From Casetext: Smarter Legal Research

United States v. Blouin

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE
Aug 14, 2017
CR16-307 TSZ (W.D. Wash. Aug. 14, 2017)

Summary

holding that "[b]ecause hash values are analogous to fingerprints," 'the images of videos need not themselves be downloaded from the suspect's computer in advance of the issuance or execution of a search warrant."

Summary of this case from United States v. Murphree

Opinion

CR16-307 TSZ

08-14-2017

UNITED STATES OF AMERICA, Plaintiff, v. DOUGLAS BLOUIN, Defendant.


ORDER

THIS MATTER came before the Court on four motions brought by defendant Douglas Blouin: (i) a motion to suppress, docket no. 61; (ii) a motion for a Franks hearing, docket no. 63; (iii) a motion to dismiss, suppress, or for a jury instruction regarding spoliation, docket no. 59; and (iv) a motion to exclude pursuant to Daubert , docket no. 62. By Minute Order entered July 25, 2017, docket no. 90, and by oral ruling issued on July 27, 2017, see Minutes (docket no. 91); Tr. at 96:10-99:24 (docket no. 99), the Court denied all of these motions, with the exception of the alternative request for a jury instruction regarding spoliation, which was deferred to trial. This Order incorporates by reference the Court's oral ruling and further explains the Court's reasoning. Background

At issue in each of defendant's motions is the Government's deployment of software known as RoundUp eMule. Using RoundUp eMule, Homeland Security Investigations ("HSI") Special Agent Toby Ledgerwood allegedly downloaded twelve videos and two images of child pornography from a computer with an Internet Protocol ("IP") address associated with defendant. After a search warrant was obtained, a Dell desktop computer was seized from defendant's home. A forensic examination of the computer revealed that it had been "thoroughly scrubbed" just days before the search, and only one image of child pornography was found, which was not among the materials previously downloaded by Ledgerwood.

According to defendant's expert, the image was found in "pagefile.sys," which is a file created and managed by the Microsoft Windows operating system, and which is not accessible to the user. See Lahman Decl. at 12 (docket no. 83-2); see also Gillie Decl. at ¶ 13 (docket no. 74-1) (indicating that a single image of child pornography was discovered on defendant's hard drives, within a system file).

RoundUp eMule was developed by Brian Lynn, a Senior Programmer in the College of Information and Computer Sciences at the University of Massachusetts, Amherst, with funding from the Department of Justice. See Lynn Decl. at ¶¶ 1-2 (docket no. 79). It is a modified version of the publicly-available ("open source") peer-to-peer ("p2p") file-sharing program known as eMule. See id . at ¶ 4. RoundUp eMule was first released in March 2011. Id . at ¶ 6. Lynn testified at the hearing on July 27, 2017, that sixteen (16) different versions of RoundUp eMule have been created, but not all of them were released. Version 1.54, which was used by Ledgerwood in this matter, was released in January 2015. Id . It was not, unlike Version 1.38, subjected to validation testing, see Pla.'s Hrg. Ex. 2 (Report by The MITRE Corporation), but Lynn believes that none of the intervening changes would have altered the functionality of RoundUp eMule, see Lynn Decl. at ¶ 12.

Like eMule and another open-source program known as Shareaza, RoundUp eMule adheres to the protocol of the eDonkey/KAD p2p file-sharing network, and enables downloading of only those files being shared by eDonkey/KAD clients. See id . at ¶¶ 7 & 9; see also Erdely Decl. at ¶¶ 4-5 (docket no. 38-1). Lynn has indicated under oath that he did not include any code in RoundUp eMule that would facilitate involuntary sharing of files. Lynn Decl. at ¶ 9; see also Erdely Decl. at ¶¶ 12, 17, 21, & 23. Lynn has also testified via declaration, as well as during the hearing on July 27, 2017, that, unlike eMule and Shareaza, RoundUp eMule downloads files from a single source to ensure that they come from one particular eDonkey/KAD network user. See Lynn Decl. at ¶ 10; see also Erdely Decl. at ¶¶ 6 & 16. In February 2014, Lynn released another program known as the RoundUp eMule Scheduler, which allows law enforcement to automate the process of downloading from single sources based on the geographic areas of IP addresses. Lynn Decl. at ¶ 13. In connection with his investigation in this matter, Ledgerwood also used the RoundUp eMule Scheduler. Discussion A. Motion to Suppress

