STATE OF OHIO v. JAMES MAHAN
No. 95696
Court of Appeals of Ohio, EIGHTH APPELLATE DISTRICT, COUNTY OF CUYAHOGA
October 6, 2011
2011-Ohio-5154
Sweeney, J., Stewart, P.J., and Celebrezze, J.
Criminal Appeal from the Cuyahoga County Court of Common Pleas Case No. CR-525553. RELEASED AND JOURNALIZED: October 6, 2011. JUDGMENT: AFFIRMED AND REMANDED.
Ronald L. Frey, Esq.
Ian N. Friedman & Associates, L.L.C.
1304 West Sixth Street
Cleveland, Ohio 44113
ATTORNEYS FOR APPELLEE
William D. Mason, Esq.
Cuyahoga County Prosecutor
By: T. Allan Regas, Esq.
Francine B. Goldberg, Esq.
Assistant County Prosecutors
The Justice Center, 9th Floor
1200 Ontario Street
Cleveland, Ohio 44113
{¶ 1} Defendant-Appellant, James Mahan, appeals from the trial court‘s denial of his motion to suppress and his motion to compel. Appellant also appeals the sentence imposed upon him. For the reasons that follow, we affirm but remand with instructions to reclassify defendant as a Tier II sex offender as both parties conceded at oral argument defendant was improperly classified as a Tier III sex offender.1
{¶ 3} During the course of the proceedings, defendant filed a motion to compel certain information from the state, including a mirror image forensic copy of Peer Spectre and any and all instruction/operation and/or training manuals associated with Peer Spectre, and the software‘s source code. Defendant believed the information would reveal the functionality and calibration of the software, and asserted it was material to his defense in order to challenge the software‘s reliability and methodology.
{¶ 4} In opposition, the state maintained the requested discovery was not subject to disclosure by the state pursuant to
{¶ 5} The trial court conducted a hearing on defendant‘s motion to suppress and the motion was denied. Defendant then entered a plea of no contest and was found guilty. The trial court imposed an aggregate prison sentence of 16 years comprised of the following: eight year concurrent prison terms on 11 counts to be served consecutively with eight year concurrent prison terms on 70 other counts; all concurrent with four and one year prison terms on the remaining counts.
{¶ 6} Defendant‘s appeal presents four assignments of error for our review:
{¶ 7} “I. The trial court erred when it denied the defendant-appellant‘s motion to suppress.”
{¶ 8} “Appellate review of a trial court‘s ruling on a motion to suppress presents mixed questions of law and fact. An appellate court is to accept the trial court‘s factual findings unless they are clearly erroneous. We are therefore required to accept the factual
{¶ 9} Under this asserted error, defendant raises multiple issues that allege that: (1) the trial court erred in its findings of fact and conclusions of law; (2) the warrantless use of Peer Spectre constituted an unlawful search in violation of his constitutional rights; (3) the search warrant was issued without probable cause because it relied on information obtained from use of Peer Spectre; and (4) the probable cause finding for the search warrant was based upon an affidavit that contained substantive inaccuracies and omissions.
{¶ 10} The trial court conducted an evidentiary hearing on defendant‘s motion to suppress at which McGinnis was the only witness.
{¶ 11} McGinnis testified as follows: He obtained training on internet investigations of child pornography from Fox Valley Technical College, and the training included peer-to-peer network searches. As part of his training, he was instructed on the use of Peer Spectre, which is exclusively restricted to law enforcement. Peer Spectre is a search program that operates on the Gnutella network, which is a public peer-to-peer network where people share their computer files back and forth. The Gnutella network enables people to log onto the internet to search, find, retrieve, and download shared files from other computers, including child pornography. The search will reveal an IP address
{¶ 12} McGinnis repeatedly testified that all the information he obtained from using Peer Spectre he could have obtained using other publicly available software, such as LimeWire or Phex, the only difference being that with the other software he would have to manually enter the data to keep searching. McGinnis stated that Peer Spectre saves time.
{¶ 13} In short, Peer Spectre conducts an automated search that identifies file sharing of known or suspected child pornography associated with a specific IP address. While McGinnis acknowledged that he did not create Peer Spectre and was unaware of the technical aspects of it, he testified that he was trained how to operate it and understood that it reads publicly available advertisements from computers that are sharing files over the Gnutella peer-to-peer network.
