From Casetext: Smarter Legal Research

U.S. v. Carter

United States District Court, D. Nevada
Mar 6, 2008
549 F. Supp. 2d 1257 (D. Nev. 2008)

Summary

In United States v. Carter, 549 F. Supp. 2d 1257 (D. Nev. 2008), law enforcement authorities identified an IP address associated with the attempted downloading of child pornography, served an administrative subpoena on the internet service provider which issued that IP address, obtained the name and address of the subscriber who used that IP address at the time the attempt was made to download child pornography, and then verified that name and address through DMV and utility records.

Summary of this case from United States v. Larson

Opinion

No. 2:07-CR-00184-RLH-GWF.

March 6, 2008.

Nancy J. Koppe, U.S. Attorney's Office, Las Vegas, NV, for Plaintiff.


ORDER


Before this Court is the Findings Recommendations (#36) of United States Magistrate Judge George W. Foley, entered on February 7, 2008. Objections (#41) were filed to Magistrate Judge Foley's Findings Recommendations in accordance with Local Rule IB 3-2 of the Rules of Practice of the United States District Court for the District of Nevada. The Government filed an Opposition (#42) thereto, and the matter was submitted for consideration.

The court has conducted a de novo review of the record in this case in accordance with 28 U.S.C. § 636(b)(1)(B) and (C) and Local Rule IB 3-2 and determines that the Findings Recommendations of Magistrate Judge Foley should be accepted and adopted.

IT IS THEREFORE ORDERED that Magistrate Judge Foley's Findings Recommendation (#36, entered February 7, 2008) is AFFIRMED and ADOPTED, and Defendant's Motion to Suppress Evidence (#25) is denied.

FINDINGS RECOMMENDATIONS Motion to Suppress Evidence — #25

GEORGE FOLEY JR., United States Magistrate Judge.

This matter is before the Court on Defendant Travis Carter's Motion to Suppress Evidence (Franks Hearing Requested to Determine Whether the Application for the Search Warrant Was Misleading) (#25), filed on November 27, 2007 and the Government's Response to Defendant's Motion to Suppress Physical Evidence (#27), filed on November 29, 2007.

Defendant Travis Carter is charged in a two count Indictment filed on August 15, 2007 with receipt of child pornography in violation of 18 U.S.C. § 2252A(a)(2) and possession of child pornography in violation of 18 U.S.C. § 2252A(5)(B). The Indictment arises out of evidence that the Government seized during the search of a residence on March 1, 2007 pursuant to a search warrant. Defendant alleges that the affidavit in support of the application for the search warrant contained material misstatements or omissions, absent which there would not have been probable cause to support the issuance of a search warrant. Defendant, therefore, requests that the Court conduct a Franks evidentiary hearing to determine whether the allegedly false statements or omissions in the affidavit were made intentionally or with reckless disregard for the truth. If the Court so concludes, then Defendant moves for suppression of the evidence.

FACTUAL BACKGROUND

The search warrant in this case was based on the affidavit of Sue A. Flaherty, a Special Agent (SA) with the Federal Bureau of Investigation ("FBI"). Motion to Suppress (#25), Exhibit "A". Agent Flaherty's affidavit contains a general discussion of the characteristics or behavior patterns of persons who produce, trade, distribute or possess images of minors engaged in sexually explicit conduct and how such persons use personal computers and the Internet to facilitate such activities. Exhibit "A", Affidavit, pp. 3-6, ¶¶ 6-13. The affidavit also contains a Definitions section for key terms relating to child pornography and computer or Internet technology, Id., pp. 6-8, ¶ 14, and a procedure for searching electronic data in computer hard drives and other memory storage devices. Id., pp. 8-10, ¶¶ 15-18.

The specific factual information supporting the application for the search warrant was based on information provided to Agent Flaherty by Special Agent (SA) Wade Luders of the San Francisco Division of the FBI regarding his investigation of "the Ranchi message board." On or about July 25, 2006, SA Luders became aware of the Ranchi message board which is a hard core child pornography message board located in Japan. SA Luders' investigation of this message board over a six month period revealed that the only postings to it were sexually explicit videos and images (and related text) depicting children that constitute child pornography. Exhibit "A", Affidavit, p. 11, ¶ 20. In order to access the Ranchi message board, Internet users were required to enter through a "gateway" or a website address that redirected the users to the current physical location of the message board. At any given time, there were three gateways to the Ranchi site most of which were located on webservers in Russia. Id., ¶ 21. Upon entering the Ranchi message board, new users were directed to read the "FAQ" (Frequently Asked Questions) and "Tutorials" sections. These sections informed the user that the Ranchi message board contained a range of child pornography, including "hardcore baby material." Id., ¶¶ 21, 22. Other postings in these sections discussed how to encrypt and decrypt files, to remove identifying information from postings, to utilize online Internet tools to mask IP addresses, and generally how to evade law enforcement. Id., ¶ 22. The Affidavit states that between July and December 2006, SA Luders downloaded multiple video and image files depicting children engaged in sexual acts with each other and with adults. Id., p. 12, ¶ 24. The Affidavit contains specific written descriptions of some of the video files and image files downloaded by SA Luders which Agent Flaherty reviewed and considered to constitute child pornography. Id., p. 12, ¶¶ 24, 25.

