TIMOTHY S. BLACK, District Judge.
This criminal case is before the Court on Defendant's motion to suppress evidence (Doc. 29) and the parties' responsive memoranda (Docs. 31, 32). The Court held oral arguments on January 23, 2017. (Min. Entry, Jan. 23, 2017).
On May 18, 2016, Defendant Eric Michael Schuster was charged in a three-count indictment with: production of child pornography, in violation of 18 U.S.C. § 2251(a), (e) (Count 1); receipt of child pornography, in violation of 18 U.S.C. § 2252(a)(2), (b)(1) (Count 2); and possession of child pornography, in violation of 18 U.S.C. § 2252(a)(4), (b)(2) (Count 3). (Doc. 14).
Defendant moves to suppress the evidence against him in the instant case, arguing that the evidence was obtained as a result of a search warrant that is "void for want of jurisdiction." (Doc. 29 at 1).
In or around September 2014, federal agents began investigating a website known as Playpen ("Playpen" or "Website A"). (Doc. 29, Ex. 3 at ¶ 11; Doc. 31 at 3). Playpen served as an online global forum "dedicated to the advertisement and distribution of child pornography and the discussion of matters pertinent to the sexual abuse of children." (Doc. 29 at 2).
Playpen operated on an anonymous network known as The Onion Router ("Tor"). (Doc. 29 at 2; Doc. 31 at 4). Tor creates anonymity by masking a user's Internet Protocol ("IP") address, which could otherwise be used to identify the user.
In order to mask a user's IP address, Tor routes the user's communications through a network of relay computers located all over the world, rather than through a more direct connection. (Id.) Stated simply:
Additionally, Tor allows users to utilize certain "hidden services," which include hosting websites that are inaccessible to those not using Tor and, further, are hidden from those who do not know of the website's existence and precise Tor-based web address. (Doc. 31 at 4-5). Moreover, Tor masks the IP address of the server hosting these hidden websites and, accordingly, the location of the server cannot be determined. (Id.) Playpen was one such "hidden" website. (Id.)
However, in December 2014, a foreign law enforcement agency provided federal agents with an IP address suspected to belong to the server hosting Playpen. (Doc. 29, Ex. 3 at ¶ 28). Through further investigation, the Federal Bureau of Investigations ("FBI") was able to verify the accuracy of the information and trace the IP address to a server hosting company headquartered in North Carolina. (Id.) On February 20, 2015, federal agents seized the server from its location in North Carolina and took it to Virginia, where the FBI assumed administrative control over Playpen. (Doc. 29 at 2).
As part of a larger effort to identify registered users, the FBI allowed Playpen to continue in operation until March 4, 2015. (Doc. 31 at 5). To that end, federal prosecutors and agents in the Eastern District of Virginia ("EDVA") proceeded to obtain two separate warrants. (Id.)
Specifically, a NIT is an investigative method used to circumvent Tor's anonymity features, thereby allowing law enforcement to identify the individuals who are visiting particular hidden websites. (Doc. 29, Ex. 3 at ¶¶ 31-35). In the affidavit in support of the NIT warrant application, the Affiant explained that:
(Id. at ¶ 33). The identifying information to be transmitted included, inter alia, the computer's actual IP address, operating system and version, host name, active username, and unique media access control ("MAC") address. (Id. at ¶ 34). Further, the application in support of the NIT warrant specifically requested authorization to deploy the NIT in order to obtain the identifying information from "activating computers —
EDVA agents obtained the NIT warrant and deployed the NIT on Playpen on February 20, 2015. (Doc. 29, Ex. 1 at ¶ 25). The NIT remained active, allowing EDVA agents to collect the identifying information of the registered users who logged into Playpen, until the website was taken offline on March 4, 2015.
As a result of the NIT, law enforcement obtained the identifying information of Playpen users, including one particular user who logged into Playpen on March 3, 2015 under the name "torlayer."
