DAVID STEWART CERCONE, District Judge.
On September 13, 2011, a grand jury returned a three count indictment charging Larry Edwards Hawkins ("defendant") at Count One with receipt of material depicting the sexual exploitation of a minor, from in and around August 2010 to in and around January 2011, in violation of Tile 18, United States Code, Sections 2252(a)(2) and 2252(b)(1), at Count Two with distribution of material depicting the sexual exploitation of a minor, from in and around August 2010 to in and around January 2011, in violation of Tile 18, United States Code, Sections 2252(a)(2) and 2252(b)(1), and at Count Three with possession of material depicting the sexual exploitation of a minor, from in and around August 2010 to in and around January 2011, in violation of Tile 18, United States Code, Sections 2252(a)(4)(B) and 2252(b)(2).
On August 16, 2010, Investigator Jason Howell of the Ohio Internet Crimes Against Children Task Force was investigating on-line activity in an effort uncover individuals possessing and distributing child pornography. Investigator Howell was focusing on individuals who were using the Gnutella peer-to-peer computer network. Use of the Gnutella Network permitted Investigator Howell to check files being shared on the network for their secure hash algorithm, which is a mathematical algorithm that in effect provides a "fingerprint" for digital files. Investigator Howell was utilizing the Federal Information Processing and Digital Signature Algorithm, which produces a "SHA1" value that is unique to each file.
At approximately 10:14 a.m. Investigator Howell identified a computer with an IP address of 71.74.235.104 that was sharing 2 files on the Gnutella Network. He initiated a request to browse the shared files folder being made available and upon response was permitted to obtain a list of at least 1571 shared files. He then captured their names, types, sizes and SHA1 values. At least 6 of these files had SHA1 values of files that were known or suspected to be pictures or video containing child pornography. At approximately 10:32 a.m. Investigator Howell downloaded 13 of these files and captured their names and SHA1 values. He also was able to take screen shots to verify the files were being downloaded from the above-referenced IP address.
On August 23, 2010, at 6:13 p.m. Investigator Howell directed a second browse request to the same IP address and was permitted to connect directly to that host computer. This time the operator was making available at least 1572 files for sharing. Investigator Howell captured the names, types, sizes and SHA1 values of these files. At least 8 had SHA1 values of files that were known or suspected to be pictures or video containing child pornography. He downloaded 3 of the files, capturing their names and SHA1 values. He took screen shots during the download to verify that the files came from the same IP address.
Investigator Howell previewed the 16 files before they were downloaded. Based on his training for and experience in investigating crimes against children Investigator Howell determined that some of these files were child pornography in contravention of Ohio, Pennsylvania and federal law.
On August 27, 2010, a grand jury subpoena was served on Time Warner Cable seeking subscriber information for the IP address. On September 23, 2010, Time Warner identified defendant as the subscriber of the account and indicated the account had been active since March 13, 2008.
On January 18, 2011, Pennsylvania State Police Trooper Dana Stewart presented an application for a search warrant to Pennsylvania Magisterial District Judge Paul Manzi. Trooper Stewart incorporated the above information into an affidavit along with additional information pertaining to common characteristics and behaviors of individuals who collect child pornography. These characteristics were based on Trooper Stewart's knowledge, experience and training in child exploitation and child pornography. They included: collectors may receive sexual gratification, stimulation and satisfaction from contact with children and/or from fantasies about the same generated from viewing various forms of child pornography; this pornography is collected in multiple and different media forms, such as photographs, magazines, motion pictures, videotapes, books, and slides; hard copies of the pornography often are stored at secured locations, such as a collector's home or private office; collectors typically retain their collection for many years; and collectors prefer to avoid being without their collection for any prolonged period of time.
Based on the above, Trooper Stewart's affidavit submitted to the magisterial judge asserted there was probable cause to believe the user of a computer located at defendant's address was a collector of child pornography. It further asserted that based on the common tendencies of collectors, namely that they tend to maintain their collections at secure locations for long periods of time, and that the user had made numerous files available on the peer-to-peer network, there was probable cause to believe that evidence of the offenses of distributing, receiving and possessing child pornography would be found at defendant's address. The affidavit included additional legal support for the propositions that collectors of child pornography keep their collection for long periods of time and even when certain computer files have been deleted they can nevertheless be recovered through forensic examination, thus minimizing the impact of the passage of 5 months between Investigator Howell's discoveries and the application for the warrant.