The Affidavit states that because the Ranchi message board is hosted in Japan, whose child pornography laws are different than those of the United States, SA Luders was unsuccessful in obtaining a search warrant for user logs that would have enabled the Government to identify users who downloaded from the links posted to the Ranchi message board. Consequently, SA Luders decided to make undercover postings to the Ranchi message board that would capture the Internet Protocol (IP) addresses of its users. SA Luders' postings to the Ranchi message board were consistent with other postings he had observed there in that they advertised child pornography and contained hyperlinks that purportedly connected to where child pornography could be downloaded. The hyperlinks created by SA Luders actually connected to a covert FBI computer in San Jose, California, and the files contained therein were encrypted and non-pornographic. The FBI computer captured the Internet Protocol (IP) addresses of Ranchi message board users who attempted to download what was advertised as a child pornography video. Exhibit "A", p. 13, ¶ 27.

On October 25, 2006 at approximately 3:00 p.m Pacific Daylight Time (PDT), SA Luders, in an undercover capacity, logged into the Ranchi message board and created a posting that advertised a video of a four-year old female engaging in sexual activity with an adult male. The text of the posting read, "here is one of my favs — 4yo hc with dad (toddler, some oral, some anal) — supercute! Haven't seen her on the board before — if anyone has anymore, PLEASE POST." The posting directed individuals to go to the certain website links (listed in the Affidavit) to download the video file. Exhibit "A", p. 13, ¶ 28.

Approximately 40 minutes after the first posting, SA Luders posted another message on the Ranchi message board, the purpose of which was to give the impression that he had accidently posted the wrong file to his previous posting. The text of SA Luders' second posting read, "sorry for the mixup — I see I didn't post the right file I meant to (shit!) here is correct preview movie — others coming soon." The second posting directed individuals to go to another website link in order to download the "correct" video file. This link also returned to the covert FBI computer in San Jose, California which captured the Internet Protocol (IP) addresses of the users who accessed the website link and attempted to download the advertised video image. Exhibit "A", pp. 13-14, ¶¶ 29, 30.

The Affidavit then sets forth Agent Flaherty's opinion that if someone attempted to download the images posted by SA Luders, they would have done so intentionally and with full expectation that the file contained child pornography. Agent Flaherty based her opinion on the content of SA Luders' undercover postings and on the configuration and content of the Ranchi message board. Exhibit "A", p. 14, ¶ 31. The Affidavit stated that there was probable cause to believe that prior to accessing SA Luders' postings, the user would have had to know one of the gateways to access the Ranchi message board, and would have been aware from the "FAQ" page that the message board contained illegal material. Users would also have likely gone to the "FAQ" page to learn how to uncrypt the downloaded file which would have increased the users' awareness that the Ranchi message board contained illegal materials. The Affidavit also noted that many other links on the Ranchi message board contained links to child pornography. Id.

On October 26, 2006 at approximately 4:00 p.m. PDT, one day after his initial postings to the Ranchi message board, SA Luders shut down the webserver on the covert FBI computer and copied and preserved the log file which captured the Internet Protocol (IP) addresses that accessed the links he posted on the Ranchi message board. Exhibit "A", p. 15, ¶ 32. Several hundred unique IP addresses attempted to download child pornography, i.e., the video image referred in SA Luders' posting. These entries included five entries for Internet Protocol (IP) address 68.108.184.145. Id., ¶ 33. The entries associated with this IP address occurred between 7:12 p.m. and 7:15 p.m PDT on October 25, 2006, and between 1:19 a.m and 1:27 a.m PDT on October 26, 2006. Id., ¶ 34.

