Sie sind auf Seite 1von 39

U.

S, DIST
DISTRICT
UNITED STATES DISTRICT COURT F L
FOR THE 2013 NOV -8 PM I: 54
DISTRICT OF VERMONT
CLERK
UNITED STATES OF AMERICA )
)
v,
) Case Nos. 5: 12-cr-37, 5: 12-cr-44,
) 5: 12-cr-97
DEREK THOMAS, DOUGLAS NEALE, )
and STEPHAN LEIKERT )
OPINION AND ORDER DENYING
DEFENDANTS' MOTIONS TO SUPPRESS
Defendant Thomas (Docs. 47, 83 & 84)
Defendant Neale (Docs. 24 & 65)
Defendant Leikert (Docs. 22 & 46)
This matter came before the court for an evidentiary hearing on April 17 and July
30-31, 2013 on the motions to suppress filed by Defendants Derek Thomas, Douglas
Neale, and Stephan Leikert which were consolidated for the purposes of the court's
hearing. The parties' filing of post-hearing memoranda was completed on September 25,
2013.
The government is represented by Assistant U.S. Attorney Nancy 1. Creswell in
the Thomas case; by Assistant U.S. Attorney Timothy C. Doherty, Jr. in the Neale case;
and by Assistant U.S. Attorney Christina Nolan in the Leikert case. Defendant
Thomas is represented by Elizabeth D. Mann, Esq. Defendant Neale is represented by
Assistant Federal Public Defender David L. McColgin. Defendant Leikert is represented
by Chandler W. Matson, Esq. and William W. Cobb, Esq.
Each of the Defendants was charged by indictment with possession of child
pornography in violation of 18 U.S.C. 2252(a)(4)(B) after law enforcement executed
search warrants at their respective residences and seized evidence from a computer or
computers found therein. Defendants seek suppression of all evidence derived from the
search, arguing that law enforcement's use of automated software constituted a
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 1 of 39
warrantless search of the private areas of their respective computers in violation of the
Fourth Amendment.
In the alternative, Defendants argue that the search warrants in their cases lacked
probable cause, and contained false and misleading statements and omissions that
intentionally or recklessly misled the magistrate judge who issued the search warrants.
Defendants either collectively or individually assert that the search warrant affidavits
were false and misleading because they allegedly: (1) failed to adequately disclose and
describe law enforcement's use of automated software and a third-party database; (2)
failed to disclose the automated software's alleged ability to access incomplete, deleted,
and corrupted files, as well as files that had not been made available for sharing; (3)
failed to advise of the alleged inadequacy of the testing of the automated software; (4)
falsely represented the reliability of hash values to identify a file's contents; (5) falsely
stated that an MD4 hash value could be "converted" to a SHAI value; (6) falsely
suggested there was a manual "undercover" investigation; (7) failed to accurately and
adequately describe whether and how law enforcement verified the contents of the
suspected files; and (8) noted that Defendants allegedly "shared" certain files of child
pornography when the files were only allegedly "offered to be shared."
The government opposes the motions, contending that the automated software did
not and cannot access "private" files not made available for sharing. Accordingly, it
asserts no warrantless searches occurred. The government further contends that the use
of automated software was fully disclosed in the search warrant affidavits, the search
warrants are supported by probable cause, and the search warrant affidavits contain no
intentional or reckless material misstatements of fact or omissions.
I. Findings of Fact.
In approximately December 2011, federal and state law enforcement in Vermont
commenced an investigation, known as "Operation Greenwave," into potential child
pornography crimes using peer-to-peer file sharing software. Each of the search warrants
at issue in this case was part of Operation Greenwave.
2
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 2 of 39
A. Peer-to-Peer File Sharing.
Peer-to-peerfilesharingisapopularmeansofobtainingandsharingfiles freeof
chargedirectlyfromothercomputeruserswhoareconnectedtotheInternetandwhoare
alsousingpeer-to-peerfile sharingsoftware. Peer-to-peerfile sharingsoftwareis
publiclyavailablefordownloadfreeofchargefromtheInternetandoperatesona
particularnetworkwhichdictatestosomeextenthowthefilesharingwilloccur.
GnutellaandeDonkeyaretwopopularnetworksonwhichpeer-to-peerfilesharingtakes
place.
Generally,thesourcecodeforpeer-to-peerfile sharingsoftwareis "open,"
meaningthat,toacertainextent, itmaybemodifiedbyusers. However,althoughusers
maymakesomemodificationstothesourcecode,thesoftwaremuststilladheretoa
commonprotocolorlanguageinorderforittocommunicatewithothercomputersand
allowfilesharingtotakeplace. Therearenumeroustypesofpeer-to-peerfilesharing
programsandnumerousversionsofeachparticulartypeof program.
Oncepeer-to-peerfile sharingsoftwarehasbeendownloadedandinstalledbythe
user, theusermayinterfacedirectlywithothercomputersusingthesamefilesharing
softwareandbrowseandobtainfilesthathavebeenmadeavailableforsharing. Thefile
sharingsoftwaredoesnotpermitausertoaccessfilesthatarenotavailableforsharing.
However, ausermaydownloadaversionofthesoftwarewhichcontainsdefaultsettings
thatmakecertainfiles availablefor sharingwithouttheuser'saffirmativedesignationof
thefiles as sharedfiles. Inaddition, file sharingprogramsoftenincludeadefaultsetting
whichallowsthemtooperateanytimeacomputerisonandconnectedtotheInternet
eveniftheuserhasnotsoughttoreactivatethefilesharingprogram. Filesharing
programsmayresumeaninterrupteddownloadifthefilesharingprogramisreactivated,
eveniftheuserhasnotaffirmativelyrequestedthatthedownloadresume.
Filesharingoccurswhenonecomputer, identifiedbyanInternetProtocol("IP")
address,initiatesasearchforaresponsivefile by indicatingthetermortermsthatit seeks
tofind inthefile'sname. Thisiscalleda"query"andconsistsofkeywordssuchas
"child,""pornography,"or"childpornography." Lawenforcementhas identifieda
3
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 3 of 39
numberofsearchtermscommonlyassociatedwithchildpornography. Othercomputers
thatareusingthesamefilesharingsoftwareandconnectedtotheInternetatthetimewill
respondtothequerywitha"queryhitmessage." Aqueryhitmessageidentifiesthefile
orfiles availableforsharingwhichhaveawordinthefile namethatmatchesthesearch
wordin thequery. Thequeryhitmessagewill alsocontainadditionalinformationsuch
astheIPaddressesof thecomputersofferingtoshareresponsivefiles. OftenmUltiple
computerswillrespondtoasinglequery.
Afteraqueryhitmessageis received,thecomputeruserrequestingthefile must
affirmativelyselectit fordownload,generallybydoubleclickingonthefile'sname. It is
possibleandevenprobablethatthedownloadwilloccurfrommultiplecomputersatthe
sametimeallof whichhaverespondedwithaqueryhitmessageandaresimultaneously
sendingthefile fordownloadtothecomputerrequestingit. Thispermitsamorerapid
downloadingprocess. Apersonseekingtodownloadafilemayoftenpreviewaportion
ofthefilebeforedownloadingit,however,somepeer-to-peerfile sharingsoftware
programsdonotallowtheusertoviewthefileuntilthedownloadis complete.
Incompletefiles aregenerallynotavailablefordownloadunlessthecomputeruser
respondingtoaquery,orthedefaultsettingsonhisorhercomputer,havemadean
incompletefile availableforsharing.
Peer-to-peerfile sharingsoftwarealsooftenallows ausertorequesta"browse
host,"whichis arequesttoviewall of thefilesthatanothercomputerhasavailablefor
sharing. BoththeGnutellaandeDonkeynetworkshaveabrowsehostfunctionbuiltinto
theirprotocols. eDonkey,however,reliesonactualserverswhileGnutelladoesnot.
Accordingly,auseroftheeDonkeynetworksubmitshisorhersharedfilestoeDonkey's
servers, andtheserversrespondonbehalfof userswhoarethenonlineandoperating
eDonkeyfile sharingsoftware. Bothnetworksuseaquery-responseprotocolwhereby
queriesaresentout,responsesarereceivedanddisplayed,andtheuserthenselectsthe
files heorsheseekstodownloadorsimplybrowsesthefilesmadeavailableforsharing.
It is notuncommonforausertodownloadall ofanotheruser'sfiles availableforsharing
andthendetermineatalatertimewhethertoretainthosefiles.
4
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 4 of 39
Manypeer-to-peerfilesharingprogramspermittheusertodisablethefilesharing
componentofthesoftware. Inaddition,thesoftwaremaybeconfiguredtoprohibitthe
useofthebrowsehostfunction. However,becausethesoftwareis opensourcecode, itis
notalwayscertainthatthepeer-to-peerfile sharingsoftwarewillfunctionas intendedby
theuser. Ifauser'scomputeriseitheroffornotconnectedtotheInternet,nofile sharing
willtakeplace.
B. Hash Values.
Peer-to-peerfile sharingprogramsallusehashvaluesto identifyfiles inamanner
thatissignificantlymoreprecisethanafile'sname. Ahashvalueis alistofcharacters
thatactas adigitalfingerprintforafile'scontents. Hashvalueshavevaryingdegreesof
reliability. Thenetworkchoosesthetypeofhashvalueitwillusefor file sharing
purposes. Lawenforcementagents investigatingpeer-to-peerfile sharingactivitywill
thusreceiveresponsesthatreflectthenetwork'schosentypeofhashvalue.
TheSecureHashAlgorithm("SHA1")valueconsistsof thirty-twocharactersand
wasdevelopedbytheNational SecurityAdministrationin 1992. Itismorereliablethan
DNA(inthatthelikelihoodof twoindividualscoincidentallysharingthesameDNAis
greaterthanthelikelihoodthatmorethanonefilewillhavethesameSHA1 value)anda
collision! betweentwofiles withidenticalSHA1 valuesbutwithnon-identicalcontent
has neverbeenshowntoexist. TheGnutellanetworkusestheSHA1value.
TheeDonkeyNetworkusestheMD4hashvalue,whichdivideseveryfile into9.5
kilobytes, assignsahashvaluetoeachpart,andthenassignsahashvaluetothe
completedfile. Thecomponenthashvaluesarenotstoredseparately. eMule,whichis
themostpopularpeer-to-peerfilesharingprogramontheeDonkeynetwork,usesthe
MD4hashvalueas itsuniqueidentifierfor files. Thereis noevidencethatanMD4hash
valueis inherentlyunreliableandcannotbeusedtoidentifyfiles. Tothecontrary,itisa
substantiallymoreaccuratemeansofidentifyingafilethanthefile's name.
I Incomputerforensicsterminology,a"collision"iswhentwonon-identicalfiles sharethesame
hashvalue.
5
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 5 of 39
Thereis nowayto"convert"aMD4hashvalueintoa SHAI valueorviceversa.
