Thursday, February 25, 2016

The CPS Software, Child Pornography and Probable Cause

This post examines an opinion from the District Court of Appeals of Florida5th District:  Frazier v. State, 2015 WL 7302669 (2015).  The court begins by explaining that
Justin Frazier (`Appellant’) appeals the trial court's denial of his motion to suppress evidence of child pornography discovered on his personal computer pursuant to a search warrant. We affirm the trial court's denial, finding that a person who shares files over a peer-to-peer network has no expectation of privacy in those files.

We write to provide clarification as to why the State did not violate Appellant's Fourth Amendment rights by using Child Protection System software (`CPS software’) to obtain information to form the basis for its search warrant.
Frazier v. State, supra.          
The Court of Appeals does not explain how Frazier came to be charged with possessing child pornography, but you can read about that in the news stories you can find here, here and here.
The court does begin its opinion by explaining that
CPS software, developed by a company called TLO, automates the process law enforcement uses to search for persons sharing child pornography over peer-to-peer networks. When a user shares a file over a peer-to-peer network—in this case, the Gnutella network—any other user can enter keywords to search the network for that file.

The user can then download the file directly from the sharer's computer. Each file on the network contains an associated hash value, a unique combination of digital characters identifying the file in a manner more precise than the file name.

CPS software searches the peer-to-peer network using a predefined list of keywords and compares the responses with an online database of known child exploitation material. This database, managed by TLO, contains a list of over 300,000 file names and hash values that law enforcement officers have confirmed as being associated with files containing child pornography. CPS software narrows the responses to files shared from computers located only within the searching officer's jurisdiction.

CPS software does not infiltrate any computers when searching peer-to-peer networks for child exploitation material. Rather, the software gathers only public information made available by the user sharing files over the network, including the computer's IP address. Law enforcement may subpoena the Internet service provider for that particular IP address to determine to whom the address is registered and then use the information to form probable cause for a search warrant.
Frazier v. State, supra.
The Court of Appeals goes on to explain that
[n]umerous Fourth Amendment challenges to law enforcement's use of CPS software have failed in the Federal Courts. CPS software does not `search any areas of [defendant's] computer, download any files, or otherwise reveal any information . . . unavailable to ordinary Internet users.’ United States v. Gabel, No. 10–60168, 2010 WL 3927697, at *7 (U.S. District Court for the Southern District of Florida Sept. 16, 2010) (citation omitted).

`CPS software merely automates the aggregation of public information—a task that could otherwise be performed manually by law enforcement, albeit at a slower and less efficient pace.’ United States v. Thomas, 788 F.3d 345, 352 (U.S. Court of Appeals for the 2d Circuit 2015) (footnote omitted).

CPS software operates `simply as a sorting mechanism to prevent the government from having to sift, one by one, through [an individual's] already publically exposed files.’ United States v. Borowy, 595 F.3d 1045, 1048 (U.S. Court of Appeals for the 9th Circuit 2010) (footnote omitted). `So, even if CPS does collect information, it collects publicly available information, which does not run afoul of the Fourth Amendment.’ United States v. Dennis, Crim. No. 3:13–CR–10–TCB, 2014 WL 1908734, at *2 (U.S. District Court for the Northern District of Georgia May 12, 2014) (citations omitted).

All reported state court decisions considering this issue have likewise held that law enforcement may use CPS software to obtain information to form probable cause for a search warrant without violating the defendant's expectation of privacy. See State v. Dunham, 111 So.3d 1095, 1098 (Louisiana Court of Appeals 2012); State v. Dziegiel, No. A–0009–12T4, 2013 WL 5447716, at *3 (New Jersey SuperiorCourt – Appellate Division Oct. 2, 2013); State v. Mahan, No. 95696, 2011 WL 4600044, at *7 (Ohio Court of Appeals Oct. 6, 2011); State v. Holland, 272 Oregon Court of Appeals 211, 355 P.3d 194, 196 (2015); State v. Aguilar, 437 S.W.3d 889, 901 (Tennessee Court of Criminal Appeals 2013); State v. Roberts, 345 P.3d 1226, 1235 (Utah Supreme Court 2015).
Frazier v. State, supra.
The Court also noted that
Appellant takes the position that United States v. Ahrndt, Crim. No. 3:08–CR–00468–KI, 2013 WL 179326, at *2 (U.S. District Court for the District of Oregon Jan. 17, 2013), decided this precise Fourth Amendment challenge in his favor. Our review of Ahrndt reveals that the court addressed neither sharing files over a peer-to-peer network nor CPS software.

Rather, Ahrndt specifically explained that it granted the defendant's motion to suppress because the government produced `no evidence [defendant] was sharing files on the peer-to-peer network’ and the folder was not `accessible over the internet by [peer-to-peer network] users at the time [the officer] accessed the files, or at any time prior.’ Id. at *7.

Importantly, in reaching this conclusion, the district court distinguished the case from United States v. Ganoe, 538 F.3d 1117 (U.S. Court of Appeals for the 9th Circuit 2008). Ahrndt, 2013 WL 179326, at *7. In Ganoe, the Ninth Circuit held that the defendant lacked a reasonable expectation of privacy because “he knew or should have known that the folder into which he downloaded the files was accessible to others on the peer-to-peer network.” United States v. Ganoe, supra.  Therefore, Appellant's reliance on Ahrndt is misplaced.

Moreover, Appellant quotes extensively to the facts in United States v. Thomas, No. 5:12–CR–37, 2013 WL 6000484, at *1 (U.S. District Court for the District of Vermont Nov. 8, 2013), to explain how the CPS software functions. However, Appellant does not cite to the court's holding, which stated, `Because there is no evidence that law enforcement's use of automated software reached information on Defendants' computers that was not made available for sharing by the public, Defendants' motions to suppress on the basis of a warrantless search in violation of the Fourth Amendment must be DENIED.’ Id. at *20.
Frazier v. State, supra.
The Court of Appeals concluded its opinion by explaining that
Appellant fails to demonstrate why we should find, contrary to every other court to address this issue, that CPS software violates the Fourth Amendment.

Appellant argues the `State's reasoning appears to be that if the house is unlocked the police can secretly slip in without being invited.’ However, as the [U.S. District Court for the] Eighth Circuit explained, `[o]ne who gives his house keys to all of his friends who request them should not be surprised should some of them open the door without knocking.’ United States v. Stults, 575 F.3d 834 (U.S. Court of Appeals for the 8th Circuit 2009)

Appellant knew or should have known that sharing files over the Gnutella network would `allow the public at large to access files in his shared folder unless he took steps to avoid it.’  United States v. Borowy, supra.  Accordingly, Appellant did not have areasonable expectation of privacy in the files he shared over the Gnutella network.

Because Appellant did not have a reasonable expectation of privacy in those files, the information gleaned from the CPS software did not constitute an illegal search, and, therefore, formed a valid basis for probable cause to issue a search warrant. For these reasons, the trial court correctly denied Appellant's motion to suppress.

Frazier v. State, supra.

No comments:

Post a Comment