The Affidavit then described the steps taken by the Government to identify the user of Internet Protocol (IP) address 68.108.184.145. A search of the publicly available website arin.net revealed IP address 68.108.184.145 was controlled by Cox Communications. On October 31, 2006, the Government served an administrative subpoena on Cox Communications to identify the individual subscriber to IP address 68.108.184.145 on October 25, 2006 at 7:12 p.m. PDT when a user of this IP address first attempted to download the posting created by SA Luders on the Ranchi message board. On November 10, 2006, Cox Communications responded to the subpoena by identifying Luana Carter, 3815 North Nellis Boulevard, Number 26, Las Vegas, Nevada 89115, telephone number 702-860-7293, as the subscriber to IP address 68.108.184.145. Exhibit "A", p. 16, ¶¶ 35-38. On January 17, 2007, the Government conducted a search of the public records data base LexisNexis which indicted that Luana Carter resided at the above listed address and that Defendant Travis Carter was a household member at that address. Id., ¶ 39. On January 17, 2007, the Government also checked Nevada Department of Motor Vehicle (DMV) records which revealed a current driver's license for Luana Carter, with the same social security number, date of birth and physical address obtained through LexisNexis. Exhibit "A", pp. 16-17, ¶ 40. On February 8, 2007, the Government also served an administrative subpoena on Nevada Power Company for subscriber information for 3815 North Nellis Boulevard, Number 26, Las Vegas, Nevada 89115. Nevada Power Company's response to the subpoena listed Luana Carter as having an active account at that address since June 22, 2001 and listed her home telephone number as 702-860-7293. Id., ¶ 41.

Agent Flaherty also stated that physical surveillance was conducted at 3815 North Nellis Boulevard, Number 26, Las Vegas, Nevada on February 27, 2007 at which time she observed an Acura automobile bearing Nevada license number 252-TPG parked in front of the mobile home residence at that address. Nevada DMV records listed this vehicle as being registered to Defendant Travis Carter with an address of 3815 North Nellis Boulevard, Number 26, Las Vegas, Nevada. Exhibit "A", p. 17, ¶ 42.

Based on the foregoing information, Agent Flaherty stated in her Affidavit that there was "probable cause to believe that on October 25, 2006, someone using the Cox Communications Internet account of Luana Carter attempted to violate Title 18, United States Code § 2252 and § 2252A by attempting to download a file that was advertised as child pornography." Exhibit "A", p. 17, ¶ 41[43]. Because the IP address returned to the Internet account of Luana Carter, whose address was 3815 North Nellis Boulevard, Number 26, Las Vegas, Nevada, and there was still an active account in her name for that address on the date of the Affidavit, Agent Flaherty also stated that she believed evidence of child pornography crimes would be found at that residence. Id. Pursuant to the foregoing information, United States Magistrate Judge Lawrence R. Leavitt issued a search warrant to search the premises at 3815 North Nellis Boulevard, Number 26, Las Vegas, Nevada, including computers and other data storage devices for evidence of child pornography.

According to the Government's Response (#27), the search warrant was executed on March 1, 2007. Upon executing the warrant, the Government's agents learned that Defendant Travis Carter resided at 3815 North Nellis Boulevard, Number 26, Las Vegas, Nevada with his mother Luana Carter and his step-father. Defendant allegedly spoke with the agents and informed them that he had a computer in his bedroom and was its only user. Defendant allegedly told the agents that when he was not at home, he kept his bedroom door locked. Defendant also allegedly admitted to the agents that he viewed images of child pornography on his computer and that he had visited the Ranchi site and had downloaded images from that site. Response (#27), pp. 6-7. A subsequent forensic examination of Defendant Carter's computer allegedly revealed thousands of child pornography images, including videos or movies depicting child pornography. Id., p. 7.

Defendant's Motion to Suppress Evidence (#25) challenges whether evidence that an Internet Protocol (IP) address has allegedly been used to access and download child pornography, combined with evidence regarding the IP address subscriber's identity and residential address, is sufficient to provide probable cause to believe that evidence of child pornography will be found at the subscriber's residence. Defendant argues that Agent Flaherty's Affidavit was misleading because it failed to inform the Magistrate Judge of material facts regarding Internet access through an Internet services provider such as Cox Communications and how IP addresses function. Defendant argues that if such information had been included in the affidavit, probable cause would have been lacking. In support of his motion, Defendant has submitted (1) an affidavit of Adrian Leon Mare, an expert in computer networking, computer forensics, electronic evidence discovery and electronic data recovery, Exhibit "D"; (2) an affidavit by Al Tobin, an investigator with the Federal Public Defender, District of Nevada, Exhibit "B"; and (3) an aerial or satellite photograph of the location of Defendant's residence, Exhibit "C". Defendant has also referred the Court to a November 10, 2004 article on the FBI's website entitled "Internet Security in a Wireless World, The Case of the Not-So-Friendly Neighborhood Spammer." See Defendant's Motion (#25), p. 12.

