History
  • No items yet
midpage
United States v. Arumugam
2:19-cr-00041-RSL
W.D. Wash.
Mar 10, 2020
Read the full case

Background

  • Defendant Murugananandam Arumugam is charged with receipt and possession of child pornography; law enforcement used a modified eMule client called RoundUp to investigate him.
  • From July 2016–April 2017 Detective Conine used RoundUp to download ~2,942 files or partial files from IP address 73.11.164.229 (Port 54494); two lengthy child‑pornography videos were described in detail in the affidavit.
  • Conine obtained subscriber identity from Comcast via a warrant; Arumugam was identified as the subscriber and a residential search warrant was issued Jan. 30, 2018 and executed Feb. 1–2, 2018.
  • Seized computers and storage devices contained eMule software and files depicting child pornography; defendant moved to suppress (1) evidence derived from RoundUp and (2) physical evidence/statements from the residential search.
  • Defendant argued RoundUp constituted warrantless generalized surveillance/technology not in public use and that RoundUp ‘‘digitally trespassed’’ (tracer tag); he also sought a Franks hearing alleging material omissions about RoundUp’s automated operation and reliability.

Issues

Issue Plaintiff's Argument Defendant's Argument Held
Whether the government's use of RoundUp to access files on the eMule P2P network constituted a Fourth Amendment "search" because RoundUp differs from public eMule United States: Files in a user’s shared folder are publicly exposed; RoundUp accessed public shared files so no reasonable expectation of privacy Arumugam: RoundUp’s modifications are not in general public use; using it for automated surveillance violated his privacy Court: No search. Files placed in eMule "shared" folders are public; RoundUp accessed publicly shared files, so no reasonable expectation of privacy.
Whether RoundUp’s activity amounted to a "digital trespass" (placement of a tracer tag/active intrusion on defendant’s machine) United States: RoundUp did not alter or access private areas of defendant’s computer; eMule clients normally record connection metadata Arumugam: RoundUp repeatedly "tagged" and monitored his computer without consent Court: No digital trespass. The recording of connection metadata was ordinary eMule behavior; RoundUp did not invade or occupy the defendant’s computer.
Whether a Franks hearing is warranted for alleged omissions/misrepresentations about RoundUp’s automated operation and reliability United States: Any omitted technical minutiae about automation/reliability were immaterial; downloaded videos were confirmed and described in affidavit Arumugam: Affiant omitted that downloads were automated and did not disclose potential reliability problems, so affidavit may be materially false/misleading Court: Denied. Defendant failed to make the substantial preliminary showing required for a Franks hearing; omissions were not material and reliability concerns were speculative.
Whether the residential search warrant was supported by probable cause (including staleness concerns given many downloads but only two described and a ~10‑month gap) United States: Totality of circumstances — ~2,942 downloads/partials plus two detailed child‑pornography videos and defendant’s affirmative use of eMule — gave fair probability contraband would be found; nine‑month/ten‑month gap not dispositive Arumugam: Affidavit relied on only two described videos amid thousands of downloads and the last download was ~10 months earlier; reliance on generalized collector characteristics made the evidence stale Court: Probable cause found. The volume of downloads plus detailed video descriptions and evidence of affirmative sharing supported a fair probability that contraband would be present; staleness not fatal.

Key Cases Cited

  • Kyllo v. United States, 533 U.S. 27 (2001) (police use of device not in public use to explore details of home is a search)
  • Jones v. United States, 565 U.S. 400 (2012) (physical placement of GPS device constituted a search due to trespass/occupation)
  • Riley v. California, 573 U.S. 373 (2014) (searches of cell phones require Fourth Amendment protection due to vast personal data)
  • Carpenter v. United States, 138 S. Ct. 2206 (2018) (cell‑site location information can implicate reasonable expectation of privacy)
  • Franks v. Delaware, 438 U.S. 154 (1978) (defendant must make substantial preliminary showing of deliberate or reckless falsehood to obtain evidentiary hearing)
  • Illinois v. Gates, 462 U.S. 213 (1983) (probable cause determined by totality of the circumstances)
  • United States v. Leon, 468 U.S. 897 (1984) (good‑faith exception to exclusionary rule for warrant reliance)
  • United States v. Lacy, 119 F.3d 742 (9th Cir. 1997) (affirmed probable cause where defendant had downloaded child pornography months earlier)
  • United States v. Schesso, 730 F.3d 1040 (9th Cir. 2013) (upheld probable cause and seizure where defendant had uploader activity months earlier)
  • United States v. Raymonda, 780 F.3d 105 (2d Cir. 2015) (warrant invalid where only a single, brief access to thumbnails was insufficient to show fair probability contraband remained)
Read the full case

Case Details

Case Name: United States v. Arumugam
Court Name: District Court, W.D. Washington
Date Published: Mar 10, 2020
Docket Number: 2:19-cr-00041-RSL
Court Abbreviation: W.D. Wash.