Magisterial Judge Manzi issued the search warrant on January 18, 2011. It authorized the seizure of: all computer hardware, including all equipment used to process and store digital data and related communication devices such as modems, cables, connections, and recording equipment; and any device used to restrict access to the same. It also authorized the seizure of: any software contained within the hardware; all computer documentation that accompanied the purchase of the above and may have been used to configure the computer system(s) discovered and seized; passwords and data security devices; and documents of any nature that may relate to passwords, accomplices or co-conspirators as well as ownership of the residence and the individuals living there.
Trooper Stewart and three other state police officers executed the warrant that same day. They arrived at defendant's residence. Trooper Stewart and Corporeal Pearson were in plain clothes but had their service pistols in concealed holsters. The other two officers were in uniform with standard service firearms on their waists. Every officer wore a raid vest.
No one was at defendant's home, which was located in a condominium complex. Trooper Stewart telephoned defendant at work, informed him that they were at his home with a warrant and asked in a calm voice with normal tone if defendant would come to the residence and let them in. Defendant agreed to do so and arrived approximately 20 minutes later. Trooper Stewart did not discuss the nature of the warrant with defendant during their telephone conversation.
Defendant was patted down for weapons when he arrived. Defendant opened the door and permitted the officers to gain access. The officers cleared the home. Trooper Stewart gave the warrant to defendant and told him that he would answer any questions about the warrant once defendant had read it. Defendant sat down in the living room and began to read the warrant. Corporeal Pearson and the two troopers in uniform went about the home searching for items to be seized while Trooper Stewart and defendant remained on the main floor and generally in the living room area.
Trooper Stewart then explained to defendant that he was not under arrest and was free to leave. He advised that he would answer any questions defendant had about the warrant. He was the only officer interacting with defendant. Defendant did not express any lack of understanding or confusion about what was transpiring or being communicated. He did not appear to be under the influence of any drug or alcohol.
Trooper Stewart began to ask defendant general questions about his personal identification. These included his full name, age, date of birth, social security number, current address, height, weight, place of birth, hair color, eye color, marital status, employer and so forth. The conversation spanned about 30 to 35 minutes of the hour it took to execute the warrant. The conversation remained calm and cordial during the entire time. Defendant never expressed a desire to end the conversation, speak to a lawyer or leave the premises. Defendant was not restrained in any way.
The conversation between Trooper Stewart and defendant eventually included questions relating to the reason the police were executing the warrant. Just prior to the officers leaving, defendant admitted that he was a collector of adult pornography and he had amassed a large collection of it. He further advised that if there was any child pornography in his collection, it would be a small percentage of his overall collection and he asked Trooper Stewart to take that into consideration in deciding whether to file charges.
Defendant was presented with an inventory receipt when Corporeal Pearson and the uniformed offices were finished. Defendant signed it and received a copy of it. Defendant was not placed under arrest or restrained in any way. The officers left and defendant remained in his residence.
Defendant asserts the warrant was constitutionally deficient for two reasons: it was overly-broad and non-particular in describing the things to be seized, thus amounting to a general warrant; and it was based on stale information and thus lacking in probable cause. Defendant further asserts that the unconstitutional search tainted any statements he made during the execution of the warrant and the statements were obtained in violation of
Defendant's contention that the warrant was a general one prohibited by the Fourth Amendment because it was overly-broad and non-particularized is unavailing. Defendant asserts that because (1) the warrant was based on the existence of one particular computer sharing 16 specifically identified files on a peer-to-peer network and (2) it authorized the seizure of every type of electronic equipment in the residence, it "did not tailor the area to be seized to the probable cause on which the warrant was based." Defendant's Motion to Suppress (Doc. No. 30) at 4. Defendant further asserts that the affidavit failed to contain an adequate basis for the magisterial judge to conclude that the files shared on the network would be retained on the computer hard drive or recovered therefrom through forensic examination and it merely speculated that because that sharing had occurred, then the computer utilized "must have more files that can be discovered later." Supplemental Motion to Suppress (Doc. No. 45) at 3. The affidavit was created with generic classifications contained on Trooper Stewart's computer and contained numerous terms and definitions that had no application to the activity uncovered by Investigator Howell, further evidencing the general nature of the warrant and the uncabined discretion provided through its authorization.
It has long been settled that a "warrant[ ] must `particularly describ[e] the place to be searched and the persons or things to be seized.'"
"Indiscriminate searches and seizures conducted pursuant to general warrants ... were the immediate evils that motivated the framing and adoption of the Fourth Amendment."
The terms delineating the scope of the warrants' authorization "serve to limit the scope of the intrusion."
A warrant offends the particularity clause and becomes a general one when it "vest[s] the executing officer with unbridled discretion to conduct an exploratory rummaging ... in search of criminal evidence."