Defendant essentially contends that law enforcement should have obtained a search warrant before deploying RoundUp eMule to download items from his computer and to obtain his IP address. The threshold question is whether the use of RoundUp eMule constituted a search. In support of his argument that a warrant was required, defendant cites a law review article for the proposition that United States v . Jones , 565 U.S. 400 (2012), adopted a "mosaic theory" of the Fourth Amendment, pursuant to which the collective activities of law enforcement personnel could constitute a search even though no individual step viewed in isolation would support such conclusion. See Orin S. Kerr, The Mosaic Theory of the Fourth Amendment, 111 Mich. L. Rev. 311 (2012). The premise of Kerr's article, however, is faulty. Neither the majority opinion nor Justice Sotomayor's concurrence endorse such "mosaic theory."

In Jones , which concerned the installation of a global-positioning-system ("GPS") tracking device on a vehicle registered to the defendant's wife, the Supreme Court clarified that the "reasonable expectation of privacy" test articulated in Katz v . United States , 389 U.S. 347, 361 (1967) (Harlan, J., concurring), merely augmented, see 565 U.S. at 409, and "did not displace or diminish" the "trespassory test" that preceded it, id . at 414 (Sotomayor, J., concurring). Using the trespassory test, the Supreme Court concluded that, although the vehicle had been in a public place when the GPS device was attached to its undercarriage, the Government had encroached on a protected area (the vehicle itself) and a search warrant was therefore required. Id . at 410-11; see also id . at 414 (Sotomayor, J., concurring) ("the trespassory test applied in the majority's opinion reflects an irreducible constitutional minimum: When the Government physically invades personal property to gather information, a search occurs"). Contrary to Kerr's view, Justice Sotomayor's concurrence did not adopt a "mosaic" standard; at most, it acknowledged that the current Fourth Amendment standards, which "treat secrecy as a prerequisite for privacy," are "ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks." Id . at 417-18 (Sotomayor, J., concurring). To the extent defendant contends that the operation of RoundUp eMule amounts to a search under some "mosaic theory," his argument lacks jurisprudential support.

Defendant also relies on United States v . Darby , 190 F. Supp. 3d 520 (E.D. Va. 2016), in which the deployment of a Network Investigative Technique ("NIT") was found to constitute a search. The NIT used in Darby was sent by Government agents to computers that logged onto a particular website (Playpen) offering child pornography, and instructed such computers to transmit back certain information, including the IP address of the computer. Id . at 526-27. The Darby Court reasoned that the NIT, which was surreptitiously installed on the defendant's computer, gave the Government access to all of the contents of the computer, in which the defendant had a reasonable expectation of privacy. Id . at 529-30.

RoundUp eMule is not analogous to the NIT at issue in Darby . It does not place any program on the target computer or give the Government access to anything other than the items in the "shared" folder, which are available to anyone using a similar peer-to-peer file-sharing program. Accessing files in a "shared" folder does not violate the Fourth Amendment because no reasonable expectation of privacy exists with regard to such files. See United States v . Borowy , 595 F.3d 1045, 1048 (9th Cir. 2010); see also United States v . Dreyer , 804 F.3d 1266, 1278 n.6 (9th Cir. 2015) (citing United States v . Ganoe , 538 F.3d 1117, 1127 (9th Cir. 2008)). In Borowy , the Ninth Circuit also concluded that, even if the download of files known to be associated with child pornography was a seizure, it was supported by probable cause. 595 F.3d at 1049. Defendant's contention that law enforcement was required to obtain a search warrant before deploying RoundUp eMule lacks merit, and as a result, his motion to suppress was denied. B. Motion for Franks Hearing