The affidavit of Defendant's expert witness, Adrian Mare, states that he has worked in various positions in the computer industry for over 25 years, that he has been certified as a systems engineer or specialist by leading computer companies, such as Microsoft and Cisco Systems, and that he has been trained in advanced Internet forensics. Motion (#25), Exhibit "D", ¶ 1. Mr. Mare's affidavit makes the following points:

* Computers access the Internet through connections or portals. Each of these portals or connections is assigned its own Internet Protocol (IP) address. Each time a computer accesses the Internet, it is assigned an IP address. ¶ 4.
* One way a computer user can gain access to an IP address is to become a subscriber to an Internet Service Provider (ISP), such as Cox Communications. Cox Communications provides Internet service in portions of Las Vegas. It is not necessary or required by ISPs such as Cox for the ISP to actually go to a location to establish Internet service for a client. A client can establish an Internet account without having an ISP come to a particular location to establish service. ¶ 5.
* Upon becoming a subscriber, the computer user is permitted to connect to the ISP's network by physically attaching a connecting device, a cable modem, to cables located in his/her residence or business. A cable modem can only be physically connected to cables in a house, building or structure if cables are physically present in the structure, and not all buildings or structures have such wiring or cables. ¶ 6
* In order to allow multiple computers to access the Internet under the same IP address, the cable modem may be connected to a router, or may itself function as a router, which serves as a gateway through which multiple computers could access the Internet at the same time under the same IP address. The router could be a wireless device in which case computers located within 300 feet of the wireless router signal could access the Internet through the router and modem under the same IP address. The wireless router signal strength could be increased beyond 600 feet if additional devices are added. The only way to prevent sharing of the wireless router is to encrypt the signal and even then an individual can bypass this security using publicly available software. ¶¶ 7-8.
* Each time a computer accesses the Internet through a router it is assigned an IP address. The IP address is actually assigned to the cable modem or router. Therefore, every computer which accesses the Internet through the same router will have the same IP address. Computers may also access the Internet without a router through another computer, which process is known as "Internet connection sharing." ¶¶ 9-10.
* Computers can be in various locations while still simultaneously accessing the same wireless router. All computers accessing the Internet through the same wireless router will have the same IP address. ¶ 12.
* Each piece of computer hardware, i.e, modem, router or computer has a unique media access control (MAC) number or address. The MAC address is assigned by the manufacturer when the device is created. Each device, even if it the same type and model, will have a unique MAC address. When pieces of hardware are connected, they can communicate their MAC addresses to each other. ¶ 13.
* There is publicly available software on the Internet which permits a computer to "spoof" or fake an IP address in another network. Through this software an individual can make it appear that he is using a specific router when he is, in fact, using a different router. Thus, when this person sends a message or information to another computer, the receiving computer will be unaware of the true IP address of the sending computer. ¶ 14.
* There is also publicly available software which permits a computer to "spoof" or fake the media access control (MAC) number or address of the computer, modem or router, which would prevent the ISP, such as Cox Communication, from knowing who is actually using its network to access the Internet. ¶ 15.

Mr. Mare further states that based on his professional experience in Las Vegas, he knows that there are communities and neighborhoods in Las Vegas which have created their own network by sharing one Internet connection and thus one IP address between several households. Motion (#25), Exhibit "D", ¶ 16. Based on the foregoing, Mr. Mare states that there are many problems with using an IP address to decide the location of a computer allegedly using an IP address on the Internet. The IP address can be "spoofed." A single IP address can be used by multiple computers at multiple locations through a wireless router. The MAC address of a cable modem can be spoofed to allow access to another's Internet connection. A neighborhood with several houses can share one Internet connection and therefore have the same IP address. Id., ¶ 17.

According to the affidavit of the Federal Public Defender's investigator, Al Tobin, he interviewed a former employee of Cox Communications, April Lindskog, by telephone on September 28, 2007. Ms. Lindskog indicated in that interview that to her knowledge, Cox Communications tracks its subscribers' usage based on the MAC number or address of the cable modem associated with the account. Ms. Lindskog explained that a cable modem registered for an account could connect to Cox anywhere that Cox provided service and that a customer's access to Cox was not limited by geographical location or address. Motion (#25), Exhibit "B", ¶¶ 3-5. Mr. Tobin also stated that he visited the vicinity of 3815 North Nellis Boulevard, Number 26, Las Vegas, Nevada, and based on his preliminary investigation, there are over 200 homes located within approximately 600 feet of Defendant's residence. Id. ¶ 6.

