen different ways, many of which involve duties and powers conferred on and enjoyed by NCMEC but no other private person. For example, NCMEC is statutorily obliged to maintain an electronic tip line for ISPs to use to report possible Internet child sexual exploitation violations to the government. Under the statutory scheme, NCMEC must forward every single report it receives to federal law enforcement agencies and it may make its reports available to state and local law enforcement as well. See id. § 2258A(c). Second, ISPs are required to report any known child pornography violations to NCMEC — not to any other governmental agency, but rather to NCMEC alone. ISPs who fail to comply with this obligation face substantial (and apparently criminal) penalties payable to the federal government. Id. § 2258A(a)(1), (e). Third, when NCMEC confirms it has received a report, the ISP must treat that confirmation as a request to preserve evidence issued by the government itself. Failure to comply again opens an ISP to potential civil or criminal sanctions. Fourth, in aid of NCMEC's tip line functions, Congress has statutorily authorized it to receive contraband (child pornography) knowingly and to review its contents intentionally. Id. § 2258A(a), (b)(4). The court observed that these are actions that would normally subject private persons to criminal prosecution. See 18 U.S.C. § 2252A(a)(2) (knowing receipt or distribution); id. § 2252A(a)(5)(B) (knowing possession or access with intent to view). Fifth, the Tenth Circuit compared NCMEC to Amtrak, and analogized cases wherein the Supreme Court held that Amtrak — a publicly owned corporation — is a governmental entity. Of primary consideration here were the level of governmental control over both NCMEC and Amtrak, the broad statutory mandates to which both entities are subject, their dependence on federal funding, the purpose behind each entity's creation, and the benefits they each conferred on the government. Based on all the foregoing factors, the Tenth Circuit concluded that NCMEC is a governmental entity. Alternatively, the Court found that NCMEC acted as an agent of the government, and was therefore subject to the Fourth Amendment under the United States v. Souza, 223 F.3d 1197 (10th Cir. 2000). Under Souza, to determine whether an entity is acting as a government agent, one must ask 1) whether the government knew of and acquiesced in the intrusive conduct, and 2) whether the party performing the search intended to assist law enforcement efforts or to further his own ends. The Tenth Circuit concluded that NCMEC satisfies both criteria.
The Ackerman court then turned to the second issue, which was whether the
In Ackerman, the government attempted to analogize Jacobsen to the search NCMEC conducted on Ackerman's emails. The Tenth Circuit rejected this argument, stating:
Ackerman, 831 F.3d at 1305-06 (citations omitted). Because NCMEC opened Ackerman's email first and did so in order to view not just the attachment that was the target of AOL's private search but three others as well, each of these steps — opening the email and viewing the three other attachments — was enough to risk exposing private, noncontraband information that AOL had not previously examined. Thus, the Ackerman court concluded that the search violated the Fourth Amendment.
However, the Tenth Circuit explicitly left open the questions of whether the third-party doctrine could preclude motions to suppress like Ackerman's, or that changes in how reports are submitted or reviewed might allow NCMEC to access attachments with matching hash values directly, without reviewing email correspondence or other attachments with possibly
The government argues even if NCMEC's search of Tolbert's emails violated the Fourth Amendment, suppression is unwarranted because NCMEC and law enforcement officers acted in good faith. The Court agrees.
