State v. Daigle
93 So. 3d 657
La. Ct. App.2012Background
- Daigle pled guilty to one count of pornography with juveniles and received a two-year hard labor sentence; required to register as a sex offender; reserved Crosby motions.
- Defendant filed a motion to suppress the evidence prior to the plea, arguing illegal seizure from his home computer and privacy expectations.
- Trial court denied the suppression motion on November 30, 2009; stated the evidence could be viewed through peer-to-peer sharing and SHA values.
- Supplemental suppression motions in 2010 argued Detective Gremillion relied on SHA-1 values from the Wyoming Tool Kit and ICAC data, lacking probable cause.
- Second supplemental motion (June 2010) contended ICAC data and BearShare contract limited access and privacy expectations; argued BearShare/Wyoming Tool Kit were not publicly available.
- On appeal, the district court maintained denial of suppression; defendant challenges the ruling; conviction affirmed on appeal.
Issues
| Issue | Plaintiff's Argument | Defendant's Argument | Held |
|---|---|---|---|
| Privacy in SHA values and shared files | Daigle had a reasonable expectation of privacy in SHA values and shared BearShare files. | SHA values and encrypted/shared files are private; law enforcement overstepped by viewing them. | No reasonable expectation of privacy; no Fourth Amendment violation. |
| Probable cause and the search warrant | Warrant was based on inaccurate/invalid information; probable cause lacked. | Wyoming Tool Kit/ICAC data could not establish probable cause; warrant invalid. | Record supports probable cause; warrant not invalidated; suppression denied. |
| Standard of review for suppression rulings | Appeal should be de novo review of suppression ruling. | Court should apply abuse-of-discretion standard for mixed questions of fact and law. | Abuse-of-discretion standard applied; defer to trial court findings. |
| Reliance on ICAC/Wyoming Tool Kit data | ICAC/IDN data improperly used to infer probable cause without direct file viewing. | Wyoming Tool Kit appropriately identified SHA values; data valid for probable cause. | Reliance not invalidating; data appropriately used within framework. |
| Burden of proving invalid warrant | Defense bears burden to prove warrant invalid due to errors in application/affidavit. | No warrant/affidavit in record; defense proved invalidity. | State bears burden; defendant failed to prove invalid warrant due to absence of record. |
Key Cases Cited
- State v. Bargeman, 721 So.2d 964 (La.App. 8 Cir. 1998) (abuse-of-discretion standard for suppression review)
- U.S. v. Stults, 575 F.3d 834 (8th Cir. 2009) (fourth amendment privacy in computer-related evidence; officer's use of software)
- U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) (privacy and search considerations in peer-to-peer file sharing contexts)
- U.S. v. Perrine, 518 F.3d 1196 (10th Cir. 2008) (probable cause standards in digital evidence contexts)
- U.S. v. Borowy, 595 F.3d 1045 (9th Cir. 2010) (permissible use of specialized software in digital investigations)
