This post examines an opinion from the District Court of Appeals of Florida – 5th District:
Frazier v. State, 2015 WL
7302669 (2015). The court begins by
explaining that
Justin Frazier (`Appellant’) appeals
the trial court's denial of his motion to suppress evidence of child
pornography discovered on his personal computer pursuant to a search warrant.
We affirm the trial court's denial, finding that a person who shares files over
a peer-to-peer network has no expectation of privacy in those files.
We write to provide clarification as to
why the State did not violate Appellant's Fourth Amendment rights by using Child
Protection System software (`CPS software’) to obtain information to form the
basis for its search warrant.
Frazier v. State,
supra.
The Court of Appeals does not explain how Frazier came to be
charged with possessing child pornography, but you can read about that in the
news stories you can find here, here and here.
The court does begin its opinion by explaining that
CPS software, developed by a company
called TLO, automates the process law enforcement uses to search for persons
sharing child pornography over peer-to-peer networks. When a user shares a file
over a peer-to-peer network—in this case, the Gnutella network—any other user
can enter keywords to search the network for that file.
The user can then download the file
directly from the sharer's computer. Each file on the network contains an
associated hash value, a unique combination of digital characters identifying
the file in a manner more precise than the file name.
CPS software searches the peer-to-peer
network using a predefined list of keywords and compares the responses with an
online database of known child exploitation material. This database, managed by
TLO, contains a list of over 300,000 file names and hash values that law
enforcement officers have confirmed as being associated with files containing
child pornography. CPS software narrows the responses to files shared from
computers located only within the searching officer's jurisdiction.
CPS software does not infiltrate any
computers when searching peer-to-peer networks for child exploitation material.
Rather, the software gathers only public information made available by the user
sharing files over the network, including the computer's IP address. Law
enforcement may subpoena the Internet service provider for that particular IP
address to determine to whom the address is registered and then use the
information to form probable cause for a search warrant.
Frazier v. State,
supra.
The Court of Appeals goes on to explain that
[n]umerous Fourth Amendment challenges
to law enforcement's use of CPS software have failed in the Federal Courts. CPS
software does not `search any areas of [defendant's] computer, download any
files, or otherwise reveal any information . . . unavailable to ordinary Internet
users.’ United States v. Gabel, No. 10–60168, 2010 WL 3927697, at
*7 (U.S. District Court for the Southern District of Florida Sept. 16, 2010) (citation
omitted).
`CPS software merely automates the
aggregation of public information—a task that could otherwise be performed
manually by law enforcement, albeit at a slower and less efficient pace.’ United
States v. Thomas, 788 F.3d 345, 352 (U.S. Court of Appeals for the 2d Circuit 2015) (footnote omitted).
CPS software operates `simply as a
sorting mechanism to prevent the government from having to sift, one by one,
through [an individual's] already publically exposed files.’ United States
v. Borowy, 595 F.3d 1045, 1048 (U.S. Court of Appeals for the 9th Circuit 2010) (footnote omitted). `So, even if CPS does collect
information, it collects publicly available information, which does not run
afoul of the Fourth Amendment.’ United States v. Dennis, Crim. No.
3:13–CR–10–TCB, 2014 WL 1908734, at *2 (U.S. District Court for the Northern District of Georgia May 12, 2014) (citations omitted).
All reported state court decisions
considering this issue have likewise held that law enforcement may use CPS
software to obtain information to form probable cause for a search warrant
without violating the defendant's expectation of privacy. See State
v. Dunham, 111 So.3d 1095, 1098 (Louisiana Court of Appeals 2012); State
v. Dziegiel, No. A–0009–12T4, 2013 WL 5447716, at *3 (New Jersey SuperiorCourt – Appellate Division Oct. 2, 2013); State v. Mahan, No.
95696, 2011 WL 4600044, at *7 (Ohio Court of Appeals Oct. 6, 2011); State
v. Holland, 272 Oregon Court of Appeals 211, 355 P.3d 194, 196 (2015); State
v. Aguilar, 437 S.W.3d 889, 901 (Tennessee Court of Criminal Appeals 2013);
State v. Roberts, 345 P.3d 1226, 1235 (Utah Supreme Court 2015).
Frazier v. State,
supra.
The Court also noted that
Appellant takes the position that United
States v. Ahrndt, Crim. No. 3:08–CR–00468–KI, 2013 WL 179326, at *2 (U.S. District Court for the District of Oregon Jan. 17, 2013), decided this precise
Fourth Amendment challenge in his favor. Our review of Ahrndt reveals that the court addressed neither sharing files over
a peer-to-peer network nor CPS software.
Rather, Ahrndt specifically
explained that it granted the defendant's motion to suppress because the
government produced `no evidence [defendant] was sharing files on the
peer-to-peer network’ and the folder was not `accessible over the internet by
[peer-to-peer network] users at the time [the officer] accessed the files, or
at any time prior.’ Id. at *7.
Importantly, in reaching this
conclusion, the district court distinguished the case from United
States v. Ganoe, 538 F.3d 1117 (U.S. Court of Appeals for the 9th Circuit 2008). Ahrndt, 2013
WL 179326, at *7. In Ganoe, the Ninth Circuit held that the
defendant lacked a reasonable expectation of privacy because “he knew or should
have known that the folder into which he downloaded the files was accessible to
others on the peer-to-peer network.” United
States v. Ganoe, supra. Therefore,
Appellant's reliance on Ahrndt is misplaced.
Moreover, Appellant quotes extensively
to the facts in United States v. Thomas, No. 5:12–CR–37, 2013
WL 6000484, at *1 (U.S. District Court for the District of Vermont Nov. 8, 2013), to explain how the CPS software
functions. However, Appellant does not cite to the court's holding, which
stated, `Because there is no evidence that law enforcement's use of automated
software reached information on Defendants' computers that was not made
available for sharing by the public, Defendants' motions to suppress on the
basis of a warrantless search in violation of the Fourth Amendment must be
DENIED.’ Id. at *20.
Frazier v. State,
supra.
The Court of Appeals concluded its opinion by explaining
that
Appellant fails to demonstrate why we
should find, contrary to every other court to address this issue, that CPS
software violates the Fourth Amendment.
Appellant argues the `State's reasoning
appears to be that if the house is unlocked the police can secretly slip in
without being invited.’ However, as the [U.S. District Court for the] Eighth
Circuit explained, `[o]ne who gives his house keys to all of his friends who
request them should not be surprised should some of them open the door without
knocking.’ United States v. Stults, 575 F.3d 834 (U.S. Court of Appeals for the 8th Circuit 2009)
Appellant knew or should have known that
sharing files over the Gnutella network would `allow the public at large to
access files in his shared folder unless he took steps to avoid it.’ United States v. Borowy, supra. Accordingly, Appellant did not have areasonable expectation of privacy in the files he shared over the Gnutella
network.
Because Appellant did not have a
reasonable expectation of privacy in those files, the information gleaned from
the CPS software did not constitute an illegal search, and, therefore, formed a
valid basis for probable cause to issue a search warrant. For these reasons,
the trial court correctly denied Appellant's motion to suppress.
Frazier v. State,
supra.
No comments:
Post a Comment