As the Supreme Court has explained, the purpose of the exclusionary rule is not to remedy a private wrong, but rather as a practical means of deterring future unlawful behavior by law enforcement. United States v. Calandra, 414 U.S. 338, 347, 94 S.Ct. 613, 38 L.Ed.2d 561 (1974). Thus, "[t]he deterrent purpose of the exclusionary rule necessarily assumes that the police have engaged in willful, or at the very least negligent, conduct" to deprive a defendant of a guaranteed right. United States v. Peltier, 422 U.S. 531, 539, 95 S.Ct. 2313, 45 L.Ed.2d 374 (1975) (internal quotation marks omitted). As a result, the Court has held that the deterrent effect of exclusion of evidence is minimal where an officer has acted on an objectively reasonable belief that his actions did not violate the Fourth Amendment. United States v. Leon, 468 U.S. 897, 922, 104 S.Ct. 3405, 82 L.Ed.2d 677 (1984). In Leon, the Court concluded that the exclusionary rule should not be applied to prevent the use in a criminal prosecution of evidence obtained by officers whose reliance on a warrant issued by a magistrate was objectively reasonable, even though it was later determined that probable cause for the issuance of the warrant was lacking. "Penalizing the officer for the magistrate's error, rather than his own, cannot logically contribute to the deterrence of Fourth Amendment violations." Id. at 921, 104 S.Ct. 3405. So, to trigger the exclusionary rule, "police conduct must be sufficiently deliberate that exclusion can meaningfully deter it, and sufficiently culpable that such deterrence is worth the price paid by the justice system." Herring v. United States, 555 U.S. 135, 144, 129 S.Ct. 695, 172 L.Ed.2d 496 (2009).
In Leon, the Court applied the good faith exception because the officers acted in objectively reasonable reliance on a warrant issued by a magistrate. However, the good faith exception is not restricted to situations in which police officers rely upon a warrant later found to be invalid. For example, the Supreme Court has also held that the exclusionary rule should not be applied to suppress evidence obtained by officers who acted in objectively reasonable reliance on a statutory scheme that authorized warrantless administrative searches, even though the statute was later found to violate the Fourth Amendment. Illinois v. Krull, 480 U.S. 340, 107 S.Ct. 1160, 94 L.Ed.2d 364 (1987). In Krull, the Court explained that in light of the deterrent purpose of the exclusionary rule, "evidence should be suppressed only if it can be said that the law enforcement officer had knowledge, or may properly be charged with knowledge, that the search was unconstitutional under the Fourth Amendment." Krull, 480 U.S. at 348-49, 107 S.Ct. 1160 (internal quotation marks and citation omitted).
This case is similar to Krull in that there was a statutory scheme in place which expressly authorized NCMEC to open emails and attachments forwarded to it by ISPs and then forward the information obtained to members of law enforcement;
What was a surprise to NCMEC, however, was the fact that it would be considered a government entity or government agent that was required to obtain a warrant prior to viewing emails and attachments contained in CyberTips. To the Court's knowledge, the First Circuit was the first federal court to suggest that NCMEC was a government agent; that ruling, in United States v. Cameron, 699 F.3d 621, 645 (1st Cir. 2012), was issued on November of 2012, a couple of months after the events in this case. Cameron was later followed by the Tenth Circuit's Ackerman opinion in 2016, approximately four years after NCMEC reviewed Tolbert's emails in 2012. In September of 2012, when NCMEC opened Tolbert's emails, no court had held that NCMEC was a government entity and therefore was required to obtain a warrant prior to doing what it was statutorily authorized to do: opening emails and attachments that had been forwarded to it.
Nor can this Court assert that NCMEC and law enforcement could not have reasonably relied either on the statutory scheme authorizing NCMEC to view the attachments to Tolbert's emails without a warrant, or on their apparent belief that NCMEC was a private entity. Although Tolbert argues that it should have been immediately obvious to the employees of NCMEC and to law enforcement agencies that NCMEC is a government agent, that argument is undermined by the fact that even the district court in United States v. Ackerman, 2014 WL 2968164, No. 13-10176-01-EFM, at *7-8 (D. Kan. July 1, 2014) (unpublished), concluded that NCMEC was not a state actor. Of course, the Tenth Circuit ultimately reached the opposite conclusion and reversed the district court on this issue. However, the question is not whether law enforcement reached the wrong conclusion, but rather whether their belief in the legality of their actions was objectively reasonable at the time. This court concludes that it was. Law enforcement in this case naturally assumed that the statutory authority granted to NCMEC was enough to justify opening the emails. Thus, a reasonable law enforcement officer could conclude that by opening an email or attachment that NCMEC had already opened, he was merely repeating a search previously performed by a private party as permitted by the private search doctrine. The Court finds no evidence of deliberate, reckless, or grossly negligent conduct by either NCMEC or the police who reasonably assumed that these were the statutorily authorized actions of a private party.