Based upon the foregoing information, on August 6, 2015, within the Southern District of Ohio ("OHSD"), a federal agent (the "OHSD affiant" or "OHSD agent") obtained from a federal magistrate judge in this district (the "OHSD magistrate judge"), a warrant to search the Sherwood Drive residence (the "OHSD warrant"). (Doc. 29, Ex. 1). The OHSD warrant was executed on August 7, 2016. (Doc. 31 at 9). As a result of the search, a total of 18 items of evidence were seized including, inter alia, four internal hard drives, which contained thousands of images and videos of suspected child pornography and child erotica. (Id.)
The Fourth Amendment protects "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures," and, further, requires a showing of probable cause before a warrant may issue. U.S. Const. amend. IV. "The exclusionary rule prohibits the admission of evidence seized in searches and seizures that are deemed unreasonable under the Fourth Amendment, as well as derivative evidence acquired as a result of an unlawful search." United States v. Kennedy, 61 F.3d 494, 497 (6th Cir. 1995) (citing Wong Sun v. United States, 371 U.S. 471, 484-85 (1963)). The purpose of the exclusionary rule is to deter law enforcement from obtaining evidence through unconstitutional means. Nix v. Williams, 467 U.S. 431, 442-43 (1984).
A defendant may seek the suppression of evidence by filing a pretrial motion with the court. Fed. R. Crim. P. 12(b)(3)(C) and 41(h). "It is well settled that in seeking suppression of evidence the burden of proof is upon the defendant to display a violation of some constitutional or statutory right justifying suppression." United States v. Patel, 579 F.App'x 449, 453 (6th Cir. 2014) (quoting United States v. Rodriguez-Suazo, 346 F.3d 637, 643 (6th Cir.2003)).
Defendant moves to suppress "the evidence obtained as a result of the issuance of the NIT Warrant, arguing that the NIT Warrant is void for want of jurisdiction under the Federal Magistrates Act, 28 U.S.C. § 636(a), and additionally that it violated Federal Rule of Criminal Procedure 41(b)." (Doc. 29 at 1). Defendant further argues that the good-faith exception under United States v. Leon, 468 U.S. 897 (1984), does not apply. (Id. at 13-19).
Conversely, the Government argues that Defendant's motion should be denied because Defendant did not have a reasonable expectation of privacy in his IP address and therefore no search occurred. (Doc. 31 at 10-13). Further, the Government argues that, even assuming that a search did occur, the magistrate judge had authority under Fed. R. Crim. P. 41(b) to issue the warrant. (Id. at 13-15). Alternatively, the Government asserts that, should the Court find issuance of the NIT warrant violated Rule 41, suppression is not the appropriate remedy. (Id. at 15-17). Finally, the Government argues that, regardless of the circumstances, suppression is not warranted because the Leon good-faith exception applies. (Id. at 20).
Before deciding whether a Fourth Amendment violation occurred, the Court may choose to determine first whether the exclusionary rule applies. "[C]ourts could reject suppression motions posing no important Fourth Amendment questions by turning immediately to a consideration of the officers' good faith." Leon, 468 U.S. at 925. Whether it is necessary to address the Fourth Amendment question posed in a particular case is within the "informed discretion" of the Court. Id.
Here, the Court finds that there is no basis to resolve the Fourth Amendment issues before turning to the good-faith analysis.
Accordingly, the Court declines to begin its analysis by addressing the specific Fourth Amendment issues raised in Defendant's motion. Instead, the Court turns to the question—whether the agents acted in good-faith in obtaining and executing the warrants at issue. As fully stated below, the Court finds that
"The fact that a Fourth Amendment violation occurred—i.e., that a search or arrest was unreasonable—does not necessarily mean that the exclusionary rule applies." Herring v. United States, 555 U.S. 135, 140 (2009). Indeed, "[t]he Fourth Amendment contains no provision expressly precluding the use of evidence obtained in violation of its commands. . . ." Leon, 468 U.S. at 906. And the Supreme Court has "repeatedly rejected the argument that exclusion is a necessary consequence of a Fourth Amendment violation." Herring, 555 U.S. at 141 (noting that "
In that regard, "[t]he purpose of the exclusionary rule is not to redress the injury to the privacy of the search victim: `[T]he ruptured privacy of the victims' homes and effects cannot be restored. Reparation comes too late.'" United States v. Calandra, 414 U.S. 338, 347 (1974) (quoting Linkletter v. Walker, 381 U.S. 618, 637 (1965)). Instead, "the [exclusionary] rule is a judicially created remedy designed to safeguard Fourth Amendment rights generally through its deterrent effect, rather than a personal constitutional right of the party aggrieved." Id. at 348. In other words, "[t]he rule is calculated to prevent, not to repair. Its purpose is to deter—to compel respect for the constitutional guaranty in the only effectively available way—by removing the incentive to disregard it." Elkins v. United States, 364 U.S. 206, 217 (1960).