Defendant challenges the search warrant issued for his residence, electronic devices, and person on grounds that the affidavit filed in support of the search warrant application was deficient in two respects: (i) failing to indicate that the process by which defendant's IP address was revealed was automated and that the system being used had not been validated; and (ii) failing to state that defendant's prior conviction for child molestation was almost 20 years old and did not involve a computer, the Internet, p2p or file-sharing technology, or child pornography.

An affidavit in support of a search warrant is presumptively valid. Franks v . Delaware , 438 U.S. 154, 171 (1978). To be entitled to an evidentiary hearing, defendant must make a "substantial preliminary showing that a false statement knowingly and intentionally, or with reckless disregard for the truth, was included by the affiant in the warrant affidavit." Id . at 155-56. Omissions meeting such standard can also require a hearing, see United States v . Perkins , 850 F.3d 1109, 1116 (9th Cir. 2017), but negligence or an innocent mistake is insufficient, Franks , 438 U.S. at 171. If defendant makes the requisite initial showing, but the affidavit remains sufficient when the alleged false statement is disregarded or the omitted information is included, then no evidentiary hearing is necessary. Id . at 171-72; Perkins , 850 F.3d at 1116 ("the false or misleading statement or omission" must be "material, i .e., 'necessary to finding probable cause'").

In two different cases, the Eastern District of Wisconsin has rejected Franks arguments similar to those being made here. See United States v . Feldman , 2014 WL 7653617 (E.D. Wis. July 7, 2014); United States v . Case , 2014 WL 1052946 (E.D. Wis. Mar. 17, 2014). In Feldman , the court was "not persuaded that the fact that the investigation may have occurred automatically rather than through the manual manipulation of an investigator is relevant in the court's assessment of probable cause," and it did not "find problematic the omission of the name of the software or every detail of its capabilities." 2014 WL 7653617 at *7. As recognized in Feldman , the dispositive question is whether the warrant was supported by probable cause to believe that contraband or evidence of a crime was likely to be found at the residence. Id . Probable cause does not require certainty and "demands even less than probability." Id . at *9 (quoting United States v . Carmel , 548 F.3d 571, 576 (7th Cir. 2008)).

In Feldman , using RoundUp eMule, law enforcement personnel identified the defendant's computer as responding to a request for 17 hash values of known child pornography; however, they were unable on 320 attempts to download any of the suspected files, which might have been the result of a firewall or router characteristics. Id . at *4 & *8. The defendant in Feldman did not contend that the failure to download the material meant the contraband or evidence was not likely to be found on the defendant's computer or residence, id . at *8, and the court concluded that "[s]uccessful single-source download of the suspect files was not necessary; hash value matches alone were sufficient to establish probable cause," id . at *10. The Feldman Court relied, in part, on a Federal Judicial Center publication stating that "'less than one in one billion' chance" exists that "the two most commonly used hash algorithms will generate the same hash value for different files." Id . at *9 (quoting Barbara J. Rothstein, et al., Managing Discovery of Electronic Information: A Pocket Guide for Judges 24 (Fed. Judicial Ctr. 2007)).

Case involved a different version of RoundUp, which was designed to work with the "Ares" p2p network. 2014 WL 1052946 at *3. In applying for the search warrant at issue, the affiant attributed the work of RoundUp to an "online covert employee," called "OCE5023." Id . at *2. The Case Court observed that the defendant's arguments "did not really fit under the Franks framework," but were instead more suitable as a Murray or Markling challenge, in which the search warrant is attacked because it is based on evidence recovered during a previous, unlawful search. Id . (citing Murray v . United States , 487 U.S. 533 (1988), and United States v Markling , 7 F.3d 1309 (7th Cir. 1993)). The Case Court rejected the argument that the affiant's failure to disclose that RoundUp was running unattended at the time child pornography was downloaded from the defendant's computer precluded a finding of probable cause, distinguishing the facts of Case from "a situation where a computer program downloaded material believed to be contraband . . . and no human being looked at the material before a warrant was sought." Id . at *4. Instead, in Case , after the images were downloaded, they were confirmed to be child pornography, and using the IP address from which the images were obtained, the defendant was identified as the subscriber via a subpoena issued to the Internet service provider. Id . The Case Court concluded that this process was "sufficiently reliable to support the issuance of the warrant." Id .