However, alawenforcementofficermayaccessadatabasethatidentifiesallofthehash
valuesbelievedtobeassociatedwithaparticularfileandtherebycross-referencethe
differenttypesof hashvaluesthathavebeenassociatedwiththefile. Softwarethat
performsthisfunction ispubliclyavailableontheInternet.
C. TLO'sInvestigativeSoftwareTools.
WilliamWiltse,aformerlawenforcementofficer,certifiedcomputerforensics
examiner,andexperiencedprogrammer,createdorassistedothersinthecreationofa
suiteofsoftwareprogramstoautomate,expedite,andfocus lawenforcement's
investigationofchildexploitationcrimes. ThroughacompanycalledTLO,adatafusion
company,Mr. Wiltseandhiscolleaguesofferasuiteofsoftwareandotherproducts
knowncollectivelyastheChildProtectionSystem("CPS")freeofchargetolicensedlaw
enforcementprofessionals. TLOhastrainedlawenforcementofficersinvestigatingchild
exploitationcrimesinforty-twocountries.
AmongtheproductsTLOoffersarecertainproductsthatsubstituteautomationfor
thecomputerkeystrokesanddatagatheringalawenforcementofficerwouldotherwise
performmanuallyinordertoinvestigatepeer-to-peerfilesharingsoftwarecrimes.
Ratherthansittingatacomputersendingoutqueriesandevaluatingresponses,andthen
attemptingtonarrowsearchresultsinarelevantmanner,alawenforcementofficermay
useCPSproductstoautomatethisprocess.
CPSisawebinterfaceorportalwhichpermitsausertoaccessCPS'ssuiteof
tools. InordertouseCPSproducts,lawenforcementmustattendandsuccessfully
completean approximatelythreedaytrainingcourse. Inthecourse,lawenforcement
officersareinstructedregardinghowtosearchforchildpornographywithpeer-to-peer
file sharingsoftwareusingbothamanualmethodandaCPStoolknownasPeerSpectre
whichautomatesthequery-responsefunction. Lawenforcementistheninstructed
regardinghowtocomparetheresults. Ifalawenforcementofficersuccessfully
completesthecourse,TLOissuesthelawenforcementofficeralicensetoaccessCPS's
suiteoftoolsinhisorherjurisdiction.
6
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 6 of 39
None of CPS's products have any ability to infiltrate a user's computer with child
pornography because TLO does not possess, contain, or warehouse any actual images of
child pornography or suspected child pornography. Moreover, because CPS software is
based upon query-response software, the only information it gleans is information a
user's computer has made available for sharing. As a further limitation, CPS tools gather
only file names, hash values, and other data; they have no ability to access the images or
files themselves. A law enforcement officer must therefore follow-up on the leads
generated by CPS tools. He or she may decide to attempt a direct download from a
particular IP address or consult his or her own agency's database or another available
database of known child pornography to determine whether a file which corresponds to a
particular hash value appears to contain suspected child pornography.
Peer Spectre is part of CPS's suite of tools and is a software application that
focuses on the Gnutella file sharing network. Itoperates on a law enforcement officer's
own computer and automates the process of sending out queries for files by using terms
known to be associated with child pornography. If a user is online and has activated
peer-to-peer file sharing software, his or her computer will respond to Peer Spectre's
query with a query hit message, indicating that the computer has offered to share a
responsive file or files. The query hit message generally includes the full file name, the
file size, the hash value which identifies the file, the Globally Unique Identifier
("GUID") which is akin to a software serial number, the IP address of the computer
offering to share the file, and the port it is using. Peer Spectre then analyzes the
information received and sends a report of that information to the law enforcement
officer, who may analyze it immediately or at a later time.
Because peer-to-peer file sharing programs operate globally and contain no
internal distinction regarding geography, TLO uses publicly available geo-location
technology to narrow search results to geographic areas of interest. This allows TLO to
identity a country, state, and city for every query hit message. In turn, TLO is able to
ensure that only those query hit messages that constitute responses from IP addresses
within the law enforcement officer's licensed jurisdiction will be reported back to the
7
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 7 of 39
officer. Inmostcases,therearemoreidentifiedIPaddressesforaparticulargeographic
regionthanalawenforcementofficercanreasonablyinvestigatesothereportgenerated
bytheautomatedsoftwareassiststheofficerinprioritizinghis orherinvestigationby
identifyingthe"worst"IPaddresses, (intermsofthelikelihoodthattheIPaddressis
offeringtosharechildpornography). Incontrast,usingamanualmethod, alaw
enforcementofficermayreceivequeryhitmessagesfrom computersinotherstatesor
othercountriesandthusmustmanuallynarrowthoseresponsesbydeterminingwhether
theIPaddressreflects anInternetproviderinhisorherjurisdiction.
TLOdevelopedLimeCrawlerandLimeScannertorunonTLO'sownservers.
LimeCrawlerandLimeScannerareonepieceofsoftwaredividedintotwopartsto
automatetheprocessofinvestigatingtheuseofLimewirepeer-to-peerfile sharing
programs. LimeScannersendsoutthequerymessagesandLimeCrawlerattemptsto
makeadirectconnectionwiththeIPaddressbysendingabrowsehostrequest,askingto
seetheotherfiles thataparticularIPaddresshasmadeavailablefor sharing. These
programsoperateonboththeeDonkeyandtheGnutellanetworks.
NordicMuleis asoftwareprogram,originallydevelopedbylawenforcement
agents inNorway,thatTLOhasmodifiedforuseinamannersimilartoPeerSpectrebut
whichoperatesontheeDonkeynetwork. NordicMulethususestheMD4hashvalue
usedbytheeDonkeynetwork. LikeLimeScannerandLimeCrawler,NordicMuleis
onlyusedinternallyatTLOandresidesonTLO'sservers. Ithastheabilitytoautomate
thebrowsehostfunctionandsubmitresponsestoTLO'sservers,whichthengeneratea
reportoftheresultsforlawenforcement.
TLO'sMediaLibraryallowslawenforcementtoresearchwhetheraparticularfile
haspreviouslybeendeterminedbylawenforcementtocontainpotentialchild
pornography. TheMediaLibrarydatabasecontainsover330,000file entriesandresides
onTLO'sservers. It, however,containsonlyhashvalues,filenames,andfile
information. Itcontainsnoactualfiles orimagesofchildpornography. MediaLibrary
doesnotverifytheaccuracyof thecharacterizationofitsfiles assuspectedchild
pornographybeyondtheinitialprocessbywhichaparticularfile is submittedtoits
8
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 8 of 39
database. Itthus does not and cannot make the legal determination as to whether a
particular file depicts child pornography as the definition of "child pornography" varies
from jurisdiction to jurisdiction.
For each file, Media Library contains all known hash values associated with it
including SHAl, Tiger tree, and MD4 hash values. In this respect, if a file is identified, a
law enforcement officer can gain access to each type of hash value that has been
associated with it. Other publicly available software programs offer this same
functionality. A law enforcement officer may access Media Library even if he or she
chooses not to use Peer Spectre or any ofTLO's other products.
D. Testing of CPS Tools.
In order to test Peer Spectre, programmers used a program called a "packet
capture" that allows a programmer to effectively eavesdrop on the network transmissions
from that program out to the Internet. They then determined whether they could reliably
connect and maintain a connection within a closed network environment to validate
whether the queries were generating appropriate query hit messages. TLO tested Lime
Scanner and Lime Crawler by comparing their performance with Peer Spectre, to
determine whether both types of programs were generating the same leads regarding IP
addresses. TLO concluded that no further testing was necessary as those products are
based upon an existing source code which is the protocol for the networks on which they
operate. Because Nordic Mule was built on the eMule source code by investigators in
Norway, TLO did not test it further.
Mr. Wiltse opined that the reliability of CPS software products has
been established by marketplace acceptance. He explained that each of these programs
uses the same protocol as the networks on which they are based, which offer popular file
sharing programs that would not be used if they did not function as intended.
Defendants challenge Mr. Wiltse's opinion that CPS products are reliable. They
contend that TLO must test and establish a known error rate for CPS products before they
may be used to support a finding of probable cause. Defendants do not, however, suggest
a manner in which such an error rate could or should be established. Since CPS's
9
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 9 of 39
responsesoftwareprogramsarebaseduponthesameprotocolusedbythefile sharing
networktheyinvestigate, itisnotclearwhat,ifany, adjustmentscouldbemadetothem
torenderthemmore"reliable." ThereisnoevidencethatCPSproductsreportfalseor
misleadinginformation. Instead,theyareevidence-gatheringtoolsthatmerelyobtain,
report, andcategorizeinformationregardingfiles thatareavailableforsharingfroma
particularIPaddress. Alawenforcementofficermustthentakefurtherstepsto
determinewhethertheinformationreceivedsupportsaconclusionthatthereisprobable
causetobelievethatevidenceofchildpornographywillbefoundataparticularphysical
address.
E. AffidavitsinSupportofProbableCause.
Ineachofthesecases,lawenforcementusedacommontemplatefortheaffidavits
insupportof probablecausewhichwereusedtoobtainsearchwarrantsforDefendants'
respectiveresidences. Thetemplatewasacollaborativedraftingeffortbyanumberof
lawenforcementofficersandborrowedheavilyfromasearchwarrantaffidavitthathad
beenusedtosecureaVermontstatecourtsearchwarrant. Thetemplatealsoreflected
informationobtainedfromanICEAgentinNewHampshirewhohaddraftedaffidavits
forchildpornographysearchwarrantsinothercases. Ineachof Defendant'scases,law
enforcementdidnotattemptadirectdownloadorabrowsehostfromatargetIPaddress.
Instead, lawenforcementreliedupon"historical"informationtoestablishprobablecause.
Eachsearchwarrantaffidavitrecitestheinvestigativestepsthatweretakenthereafterto
determinetheresidencewithwhichatargetIP addresswasassociated.
DetectiveCorporalGerryEno, identifiedin eachofthesearchwarrantaffidavits
as asourceofinformation,isthecoordinatorofanundercoveroperationsunitthat
investigateschildexploitationcrimes. Allproactiveinvestigationsconductedby
Vermont'sInternetCrimesAgainstChildrenTaskForce("ICAC")fall withinhis
undercoverunitwhichhasbeenperformingpeer-to-peerfile sharinginvestigationssince
approximately2007. Forthisreason,DetectiveEnoreferstopeer-to-peerfilesharing
investigationsas"undercoverinvestigations."
10
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 10 of 39
ICAC maintains a library of files that contain images and videos of child
pornography and their associated hash values. Law enforcement officers may access
ICAC's library or an officer's own agency's library to attempt to determine whether a
particular file contains potential child pornography by comparing the hash values of the
files.
Detective Eno has completed TLO's training course and is licensed to use CPS
products in his jurisdiction. In the course of his training, he and his training class
compared manual search results with those generated by TLO's automated software, and
no discrepancies in the search results were noted. In these cases, he chose a historical
investigation approach using automated software in order to maximize limited
investigative resources and to eliminate the uncertainty of trying to predict when a
particular IP address was online.