Other federal district courts have reached the same conclusion in similar cases. For example, in United States v. Stratton, 229 F.Supp.3d 1230, 1233 (D. Kan. 2017), the defendant used his Sony PlayStation3 to send child pornography over the PlayStation Network. Id. On more than one occasion;
Id. at 46. As required by Leon, 468 U.S. at 907, 104 S.Ct. 3405, and Herring v. United States, 555 U.S. 135, 141-42, 129 S.Ct. 695, 172 L.Ed.2d 496 (2009), the Keith court weighed any possible deterrent value from applying the exclusionary rule against the "substantial social costs" of suppressing the evidence. 980 F.Supp.2d at 46. The court concluded that because the deterrent value was "minimal" under the circumstances, the social costs of suppression tipped against the defendant's motion to suppress. Id.
In this case, suppression would have very little deterrent effect because the law enforcement officers involved had no knowledge, nor could they properly be charged with knowledge, that NCMEC was required to get a warrant before opening Tolbert's emails and attachments. At
For the first time in his written closing argument [Doc. 123], Tolbert relies on the Supreme Court's very recent decision in Carpenter v. United States, No. 16-402, ___ U.S. ___, 138 S.Ct. 2206, 201 L.Ed.2d 507 (2018) (Roberts, J.) to argue that none of the exceptions to the warrant requirement can apply here. Specifically, Tolbert contends that it was improper for law enforcement to use grand jury subpoenas directed toward AOL and CenturyLink in order to find out identifying information relating to his IP address and his email accounts. According to Tolbert, under Carpenter this action constituted a "search" that required a warrant, not a mere subpoena. However, Tolbert attempts to stretch Carpenter too far.
In Carpenter, after the FBI identified the cell phone numbers of several robbery suspects, prosecutors were granted court orders to obtain the suspects' cell phone records under the Stored Communications Act. Among this information was cell-site location information (CSLI). Each time a phone connects to a radio antenna or "cell site," it generates a time-stamped record, or CSLI, which wireless carriers collect and store for their own business purposes. In Carpenter, wireless carriers produced CSLI for the defendant's phone, and the Government was able to obtain 12,898 location points cataloging Carpenter's movements over 127 days — an average of 101 data points per day. Carpenter moved to suppress the data, arguing that the Government's seizure of the records without obtaining a warrant supported by probable cause violated the Fourth Amendment. The Supreme Court agreed. It noted that individuals have a reasonable expectation of privacy in the whole of their physical movements, and that allowing government access to these types of comprehensive cell-site records without a warrant contravenes that expectation. The Court then noted that in United States v. Jones, 565 U.S. 400, 132 S.Ct. 945, 181 L.Ed.2d 911 (2012), it had recognized the privacy concerns raised by GPS monitoring, and stated that the privacy interests in CSLI data was even greater because it gives the Government the ability to retrace a person's past whereabouts with near-perfect accuracy, subject only to the five-year retention policies of most wireless carriers. The Supreme Court contrasted this high expectation of privacy in the exhaustive and revealing chronicle of CSLI location information with the much lower expectation of privacy in some types of information voluntarily turned over to third parties, such as bank records and run-of-the-mill phone records. Id. at 2216 (citing United States v. Miller, 425 U.S. 435, 96 S.Ct. 1619, 48 L.Ed.2d 71 (1976) (no expectation of privacy in financial records held by a bank), and Smith v. Maryland, 442 U.S. 735, 99 S.Ct. 2577, 61 L.Ed.2d 220 (1979) (no expectation of privacy in records of dialed telephone numbers conveyed to telephone company)). In Miller, while investigating the defendant for tax evasion the Government subpoenaed his banks, seeking several months of canceled checks, deposit slips, and monthly statements. The Court concluded not only was defendant unable to assert possession or ownership of the records because they belonged to the banks, 425 U.S. at 440, 96 S.Ct. 1619, but also that there was a limited expectation of privacy in the records because the checks were "not confidential communications but negotiable
The information subpoenaed by law enforcement in this case is much more like the bank and telephone records in Miller and Smith than the comprehensive, detailed, and long-term location information in Carpenter. The grand jury subpoenas in this case (Ex. J) requested identifying information, such as the name and address of the person who opened the account, the date the account was opened, the detailed method of payment, telephone numbers used to access the internet, email address, connection address, IP address, and any identifying information. The privacy interest in this type of identifying data, which presumably any AOL or CenturyLink employee could access during the regular course of business, simply does not rise to the level of the evidence in Carpenter such that it would require law enforcement to obtain a search warrant. The grand jury subpoenas were valid.
