History
  • No items yet
midpage
State v. Daigle
93 So. 3d 657
La. Ct. App.
2012
Read the full case

Background

  • Daigle pled guilty to one count of pornography with juveniles and received a two-year hard labor sentence; required to register as a sex offender; reserved Crosby motions.
  • Defendant filed a motion to suppress the evidence prior to the plea, arguing illegal seizure from his home computer and privacy expectations.
  • Trial court denied the suppression motion on November 30, 2009; stated the evidence could be viewed through peer-to-peer sharing and SHA values.
  • Supplemental suppression motions in 2010 argued Detective Gremillion relied on SHA-1 values from the Wyoming Tool Kit and ICAC data, lacking probable cause.
  • Second supplemental motion (June 2010) contended ICAC data and BearShare contract limited access and privacy expectations; argued BearShare/Wyoming Tool Kit were not publicly available.
  • On appeal, the district court maintained denial of suppression; defendant challenges the ruling; conviction affirmed on appeal.

Issues

Issue Plaintiff's Argument Defendant's Argument Held
Privacy in SHA values and shared files Daigle had a reasonable expectation of privacy in SHA values and shared BearShare files. SHA values and encrypted/shared files are private; law enforcement overstepped by viewing them. No reasonable expectation of privacy; no Fourth Amendment violation.
Probable cause and the search warrant Warrant was based on inaccurate/invalid information; probable cause lacked. Wyoming Tool Kit/ICAC data could not establish probable cause; warrant invalid. Record supports probable cause; warrant not invalidated; suppression denied.
Standard of review for suppression rulings Appeal should be de novo review of suppression ruling. Court should apply abuse-of-discretion standard for mixed questions of fact and law. Abuse-of-discretion standard applied; defer to trial court findings.
Reliance on ICAC/Wyoming Tool Kit data ICAC/IDN data improperly used to infer probable cause without direct file viewing. Wyoming Tool Kit appropriately identified SHA values; data valid for probable cause. Reliance not invalidating; data appropriately used within framework.
Burden of proving invalid warrant Defense bears burden to prove warrant invalid due to errors in application/affidavit. No warrant/affidavit in record; defense proved invalidity. State bears burden; defendant failed to prove invalid warrant due to absence of record.

Key Cases Cited

  • State v. Bargeman, 721 So.2d 964 (La.App. 8 Cir. 1998) (abuse-of-discretion standard for suppression review)
  • U.S. v. Stults, 575 F.3d 834 (8th Cir. 2009) (fourth amendment privacy in computer-related evidence; officer's use of software)
  • U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) (privacy and search considerations in peer-to-peer file sharing contexts)
  • U.S. v. Perrine, 518 F.3d 1196 (10th Cir. 2008) (probable cause standards in digital evidence contexts)
  • U.S. v. Borowy, 595 F.3d 1045 (9th Cir. 2010) (permissible use of specialized software in digital investigations)
Read the full case

Case Details

Case Name: State v. Daigle
Court Name: Louisiana Court of Appeal
Date Published: May 2, 2012
Citation: 93 So. 3d 657
Docket Number: No. KA 11-1209
Court Abbreviation: La. Ct. App.