Prior to submitting the search warrant applications to the magistrate judge, law
enforcement submitted them to an Assistant United States Attorney for review and
approval. The law enforcement officers who signed the search warrant affidavits
credibly testified that they believed the contents of their affidavits were true and correct
to the best of their knowledge when they submitted them to the magistrate judge. They
further credibly testified that they maintain that same belief notwithstanding Defendants'
challenges. None of the affiants is an expert in computer forensics or claims such status
in his or her affidavit.
Each search warrant affidavit is approximately thirty pages in length with several
pages of attachments. Each contains introductory paragraphs identifying the affiant, the
place to be searched, and the items to be seized. Each affidavit states that the information
contained therein is based on an investigation conducted by the affiant and other law
enforcement agents and states further that: "This affidavit does not contain every fact
known to me with respect to this investigation. Rather, it contains those facts that I
believe to be necessary to establish probable cause for issuance of a search warrant for
the Subject Premises." Ex. 7 at 5; Ex. 8 at 5; Ex. 9 at 5.
11
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 11 of 39
The affidavits cite the criminal statutes alleged to have been violated followed by
a lengthy list of definitions of relevant terms. Thereafter, the affidavits contain
approximately ten paragraphs under the heading "Background on Computers and Child
Pornography" which explain, in some detail, how child pornography crimes are
committed using computers and how evidence of child pornography may be detected on a
computer. The affidavits disclose the use ofthird party software to identify the IP
address of a target computer and to monitor and log Internet and local network traffic
from that IP address.
Each search warrant contains an additional section entitled "Specifics of Search
and Seizure of Computer Systems," which explains how data is extracted from a seized
computer and the technology, resources, and time generally needed for this process.
Defendants' challenges in these cases are primarily directed to a section of the
search warrant affidavits entitled "Background of Investigation." Defendants claim that
this section insufficiently discloses law enforcement's use of automated software from a
third party source; overstates the reliability of hash values; erroneously characterizes the
investigation as "undercover"; and omits facts that would have allowed the magistrate
judge to evaluate the automated software's reliability. The challenged section is
therefore set forth in its entirety with the particular language at issue in bold:
A growing phenomenon on the Internet is peer to peer (P2P) file sharing.
P2P file sharing is a method of communication available to Internet users
through the use of special software. Computers linked together through the
Internet using this software form a network that allows for the sharing of
digital files between users on the network. The Gnutella and eDonkey
networks are two of the most popular file sharing networks today. A
number of software applications support file sharing on the Gnutella and
eDonkey networks. A user first obtains the P2P software, which can be
downloaded from the Internet. In general, P2P software allows the user to
set up file(s) on a computer to be shared with others running compatible
P2P software. A user obtains files by opening the P2P software on the
user's computer, and conducting a search for files that are of interest and
currently being shared on the network. Client programs participating in the
Gnutella or eDonkey networks, such as Limewire, set up their searches by
keywords. The results of a keyword search are displayed to the user. The
user then selects the file(s) from the results for download. The download of
12
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 12 of 39
afile is achievedthroughadirectconnectionbetweenthecomputer
requestingthefileandoneormorecomputerscontainingthefile.
Forexample,apersoninterestedinobtainingchildpornographicimages
wouldopentheGnutellaoreDonkeyP2Papplicationonhislhercomputer
andconductakeywordsearchforfilesusingatermsuchas "preteensex."
ThesearchissentoutoverthenetworkofcomputersusingcompatibleP2P
software. Theresultsofthesearcharereturnedtotheuser'scomputerand
displayed. Theuserselectsfromtheresultsdisplayedthefile(s) heorshe
wantstodownload. Thefile is downloadeddirectlyfromthecomputer(s)
hostingthefile. Thedownloadedfile is storedintheareapreviously
designatedbytheuser. Duringtheinstallationprocesstheclientprogram
canselectapre-determinedfolderforthedownloadedfilestobeplacedin.
Thisfolderisgenerallythe"shared"folder. Theusercanchangethe
downloadlocationatanytime, duringtheinstallationprocessorthereafter.
Thedownloadedfilewillremainuntilmovedordeleted. Usersattempting
totradefiles onaP2Pfile sharingnetworkcanplacefiles fromtheirown
computerinasharedfile directory. TheP2Psoftwareinstalledonthe
computercalculatesthehashvalue(describedbelow)foreachsharedfile
andprovidesthatinformationtootherusers ontheP2Pnetwork.
OneoftheadvantagesofP2Pfilesharingisthatmultiplefiles maybe
downloadedinparallel. Thismeansthattheusercandownloadmorethan
onefile atatime. Inaddition, ausermay downloadpartsofonefile from
morethanonesourcecomputeratatime. Forexample, aLimewireuser
downloadinganimagefilemayactuallyreceivepartsoftheimagefrom
multiplecomputers. Theadvantageofthisisthatit speedsupthetimeit
takestodownloadthefile. Often,however,aLimewireuserdownloading
an imagefilereceivestheentireimagefrom onecomputer. Anotherfeature
ofP2Pfile-sharingnetworksisthebrowsingof(receivealistof)allthe
files aparticularcomputerissharing. TheP2Pprogramallowsuserstosee
all ofthefilesthatanindividualuseris sharing. If thesharingcomputer
is in theprocessofdownloadingfile(s) (incompletefiles), thesefiles do
notappearin thelist. Onlythosethatarecompletelydownloadedand
beingsharedwillbedisplayedinthislist. Ausermayalsoaddotherfiles
intothissharedfile listwhichwerenotdownloadedbythisclient.
TheGnutellaNetworkbasesall ofitsfilesharesontheSecureHash
Algorithm(SHAI). Thismathematicalalgorithmallowsforthe
fingerprintingoffiles. OnceyoucheckafilewithaSHAI hashingutility
capableofgeneratingthisSHAI value(thefingerprint),thatwillbea
fixed-lengthuniqueidentifierforthatfile. TheSecureHashAlgorithmwas
developedbytheInstituteofStandardsandTechnologyandtheNational
13
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 13 of 39
Security Agency. The federal government has adopted the SHAI hash
algorithm as a Federal Information Processing Standard. The SHAI is
called secure because it is computationally infeasible for two files with
different content to have the same SHAI hash value. When a user
browses or views the entire list of files being shared by a computer system
running Limewire (or any other Gnutella Client), the SHAI hash value is
visible and can be logged. One of the P2P networks investigated in this
operation uses the SHAI digital signature to verifY the unique identity of
individual files. A person is able to compare the SHAI hash values of files
being shared on the network to previously identified SHAI hash values of
any file, including child pornography files.
The eDonkey network is a decentralized, peer-to-peer file sharing network
best suited to share big files among users, and to provide long term
availability of files. Like most sharing networks, it is decentralized, as
there is not any central hub for the network; also, files are not stored on a
central server but are exchanged directly between users based on the peer-
to-peer principle.
eDonkey uses a different hash algorithm than the Gnutella network to
identifY files, namely, the MD4 hash algorithm. Files located in a user's
shared directory are processed by the client software, and an MD4 hash
value is computed for each file in the user's shared directory. MD4
verifies the identity of a digital file.
The eDonkey network uses MD4 hash values to improve network
efficiency. As with the Gnutella network, users may receive a selected file
from numerous sources by accepting segments of the file from mUltiple
users and then reassembling the complete file on the local computer. The
client program succeeds in reassembling the file from different sources only
if all the segments came from exact copies of the same file. The network
uses MD4 hash values to ensure exact copies of the same file are used
during this process.
A person is able to compare the MD4 hash values of files being shared on
the network to previously identified MD4 hash values of any file, including
child pornography. Using a publicly available eDonkey client program, a
user can select the MD4 hash value of a known file and attempt to receive
it. Once a specific file is identified, the download process can be initiated.
Once initiated, a user is presented with a list of users or IP addresses that
have recently been identified as download candidates for that file. This
allows for the detection and investigation of computers involved in
14
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 14 of 39
possession,receivingand/ordistributingfiles of previouslyidentifiedchild
pornography.
Whenlawenforcementidentifieschildpornographybeingsharedon
theeDonkeynetwork,itcanhashthefile usingtheSHAldigital
algorithmanddetermineitsSHAlvalue. Oncethehashvalueis
convertedtoSHA1,lawenforcementcansearchforthefile onthe
Gnutellanetwork. Forthepurposesofthisinvestigation,law
enforcementneedstoconverttheeDonkeyhashvaluetoSHAlbecause
itis abletosearchforfiles byhashvalueonlyontheGnutellanetwork.
AP2PfiletransferisassistedbyreferencetoanIPaddress. Thisaddress,
expressedas fournumbersseparatedbydecimalpoints, is uniquetoa
particularcomputerduringanonlinesession. TheIPaddressprovidesa
uniquelocation,makingitpossiblefordatatobetransferredbetween
computers.
Thecomputerrunningthefile sharingapplicationhasanIPaddress
assignedtoit whileitisontheInternet. Investigatorsareableto seetheIP
addressofanycomputersystemsharingfiles. Investigatorscanthensearch
publicrecordsthatareavailableontheInternettodeterminetheInternet
serviceproviderwhohasassignedthatIP address. BasedupontheIP
addressassignedtothecomputersharingfiles, subscriberinformationcan
beobtainedfromtheInternetserviceprovider. ByexaminingalistofIP
addressessharingfiles, lawenforcementcanlocatecomputersthatare
reportedto beinVermont. BycomparingtheSHAldigitalsignaturesto
files thataresharedbytheVermont-basedcomputers,investigators
knowthatthesecomputersaresharingfiles knowntodepictthesexual
exploitationofchildrenontheP2Pnetwork.
Aspartof thisoperation,DetectiveCorporalGerryEnooftheVermont
InternetCrimesAgainstChildren(ICAC)TaskForceandtheSouth
BurlingtonPoliceDepartmentconfirmedthateach[SHAl]valueofinterest
totheinvestigationactuallyrepresentsanimageormoviethatdepictschild
pornography. DetectiveCorporalEnodidthisbyviewinganimageor
moviewiththesameSHAlsignatureasthesharedfile. Detective
CorporalEnolocatedtheimageormovieintheVTICACdatabase,or
otherwiseobtainedacopyfromanothersource(ormultiplesources)on
theP2Pnetwork.
Duringthisinvestigation,lawenforcementusedsoftwarethat
automatestheprocessofsearchingforcomputersinVermontthatare
suspectedofsharingimagesorvideosdepictingchildpornographyon
15
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 15 of 39
P2Pnetworks. Thissoftwareis designedto replacethesearchesthat
werepreviouslydonemanuallybylawenforcementandthepublic.
Thesoftwarereportsinformationthatis discoverablebythegeneral
publicusingpubliclyavailableP2Psoftware. Investigatorswhohave
accesstothissoftwarephysicallyactivatethesoftwareinordertobegin
thesearchprocesswhichthenautomaticallyreadsthepublicly
availableadvertisementsfromcomputersthataresharingfiles
depictingchildpornography. Thesoftwarereadstheoffersto
participateinthesharingofchildpornographyandlogstheIP
address,time,date,SHAIvalues,and[file name] ofeachindividual
computerinthesamewayeverytime. Lawenforcementhasvalidated
thissoftwarebyrunningidenticalsearchtermsthroughthemanual
methoddescribedaboveandhaveconfirmedthatthesoftware
performsinthesameway.