The Court has also reviewed the FBI article, "Internet Security in a Wireless World, The Case of the Not-So-Friendly Neighborhood Spammer," referenced in Defendant's Motion. The article states that there are people who drive around neighborhoods and office parks with laptop computers looking for open or unprotected wireless access points to the Internet. These persons electronically hijack the web connections they find and use them to send unsolicited spam. Such persons can use the person's Internet connection and IP address to send spam to other computers, including child pornography. The article also discusses steps that a computer user can take to protect his or her wireless device from being hijacked.

DISCUSSION

As both parties note in their respective briefs, this Court previously issued findings and recommendations in United States v. Latham, Case No. 2:06-cr-379-LDG (GWF) (hereinafter " Latham") which involved a substantially similar motion to suppress and request for a Franks hearing. The motion in Latham was also supported by affidavits by Defendant's computer expert, Adrian Mare, and by investigator Al Tobin which contain substantially the same information set forth in their affidavits in support of Defendant Carter's instant motion. See Latham Motion to Suppress (#50). The undersigned Magistrate Judge recommended that Defendant Latham's motion to suppress and request for a Franks hearing be denied. See Latham Report and Recommendations (#56). District Judge George adopted the Report and Recommendations and denied Defendant Latham's motion to suppress. See Latham Order (#70).

The affidavit of Mr. Mare in support of Defendant Carter's instant motion contains some additional information that was not included in his affidavit in Latham. In particular, the information set forth in paragraph 16, regarding local neighborhood networks, and Mr. Mare's opinions in paragraph 17 were not included in his earlier affidavit. Otherwise, the information in both affidavits is substantially the same. The FBI website article was not provided in the motion in Latham. With this additional information also in mind, the Court proceeds with a discussion and evaluation of Defendant Carter's instant motion.

In Franks v. Delaware, 438 U.S. 154, 98 S.Ct. 2674, 57 L.Ed.2d 667 (1978), the Supreme Court held that the Fourth Amendment entitles a defendant to challenge the validity of a search warrant affidavit if the defendant makes a substantial preliminary showing that (1) the affidavit contains intentionally or recklessly false statements and (2) the affidavit purged of its falsities would not be sufficient to support a finding of probable cause. See United States v. Martinez-Garcia, 397 F.3d 1205, 1215 (9th Cir. 2005), citing United States v. Reeves, 210 F.3d 1041, 1044 (9th Cir. 2000). In making the initial determination of whether a defendant is entitled to an evidentiary hearing, Franks states:

There is, of course, a presumption of validity with respect to the affidavit supporting the search warrant. To mandate an evidentiary hearing, the challenger's attack must be more than conclusory and must be supported by more than a mere desire to cross-examine. There must be allegations of deliberate falsehood or of reckless disregard for the truth, and those allegations must be accompanied by an offer of proof. They should point out specifically the portion of the warrant affidavit that is claimed to be false; and they should be accompanied by a statement of supporting reasons. Affidavits or sworn or otherwise reliable statements of witnesses should be furnished or their absence satisfactorily explained. Allegations of negligence or innocent mistake are insufficient.
438 U.S. at 171.

Franks further stated that if the defendant makes a substantial showing that the affidavit contains intentionally or recklessly false statements, "and if, when the material that is the subject of the alleged falsity is set to one side, there remains sufficient content in the warrant affidavit to support a finding of probable cause, no hearing is required." Id., at 171-172. On the other hand, if the remaining content is insufficient to support probable cause, then the defendant is entitled to an evidentiary hearing. Id. At such hearing, the defendant has the burden of proof by a preponderance of the evidence to establish that the false statements were deliberately made or were made with a reckless disregard for the truth. United States v. DeLeon, 955 F.2d 1346, 1348 (9th Cir. 1992).