"As with any remedial device, the [exclusionary] rule's application has been restricted to those instances where its remedial objectives are thought most efficaciously served." Arizona v. Evans, 514 U.S. 1, 11 (1995). Courts must therefore make a caseby-case determination and grant suppression "
In particular, the "`prime purpose' of the exclusionary rule `is to deter future unlawful police conduct and thereby effectuate the guarantee of the Fourth Amendment against unreasonable searches and seizures.'" Illinois v. Krull, 480 U.S. 340, 347 (1987) (quoting Calandra, 414 U.S. at 347). More specifically, "the exclusionary rule serves to deter
"`[A] warrant issued by a magistrate normally suffices to establish' that a law enforcement officer has `acted in good faith in conducting the search.'" Leon, 468 U.S. at 922 (quoting United States v. Ross, 456 U.S. 798, 823, n. 32 (1982)). Thus, "[c]ourts should not . . . suppress `evidence obtained in objectively reasonable reliance on a subsequently invalidated search warrant.'" United States v. Carpenter, 360 F.3d 591, 595 (6th Cir. 2004) (quoting Leon, 468 U.S. at 922). Significantly, "the exclusionary rule is designed to deter
Of course, an "officer's reliance on the magistrate's probable-cause determination and on the technical sufficiency of the warrant [that the magistrate judge] issue[d] must be objectively reasonable. . . ." Id. at 922. Indeed, the exclusionary rule will "not apply in cases where the issuing magistrate wholly abandoned his judicial role . . . [if under] such circumstances, no reasonably well trained officer should rely on the warrant." Id. at 923.
However, "[i]n the ordinary case, an officer cannot be expected to question the magistrate's probable-cause determination or his judgment that the form of the warrant is technically sufficient . . . [and] [p]enalizing the officer for the magistrate's error, rather than his own, cannot logically contribute to the deterrence of Fourth Amendment violations." Id. at 922. Accordingly, "evidence should be suppressed `only if it can be said that the law enforcement officer had knowledge, or may properly be charged with knowledge, that the search was unconstitutional under the Fourth Amendment.'" Krull, 480 U.S. at 348-49 (quoting United States v. Peltier, 422 U.S. 531, 542 (1975)).
As an initial matter, the question presently before the Court is whether
In resolving whether to exclude evidence obtained during the execution of
Focusing on the OHSD warrant, and assuming the NIT warrant is void because the EDVA magistrate judge lacked authority for its issuance, the Court must look to "whether there was good faith on the part of the agents." (Doc. 33 at 5:17-6:7). Defendant argued during oral arguments that the OHSD affiant is "an experienced FBI agent who is familiar with what happened in [EDVA], is familiar with Rule 41," and regardless of jurisdiction "should have known . . . that the [NIT] warrant was invalid." (Id. at 6:10-16). More specifically, Defendant argued that, because Defendant is not the first to challenge the NIT warrant in the context of the Playpen investigation, the OHSD agent should have known the NIT warrant was invalid. (Id. at 7:1-25). Additionally, Defendant asserts that the agents should have been aware that the NIT warrant was not authorized under Rule 41(b), as written at the time, because "[a] memorandum addressed to the Committee on Rule of Practice and Procedure dated May 5, 2014, introduce[d] [the] proposed amendment to Rule 41(b) that would authorize the use of the NIT Warrant." (Doc. 29 at 18). Defendant alleges that holding the agent to such high standards of legal knowledge is in line with Leon and accomplishes the purpose of the exclusionary rule—that "the lesson is to be sent to the [agents]. . . ." (Doc. 33 at 6:19-25). The Court rejects Defendant's position.