Ex. 7at 21-33;Ex. 8at 21-33;Ex. 9at 21-33 (emphasissupplied).
Defendantsfurtherchallengeaportionof thesearchwarrantaffidavitsinasection
entitled"ProbableCause"whichexplainshowinDecemberof2011, DetectiveCorporal
Eno"wasconductingundercoveroperations"onanidentifiedfile sharingnetworkand
notedthatanidentifiedIPaddresshadpreviouslysharedfiles identifiedbytheirhash
valuesas containingchildpornography. Ex. 7at 34;Ex. 8at 34, Ex. 9at 34. The
affidavitsnotethatDetectiveEno"determined"the SHAI hashvaluesfor certainof these
files "andwasabletoviewthem,eitherbysearchingfor anddownloadingthemonthe
Gnutellanetworkorbylocatingthemwithinalibraryoffiles andassociatedSHAI hash
valuesmaintainedbytheVermontInternetCrimesAgainstChildrenTaskForce." Ex. 7
at 35;Ex. 8at 34;Ex. 9at 34.
Eachofthesearchwarrantaffidavitsthereaftercontainsadescriptionof the
allegedchildpornographyofferedtobeshared, informationregardingtheIPaddress, and
lawenforcement'seffortstoidentifyaspecificresidenceassociatedwiththeIPaddress.
F. ComputerForensicsExpertTamiLoehrs.
TamiLoehrstestifiedas anexpertincomputerforensics onbehalfof Defendants
NealeandLeikert. SheperfonnednoworkonbehalfofDefendantThomas. The
governmentdidnotchallengeherqualificationstotestify. Sheisbothacertified
16
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 16 of 39
computerforensicexaminerandaprivateinvestigator. Shehastestifiedas acomputer
forensicsexpertapproximatelyseventy-fivetimes.
Ms.Loehrswasaskedtopreparean expertreportintheNeale casewhichwas
admittedas ExhibitB. HerdeclarationintheNeale casedatedDecember20,2012was
admittedasExhibitC. Ms.Loehrswasnotaskedtopreparean expertreportinthe
Leikert case,althoughshesubmittedadeclarationwhichwasadmittedintoevidenceas
Exhibit 16.
Ms.Loehrs'sdeclarationsfiled inNeale andLeikert aremisleadinginseveral
respects. Forexample, ineachofthem,Ms.LoehrsstatedthatsheneededtotestPeer
Spectresoftwarebecause"thisis theverysameautomatedsoftwareusedbylaw
enforcementinnumerouscasesthroughoutthecountryinwhich1havebeeninvolvedas
adefenseexpert. Thesecaseshavebroughttolightseriousconcernswithregardtothe
...softwareusedbylawenforcementduringundercoverP2Pinvestigations[.]" Ex.C
at 10;Ex. 16 at II. Shefurthertestifiedthatpeer-to-peersoftwareis notvalidated,
tested,orreliable,notingspecificallythat"PeerSpectreinanysearchingdoesrelyonthe
reliabilityof thesenetworksthatwe'researching. Andthesenetworksarehorribly
unreliable." (Tr.7/30/13 at73.) Sheconcededthatthereisnoavailableprotocol for
testingpeer-to-peerfile sharingsoftware. Shecitesnocourtandnolearnedtreatiseor
peer-reviewedresearchthathasendorsedherconcerns. Shealsocitednoevidencethat
anycourthas grantedamotiontosuppressbasedonhertestimonyorhasexpressed
"seriousconcerns"withlawenforcement'suseofPeerSpectreorwithanyotherCPS
products.
Asaprefacetoalistoftwenty-fivecasesidentifiedin herdeclarations,Ms.
Loehrsstates: "Ihavealsolearnedthroughhundreds offorensicexaminationsoncases
involvingundercoverP2Pinvestigationsandallegationsofchildpornography,thatfiles
arebeingidentifiedbylawenforcement'sautomatedsoftwareascontainingchild
pornographywhen, in fact, theydonot." Ex. Cat 19;Ex. 16 at'120. However,noneof
thecaseslistedin Ms. Loehrs'sdeclarationsappearedtohaveresultedinajudicial
findingtothateffect. TotheextentMs. Loehrsreliesonherfindings intheNeale and
17
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 17 of 39
Leikert casesforthisstatement,sheconcedesthatthereareadditionalfacts, notdisclosed
inherdeclarationsorreport,whichmayexplainherfindings.
Inherdeclaration filed intheNeale case,Ms. Loehrsstatedthatshedidnotfind
thefiles identifiedintheNeale searchwarrantaffidavitonDefendantNeale'scomputer
whensheexaminedit. Shefurtherassertsthatthegovernment'sforensicexaminationof
theevidencedidnotrevealthosefiles onDefendantNeale'scomputer. However, on
cross-examination,sheacknowledgedthatotherevidenceof possessionofchild
pornographywasfoundbythegovernmentonDefendantNeale'scomputerincluding
variationsofthefilenamesinthesearchwarrantaffidavit(appendedwithadifferent
numberattheendof thefile name). Thisinformationisnotincludedineitherherreport
ordeclaration.
Similarly,inLeikert, inherdeclarationMs.Loehrsnotedthatthespecificimages
identifiedintheLeikert searchwarrantapplicationwerenotlaterfoundonDefendant
Leikert'scomputer. Sheagainnotesthatthegovernment'sforensicreportreflectsthe
samefinding. Oncross-examination,however,sheacknowledgedthatMr.Leikertre-
installedtheoperatingsystemofhiscomputerbeforethesearchwarrant'sexecution. In
suchevent,sheacknowledgesthatanypre-existingfiles wouldbedestroyed. Again,this
factwasnotdisclosedinherdeclaration.
Ms.LoehrsopinedthataSHAI valueisnotareliableindicatorofafile's
contentsandthatmorethanonefilemayhavethesameSHAIvalue. Shelaterclarified
hertestimonytoacknowledgethatshehadpersonallyneverseenorheardofaSHAI
valuecolliding, andsheacknowledgedthattwofileswiththesameSHAI valuecannot
havedifferentcontent. (Tr. 7/30/13 at86,87.) Sheassertedasimilaropinionwithregard
totheMD4hashvalue,butdidnotcitetoanyspecificinstancesofcollisionsorany
researchthathas found anMD4hashvaluecannotreliablybeusedto identifyafile's
contents.
AlthoughMs.Loehrstestifiedthatinorderfor apersontoobtainchild
pornographyfiles usingapeer-to-peerfile sharingprogram,"[t]ypicallytheyhavetobe
selectedsomehow"(Tr.7/30/13 at 139), shefurthertestifiedthatfora"numberof
18
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 18 of 39
reasons," an individual may have a SHAI value for a child pornography file on his or her
computer without having intentionally downloaded the file. (Tr. 7/30/13 at 56.) She
explained that "SHA values and files names can be downloaded onto your computer
while you're downloading other files that have nothing to do with those. They could get
on your computer because of viruses, Trojans, hackers. [A]nyone who has kids at home
who used the computer to download stuff they could be getting SHA values and file
names on your computer. There's a multitude of ways those can be on there." Id. She
disagrees with Mr. Wiltse's testimony that a virus cannot be embedded in an image file,
although she testified that: "I don't know if I've specifically seen one embedded in an
image file myself. [B]ut it, it's absolutely out there. All you have to do is go to the virus
protection software and they'll tell you about them. 1 don't know that 1 have
specitically-I can't recall an instance where 1 know ofa virus embedded in an image
file but, yes, it's possible." (Tr. 7/30/13 at 83-84.) At the prompting of defense counsel,
Ms. Loehrs then recalled one instance in which she allegedly witnessed a virus embedded
in a video file. Here, the court need not decide whether Ms. Loehrs's testimony is
credible and sufficiently reliable because there is no evidence before the court that the
evidence of alleged child pornography discovered on Defendants' computers was the
product of a virus or by any other unintentional means or process. Even if such evidence
existed, it may provide a defense to the merits of the case, but it would not preclude a
finding of probable cause.
The most troubling aspect of Ms. Loehrs's expert opinions in this case is her
reliance on her work in other cases which was either disproved or rejected. For example,
she testified that "it is evident from my investigation that Peer Spectre has the ability to
identify files that are not publicly available" (Tr. 7/30113 at 117) and that "[a]ll of my
testing, research, communication with other experts in the field that have found the very
same thing" support her conclusion that "SHA values and files names that exist in [a
computer's] hidden system files regardless of [ whether] they are associated with file
sharing are being reported as actual shared files when in fact they are not and may have
never been." (Tr. 7/30113 at 61.) From her perspective, "that's the issue, [it] is the
19
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 19 of 39
communicationbetweencodeandcodeintothesehiddenfiles. It'snotwhattheuseris
seeingintheirso-calledsharedfolder." [d. ShecitedanarticleauthoredbyJoseph
LithwaitandVictoriaSmiththatpurportedlystatesthatacomputer'sfileurns.cacheholds
the SHAI valueofsharedfiles wheninactualityitholds SHA1valuesoffilesthathave
beendeleted. Shealso"created"ascreenshotbymanuallyplacingincomplete,empty,
andpreviewfiles (frombothPhexandLimewire)inasharedfoldertodemonstratewhat
shehas allegedlypreviouslyseeninhercomputerforensics career.
InsupportoftheopinionssheoffersinNeale andLeikert, Ms.Loehrsrelies
heavilyonherworkintwostatecourtcases. ShecitesherforensicworkinState of
Arizona v. Lemuel Robson, inwhichMr. Robsonhadhisfile sharingturnedoff atthe
timePeerSpectreidentifiedfilesavailableforsharing. Inherdeclarationfiledinthe
Leikert case,shequeries: "Withsharingturnedoff,nothingonRobson'scomputershould
havebeenpubliclyavailableandthequestion[]remains, 'howdidlawenforcement's
softwareidentifYthosefiles?'" Ex. 16at 26. SheconcludesthatPeerSpectremust
haveidentifiedMr.Robson's"private"files. However,incross-examination,Ms.Loehrs
concededthatMr. RobsonhadaroommatewhosecomputerusedthesamerouterandIP
address. Sheinitiallytestifiedthatshedidnotrecallwhethertheroommate'scomputer
containedtheimagesofsuspectedchildpornographyidentifiedinlawenforcement's
investigationandtestifiedthatshedidnotrecallthefacts of theRobson case. (Tr.
7/30113 at 124-25.) Afterreviewingthegovernment'sforensic investigationreportin
Robson, Ms.Loehrsconcededthatthereportindicatedthattwofiles ofsuspectedchild
pornographyfoundbytheinvestigatingofficerwereinfactfoundontheroommate's
computer. (Tr.7/30/13 at 119-20.) Thesefacts wereomittedfromherdescriptionof her
workintheRobson caseinherdeclarationsfiledinthiscase. Ms.Loehersultimately
agreedthatafilemustbemadeavailablefor file sharingeitherbyauserorbythedefault
settingsoftheuser'ssoftwareprogrambeforeitwillbeshared.