Defendant's contention that the search warrant lacked meaningful limits on the executing officers' authority is misplaced. The warrant identified the specific place to be searched and the specific items of property that could be searched for and seized. It was limited to the "two story apartment" belonging to defendant. The items to be searched for and seized were limited to computer hardware, computer processing units and storage devices, input and output devices that could be used with such equipment, devices or equipment used to restrict access to the same, software that was or could be used in conjunction therewith and any accompanying documentation and information needed to understand how such computer units had been configured for operation or restricted to limit access. The statutory violation was identified as 18 Pa. C. S. § 6312 — "Sexual Abuse of Children." And the nature of the contraband believed to be possessed in violation of that statue was identified in specific detail in the accompanying affidavit. A 48 hour time limit for executing the warrant was set forth. These limitations sufficiently particularized the property to be searched, and the search to be conducted was limited to the instrumentalities that were likely used to violate 18 Pa. C. S. § 6312 in the manner set forth in the affidavit. What ultimately could be seized was limited to instrumentalities likely to contain the the actual fruits and evidence of such a violation.
Contrary to defendant's assertions, such limitations were more than sufficient to keep the warrant from running afoul of the prohibition against general warrants. Compare Karrer, 460 F. App'x at 161 (a warrant to seize images of child pornography obtained pursuant to images discovered during initial search for evidence involving unlawful contact with a minor was not a general warrant where it "identified particular devices and file types to be searched for evidence of a specific statutory offense.") (citing
Similarly, "the warrant's authorization to search and seize virtually all computer-related items in [Hawkin's] home does not invalidate the warrant."
In this regard the warrant's authorization to seize and search "all computer hardware, including ... any equipment that can be used to ... store, conceal or transmit electronic ... data" and all processing units, peripheral input and output devices, software, and the information needed to understand and access such electronic equipment and storage devices, was not authority to search these items of property for evidence of any criminal offense, but was particularly limited to the equipment and devices that could be used to access the images and data evidencing the criminal offense of sexual abuse of children as prohibited by 18 Pa. C. S. § 6312. Furthermore, the affidavit explained that the volume of storage, the ability to disguise file content, the myriad of ways that peripheral devices can be used to enter or retrieve stored electronic information and the highly technical processes involved in searching stored electronic data created the need to seize all computer storage devises, related software, documentation and data security devices and conduct a sufficient search in a controlled setting in order to find the identified contraband and/or evidence of defendant's receipt, possession and distribution of it. Thus, the warrant did not authorize the search of all electronic property that could be used to connect and interact on the internet for evidence of any wrongdoing such as tax evasion, espionage, or mail fraud, for example; instead, when read as a whole the warrant's authorization was limited to the seizure and subsequent searching of discovered computers and electronic storage devices which could be used singularly or in combination to store data containing the types of unlawful images identified in the affidavit, i.e., existing child pornography. Contrary to the arguments of defendant, such boundaries provide meaningful limitations on the officers' discretion to search defendant's digital devices.
Defendant's contention that the warrant constitutionally was overbroad likewise falls short of the mark. "An overly broad warrant `describe[s] in both specific and inclusive generic terms what is to be seized,' but ... authorizes the seizure of items as to which there is no probable cause."
Here, the warrant does not suffer from such a shortcoming. It did describe the computers and related electronic access and storage items to be seized in specific and inclusive generic terms. But the seizure of those items and the search of them was limited to images possessed in violation of the laws prohibiting the sexual abuse of children and evidence of the unlawful possession of such contraband. And there was probable cause to believe that defendant's computers and electronic data storage devices contained such contraband and/or evidence of the unlawful receipt, possession and distribution of such contraband.
It is well-established that the role of a reviewing court in analyzing an issuing judge's initial probable cause determination is to assess whether the issuing judge had a substantial basis for concluding that probable cause existed.
An issuing judge's finding of probable cause "should be paid great deference by reviewing courts."
A search warrant is supported by probable cause when the attached affidavit sets forth sufficient facts and circumstances to justify a reasonable belief that a search of the specified premises will uncover evidence of criminal wrongdoing.
In assessing whether probable cause exists, an issuing judge must "make a practical, common-sense decision" that there is a "fair probability that ... evidence of a crime will be found in a particular place."
When analyzing the existence of probable cause, the focus must be on "factual and practical considerations of everyday life on which reasonable and prudent men, not legal technicians, act."
