Justin Frazier (“Appellant”) appeals the trial court’s denial of his motion to suppress evidence of child pornography discovered on his personal computer pursuant to a search warrant. We affirm the trial court’s denial, finding that a person who shares files over a peer-to-peer network has no expectation of privacy in those files. We write to provide clarification as to why the State did not violate Appellant’s Fourth Amendment rights by using Child Protection System software (“CPS software”) to obtain information to form the basis for its search warrant.
CPS software, developed by a company called TLO, automates the process law enforcement uses to search for persons sharing child pornography over peer-to-peer networks. When a user shares a file over a peer-to-peer network — in this case, the Gnutella network — any other user can enter keywords to search the network for that file. The user can then download the file directly from the sharer’s computer. Each file on the network contains an associated hash value, a unique combination of digital characters identifying the file in a manner more precise than the file name.
CPS software searches the peer-to-peer network using a predefined list of keywords and compares the responses with an online database of known child exploitation material. This database, managed by TLO, contains a list of over 300,000 file names and hash values that law enforcement officers have confirmed as being associated with files containing child pornography. CPS software narrows the responses to files shared from computers located only within the searching officer’s jurisdiction. CPS software does not infiltrate any computers when searching peer-to-peer networks for child exploitation material. Rather, the software gathers only public information made available by the user sharing files over the network, including the computer’s IP address. Law enforcement may subpoena the internet service provider for that particular IP address to determine to whom the address is registered and then use the information to form probable cause for a search warrant.
Numerous Fourth Amendment challenges to law enforcement’s use of CPS software have failed in the Federal Courts. CPS software does not “search any areas of [defendant’s] computer, download any files, or otherwise reveal any information ... unavailable to ordinary internet users.” United States v. Gabel, No. 10-60168,
All reported state court decisions considering this issue have likewise held that law enforcement may use CPS software to obtain information to form probable cause for
Appellant takes the position that United States v. Ahrndt, Crim. No. 3:08-CR-00468-KI,
Moreover, Appellant quotes extensively to the facts in United States v. Thomas, No. 5:12-CR-37,
Appellant fails to demonstrate why we should find, contrary to every other court to address this issue, that CPS software violates the Fourth Amendment. Appellant argues the “State’s reasoning appears to be that if the house is unlocked the police can secretly slip in without being invited.” However, as the Eighth Circuit explained, “[o]ne who gives his house keys to all of his friends who request them should not be surprised should some of them open the door without knocking.” United States v. Stults,
AFFIRMED.
