Monday, July 23, 2012

Multiplicity, EP2P and Child Pornography

David Chiaradio was indicted on two counts of possessing child pornography in violation of 18 U.S. Code § 2252(a)(4)(B) and one count of distributing it in violation of 18 U.S. Code § § 2252(a)(2).  U.S. v. Chiaradio, __ F.3d __, 2012 WL 2821892 (U.S. Court of Appeals for the 1st Circuit 2012).  After a jury found him “guilty across the board”, the judge imposed “concurrent 97-month incarcerative” sentences “on each count of conviction.”  U.S. v. Chiaradio, supra.  Chiaradio appealed.  U.S. v. Chiaradio, supra.  

Chiaradio raised a number of arguments on appeal, but we’re only concerned with two of them, the first of which went to “the government’s decision to charge him with two counts of possessing child pornography” in violation of 18 U.S. Code § 2242(a)(4)(B).  U.S. v. Chiaradio, supra.  Chiaradio argued that the charges were multiplicitous, i.e., that the prosecution was essentially "doubling up" on the charges. U.S. v. Chiaradio, supra.  

As I explained in a post I did several years ago, criminal charges are based on the premise that each “charge” – which usually translates into a “count” in an indictment or other charging document – is based on the commission of one “crime.”  As I noted in another post, a defendant can challenge a charge if he believes it violates this premise.  As § 919 of the U.S. Department of Justice’s Criminal Resource Manual notes, multiplicity is “the charging of a single offense in several counts.” And as this court explained, a charge is multiplicitous when the prosecution charges a defendant twice for a single crime.

Determining whether an indictment is multiplicitous requires an inquiring court to examine whether a particular course of illegal conduct constitutes one or multiple offenses. . . . Congress's intent is paramount on this point: the legislature may castigate a particular act by exposing the actor to several prosecutions and punishments, or it may specify that the act should only be subject to a single unit of prosecution. 

U.S. v. Chiaradio, supra.  

To understand Chiaradio’s argument, you need to understand how the case arose. On February 28, 2006, FBI Agent Cecchini went online to search for child pornography, using a version of the peer-to-peer file-sharing program known as LimeWire.  U.S. v. Chiaradio, supra.  He actually used “a special version of LimeWire developed by the FBI, known as `enhanced peer-to-peer software’ (EP2P), which was customized to assist child pornography investigations.”   U.S. v. Chiaradio, supra. 

The opinion notes that EP2P differs from the commercially available version of the software in “three principal respects”:

First, when a user of the commercially available version . . .  tries to download a file, the program seeks out all the users who are sharing the same file and downloads different pieces of that file from multiple locations in order to optimize download speed. EP2P eliminates that functionality; it allows downloading from only one source at a time, thus ensuring that the entire file is available on that source's computer.

Second, in its commercially available iteration, LimeWire responds to a search term by displaying basic information such as the names of the available files, file types, and the file sharers' Internet Protocol (IP) addresses. EP2P displays not only that data but also the identity of the Internet Service Provider (ISP) and the city and state associated with the IP address sharing a particular file.

Third, EP2P has been modified so an agent can easily compare the hash value (essentially, the digital fingerprint) of an available file with the hash values of confirmed videos and images of child pornography. Taken together, these three modifications permit agents to download a file from a single source, learn the general location of the source, and facilitate the identification of child pornography as such.

U.S. v. Chiaradio, supra.  We’ll come back to EP2P later in this post.

Cecchini used EP2P to run a search for a term he knew was “fancied by collectors of child pornography” and got a number of hits, one of which came “from an IP address in Rhode Island.”  U.S. v. Chiaradio, supra.  Cecchini used LimeWire’s browse function to review the files being shared by that IP address, and found “643 files with titles suggestive of child pornography.”  U.S. v. Chiaradio, supra. 

He downloaded three of them, confirmed they contained child pornography, used a subpoena to the ISP to get the IP address and traced it to “a residence in Westerly, Rhode Island, owned by” Chiaradio’s father.  U.S. v. Chiaradio, supra.  Another Agent, Agent Yesnowski, used this information to obtain a warrant to search the residence.  U.S. v. Chiaradio, supra.

On August 22, 2006, Yesnowski and Agent Kohn executed the warrant, seizing a laptop from Chiaradio’s bedroom and a desktop computer from a spare bedroom.  U.S. v. Chiaradio, supra.  Chiaradio took responsibility for both computers and agreed to speak with the

agents about his computer usage. He explained the house had a shared wireless network connecting both computers to the Internet, as well as its own internal file-sharing system enabling a user of one computer to access data and files on the other. . . . [He] admitted installing and using LimeWire on the laptop to download music but denied he had ever searched for, or downloaded, child pornography.

U.S. v. Chiaradio, supra.  Analysis revealed “over 5,000 images and videos” of child pornography on the desktop and “nearly 2,000” on the laptop. U.S. v. Chiaradio, supra.

That brings us back to multiplicity.  Section 2252(a)(4)(B) makes it a crime to knowingly possess “one or more books, . . . , video tapes, or other matter” which contains “any visual depiction” that has traveled in or was produced by materials that traveled in interstate commerce if producing it involves the use of a minor engaging in sexually explicit conduct and the depiction “is of such conduct.” 18 U.S. Code § 2252(a)(4)(B). The opinion then explains that in this case, the government seized a “plethora” of

files during a single search of a single dwelling, yet charged [Chiaradio] with two counts of . . . possession. The government defends its use of dual counts . . . on the ground that the proper unit of prosecution is each matter or physical medium on which images are stored. 