2
2 Question: "Soyouadmitthatjustbecausethereisdatainacomputerinvariousplaces,various
systemsfilesasyouputit, thatdoesn'tmeanthatit'savailablefor sharingalways?"
20
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 20 of 39
Ms. Loehrs further relies on what she described as "very formal testing" (Tr.
7/30113 at 19) she allegedly performed at the request of the court in State ofArizona v.
Robert Dean Moran, CR2009-114677 -001 SE (Maricopa County Superior Court Sept.
11,2012). Defendants introduced into evidence without objection a report ofP2P file
sharing testing dated September 28, 2011 that Ms. Loehrs prepared for the Moran case,
as well as her affidavit submitted to the Moran court. In Moran, Ms. Loehrs performed
testing which she claims revealed that a browse host function can show as available for
sharing partial, incomplete, deleted, and corrupt files. She further testified that her
testing in Moran revealed that "child pornography was actually created in a hidden
system folder that the user doesn't have access to," which was a video file with a virus.
(Tr. 7/30113 at 78.)
Ms. Loehrs testified that she has not read the Moran court's opinion although it
was provided to the attorneys who called her as a witness in this case. The court finds
Ms. Loehrs's claim in this respect either incredible or reflective of a lack of concern
regarding the reliability of the opinions she is offering under oath. Many of the opinions
advanced by Ms. Loehrs in the Neale and Leikert cases were the same opinions she
advanced in Moran. The Moran court squarely rejected those opinions, finding that "Ms.
Loehrs ... could not explain her own testing methods based on her screenshots she
provided" and that, "[0]verall, [Ms. Loehrs] provided testing screen captures to this Court
that were inaccurate, incomplete, and thus misleading as they did not fully set forth in
detail the testing she asserts ... supports her contention that there are flaws with the Peer
Spectre program." Moran, at 9. The Moran court further rejected Ms. Loehrs's
testimony that "a SHA-l value or Hash Value of an image was not reliable and thus
dangerous for a [d]etective to use as a basis for probable cause" and specifically rejected
Ms. Loehrs: "I've never said that that's the case. Only if it's in a file sharing system file that's
being read by other file sharing."
Tr. 7/30/13 at 137.
21
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 21 of 39
herconclusionthatasinglesourcedownloadwasrequiredtoestablishprobablecause.
Id. at 10. AstheMoran courtobserved:
Ms.Loehrsuses heropinionaboutsinglesourcedownloadstofurther
support...hercontentionofthelackof probablecauseinthiscase. To
thatend,Ms. Loehrstestifiedthatasinglesourcedownloadisrequiredto
provethattheDefendantwas inpossessionofthechildpornography,she
howevercouldnottellthisCourtwhereshelearnedthis information. Nor
couldshetellthisCourtthetrainingorthepersonfromwhomshelearned
thisrequirement. Ms. LoehrsfurtherfailedtoprovidethisCourtwithany
information,beittrainingmaterials,caselaw, orotherwise,thatassertsthat
officersarerequired toperformsinglesourcedownloadsoftheir
investigations.
Onceagain,Ms. Loehrshasproveninaccurateas allof theofficerswho
testifiedbeforethisCourt,includingState'sExpertCorporalErdely,
indicatedthatthereisnorequirementofofficerstoperformasinglesource
downloadofanimage.
* * *
Ms.LoehrstestifiedandsworeinheraffidavittothisCourt,thatthe
VictoriaSmitharticlesubmittedas evidencearticulatedtherequirementfor
asinglesourcedownload. Ms.Loehrsfurtherindicatedthatthearticle
supportedherclaimsthatincomplete,deleted,corruptedandemptyfiles
willshowinthePeertoPeernetworkdownloadsas files availablefor
sharing. Ms.Loehrs['s]contentionisthattheseincompletefiles, corrupted
files, partialfiles, wouldshowinthefileurns.cacheas availableforsharing.
TheVictoriaSmitharticleclearlystatesotherwise. Infact, thearticleis
certainthatthesefiles wouldgointothedownloads.datfile andnotshowas
availableforsharing. Ms.Loehrsultimatelyconcededthatthesworn
statementsinheraffidavittothisCourtabouttheVictoriaSmitharticledo
notsupporttheargumentssheclaimed.
Id. at 10-11 (internalcitationsomitted).
InlightoftheMoran court'srejectionof Ms.Loehrs'sexpertopinions,sheshould
nothavereliedontheMoran testinginthis case. Onbalance,Ms.Loehrsprovidedlittle,
ifany,credibleorreliabletestimonytosupportherexpertopinionsinthis case.
Accordingly,thecourtdoesnotrelyonheropinionsinreachingitsconclusions.
22
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 22 of 39
G. ComputerForensicsExpertLaurieMintzer.
DefendantThomascalledLaurieMintzeras anexpertwitnessincomputer
forensics. ThegovernmentdidnotchallengeherqualificationstotestifY. Ms.Mintzer
performedaforensic examinationofDefendantThomas'scomputeranddeterminedthat
peer-to-peerfile sharingsoftwarewasactiveonhis computer,thatFrostWireonce
existedonhiscomputer,thatShareazaonceexistedonhiscomputer,andthatwhile
eMuledownloadswerefound, therewasnoreferencetotheminthecomputer'sprogram
file. Shewas able tolocateoneof thefiles identifiedinlawenforcement'ssearch
warrantaffidavitonMr.Thomas'scomputer,butdidnotfinditinasharedfolder. She
opinedthatitwaspossiblethatthefile wasneverinasharedfolderiflawenforcement
was sendingoutaquerysimultaneouslywithDefendantThomas'sdownloadingofthe
file. (Tr. 7/30/13 at 164.) Shefurthertestifiedthatfilesthatareinthemidstofbeing
downloadedcouldbeshownas availableforsharingeventhough, in themidstofa
download,theyareincomplete. However, sheconcededthatnoactualsharingwilltake
placeunlessthedownloadis completeandthefile ismadeavailableforsharing. She
contendsthatanactualdownloadofthefile andanexaminationofits contentsis a"better
way"tovalidatePeerSpectre. (Tr. 7/30113 at 174.) Shecitednoresearchorauthority
forthisopinion.
AlthoughMs. MintzerhadneverseenacollisionwithaSHAI value,shereadan
articlewhichdescribedhowa"ProfessorWong,Wong orWang"showedthe
"possibility"that"withbruteforce" aSHAIhashvaluecouldbecompromised. (Tr.
7/30113 at 170, 171.) Ms.Mintzerdidnotprovideacopyof thisarticletothecourt,and
thecourthasnootherinformationregardingitsexistence.
ThecourtacceptsMs. Mintzer'sopinionthatacomputerinthemidstof
downloadingafilemayindicatethatthefileis availableforsharingwheninfactit isnot
untilthedownloadis complete. ThecourtrejectstheremainderofMs. Mintzer's
opinionsas unsupportedbyreliableevidence.
23
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 23 of 39
II. ConclusionsofLawandAnalysis.
EachoftheDefendantsarguesthatlawenforcementengagedinawarrantless
searchoftheprivateareasoftheirrespectivecomputers. Thecourtthusconsiders
whethera occurredintermsoftheFourthAmendment ifso, whetherthe
absenceofawarrantrenderedthatsearchunconstitutional. Ifawarrantlesssearchdid
notoccur,Defendantsmaintainthatsuppressionoftheevidencederivedfromthesearch
warrantsremainsappropriatebecauselawenforcementintentionallyorrecklesslymisled
the magistratejudgebyincludingmaterialmisstatementsandomissionsoffactinthe
supportingsearchwarrantaffidavitswhich,ifcorrected,defeatafindingofprobable
cause.
A. StandardofReview.
"Itiswellestablishedthattheburdenofproductionandpersuasiongenerallyrest
uponthemovantinasuppressionhearing." United States v. Arboleda, 633 F.2d985,989
(2dCir. 1980)(internalquotationmarksomitted);see also United States v. Joseph, 332
F. Supp. 2d571, 574 (S.D.N.Y. 2004)(same). "Themovantcanshifttheburdenof
persuasiontotheGovernmentandrequireittojustifYits search, however,whenthe
searchwasconductedwithoutawarrant." Arboleda, 633 F.2dat989;Joseph, 332F.
Supp.2dat574 ("[B]oththeSupremeCourtandSecondCircuithaveheldthatthereare
situationswheretheburdenofpersuasionatasuppressionhearingcanshifttothe
Governmenttoprove, by apreponderanceof theevidence,thattheprofferedevidenceis
valid.")(summarizingcases). "[T]hecontrollingburdenofproofatsuppressionhearings
shouldimposenogreaterburdenthanproofbyapreponderanceoftheevidence." United
States v. Matlock, 415 U.S. 164, 177 n.l4(1974).
B. WhetherLawEnforcementObtainedPrivateInformationfrom
DefendantsThroughaWarrantlessSearch.
Theaffidavitsstatethatalawenforcementofficerperformedaninvestigationof
peer-to-peerfile sharingusingautomatedsoftwaretodeterminewhetherIPaddressesin
hisorherjurisdictionhadofferedtosharefiles indicativeofchildpornography.
Defendantsarguethatthesoftwareactuallyhastheabilitytoaccessprivateinformation
24
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 24 of 39
whichDefendantsdidnotmakeavailablefor sharing. Afteralengthyevidentiary
hearing,thereis nofactual supportforthisclaim. Instead,theevidenceoverwhelming
demonstratesthattheonlyinformationaccessedwasmadepubliclyavailablebytheIP
address orthesoftwareit wasusing. Accordingly,eitherintentionallyorinadvertently,
throughtheuseofpeer-to-peerfile sharingsoftware,Defendantsexposedtothepublic
theinformationtheynowclaimwasprivate.
TheSupremeCourthasrepeatedlyexplainedthat"apersonhasnolegitimate
expectationofprivacyininformationhevoluntarilyturnsovertothirdparties." Smith v.
Maryland, 442U.S. 735, 743-44(1979);Katz v. United States, 389U.S. 347, 351 (1967)
("Whatapersonknowinglyexposestothepublic,eveninhisownhomeoroffice,is not
asubjectofFourthAmendmentprotection"). InSmith, thegovernmentinstalledatthe
telephonecompany'sheadquartersa"penregister"thatrecordedthenumbersdialedona
certaintelephone;thepenregister, however, didnotrecordthecontentofthephonecalls.
Smith, at736n.l,737, 741. TheCourtconcludedtherewasnolegitimateexpectationof
privacyinthenumbersthedefendantdialed, reasoning: "First,wedoubtthatpeoplein
generalentertainany actualexpectationofprivacyinthenumbersthey dial. All
telephoneusersrealizethattheymust'convey'phonenumberstothetelephone
company, sinceitis throughtelephonecompanyswitchingequipmentthattheircallsare
completed." Id. at742. "Second,evenif[thedefendant] didharborsomesubjective
expectationthatthephonenumbershedialedwouldremainprivate,this expectationis
notonethatsocietyis preparedtorecognizeas reasonable." Id. at 743-44(internal
quotationmarksandcitationsomitted).