The Court concludes as a matter of law that, if files with hash values known to be associated with child pornography are reported to be on the "shared" folder of a suspect's computer, probable cause exists for searching such suspect's computer. Because hash values are analogous to fingerprints and provide high confidence that the contents of files associated with such hash values are known, the images or videos need not themselves be downloaded from the suspect's computer in advance of the issuance or execution of a search warrant. Thus, any question concerning whether, in this case, RoundUp eMule actually effected a single-source download from defendant's computer does not affect the validity of the search warrant.

United States v . Perkins , 850 F.3d 1109 (9th Cir. 2017), and United States v . Needham , 718 F.3d 1190 (9th Cir. 2013), on which defendant relies in support of his argument that the search warrant affidavit did not disclose enough information about his prior child-molestation conviction, are both distinguishable. In Perkins , the defendant traveled through the Toronto International Airport on his way home from Chile to Washington. 850 F.3d at 1112. He was stopped by Canadian Border Services Agency officers because he was a registered sex offender. Id . A laptop he was carrying, which turned out to belong to his wife, was searched, and he was arrested for being in possession of child pornography. Id . at 1113. The next day, a Peel Regional Police Constable reviewed the two images on the laptop and concluded that they did not constitute child pornography under Canadian law. Id . The subsequent search warrant affidavit prepared by an agent of the United States Department of Homeland Security (i) omitted the fact that Canadian authorities dropped the possession of child pornography charge because the images were not pornographic, (ii) provided a misleading description of one of the two images, and (iii) did not attach a copy of either image. Id . at 1116. The Perkins Court held that the defendant's motion to suppress evidence obtained pursuant to the resulting search warrant was erroneously denied by the district court. Id . at 1123. It reasoned that, if corrected, the search warrant application would have included only copies of the non-pornographic images and the defendant's convictions for first-degree incest and for first-degree child molestation, both of which were over twenty years old, and this information would not have been enough to justify the issuance of a warrant to search the defendant's home and computers for child pornography. Id . at 1119-23.

Needham involved a search warrant issued for evidence of possession or distribution of child pornography on the basis of a report that the defendant was believed to be the individual who molested a five-year-old boy in a restroom at the local mall. 718 F.3d at 1191-93. After the search warrant was executed, the Ninth Circuit decided Dougherty v . City of Covina , 654 F.3d 892 (9th Cir. 2011), in which officers were granted qualified immunity as to their improper reliance on a warrant predicated on the bare inference that persons who molest children are likely to possess child pornography. See 718 F.3d at 1194-95. Although the warrant in Needham was likewise the product of an alleged propensity of child molesters to collect child pornography, which is not alone sufficient to establish probable cause to search for such pornography, the Ninth Circuit concluded that, at the time the search warrant was executed, the law was not so clearly established as to render the officers' reliance on the warrant objectively unreasonable. Id . at 1195.