As the Ninth Circuit recently reiterated in United States v. Jawara, 474 F.3d 565, 582 (9th Cir. 2007), intentional or reckless omissions may also provide grounds for a Franks hearing. The Court stated:

"A search warrant, to be valid, must be supported by an affidavit establishing probable cause." United States v. Stanert, 762 F.2d 775, 778 (9th Cir. 1985). In Stanert, we applied the rationale of Franks v. Delaware, 438 U.S. 154, 98 S.Ct. 2674, 57 L.Ed.2d 667 (1978), to hold that a defendant could challenge a facially valid affidavit by making a substantial preliminary showing that "the affiant intentionally or recklessly omitted facts required to prevent technically true statements in the affidavit from being misleading." Stanert, 762 F.2d at 781 ("By reporting less than the total story, an affiant can manipulate the inferences a magistrate will draw. To allow a magistrate to be misled in such a manner could denude the probable cause requirement of all real meaning.") In addition, the defendant must show that the "affidavit, once corrected and supplemented," would not "provide . . . a substantial basis for concluding that probable cause existed" to search defendant's residence. Id. at 782.
Stanert also states that in determining whether a defendant is entitled to an evidentiary hearing, "[c]lear proof of deliberate or reckless omission is not required. See United States v. Chesner, 678 F.2d 1353, 1362 (9th Cir. 1982). Such proof is reserved for the evidentiary hearing." 762 F.2d at 781. The search warrant affidavit in Stanert alleged that defendant's residence was being used as an illegal drug laboratory. The court found that defendant had made a substantial preliminary showing that the affidavit omitted material information regarding each of the key facts relied on by the government to support probable cause and that the nature of the omissions suggested that they were made intentionally or at least recklessly. Probably the most glaring example was the affiant's statement that an illicit drug lab had previously exploded at the residence. The affidavit did not inform the issuing judge, however, that defendant did not purchase or move into the residence until after that explosion. The court also held that if the omitted information had been included in the affidavit, there would not have been a substantial basis upon which to find probable cause. Defendant was therefore entitled to a Franks hearing to determine whether the officer's omissions were intended to deceive the issuing judge or were made with reckless disregard for the truth.

As Stanert indicates, the materiality of the omitted information in regard to probable cause is relevant to the defendant's initial preliminary showing that the omissions were made intentionally or recklessly. The Seventh Circuit has stated that Defendant "must offer direct evidence of the affiant's state of mind or inferential evidence that the affiant had obvious reasons for omitting facts in order to prove deliberate falsehood or reckless disregard." United States v. Souffront, 338 F.3d 809, 822-23 (7th Cir. 2003). In this latter regard, the nature of the omitted facts must be such that it is reasonable to infer that they were deliberately or intentionally omitted from the affidavit. See e.g. Stanert, supra, (advising judge about previous drug lab explosion, but failing to disclose that it occurred before the defendant owned or resided on the premises indicated at least a reckless disregard for the truth.)

The affidavit in this case provides a fairly detailed description of the means and methods by which persons use computers and the Internet to exchange and download images of child pornography. See Motion (#25), Exhibit "A", Affidavit, pp. 3-6. As this Court stated in Latham and reiterates here, it is reasonable to infer that the FBI agents who prepared or assisted in preparing the search warrant affidavit understand how IP addresses function and the extent to which IP addresses indicate where a particular computer is located. The issue before the Court, therefore, is whether the alleged omissions here would have defeated probable cause had they been included in the affidavit and, if so, whether they sufficiently evidence deliberate falsehood or reckless disregard for the truth to warrant a Franks evidentiary hearing.

In United States v. Kelley, 482 F.3d 1047, 1050-51 (9th Cir. 2007), the Ninth Circuit recently reiterated the standards for determining probable cause as spelled out in Illinois v. Gates, 462 U.S. 213, 103 S.Ct. 2317, 76 L.Ed.2d 527 (1983). The court noted that these standards apply with equal force to cases involving child pornography on a computer. United States v. Gourde, 440 F.3d 1065, 1069 (9th Cir. 2006) (en banc). Kelley states:

Thus, probable cause means a "fair probability" that contraband or evidence is located in a particular place. Gates 462 U.S. at 246, 103 S.Ct. 2317, 76 L.Ed.2d 527; Gourde, 440 F.3d at 1069. Whether there is a fair probability depends upon the totality of the circumstances, including reasonable inferences, and is a "commonsense, practical question." Gourde, 440 F.3d at 1069 (citing and quoting Gates, 462 U.S. at 230, 246, 103 S.Ct. 2317, 76 L.Ed.2d 527). Neither certainty nor a preponderance of the evidence is required. Id. (citing Gates, 462 U.S. at 246, 103 S.Ct. 2317, 76 L.Ed.2d 527).
Normally, we do not "flyspeck" the affidavit supporting a search warrant through de novo review; rather, the magistrate judge's determination "`should be paid great deference.'" Gourde, 440 F.3d at 1069 (quoting Gates, 462 U.S. at 236, 103 S.Ct. 2317, 76 L.Ed.2d 527 (quoting Spinelli v. United States, 393 U.S. 410, 419, 89 S.Ct. 584, 21 L.Ed.2d 637 (1969)). In addition, the Supreme Court has reminded reviewing courts that "[a]lthough in a particular case it may not be easy to determine when an affidavit demonstrates the existence of probable cause, resolution of doubtful or marginal cases in this area should largely be determined by the preference to be accorded to warrants." Gates, 462 U.S. at 237 n. 10, 103 S.Ct. 2317 (quoting United States v. Ventresca, 380 U.S. 102, 109, 85 S.Ct. 741, 13 L.Ed.2d 684 (1965)).