TheSmith Courtanalogizedthefacts beforeittothoseatissuein United States v.
Miller, 425 U.S. 435 (1976),whereintheCourt"heldthatabankdepositorhasno
'legitimateexpectationofprivacy' infinancial information'voluntarilyconveyedto
banksandexposedtotheiremployeesintheordinarycourseofbusiness.'" Smith,442
U.S. at744. (quotingMiller, 425 U.S. at442.) TheCourtexplained"thattheFourth
Amendmentdoesnotprohibittheobtainingofinformationrevealedtoathirdpartyand
conveyedbyhimtoGovernmentauthorities, eveniftheinformationis revealedonthe
25
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 25 of 39
assumptionthatitwillbeusedonlyforalimitedpurposeandtheconfidenceplacedinthe
thirdpartywillnotbebetrayed." Miller, 425 U.S. at443. TheMiller Court'sanalysis
"dictate[d]"theresultinSmith: "Whenheusedhisphone, [thedefendant]voluntarily
conveyednumericalinformationtothetelephonecompanyand'exposed'that
informationtoits equipmentintheordinarycourseofbusiness. Insodoing, [the
defendant]assumedtheriskthatthecompanywouldrevealtopolicethenumbershe
dialed." Smith, 442U.S. at744. Asimilarconclusioniswarrantedhere.
Defendantsconveyedcertaininformationtothepublicwhentheyusedpeer-to-
peerfile sharingsoftwareandmadecertainfiles availableforsharing. Thisincludesfiles
thattheywereinthemidstof downloadingeveniftheylaterintendedtomaintainthose
files inaprivate,non-sharedfolderwhenthedownloadwascomplete. Accordingly,the
onlyquestioniswhetherDefendantsmaintainedareasonableexpectationofprivacyin
thefaceofpublicdisclosureofthatinformation.
Thefederal courtsofappealsthathaveexaminedtheprivacyimplicationsof
searchingpeer-to-peernetworksforfiles potentiallycontainingchildpornographyhave
concludedthatasearchofpubliclyavailableinformationdoesnotviolateacomputer
user'sreasonableexpectationofprivacy. Forexample, in United States v. Borowy, 595
F.3d1045 (9thCir. 2010),theNinthCircuitrejectedtheargumentthatthedefendanthad
areasonableexpectationof privacyinfilesthatweresharedonapeer-to-peerfilesharing
site, eventhoughthedefendantintendedtomaintainthefilesasprivate. See id. at1048
("[Defendant's]subjectiveintentionnottosharehis files didnotcreateanobjectively
reasonableexpectationof privacyintheface ofsuchwidespreadpublicaccess."). The
Borowy courtalsoaddressedwhetheruseofaforensicsoftwareprogram,whichisnot
availabletothepublic,rendersthesearchunlawful,andconcludedthatitdidnot. See id.
(describingthesoftwareas "function[ing]simplyas asortingmechanismtopreventthe
governmentfromhavingtosift,onebyone,through[thedefendant's] alreadypublically
exposedfiles,,).
3
3 DefendantspointoutthattheBowory courtobservedthat"wheretheinformationwasnot
alreadyexposedtothepublicatlarge,wherethehash-markanalysismightrevealmorethan
26
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 26 of 39
Other circuits have reached similar conclusions. See United States v. Norman, 448
F. App'x 895,897 (lIth Cir. 2011) (concluding that search of defendant's computer did
not constitute an unlawful search because "the contents of the shared folder on
[defendant's] computer were knowable to law enforcement without physical intrusion
in [to] [defendant's] house because this information was also available to members of the
public"); United States v. Stults, 575F.3d 834,843 (8th Cir. 2009) (concluding that
defendant "had no reasonable expectation of privacy in files that the FBI retrieved from
his personal computer where [defendant] admittedly installed and used Limewire to make
his files accessible to others for file sharing"); United States v. Perrine, 518 F.3d 1196,
1205 (lOth Cir. 2008) (concluding defendant had no expectation of privacy in his
subscriber information because "he had peer-to-peer software on his computer, which
permitted anyone else on the internet to access at least certain folders in his computer,"
and "such access could expose his subscriber information to outsiders."). Lower courts
have also found that software utilized by law enforcement officers to investigate files
shared on peer-to-peer file sharing sites permits "no greater access to other users' shared
files than any other Gnutella client." United States v. Gabel, 2010 WL 3927697, at *2
(S.D. Fla. Sept. 16,2010), adopted, 2010 WL 3894134 (S.D. Fla. Oct. 4, 2010)
(examining ShareazaLE software).
Courts that have specifically considered Peer Spectre have found the evidence it
gleans admissible. See United States v. Willard, 2010 WL 3784944, at *3 (E.D. Va. Sept.
20, 2010) (denying motion to suppress and ruling Peer Spectre "did not constitute a
wiretap because the software does not intercept electronic communications" but instead
"reads publicly available advertisements from computers identified as offering images of
whether a file is known child pornography, or where the government 'vacuumed' vast quantities
of data indiscriminately we might find a Fourth Amendment violation." Bowory, 595 F.3d at
1048 n.2. Defendants argue that their cases are of the type that the Bowory court declined to
address because law enforcement accessed system files on their computers, and thus recorded
information about files that the users expressly decided not to make public. However, there is no
evidence that law enforcement accessed any private system files on any of the Defendants'
computers. Defendants' legal argument that these cases fall within the Bowory exceptions thus
lacks a factual basis.
27
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 27 of 39
childpornographyfor distributionandidentifiestheirIP see also United
States v. Driver, 2012WL 1605975,at*2 (E.D.Mich. May 2012)(explainingresults
oflawenforcement'sundercoverinvestigation,notingthatPeerSpectre"Iook[s] forfiles
usingknownsearchterms"andcaptures"IPaddress,date/time,hashvalue,[and]
filename"ofsuchfiles, andrulingthatthisevidenceisadmissibleagainstacriminal
defendantas inextricablyintertwinedwiththechargedchildpornographyoffense).
Defendantscitenoauthorityforthepropositionthattheyretainedareasonable
expectationofprivacyintheinformationobtainedbyPeerSpectreoranyotherCPS
product.
Becausethereisnoevidencethatlawenforcement'suseofautomatedsoftware
reachedinformationonDefendants' computersthatwasnotmadeavailableforsharing
bythepublic,Defendants'motionstosuppressonthebasisofawarrantlesssearchin
violationof theFourthAmendmentmustbeDENIED.
C. WhetherFranks RequiresExclusionofCertainInformationand
Whether,If Excluded,theSearchWarrantsLackProbableCause.
TheFourthAmendmentprovidesthat"noWarrantsshallissue, butuponprobable
cause,supportedbyOathoraffirmation,andparticularlydescribingtheplacetobe
searched,andthepersonsorthingstobeseized." U.S. CONST. amend. IV. Amagistrate
judgemust"makeapractical,common-sensedecisionwhether,givenallthe
circumstancessetforth intheaffidavitbeforehim, ...thereis afairprobabilitythat
contrabandorevidenceofacrimewillbefound inaparticularplace." Illinois v. Gates,
462U.S. 213,238(1983). "Asearchwarrantaffidavitispresumedreliable." United
States v. Klump, 536F.3d 113, 119(2dCir.2008). "[T]hetaskofareviewingcourtis
simplytoensurethatthe'totalityofthecircumstances' affordedthe[issuingjudge] 'a
substantialbasis' formakingtherequisiteprobablecausedetermination." United States
v. Clark, 638FJd89, 93 (2dCir. 2011)(quotingGates, 462U.S. at238).
DefendantsciteFranks v. Delaware, 438U.S. 154 (1978),insupportoftheir
contentionthatthesearchwarrantaffidavitsintheirrespectivecasescontaindeliberately
orrecklesslyfalsestatementsoromissionswhich,ifcorrected,defeatafindingof
28
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 28 of 39
probablecause. To secureaFranks hearing,Defendantsmustmakea"'substantial
preliminaryshowing' thatadeliberatefalsehoodorstatementmadewithreckless
disregardforthetruthwasincludedinthewarrantaffidavitandthestatementwas
necessarytothejudge'sfindingofprobablecause." United States v. Falso, 544F.3d
110, 125 (2dCir. 2008)(quotingFranks, 438U.S. at 155-56, 170-71).
Asearchwarrantaffiant"doesnotnecessarily actwith'recklessdisregardforthe
truth' simplybecauseheorsheomitscertainevidencethatareviewingcourt, inits
judgment,considerstobe"clearlycritical." United States v. Rajaratnam, 719F.3d139,
154(2dCir.2013). "Rather,thereviewingcourtmustbepresentedwithcredibleand
probativeevidencethattheomissionofinformation"inthesearchwarrantapplication
"was'designedtomislead' orwas 'madeinrecklessdisregardof whether[it] would
mislead.'" ld. (alterationinoriginal)(quoting United States v. Awadallah, 349F.3d42,
68(2dCir. 2003)). Thisis asubjectiveinquiry:
Toproverecklessdisregardforthetruth,thedefendants[must]provethat
theaffiantinfactentertainedseriousdoubtsastothetruthof his
allegations. Becausestatesofmindmustbeprovedcircumstantially,a
factfindermay inferrecklessdisregardfrom circumstancesevincing
obviousreasonsto doubtthe veracityoftheallegations.
ld. (quoting United States v. Whitley, 249F.3d614,621 (7thCir.2001)).
Informationomittedfrom anaffidavitismaterialonlyifitaffectsafinding of
probablecause. Inotherwords,awarrantisinvalid"only iftheaffidavitas
supplementedbytheomittedmaterialcould not havesupportedtheexistenceof probable
cause." United States v. Lueth, 807F.2d719,726(8thCir. 1986);see also United States
v. Garza, 980F.2d546,551 (9thCir. 1992)(refusingtosuppressevidencewhen, "[e]ven
if themisstatementswerecorrectedandtheomissionssupplied,theaffidavitwould
furnishprobablecause forissuanceofthewarrant").
DefendantsseektosatisfytheirinitialburdenunderFranks bypointingtoan array
ofstatementsin, andomissionsfrom, thesearchwarrantaffidavitswhichtheycontend
areeitherfalse ormisleading. ManyofDefendants' challengesmaybedismissed
29
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 29 of 39
summarilyastheyareeitherunsupportedby.thefacts orhavenopotentialtoaffecta
determinationof probablecause.
1. Franks ChallengesWhichAreNotSupportedbyaFalseor
MisleadingStatementOrOmission.
DespiteDefendants' argumentstothecontrary, lawenforcementdisclosedtothe
magistratejudgeitsuse ofautomatedsoftwareinconductingitsinvestigationsandthe
informationderivedtherefrom:
[L]awenforcementusedsoftwarethatautomatestheprocessofsearching
forcomputersinVermontthataresuspectedof sharingimagesorvideos
depictingchildpornographyonP2Pnetworks. Thissoftwareisdesignedto
replacethesearchesthatwerepreviouslydonemanuallybylaw
enforcementandthepublic. Thesoftwarereportsinformationthatis
discoverableby thegeneralpublicusingpubliclyavailableP2Psoftware.