Unlike in Perkins and Needham , the search warrant affidavit at issue in this case includes much more than a bare inference drawn from a prior conviction of child molestation that the suspect possesses child pornography. In this matter, the affidavit indicates that Ledgerwood established a single-source connection with defendant's IP address and downloaded several files depicting child pornography, as defined by federal law, including two videos that Ledgerwood reviewed and described in detail in his affidavit. Ledgerwood Aff. at ¶¶ 13-20, Def.'s Ex. G (docket no. 64). In contrast to the defendant in Perkins , defendant here does not contend that Ledgerwood's summary of the videos is in any way misleading or that Ledgerwood omitted information that might cast doubt on whether the videos depicted child pornography. In sum, in this case, the search warrant is not improperly premised solely on a prior conviction for child molestation; rather, the reference to defendant's prior conviction simply provides a basis for distinguishing between defendant and any other individual who might share the IP address at issue for purposes of searching the person, as opposed to the premises, identified in the search warrant. Defendant has not made the requisite showing for a Franks hearing, and his motion was therefore denied. C. Motion to Dismiss

Defendant previously sought to compel the Government to produce the source code for Version 1.54 of RoundUp eMule. Based on the facts represented at the time in the parties' briefing, the Court denied defendant's motion. See Order (docket no. 56). The facts now appear to be slightly different from what was earlier understood, and defendant has renewed his request for the source code, which is addressed in the next section concerning his Daubert motion. The most significant change in the parties' recitations of facts involves whether eMule and Shareaza were installed on defendant's computer. Although the Government indicated in its response to defendant's motion to compel that both programs were installed on his computer, see Pla.'s Resp. at 7:2 (docket no. 38), the parties seem to currently agree that the programs had been downloaded, but were either not configured or not installed, see Gillie Decl. at 12 (eMule and Shareaza had not been configured); see also Lahman Decl. at 19 (docket no. 83-2) (Shareaza was not installed; eMule was installed, but never executed and configured).

This information was evidently known as early as November 10, 2016, when HSI Computer Forensics Analyst Thomas Gillie engaged in a direct, non-write-blocked interaction with the hard drives seized from defendant's residence. See Gillie Decl. at ¶¶ 7-13. He did so to answer what he believed were time-sensitive questions from Ledgerwood, who was in the process of testifying before the grand jury from which an indictment in this case was being solicited. See id . at ¶ 7; see also Def.'s Ex. H (docket no. 83-1). In a responsive text to Ledgerwood, Gillie wrote that he found the Shareaza program on defendant's computer, but when he started the application, it began by "asking to select setup language." Def.'s Ex. L (docket no. 83-4). Gillie speculated: "I bet he deletes the program after he downloads." Id . Gillie did not himself add, alter, or delete any files or settings, but his examination of defendant's computer caused the operating system to modify over 700 files. See Gillie Decl. at ¶¶ 11-12. Although an exact copy of each hard drive had been made before Gillie's analysis on November 10, 2016, and were preserved, defendant has accused Gillie of spoliating evidence and seeks as a remedy dismissal, suppression, or a jury instruction regarding spoliation.

The Government's failure to preserve potentially exculpatory evidence rises to the level of a due process violation if the Government acted in bad faith. United States v . Flyer , 633 F.3d 911, 916 (9th Cir. 2011). Bad faith requires more than mere negligence or recklessness. Id . If the Government destroys evidence under circumstances that do not constitute a violation of a defendant's constitutional rights, the Court may still impose sanctions, including the suppression of secondary evidence. Id . In deciding whether to impose sanctions, the Court must balance "the quality of the Government's conduct and the degree of prejudice to the accused." Id . The Government bears the burden of justifying its conduct and the defendant bears the burden of demonstrating prejudice. Id .

Although Gillie might have used alternative means to answer the questions posed by the grand jury, no showing has been made that he, Ledgerwood, or Assistant United States Attorney Matthew Hampton affirmatively altered, or acted in bad faith to alter, the hard drive. Moreover, defendant has not explained what exculpatory evidence on the hard drive was or might have been spoliated. Any previously deleted child pornography that might have been overwritten during the course of Gillie's examination would be inculpatory, not exculpatory. Given the relative innocuousness of the Government's conduct and the lack of apparent prejudice to defendant, neither dismissal nor suppression of evidence would be an appropriate sanction. Whether to give a jury instruction regarding spoliation turns on the evidence presented at trial, and the issue was therefore deferred. D. Motion to Exclude Pursuant to Daubert