Thus, the good faith exception applies, and the motion to suppress will be denied.
Subject to a few exceptions, evidence obtained in violation of the Fourth Amendment will be suppressed under the exclusionary rule; the inevitable discovery doctrine is one such exception. United States v. Cunningham, 413 F.3d 1199, 1203 (10th Cir. 2005). Under it, illegally obtained evidence may be admitted if it "ultimately or inevitably would have been discovered by lawful means." Nix v. Williams, 467 U.S. 431, 444, 104 S.Ct. 2501, 81 L.Ed.2d 377 (1984). The "inevitable discovery exception applies whenever an independent investigation inevitably would have led to discovery of the evidence, whether or not the investigation was ongoing at the time of the illegal police conduct." United States v. Larsen, 127 F.3d 984, 986 (10th Cir. 1997). The government bears the burden of proving by a preponderance of the evidence that the evidence would have been discovered without the Fourth Amendment violation. Cunningham, 413 F.3d at 1203.
In both Cunningham and United States v. Souza, 223 F.3d 1197 (10th Cir. 2000), the Tenth Circuit applied inevitable discovery to situations like the one here, where there was one line of investigation that would have led inevitably to the obtaining of a search warrant by independent lawful means. In Cunningham, police searched the defendant's home after getting his consent. 413 F.3d at 1202. The defendant later contested the search, claiming his consent was coerced. Id. The court held that even if the search was illegal, the evidence was admissible because the officers "would have obtained a search warrant" if the search had not occurred. Id. at 1205. Similarly, in Souza police illegally opened a UPS package that contained drugs. 223 F.3d at 1200, 1202. The Tenth Circuit held the evidence admissible under inevitable discovery because the officers "would have obtained a warrant" had the illegal search not occurred. Id. at 1206. Thus, evidence should not be excluded when the investigation would inevitably have discovered the contested evidence by lawful means.
In this case, the Government has met its burden to show that the evidence provided to NCMEC in the various CyberTips would have inevitably led law enforcement to obtaining a warrant and searching Tolbert's home even if NCMEC, Pena, and Altamirano had not opened the attachment
At this point, without looking at the attachment in question or opening the emails themselves, the NMAGO would have had ample evidence to support probable cause for a search warrant to open the emails and their attachments, and for NMAGO to continue its own investigation. See Trans. 4/24/2018 at 202-204. In fact, this is what Pena did by conducting his own open source investigation (which also led him to Donald Tolbert, registered sex offender) and by securing grand jury subpoenas for the email addresses identified by AOL in the CyberTips. At that point, the evidence that AOL provided in response to the subpoena would have led law enforcement to Tolbert's residence, as well as to his mother's home — all without opening the emails or their attachments.
There are two additional sources of information that would have led to inevitable discovery of the evidence without opening the five emails or their attachments. They are the two additional CyberTips from AOL to NCMEC that are not the subject
Thus, the same evidence that Tolbert seeks to suppress would have been inevitably discovered through independent means. Accordingly, the motion to suppress will be denied