Investigatorswhohaveaccesstothissoftwarephysicallyactivatethe
softwareinordertobeginthesearchprocesswhichthenautomatically
readsthepubliclyavailableadvertisementsfrom computersthataresharing
files depictingchildpornography. Thesoftwarereadstheoffersto
participateinthesharingofchildpornographyandlogstheIP address,
time,date, SHAIvalues,andfile nameofeachindividualcomputerinthe
samewayeverytime. Lawenforcementhasvalidatedthissoftwareby
runningidenticalsearchtermsthroughthemanualmethoddescribedabove
andhaveconfirmedthatthesoftwareperformsinthesameway.
Ex. 7at 33;Ex. 8at 33;Ex. 9at 33. Defendantsnonethelesscontendthatlaw
enforcementshouldhavealsodisclosedthattheautomatedsoftwaregenerated
informationwhichwas senttoathirdpartydatabasewhichthenproducedareportthat
wastransmittedtolawenforcementfor furtherinvestigation. Notablyabsentfrom
Defendants' briefsisanycitationtoany instanceinwhichsuppressionwasgrantedon
thisbasis. Defendantsaresimplyincorrectintheirfurtherassertionthatallofthe
informationsetforth intheaffidavitswasacquiredfrom athirdpartysourceandnoother
investigationwasperformed. Eachaffidavitidentifiesthestepslawenforcementtookto
verifyandcorroboratetheinformationreceivedfromtheautomatedsoftware.
Defendantsfurthercontendthatlawenforcementwasobligatedtoadvisethe
magistratejudgeof thenamesof eachof theautomatedsoftwareprogramsused,howand
30
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 30 of 39
from whom they were obtained, and facts about the creation and maintenance of the
databases which they accessed. In essence, Defendants assert that if the magistrate judge
knew that TLO, a data fusion company based in Boca Raton, Florida, offered automated
software programs called Peer Spectre, Lime Scanner, Lime Crawler, ShareazaLE, and
Nordic Mule as part of a suite of software called CPS, and generated reports for law
enforcement to use in their investigation of child exploitation crimes, the determination
of probable cause would somehow be different. This argument is without merit. The
material fact that law enforcement was obligated to disclose was that law enforcement
automated the process of searching for files indicative of child pornography by using
software that reported certain publicly available information. This fact was fully
disclosed. More exacting details and disclosures simply were not required to establish
probable cause. See United States v. Martin, 426 F.3d 83, 86 (2d Cir. 2005) ("[P]robable
cause only requires 'the probability, and not a prima facie showing, of criminal
activity."') (quoting Gates, 462 U.S. at 235). Moreover, if made, these additional
disclosures would not have affected the determination of probable cause because they
would have merely provided the magistrate judge with further information regarding the
source and identity of the automated software. Defendant Thomas concedes this point.
4
Defendants next assert that after CPS investigative tools were created and offered
for use, either TLO or law enforcement had an obligation to further test them before they
could be employed by law enforcement. As a corollary to this argument, Defendants
contend that it was insufficient and misleading to advise the magistrate judge that the
4 Counsel for Defendant Thomas: "And my bottom-line point is why would you not tell the
magistrate that I'm pulling this information from a data base .... The source of that information
should have been made known to the magistrate so that he could evaluate it. Am I suggesting
that if they told Magistrate Judge Conroy that, gee, this is [a] law enforcement organized venture
and law enforcement has done all of this stuff to put together this database and this is the
database that I drew from that he wouldn't have granted the affidavit? Probably not. He
probably would have."
The Court: But that's a key concession. I mean that's Franks.
(Tr. 7/31113 at 24-25.)
31
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 31 of 39
resultsfromPeerSpectrehavebeencomparedtotheresults from manualsearchesin
orderto"validate"thisinvestigativetool. Defendantspointtonoacceptedtestsor
methodologythatshouldandcouldhavebeenusedtofurthertestthereliabilityofCPS's
productsandMs.Loehrsconcededthattheydonotexist. Althoughshehypothesizes
regardinghowshewouldcreateanidealtestingenvironment,shecouldcitetonocourt
orscientificjournalthathasendorsedherapproachorrecognizeditasastandardforthe
industry.
Inaddition,becauseautomatedsoftwareproductsmustusethesameprotocolsas
thefile sharingprogramswhichtheyinvestigate,itmakeslittlesensetoargue, as Ms.
Loehrsdoes,that"unreliable"protocolsdevelopedbythenetworkswhichhostthefile
sharingsoftwareprogramsshouldnotbeusedbyautomatedsoftware. Ifthesame
protocolsarenotused,theautomatedsoftwarewouldceasetofunction. Inanyevent,
Defendantsconfusethetestfordeterminingtheadmissibilityofevidencefrom anexpert
witnessattrialunderFed. R. Evid. 702withthemoreflexible andlessdemanding
standardfor evidencenecessarytoestablishprobablecause. Adeterminationofprobable
causesimplydoesnotrequirethelevelofcertaintywhichDefendantserroneouslyargue
mustbeshownbeforeCPSinvestigativetoolscanbeused. See Maryland v. Pringle, 540
U.S. 366, 371 (2003)("Theprobable-causestandardis incapableofprecisedefinitionor
quantificationintopercentagesbecauseitdealswithprobabilitiesanddepends onthe
totalityof thecircumstances.").
Defendants' challengetotherelianceonhashvaluestoidentifYfiles made
availablefor sharingby aparticularIPaddressissimilarlymisplaced. Defendants
concede, astheymust,thatfiles sharedwithpeer-to-peersoftwareprogramsall usesome
formof hashvalueinordertoidentifyafile. Lawenforcementplaysnoroleinthetype
ofhashvaluechosen. Moreover,lawenforcementseekingtoinvestigatefilesharing
involvingpeer-to-peerfilesharingsoftwareonaparticularnetworkmustatleastinitially
relyuponthetypeof hashvaluechosenbythenetwork. It isthereforenonsensicalto
ascribefaulttolawenforcementforusingaparticulartypeofhashvalue. Theevidence
beforethecourtsupportsaconclusionthathashvaluesprovideinformationregardinga
32
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 32 of 39
particular file's contents that is substantially more reliable than a file's name or size.
s
Indeed, it is the most reliable information available. In these cases, law enforcement
physically examined the images associated with the identified hash values and concluded
that the identified files contained child pornography. Defendants cite to no authority for
their claim that hash values are inherently unreliable or that a direct download of the file
is necessary to establish probable cause. Courts have routinely found otherwise. See,
e.g., United States v. Cunningham, 694 F.3d 372,376 n.3 (3d Cir. 2012) ("'Although it
may be possible for two digital files to have hash values that collide, or overlap, it is
unlikely that the values of two dissimilar images will do so. "') (quoting United States v.
Wellman, 663 F.3d 224,226 n.2 (4th Cir. 2011; United States v. Glassgow, 682 F.3d
1107,1110 (8th Cir. 2012) (addressing a challenge to an exhibit showing video clips
from a law enforcement database, the court explained that "the SHA-l values of these
videos matched the SHA-l values ofthe files offered for distribution from [defendant's]
computer. According to the expert, there was a 99.9999% probability that [the exhibit]
contained the same video clips that [defendant] possessed. The admission of [the exhibit]
... was not unfairly prejudicial") (footnote omitted); United States v. Willard, 2010 WL
3784944, at * 1 n.l & *5 (E.D. Va. Sept. 20,2010) (discussing a police database
maintained with records of child pornography, the court noted that "[b]y comparing the
SHAI values of two files, investigators can determine whether the files are identical with
precision greater than 99.9999 percent certainty" and rejecting request for Franks hearing
based upon a claim "that the officers making the affidavit made false statements
regarding the accuracy of SHAI ").
Defendants next contend that the search warrant affidavits failed to disclose the
alleged unreliability of an MD4 hash value which they contlate with an MD5 hash value.
This argument is based upon the fallacy that law enforcement somehow affirmatively
chose to rely on NID4 values in its investigation when more reliable information was
5 However, as the government points out, the file names at issue here were alone supportive of a
finding of probable cause and their corresponding file sizes provided some indicia that they were
not devoid of content.
33
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 33 of 39
available. Certainfilesharingnetworks, suchastheeDonkeynetwork,useMD4hash
valuestoidentifY files forsharingandtofacilitaterapiddownloads. Accordingly, when
investigatinguseofeDonkeynetworksfor childpornographycrimes, lawenforcement
willreceiveanMD4hashvaluefor atargetfile. Lawenforcementmaythen, ashere,
seektobolstertheMD4hashvalue'sreliabilitybyattemptingtofindthefile'sequivalent
SHAI value. Defendantsfail tociteasinglecaseinwhichalackofprobablecausehas
beenattributedtotheuseofanMD4hashvaluetoidentifY childpornography.
Moreover,bothMr. WiltseandMs.LoehrstestifiedthattheyhaveneverseenanMD4
hashvaluecollide. As aresult, additionalinformationregardingthereliabilityofMD4
valueswouldnothaveaffectedafindingofprobablecause.
Defendantsnextarguethatitwasmisleadingfor lawenforcementtodescribeits
investigationas"undercover"whenfromDefendants'perspectiveit wasnot. Detective
Enocrediblytestifiedthattheinvestigationwasreferredtoas"undercover"becauseit
wasinitiatedbyanundercoveroperationsunit. Inthiscase,probablecausewouldnotbe
enhancedordiminishedbyaninvestigationthatwasorwasnotundercover. Defendants
do notarguetothecontrary. Moreover,eachsearchwarrantaffidavitprovidedample
informationfromwhichthemagistratejudgecouldmakehisowninformeddetermination
of whetherlawenforcement'sinvestigationwas"undercover."
Finally,DefendantscontendthatlawenforcementfailedtosufficientlyverifY
whetheraparticularIPaddresswasofferingtosharepotentialchildpornographybecause
lawenforcementmerelycomparedthefilesthatweremadeavailablefor sharingwith
databaseimagesofthesamefiles, insteadofattemptingadirectdownload. Inaddition,
Defendantsclaimthecomparisonprocesswas inadequatelyandmisleadinglydescribed
inthesearchwarrantaffidavits. Thesearchwarrantaffidavits,however,adequately
describedhowlawenforcementverifiedtheimagesinquestion:
Aspartofthisoperation,DetectiveCorporalGerryEnooftheVermont
InternetCrimesAgainstChildren(ICAC)TaskForceandtheSouth
BurlingtonPoliceDepartmentconfirmedthateachSHAI valueofinterest
totheinvestigationactuallyrepresentsanimageormoviethatdepictschild
pornography. DetectiveCorporalEnodidthisbyviewinganimageor
34
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 34 of 39
moviewiththesameSHA1signatureasthesharedfile. DetectiveCorporal
EnolocatedtheimageormovieintheVTICACdatabase,orotherwise
obtainedacopyfromanothersource(ormultiplesources)ontheP2P
network.