As the government would have it, [Chiaradio’s] utilization of two computers . . . exposed him to prosecution for two separate crimes. This is especially fitting, the government suggests, because the computers were in different rooms and had different functions: the laptop was used for acquiring the pornographic images, whereas the desktop was used for storing them.
U.S. v. Chiaradio, supra (emphasis in the original).

Chiaradio argued that since the statute specifically outlaws the possession of one or more “container[s]” of child pornography, it therefore criminalizes the possession of

`one or more’ computers containing offending images. It follows, [he] says, that the government may charge only a single crime regardless of whether a defendant possesses two or 2,000 images on one or 100 computers, at least when that possession is simultaneous and under one roof. In other words, the number of `matters’ (here, the number of computers) does not in itself define the proper unit of prosecution. 

Dividing the crime of possession into two separate crimes was especially egregious in this case, [Chiaradio] suggests, because the computers were linked (that is, they shared an internal network through which files could freely move back and forth) and their contents overlapped (albeit to an unspecified degree).

U.S. v. Chiaradio, supra.

After reviewing the statute’s legislative history and decisions from two other Courts of Appeals, the 1st Circuit agreed with Chiaradio.  U.S. v. Chiaradio, supra.  It held that one “who simultaneously possesses a multitude of forbidden images at a single time and in a single place” commits only one act of possession in violation of . . . § 2252(a)(4)(B).  U.S. v. Chiaradio, supra. It also held, therefore, that Chiaradio’s two convictions violated his right to be free from double jeopardy.  U.S. v. Chiaradio, supra.

The court then took up Chiaradio’s argument that the district court judge “should have granted his pretrial motion to compel production of the source code of the EP2P program (essentially, the human-readable version of the instructions used by a computer running EP2P).”  U.S. v. Chiaradio, supra. Chiaradio claimed he was entitled to the code as part of the discovery – the process by which the prosecution and defense can gain access to evidence the other intends to use at trial – allowed by Rule 16(a)(1)(E) of the Federal Rules of Criminal Procedure. U.S. v. Chiaradio, supra.

Rule 16(a)(1)(E) “requires the government to permit the defendant to examine and copy documents, data, and objects in its control if the items are material to preparing the defense or if the government plans to use them in its case in chief.”  U.S. v. Chiaradio, supra. The court noted it reviews a district court judge’s rulings under Rule 16 for “abuse of discretion”, and if it finds an error, the error will not require reversing a conviction unless the defendant can show he was prejudiced by it.  U.S. v. Chiaradio, supra. 

When Chiaradio sought access to the code prior to his trial, he argued that “he had to obtain the source code in order to determine whether he could credibly challenge the reliability of the technology and block the expert testimony proffered by the government on the EP2P program and how it implicated”.  U.S. v. Chiaradio, supra.  Chiaradio, therefore, wanted to see if he could raise a Daubert challenge to EP2P.  In Daubert v. Merrell Dow Pharmaceuticals, 509 U.S. 579 (1993), the Supreme Court held that before a trial judge can allow an expert to testify about scientific knowledge, he or she must determine that the expert’s testimony is sound, i.e., is scientifically valid. 

The Court of Appeals noted that the FBI “developed EP2P as an investigatory tool” and its source code is “closely held; it is not shared with or accessible to the agents who use the program, let alone the public.” U.S. v. Chiaradio, supra. It also noted that the district court judge held an evidentiary hearing on Chiaradio’s motion.  U.S. v. Chiaradio, supra.  At the hearing, the judge heard testimony from FBI Agent P. Michael Gordon,

the government's proposed EP2P expert. Gordon had been involved in testing the program, had instructed other agents about its use, and had participated in over eighty investigations in which EP2P was employed. 

He demonstrated, among other things, how to check the results of an EP2P investigation manually to ensure the files transferred had come from the location identified through EP2P. He vouchsafed that, in his wide experience, no EP2P investigation had ever yielded a false positive.

U.S. v. Chiaradio, supra. 

The district court judge found that Gordon’s testimony satisfied the Daubert standard, i.e., established the scientific reliability of the software.  U.S. v. Chiaradio, supra. And the Court of Appeals agreed:

Even if the source code were discoverable under Rule 16 -- a matter on which we take no view – [Chiaradio] cannot demonstrate prejudice from its nondisclosure. The government gave [him] a digital file recording the transfer from [his] laptop to Cecchini's computer. 

It also gave [him] a copy of the FBI guide detailing how to reconstruct an EP2P session manually (using only the recording and publicly available programs). The government presented testimony indicating that its agents had used these materials to reconstruct the transfer and had verified that the files downloaded by Cecchini came from [Chiaradio’s] computer.

[He] neither contradicted nor cast the slightest doubt upon this testimony. This evidence makes it pellucid that the forbidden files were located on [Chiaradio’s] computers and transferred to Cecchini. Consequently, any error in the application of the EP2P program was harmless.

U.S. v. Chiaradio, supra. Since the court would not reverse the conviction unless any error involving the use of the EP2P program prejudiced Chiaradio’s ability to defend himself, and since the court found that the error, if any existed, was harmless, it rejected Chiaradio’s argument on this issue. U.S. v. Chiaradio, supra. 

The court therefore remanded the case to the district court judge to address the multiplicity problem, either by “merg[ing] the two possession counts or vacat[ing] the conviction and sentence on one of them.”  U.S. v. Chiaradio, supra.

1 comment:

Anonymous said...

The dude's attorney should have looked on The Pirate Bay. You can download the entire FBI's EP2P program from there and tear it apart and play with it as much as you want to and check out how to works or how to break it.

Not that it matters in this case. The guy either had porn on his computer or he didn't. In this case, there was no disagreement about him having the porn.