The affidavit supplied a substantial basis for Judge Manzi to conclude that sufficient facts and circumstances had been presented to raise a fair probability that evidence of the images of child pornography detailed in the affidavit would be found in the computers and data storage devices located at defendant's residence. The affidavit relayed that Investigator Howell had interacted with a computer using an IP address that was associated with defendant's residence. On two separate occasions Investigator Howell had interacted with that computer and was able to verify on the first occasion that 1571 files were being shared on the network and 1572 files were being made available on the second. Several of the files had hash values that were known or suspected of containing child pornography. Investigator Howell downloaded 16 of these files from the computer at defendant's residence. Screen shots were captured during the downloading process to verify that the files were being made available from defendant's IP address. Based on a pre-download review of the files, Investigator Howell determined from his training and experience that a number of the 16 files were child pornography prohibited by federal and state law.
Trooper Stewart further attested that his training, field experience and gained expertise had verified certain common characteristics of collectors of child pornography, including that they often receive personal gratification and/or stimulation from their collection, the contraband is collected in multiple and different media forms; permanent copies of the pornography often are stored at secured locations, such as a collector's home; collectors typically retain their collection for many years; and collectors prefer to avoid being without their collection for any prolonged period of time. He also supplied additional legal case law that recognized the propositions that collectors of child pornography keep their collection for long periods of time and even when certain computer files have been deleted they can nevertheless be recovered through forensic examination.
The affidavit provided sworn facts that directly connected a computer at defendant's residence with the offering and distribution of multiple image files having hash values equivalent to those known or suspected to be child pornography in violation of Pennsylvania law. The investigator downloaded 14 complete files and 3 partial files from that computer. The investigator's preview of those files lead him to conclude that based on his training and experience some of the files were child pornography possessed in violation of Ohio, Pennsylvania and federal law. Those files had been made available on a file-sharing network for others to preview and obtain if desired. Thus, there was probable cause to believe that a computer within defendant's residence had been used to receive, possess and distribute child pornography and an individual within defendant's residence was a collector of child pornography.
Moreover, Judge Manzi was supplied with known common characteristics of collectors of child pornography that had been verified through Trooper Stewart's training and experience as well as the training and experience of other officers with whom he had shared and discussed investigative experiences. These collective experiences provided a basis to believe that the collector of child pornography within defendant's residence would have access to the acquired collection through secured means located in the residence, such as a computer and related electronic data storage devices configured to restrict access, and that individual would seek to maintain that access on an ongoing basis. Of course, Judge Manzi was permitted to draw the inference that the individual with computer access at defendant's residence likewise had behaved in a manner consistent with these common characteristics and credit Trooper Stewart's conclusion that probable cause existed to search for and seize the electronic storage devices at that location because it was probable that forensic analysis of those devices would reveal the contraband and evidence of its receipt, possession and distribution.
Moreover, the fact that the warrant authorized the seizure of devices and files that were unrelated to the specified criminal offenses did not render the warrant constitutionally overbroad. "[A]s a practical matter, when a search requires review of a large collection of items, `it is certain that some innocuous [items] will be examined, at least cursorily, in order to determine whether they are, in fact, among those [items] authorized to be seized.'"
Trooper Stewart explained in the affidavit that computer storage devices can store tremendous volumes of information; that suspects may try to conceal evidence of criminal conduct through deceptive labeling or random storage; searching for such concealed data is a highly technical process requiring the use of expert skills in a controlled environment; and that searching conducted in that manner can recover hidden, erased, compressed and/or encrypted data/evidence. He further explained that his experience had verified that searching for electronic data in that manner "commonly requires investigators to seize all of a computer system's input/output peripheral devices, related software, documentation, and data security devices (including passwords) so that a qualified computer expert can accurately retrieve the system's data in a laboratory or other controlled environment" because (1) access to the central processing unit and all storage devices is essential to retrieving any data from the computer system and (2) there is significant variation in the compatibility of peripheral devices. In this regard, such searches are complex and time-consuming; and in order to accomplish an accurate retrieval, the analyst needs to be able to re-configure the entire system as it was operating in order to extract the information within the system, which includes having access to the relevant system software, applications software, instructions manuals or related documentation and/or data security devices.
It follows that the very search to be undertaken based on probable cause required the use of numerous items that are not in themselves contraband. These items were integrated with and a part of a larger collection of items for which there was probable cause. They could not be readily or even easily distinguished from the contraband and related evidence of the suspected criminal activity. There was probable cause to believe that the contraband had been stored and likely hidden within the collection of these electronic items. And as Trooper Stewart further emphasized, there was probable cause to believe that many of these items were instrumentalities of the crimes for which there was probable cause. Under these circumstances, the fact that the warrant authorized the potential seizure of a number of innocuous items that were unrelated to the specified criminal offenses did not render the warrant constitutionally overbroad.