In United States v. Gourde, 440 F.3d 1065, 1069 (9th Cir. 2006) ( en banc), the government obtained a warrant to search defendant's residence and personal computer for child pornography based on information in the affidavit that defendant had subscribed to and remained a member of an Internet website which charged a monthly fee, and which advertised and allowed members to view and download both legal pornography and illegal child pornography. The affidavit also discussed the characteristics of persons who collect child pornography, including their general habits in retaining child pornography on their computers or elsewhere in their residences. The en banc majority held that the affidavit provided a fair probability that defendant had downloaded child pornography from the website and retained it in his possession at the time the warrant was issued. The majority therefore held that the search warrant was supported by probable cause. Relying on Gourde, the court in Kelley similarly held that the government's affidavit provided sufficient evidence for probable cause to believe that defendant had knowingly received and possessed email communications with attachments containing child pornography images.

Defendant Carter does not dispute that Agent Flaherty's affidavit provided probable cause to believe that the person(s) who accessed the links on the posting that SA Luders created on the Ranchi website through IP address 68.108.184.145 did so intentionally and with knowledge that he or she was attempting to access illegal child pornographic images. Defendant argues, however, that the affidavit was misleading in representing or suggesting that the identification of the name and address of the subscriber for IP address 68.108.184.145 was sufficient to establish probable cause to believe that the person using that IP address on October 25-26, 2006 was located on the premises at 3815 North Nellis Boulevard, Number 26, Las Vegas, Nevada, and that evidence of illegal child pornography would be found on those premises. Defendant argues that the Government knew or should have known of the other possibilities set forth in Mr. Mare's affidavit regarding the use of IP address 68.108.184.145 which, if included in the affidavit, would have negated probable cause regarding the location of the evidence.

The Fifth Circuit in United States v. Perez, 484 F.3d 735 (5th Cir. 2007), rejected a similar argument as sufficient to defeat probable cause. In Perez, a woman complained to the police that someone with the Yahoo ID "famcple" sent her an Internet message containing child pornography. The police forwarded the complaint to the FBI. Through a subpoena to Yahoo!, Inc., the FBI determined that on the dates the child pornography was transmitted, the computer used IP address 24.27.21.6. The FBI determined that this IP address was owned by Time Warner Cable and, through a subpoena to Time Warner, learned that the IP address was assigned to defendant. Based on this information, the FBI obtained a search warrant to search defendant's residence. Defendant argued that the "mere association between an IP address and physical address is insufficient to establish probable cause." In rejecting this argument, the Court stated:

In this case it is clear that there was a substantial basis to conclude that evidence of criminal activity would be found at 7608 Scenic Brook Drive. The affidavit presented to the magistrate included the information that the child pornography viewed by the witness in New York had been transmitted over the IP address 24.27.21.6, and that this IP address was assigned to Javier Perez, residing at 7608 Scenic Brook Drive, Austin, Texas 78736. Perez argues that the association of an IP address with a physical address does not give rise to probable cause to search that address. He argues that if he "used an unsecure wireless connection, then neighbors would have been able to easily use [Perez's] internet access to make the transmissions." But though it was possible that the transmissions originated outside of the residence to which the IP address was assigned, it remained likely that the source of the transmissions was inside that residence. See United States v. Grant, 218 F.3d 72, 73 (1st Cir. 2000) (stating that "even discounting for the possibility that an individual other than [defendant] may have been using his account, there was a fair probability that [defendant] was the user and that evidence of the user's illegal activities would be found in [defendant's] home") (emphasis in original). "[P]robable cause does not require proof beyond a reasonable doubt." Brown, 941 F.2d at 1302.
Perez also argues that evidence that illicit transmissions were made does not give rise to probable cause that physical evidence would be located at the residence. However, the New York witness stated that the images she observed appeared to be videos played on a television screen transmitted via a web cam. There was therefore a basis to believe that the suspect would have such videos in his residence. Moreover, Britt stated in his affidavit that, in his experience, persons interested in child pornography typically retain numerous images of child pornography as well as "material documenting the arrangements, the introduction, and tasks to consummate the acquisition of child pornography." Based on this information, there was probable cause to believe that physical evidence of violations of the child pornography laws would be located at 7608 Scenic Brook Drive.
Perez, 484 F.3d at 740-41.