Defendant moved to exclude testimony concerning RoundUp eMule pursuant to Daubert v . Merrell Dow Pharms., Inc., 509 U.S. 579 (1993), and Kumho Tire Co . v. Carmichael , 526 U.S. 137 (1999). Daubert and Kumho provide standards for expert testimony. Expert testimony is admissible pursuant to Federal Rule of Evidence 702 if it is both relevant and reliable. E .g., Estate of Barabin v . AstenJohnson, Inc., 740 F.3d 457, 463 (9th Cir. 2014) (en banc). The Court has an obligation to act as "gatekeeper" to exclude "junk science" that does not meet Rule 702's reliability standard. Id . The Daubert list of non-exhaustive factors for assessing the reliability of expert testimony includes: (i) whether a theory or technique can be (and has been) tested; (ii) whether the theory or technique has been subjected to peer review and publication; (iii) whether the theory or technique has a known or potential error rate; and (iv) whether the theory or technique is generally accepted in the relevant scientific community. Id .; see Daubert , 509 U.S. at 593-94. The Court may disregard some of these factors and/or consider other factors, depending on the particular circumstances of a particular case; the Rule 702 inquiry is "flexible" and Daubert does not set forth a "definitive checklist or test." See Kumho , 526 U.S. at 141-42 & 149-52.

Rule 702 was amended in 2000 and restyled in 2011, and now reads as follows:

A witness who is qualified as an expert by knowledge, skill, experience, training, or education may testify in the form of an opinion or otherwise if:

(a) the expert's scientific, technical, or other specialized knowledge will help the trier of fact to understand the evidence or to determine a fact in issue;

(b) the testimony is based on sufficient facts or data;

(c) the testimony is the product of reliable principles and methods; and

(d) the expert has reliably applied the principles and methods to the facts of the case.

With regard to Ledgerwood, who would be a fact or lay witness with respect to his use of RoundUp eMule, neither Daubert nor Kumho apply. Ledgerwood will be permitted to testify about how he interfaced with the RoundUp eMule program and what resulted from his efforts. Ledgerwood does not have to know about or explain how the program executes its source code; he just has to describe the manner in which he used it. To the extent defendant argues otherwise, the natural extension of his reasoning would be to require that a state trooper or highway patrol officer know about and be able to explain the science underlying a radar gun and how one is constructed before being allowed to testify about the vehicle speed that was measured using such device. The law does not require law enforcement personnel using technology to perform their work (for example, field tests for controlled substances, blood-alcohol content measurement devices) to be qualified as experts before they can testify about their observations. To the extent the reliability (and perhaps relevance) of a particular technology is in doubt, the method for raising such challenge is not through the exclusion of the lay witnesses who used the technology.

As to Lynn, defendant cannot seriously challenge his expertise or his ability to testify about how he created the program, what the program is designed to do, and whether, in his opinion, the program does what was intended. Computer programming is not a scientific theory or technique, it is not new or novel, and it does not implicate the Court's responsibility to keep "junk science" out of the courtroom. Any doubts about whether RoundUp eMule operates in the manner that Lynn represents go to the weight, and not the admissibility, of his testimony.

With respect to Detective Robert Erdely, who seems to be a fact witness, rather than an expert witness, defendant's motion to exclude also lacks merit. Erdely is proffered by the Government to describe the process for training law enforcement personnel to use RoundUp eMule and to discuss the tests he has performed both as part of the training curriculum and during the course of this case. Erdely need not be a software engineer or have training in computer programming to testify about how a user interfaces with RoundUp eMule and the types of results that can be obtained. Neither Daubert nor Kumho preclude Erdely's testimony.