First, the EDVA agents obtained the NIT warrant on February 20, 2015, and the NIT remained active on the Playpen server until March 4, 2015. (Doc. 29, Ex. 1 at ¶ 25). Just five months later, on August 6, 2015, the OHSD agent obtained the OHSD warrant. (Id. at Ex. 1). And while Defendant argues that the OHSD agent should have known that the NIT warrant was invalid because of the ongoing challenges by other defendants, this Court is unable to find any case arising from the Playpen investigation where a motion challenging the NIT warrant predates the August 6, 2015 OHSD warrant.
Second, the Court rejects Defendant's argument that the agents were on notice that the NIT warrant may be invalid, based on the existence of
Beyond the argument that the agents essentially `should have known better,' there is no evidence that any agent acted unreasonably, let alone deliberately or recklessly. Indeed, the sheer number of agents who have relied upon the NIT warrant, and obtained subsequent warrants from magistrate judges in their own jurisdictions, as well as the inconsistent rulings by district courts across the country, shows that
Thus, the Court finds the exclusionary rule inapplicable here, as there is no basis upon which to conclude that any agent involved in the Playpen investigation, or any derivative investigation, knew or should have known that the validity of the NIT warrant, or any subsequently obtained warrant, was unconstitutional or procedurally improper. See Krull, 480 U.S. at 348-49 ("evidence should be suppressed `only if it can be said that the law enforcement officer had knowledge, or may properly be charged with knowledge, that the search was unconstitutional under the Fourth Amendment'") (quoting Peltier, 422 U.S. at 542). Moreover, there is no evidence that any agent engaged in "
In short, this Court finds it unreasonable to expect any agent to have made a definitive finding of law as to the NIT warrant, when magistrate judges and district judges across the nation have been and are unable to do so. Accordingly, the Court finds that the OHSD affiant acted in good-faith in relying upon the results of the NIT warrant as the basis for probable cause, as well as relying upon the findings of the OHSD magistrate judge as to the validity of the NIT and the OHSD warrants. Therefore, the exclusionary rule does not apply and suppression is not warranted.
Despite the Court's focus on the OHSD warrant, the Court feels compelled to also separately address the NIT warrant, in light of Defendant's argument that the good-faith exception should not apply. Specifically, Defendant argues that, because the EDVA magistrate judge lacked authority to issue the NIT warrant, it is void ab initio. (Doc. 29 at 13-19). Accordingly, Defendant suggests that the Court should treat the NIT as a warrantless search and, citing to the Sixth Circuit's decision in United States v. Scott, 260 F.3d 512 (6th Cir. 2001), argues that the good-faith exception does not apply.
The Court finds Defendant's reliance on Scott, for the proposition that the goodfaith exception does not apply, wholly unpersuasive in light of the fact that the Sixth Circuit subsequently acknowledged in United States v. Master that "the Supreme Court's evolving suppression rulings in Fourth Amendment cases require clarification or modification of our precedent in Scott." 614 F.3d 236, 243 (6th Cir. 2010). The Sixth Circuit recognized, in light of the Supreme Court's more recent decisions in Herring, 555 U.S. 135 and Hudson 547 U.S. 586, that in cases where a warrant is issued by a judge lacking legal authority, Scott's categorical foreclosure of the good-faith exception is no longer viable. Master, 614 F.3d at 241-42. Rather, the Sixth Circuit explained that, "[t]he Supreme Court has effectively created a balancing test by requiring that in order for a court to suppress evidence following the finding of a Fourth Amendment violation, `the benefits of deterrence must outweigh the costs.'" Id. at 243 (quoting Herring, 555 U.S. at 141).
Accordingly, this Court finds that the good-faith exception is not rendered automatically inapplicable simply because law enforcement officers relied upon a warrant that is subsequently found to be void ab initio.
Accordingly, here, the Court follows the Supreme Court's clear instruction that the exclusionary rule is only applicable,
Based upon the foregoing, Defendant's motion to suppress (Doc. 29) is