In deciding whether the Defendant has made a sufficient threshold showing to warrant a Franks evidentiary hearing, the Court assumes that the factual information set forth in Mr. Mare's and Mr. Tobin's affidavits is accurate. The article on the FBI website also verifies that an outsider can use a subscriber's wireless connection and IP address to gain access to the Internet and, among other things, use that connection and IP address to either send or receive child pornography. The fact that an outside computer user can gain access to the Internet through the Internet service subscriber's wireless connection and IP address, with or without his knowledge, or that computer users can use software to "spoof" another person's assigned IP address or MAC address, are certainly possibilities that diminish the likelihood that the Internet transmission emanated from the subscriber's premises.

The Court nevertheless agrees with Perez that even if the information set forth in Mr. Mare's and Mr. Tobin's affidavits had been included in Agent Flaherty's affidavit, there would still have remained a likelihood or fair probability that the transmission emanated from the subscriber's place of residence and that evidence of child pornography would be found at that location. The Defendant, therefore, has not met his initial burden to show "that the `affidavit, once corrected and supplemented,' would not `provide . . . a substantial basis for concluding that probable cause existed' to search defendant's residence." United States v. Jawara, 474 F.3d at 582, quoting Stanert. Additionally, unlike the circumstances in Stanert, supra, where the omitted information would have clearly negated probable cause, the omissions in this case do not support an inference that they were made intentionally to mislead the Court or with reckless disregard for the truth.

CONCLUSION

The Court concludes that Defendant has not made the threshold showing to warrant a Franks evidentiary hearing because the omitted information, if included in the affidavit, would not have negated a substantial basis for concluding that there was probable cause to believe that evidence of child pornography would be found on the premises to be searched. Given this conclusion, there are also no grounds to support an inference that the omissions were intentional or made with reckless disregard for the truth. Accordingly,

RECOMMENDATION

IT IS RECOMMENDED that Defendant's Motion to Suppress Evidence (Franks Hearing Requested to Determine Whether the Application for the Search Warrant Was Misleading) (#25) be denied.

NOTICE

Pursuant to Local Rule IB 3-2, any objection to this Finding and Recommendation must be in writing and filed with the Clerk of the Court within ten (10) days. The Supreme Court has held that the courts of appeal may determine that an appeal has been waived due to the failure to file objections within the specified time. Thomas v. Arn, 474 U.S. 140, 142 (1985). This circuit has also held that (1) failure to file objections within the specified time and (2) failure to properly address and brief the objectionable issues waives the right to appeal the District Court's order and/or appeal factual issues from the order of the District Court. Martinez v. Ylst, 951 F.2d 1153, 1157 (9th Cir. 1991); Britt v. Simi Valley United Sch. Dist., 708 F.2d 452, 454 (9th Cir. 1983).


Summaries of

U.S. v. Carter

United States District Court, D. Nevada
Mar 6, 2008
549 F. Supp. 2d 1257 (D. Nev. 2008)

In United States v. Carter, 549 F. Supp. 2d 1257 (D. Nev. 2008), law enforcement authorities identified an IP address associated with the attempted downloading of child pornography, served an administrative subpoena on the internet service provider which issued that IP address, obtained the name and address of the subscriber who used that IP address at the time the attempt was made to download child pornography, and then verified that name and address through DMV and utility records.

Summary of this case from United States v. Larson

In Carter, the defendant claimed the government's contact with co-conspirators he had named in the proffer session violated the government's agreement not to use his proffer statements against him.

Summary of this case from U.S. v. MERZ

noting possibility of spoofing

Summary of this case from London-Sire Records, Inc. v. Doe 1
Case details for

U.S. v. Carter

Case Details

Full title:UNITED STATES of America, Plaintiff(s), v. Travis CARTER, Defendant(s)

Court:United States District Court, D. Nevada

Date published: Mar 6, 2008

Citations

549 F. Supp. 2d 1257 (D. Nev. 2008)

Citing Cases

U.S. v. MERZ

In addition, two other district courts have denied suppression of evidence recovered from residential…

U.S. v. Massey

The Court notes that several other courts have similarly considered and rejected the instant objection. See…