The real issue in this case does not involve Daubert and Kumho , but rather is best summed up in Feldman . In Feldman , the court observed that the defendant was "not charged for conduct the investigator observed over the peer-to-peer network but rather [for] what the investigators found in his home." 2014 WL 7653617 at *6. In other words, in Feldman , neither RoundUp eMule nor the investigator were "transactional witnesses" to the charged offense. Id .; see also id . at *5 ("the defendant, unlike the defendant in Budziak , is not charged with any conduct that law enforcement observed via RoundUp"). In contrast, in this case, the evidence against defendant consists primarily of the files Ledgerwood allegedly pulled, via RoundUp eMule, from defendant's IP address. Thus, the dispositive question in this matter is whether RoundUp eMule operates in the manner asserted by the Government and engages in single-source downloading. RoundUp eMule and its operator (Ledgerwood) are, in essence, the witnesses against defendant, and the question before the Court is what discovery must defendant be provided concerning RoundUp eMule for defendant to be able to confront his accusers and adequately prepare for cross-examination.

United States v . Budziak , 697 F.3d 1105 (9th Cir. 2012). --------

The Court remains persuaded that defendant does not need the source code to mount his defense. As indicated in the Order denying defendant's motion to compel, unlike the defendant in Budziak , defendant here does not contend that the program at issue allows law enforcement to modify the sharing settings on target computers. Instead, he challenges the reliability of the single-source downloading feature of RoundUp eMule. Defendant's expert suggests that, in April 2016, Ledgerwood might have downloaded the child pornography at issue from a computer that was no longer at the IP address in October 2016, when the search warrant was executed, or from one or more IP addresses other than the one associated with defendant. See Lahman Decl. at 14 (docket no. 83-2). Defendant's expert has also acknowledged the possibility that Ledgerwood obtained the child pornography at issue from defendant's computer before it was deleted by defendant. See id . at 13-14. This latter explanation does not support an assertion of innocence. All of these scenarios, however, are premised not on the functionality of RoundUp eMule, but on the fact that none of the images or videos Ledgerwood captured in April 2016 were found on defendant's seized hard drives. Defendant can present these theories, the first of which is potentially exculpatory and the second of which might raise a reasonable doubt, without access to the source code, and he has not shown how having the source code would aid in his defense. Thus, to the extent defendant seeks reconsideration of the Order entered June 14, 2017, docket no. 56, such request is denied. Conclusion

For the foregoing reasons, defendant's motions to suppress, docket no. 61, for a Franks hearing, docket no. 63, and to exclude pursuant to Daubert , docket no. 62, were DENIED, and defendant's motion to dismiss, suppress, or for a jury instruction regarding spoliation, docket no. 59, was DENIED in part and DEFERRED in part.

IT IS SO ORDERED.

Dated this 14th day of August, 2017.

/s/_________

Thomas S. Zilly

United States District Judge


Summaries of

United States v. Blouin

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE
Aug 14, 2017
CR16-307 TSZ (W.D. Wash. Aug. 14, 2017)

holding that "[b]ecause hash values are analogous to fingerprints," 'the images of videos need not themselves be downloaded from the suspect's computer in advance of the issuance or execution of a search warrant."

Summary of this case from United States v. Murphree

explaining how different types of government child-pornography-detection software work and noting that "[the government software program] downloads files from a single source to ensure that they come from one particular peer-to-peer network user"

Summary of this case from United States v. Lawrence
Case details for

United States v. Blouin

Case Details

Full title:UNITED STATES OF AMERICA, Plaintiff, v. DOUGLAS BLOUIN, Defendant.

Court:UNITED STATES DISTRICT COURT WESTERN DISTRICT OF WASHINGTON AT SEATTLE

Date published: Aug 14, 2017

Citations

CR16-307 TSZ (W.D. Wash. Aug. 14, 2017)

Citing Cases

United States v. Savanh

” “Accessing files in a ‘shared' folder does not violate the Fourth Amendment because no reasonable…

United States v. Arumugam

The Court agrees that "[a]ccessing files in a 'shared' folder does not violate the Fourth Amendment because…