Ex. 7at,-r32;Ex. 8at,-r32;Ex. 9at,-r32. Defendantsfail todemonstrateanyaspectof
thisdisclosurewhichisfalse ormisleading. See United States v. Adams, 110F.3d31,33
(8thCir. 1997)(findingnoFranks violationwhen"warrantwasbasedontrue
information"). Theyaresimplyincorrectthatthecomparisontookplacebyreferenceto
TLO'sdatabasebecauseTLO'sdatabasecontainsnoimagesofchildpornography.
Moreover,theycitenoauthorityforthepropositionthatadirectdownloador"active
steps"(Case5:12-cr-37;Doc. 104at2)arerequiredbeforeprobablecausemaybe
established. Evenwithoutadirectdownload,courtshaveconsistentlyfoundprobable
causeexistswhenanIPaddressthatappearstohaveaccessedchildpornographycanbe
tracedtoanidentifiableresidence. See United States v. Haymond, 672F.3d948,959
(lOthCir. 2012)(findingthatasupportingaffidavit,whichstated"that[theofficer]
observedauserwithanIPaddresslinkedto [defendant's]residencewhohadnumerous
files ofchildpornographyavailable[,]"wassufficienttoestablishprobablecause);Stults,
575 F.3dat843-44(concludingthattheaffidavit,which, amongotherthings,"statedthat
anIPaddresstracedto[defendant]wasidentifiedas accessingchildpornographysites[,J"
createdprobablecausetosearchdefendant'sresidence); United States v. Perez, 484F.3d
735, 740-42(5thCir.2007)(findingprobablecausethatevidencewouldbefound atthe
physicaladdressassociatedwiththeIPaddressfromwhichchildpornographywas
transmitted). Here, eachaffidavitestablishedtherequisitenexus.
NoneoftheforegoingchallengessatisfiesDefendants' initialburdenunder
Franks, andthecourtthereforedoesnotaddressthemfurther.
2. Further Analysisof Three of Defendants' Franks Challenges.
OnlythreeofDefendants'Franks challengesmeritfurtheranalysis,andtheydoso
onlybecauseDefendantshaveidentifiedthreestatementsinthesearchwarrantaffidavits
whichareinaccurate. First,Defendantspointoutthateachoftheaffidavitsrecitesina
singlesentencethataparticularIPaddressshared certainfiles suspectedtobechild
35
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 35 of 39
pornography. Ex. 7at 35;Ex. 8at 35;Ex. 9at 34. Lawenforcementconcedesthat
thisstatementshouldbecorrectedtoreflectthattheIPaddressoffered to share certain
files - atermusedelsewhereintheaffidavits. See Ex. 7at 34;Ex. 8at 34;Ex. 9at
34. Whilethisdifferencemaybematerialindeterminingwhetheradistributionrather
thanapossessionchargeissupportedbytheevidence,itdoesnotaffectthedetermination
of probablecause. Whetherapotentialchildpornographyfile is"offeredtoshare"or
actually"shared,"an IPaddressadvertisingthatfile is likelytobeassociatedwitha
computerthatcontainschildpornography. Accordingly,ifcorrectedtoreflecttheproper
terminology,theprobablecausedeterminationwouldremainunchanged. Moreover,
thereisnoevidencethatlawenforcementusedtheterm"shared"insteadof"offeredto
share"inordertointentionallyorrecklesslymisleadthemagistratejudge.
Second,thesearchwarrantaffidavitserroneouslystatethatanJVID4 hashvalue
maybe"converted"intoaSHAI value. Theuseof theterm"converted"is inaccurate
becauseno"conversion"actuallytakesplace. Instead,alawenforcementofficer
accessesadatabasemaintainedbyTLO,oronethatispubliclyavailable,todeterminethe
correspondingSHA1valueattributedtoafile bearinganMD4hashvalue. This
correctiontothesearchwarrantaffidavitswouldalsohavenoimpactofan analysisof
probablecausebecauseitwouldonlymoreaccuratelyexplainhowlawenforcement
attemptedtobuttressthereliabilityoftheMD4hashvaluebyfinding its SHAI
equivalent.
DefendantThomasmakesamorespecificargumentbypointingoutthattwoof
thefiles identifiedinthesearchwarrantaffidavitrelatedtohisresidencewereallegedly
advertisedontheeDonkeysystem,whichdoesnotutilizeSHA1values. Theaffidavitin
supportofthesearchwarrantexplainsthatlawenforcement"canhashthefileusingthe
SHAI digitalalgorithmanddetermineits SHAI value"(Ex. 7at 29)andthat"law
enforcementneedstoconverttheeDonkeyhashvalueto SHAI becauseit is ableto
searchfor filesbyhashvalueonlyontheGnutellanetwork." Id. DefendantThomas
arguesthatthegovernmenthasfailedtoadequatelyexplainhowlawenforcementmay
hashafileusingtheSHAI algorithmif thefile isnotdownloaded. DefendantThomas
36
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 36 of 39
contendsthatthis leftthemagistratejudgewith"adistortedandinaccuratepicture."
(Case5:12-cr-37;Doc. 47at 10.)
DefendantThomasis correctthatafilecannotbe"hashed"ifitisnotinthelaw
enforcementofficer'sphysicalpossession. Thegovernment,however,persuasively
countersthatitwasnotnecessarytodescribeintheaffidavithowafile is hashedand
howaneDonkeyhashvaluemaybecross-referencedwithitscorrespondingSHAI value
forthesamefilebecausethesefactsare"minutetechnologicaldetail." (Case5:12-cr-37;
Doc. 62 at 12.) Thecourtagrees. Althoughthesearchwarrantaffidavitfailsto
accuratelydescribetheprocessforhashingafile andfindingaSHA1valueforanMD4
file, intheabsenceofanyevidencethatcross-referencingiseithertechnologically
unfeasibleorwasnotreliablyperformed,theadditionalinformationwouldcontribute
littletoaprobablecauseanalysis,beyondascribingthecorrectterminologyforthecross-
referencingprocess.
Third,theaffidavitsstatethatpartiallydownloadedfileswillnotbeshownas
availableforsharing:
Ifthesharingcomputeris intheprocessofdownloadingfile(s) (incomplete
files), thesefiles donotappearinthelist. Onlythose[files] thatare
completelydownloadedandbeingsharedwillbedisplayedinthislist.
Ex. 7at 23;Ex. 8at 23;Ex. 9at 23. Eachexpertwitnesstestifiedthatincomplete
files maybemadeavailableforsharingin atleastthreeways. First,aquerymayreacha
computerintheprocessofdownloadingafilethatcontainsaresponsivetermand
generateaqueryhitmessagethatthefile isavailableforsharingaccompaniedbythe
hashvaluethefilewillbearuponcompletionof thedownload. Thismayoccurevenif
thefileisnotactuallyavailableforsharinguntilthedownloadiscompleteandevenifthe
file is latermovedtoanon-sharedfolder. Second,thedefaultsettingsofaparticular
versionof peer-to-peerfilesharingsoftwareorausermaydesignatepartialorincomplete
files as availableforsharing. Andthird,ausermay,asMs.Loehrsdid,manuallyplace
incomplete,deleted, orcorruptedfiles inasharedfolderandtherebymakethemavailable
forsharing. Iftheaffidavitswerecorrectedtoreflectthis information,Defendantsdonot
37
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 37 of 39
explainhowtheprobablecausedeterminationwouldbeaffected. Atbest,itmakesit
onlyslightlyless likelythatchildpornographywill befound onacomputerofferingto
sharethefile. AsthecourtinMoran concluded,thisdoesnotdefeatafindingof
probablecause.
3. Subjective Intent to Deceive or Mislead.
WithregardtoeachofDefendants'Franks challenges,therewasno
accompanyingevidenceofanyintentionalorrecklesssubjectiveintenttodeceiveor
misleadthemagistratejudge. Tothecontrary,thereisampleevidenceofsubjectiveand
objectivegoodfaith andreasonableness. Theaffiants,none ofwhomisacomputer
forensicexpert,engagedinacarefulandtime-consumingcollaborativeprocessinorder
todescribeatlengthintheirrespectivesearchwarrantaffidavitstheinformationyielded
bytheirinvestigationandwhytheybelieveditsupportedafindingofprobablecause.
TheythensoughtandobtainedanAssistantU.S. Attorney'sapprovalof theirwarrant
applications. TheincorrectstatementsDefendantshave identifiedareonlyminordetails
amongawealthofinformationcontainedinthesearchwarrantaffidavitswhich
demonstratedprobablecauseandwhichsupportedtheissuanceof thewarrants. See
United States v. Arvizu, 534U.S. 266, 274(2002)(holdingthat"evaluationandrejection
ofsevenof the [officer'sobservations] inisolationfrom eachotherdoesnottakeinto
accountthetotalityof thecircumstances,asourcaseshaveunderstoodthatphrase")
(internalquotationmarksomitted).
"[T]heultimateinquiryiswhether, afterputtingasideerroneousinformationand
correctingmaterialomissions,thereremainsaresidueofindependentandlawful
informationsufficienttosupportafindingofprobablecause." Rajaratnam, 719F.3dat
146(internalquotationmarksoralterationsomitted). Here,thatstandardiseasilymet.
Moreover,intheabsenceof"credibleandprobativeevidencethatthe...information...
wasdesignedtomisleadorwasmadeinrecklessdisregardofwhetheritwouldmislead,"
id. at 154(internalquotationsmarksandalterationsomitted),suppressionisnot
warranted.
38
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 38 of 39
D. GoodFaithException.
Asthegovernmentpointsout, evenif thecourtfoundthatthesearchwarrantsin
thesecaseslackedprobablecause, suppressionwouldnotbewarrantediflaw
enforcementrelieduponthewarrantsingoodfaith. "AstheSupremeCourtrecently
remindedcourts, suppressionis 'ourlastresort,notourfirst impulse' indealingwith
violationsof theFourthAmendment." Clark, 638F.3dat99(quotingHerring v. United
States, 555 U.S. 135, 140(2009)). Accordingly, "theexclusionaryrulebarringillegally
obtainedevidencefromthecourtroomdoesnotapplytoevidenceseized 'inobjectively
reasonablerelianceon' awarrantissuedbyadetachedandneutral...judge,evenwhere
thewarrantissubsequentlydeemedinvalid." Falso, 544F.3dat 125 (quotingUnited
States v. Leon, 468U.S. 897, 922(1984)). Here,thegoodfaithexceptionwouldapply.
CONCLUSION
Fortheforegoingreasons, Defendants' MotionstoSuppressareherebyDENIED.
SOORDERED.
DatedatRutland,intheDistrictofVermont,this dayof November,2013.
lsi Christina Reiss
ChristinaReiss, ChiefJudge
UnitedStatesDistrictCourt
39
Case 5:12-cr-00037-cr Document 113 Filed 11/08/13 Page 39 of 39

Das könnte Ihnen auch gefallen