Defendant's contention that the warrant was predicated on stale information equally is misplaced. It is beyond reproach that the "[a]ge of the information supporting a warrant application is a factor in determining [the existence of] probable cause."
Here, the mere passage of five months from the activity on the network resulting in the sharing and thus distribution of child pornography and the application for the warrant did not render the information in the affidavit stale. As emphasized above, "staleness is not a matter of mechanically counting days."
The United States Court of Appeals for the Third Circuit has repeatedly "recognized [that] persons with an interest in child pornography tend to hoard their materials and retain them for a long time."
The affidavit supplied Judge Manzi with facts and circumstances giving rise to probable cause to believe an individual with access to a computer within defendant's residence was a collector of child pornography. It likewise supplied probable cause to believe the individual had been actively sharing such material on a peer-to-peer network. It further reiterated the recognized principle that "collectors of child pornography keep their collection for long periods of time" and explained that even if the contraband had been deleted, a forensic examination can recover such files long after they have been erased. These propositions are well supported in the established precedent.
Judge Manzi's task was to make a practical, commonsense decision as to whether there was a fair probability that evidence of the receipt, possession and/or distribution of child pornography would be found within a computer system located in defendant's residence five months after someone in that residence had participated in making such materials available on the internet. Judge Manzi had a substantial basis for concluding that such probable cause existed. His determination is in accord with the growing body of case law addressing staleness in the context of child pornography offenses involving the use of the internet.
Moreover, the statements was not obtained in violation of
As an initial matter, it is important to recognize that the Supreme Court has cautioned that "custody" is not be read too broadly: "[P]olice officers are not required to administer
Custodial interrogation occurs when law enforcement officers initiate questioning "after a person has been taken into custody or otherwise deprived of his freedom of action in any significant way."
Whether an individual has been placed into custody "depends on the objective circumstances of the interrogation, not on the subjective views harbored by the interrogating officers or the person being questioned."
Where, as here, there has not been an overt arrest when the statements are made, to have custodial interrogation "something must be said or done by the authorities, either in their manner of approach or in the tone or extent of their questioning, which indicates they would not have heeded a request to depart or to allow the suspect to do so."
Consideration of the context and circumstances of defendant's encounter with Trooper Stewart and the other officers on January 18, 2011, supports a determination that defendant was not in custody or otherwise subjected to custodial interrogation when he made the statements he seeks to suppress. First, Trooper Stewart called defendant and asked if he would come to the residence and let them in. Defendant agreed to do so. Their exchange was cordial and without emotional excitement.
Second, defendant received a copy of the warrant and was given an opportunity to review it before Trooper Stewart had any conversation about the warrant beyond reference to the fact that the officers were there to execute it. Only Trooper Stewart interacted with defendant and defendant did not ask any questions about the warrant or express any confusion about why the officers were there. After defendant read the warrant Trooper Stewart told him he was not under arrest and was free to leave. Trooper Stewart then volunteered to answer any questions defendant might have and defendant elected to stay and carry on a conversation with Trooper Stewart.
Third, the interaction between defendant and Trooper Stewart was conducted in the living room area of defendant's residence. Defendant was free to move about within his residence during the time the officers were present. The conversation remained calm and cordial during the entire time and defendant never expressed a desire to end the conversation, speak with a lawyer, or leave. Nor did defendant express any reservation about answering any of Trooper Stewart's questions or continuing with their conversation.
Fourth, the execution of the warrant lasted less than an hour. The conversation between Trooper Stewart and defendant spanned 30 to 45 minutes of this time.
Fifth, while all officers wore a raid vest and were armed, no officer displayed his weapon in a manner that might have created a hostile or threatening atmosphere. No officer raised his voice or otherwise became confrontational. Defendant's movement was not restricted and he was not restrained in any way during the entire time.
Finally, defendant's statements were made voluntarily and with an understanding that he was not obligated in any way to continue with the conversation. Defendant did not subjectively believe that he had any obligation to reveal the information he imparted to Trooper Stewart and he was not aware of any facts that objectively suggested he was in custody or was otherwise being compelled to carry on a conversation with Trooper Stewart.
The above make clear that from an objective viewpoint an individual would not have reason to believe he or she was not free to leave or discontinue all further interaction with the law enforcement officers. In other words, defendant was not subjected to custodial interrogation and defendant's statements cannot be suppressed based on a failure to receive Miranda warnings.
For the reasons set forth above, defendant's motion to suppress will be denied. An appropriate order will follow.