{¶ 14} Each time that Peer Spectre is used by a law enforcement agency anywhere in the world, the results are compiled in a centralized server. The information that is logged into the central database includes the IP address, the port that it came from, and
{¶ 15} On May 23, 2008, McGinnis used this technology to search for IP addresses that were active in Ohio in May of 2008 and had been recorded as sharing known or suspected child pornography. McGinnis retrieved a “hit list” for the IP addresses at issue, which identified each file‘s SHA1 value, the date and time the file was made available for sharing, and the file‘s size, geographical location, and description. The records identified a particular IP address as a computer that made available for sharing known or suspected child pornography on May 12, 2008. From his experience, McGinnis recognized some of the SHA1 values as known child pornography. McGinnis nonetheless personally reviewed each file just to ensure that it was what he believed it to be. Portions of these files were played during defendant‘s suppression hearing and corroborated McGinnis‘s testimony as to their content of child pornography.
{¶ 16} Each IP address is unique to a certain computer at a given time. McGinnis subpoenaed the internet service provider (“ISP“) for the subscriber associated with that IP address at that time. He received the customer name and account holder, which was defendant, however, this information does not identify who was actually using the computer at the relevant time. Therefore, McGinnis was not targeting defendant but instead he sought and obtained a search warrant for the residential address based upon his belief that a computer at that address contained the suspected contraband.
{¶ 18} McGinnis testified that this was the first time he had used information gained from Peer Spectre to obtain search warrants, however, he was aware of Peer Spectre‘s accuracy from other law enforcement agencies. By the suppression hearing, it had become McGinnis‘s experience that whenever they located a computer through the use of Peer Spectre, they found child pornography on the computer unless the hard drive had been wiped clean. Under cross-examination, McGinnis stated that he could not testify to the technological processes Peer Spectre uses when it is functioning. However, he knew that Peer Spectre logs onto the same peer-to-peer network as any other publicly available software in order to perform its functions. The defense elicited an admission from McGinnis that he did not know if the files were located in a “shared folder.”
{¶ 19} While McGinnis more than once testified that he did not know if Peer Spectre went beyond shared folders of a computer, he consistently confirmed that the information recorded by Peer Spectre is “identical to the information that you would get from running a search in LimeWire if you were running it at that time that the IP address
{¶ 20} With regard to defendant‘s assignment of error, it is well settled that “the protections of the Fourth Amendment only extend to places where ‘the defendant can claim a reasonable expectation of privacy.‘” United States v. Norman (Sept. 24, 2010), M.D. Ala. No. 2:09-CR-118-WKW, quoting Katz v. United States (1967), 389 U.S. 347, 360, 88 S.Ct. 507, 9 L.Ed.2d, 576, other citations omitted. “What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.” Id., quoting Katz, 389 U.S. at 351.
{¶ 21} The state maintains that the use of Peer Spectre without a warrant did not violate defendant‘s constitutional right to be free from unreasonable searches and seizures because it simply automated the ability to search information that had been placed in the public domain. In other words, the program searches those files that have been placed in a public file-sharing network. Therefore, the first issue becomes whether defendant had a reasonable expectation of privacy in the subject files.
{¶ 22} At least one federal court that has confronted this issue concluded there is no reasonable expectation of privacy over files searched using Peer Spectre. Norman, supra (finding “a ‘search’ is not at issue unless the defendant first establishes that he or
{¶ 23} In Norman, the court observed, “courts addressing this issue have uniformly held that there is no reasonable expectation of privacy in files made available to the public through peer-to-peer file-sharing networks.” Id., citing United States v. Stults (C.A.8, 2009), 575 F.3d 834, 842-843; United States v. Ganoe (C.A.9, 2008), 538 F.3d 1117, 1127; United States v. Perrine (C.A.10, 2008), 518 F.3d 1196, 1205; United States v. Laduea (Apr. 7, 2010), D.Mass. No. 09-40021-FDS; United States v. Brese (Apr. 9, 2008), W.D.Okla. No. CR-08-52-D.
{¶ 24} Defendant asserts that McGinnis‘s inability to testify as to the specific functionality of Peer Spectre wrongly placed the burden of proof on him. However, defendant has not challenged or refuted the evidence that indicated the files from an IP address assigned to his computer were being shared over a peer-to-peer network on May 12, 2008, and therefore he has not established a reasonable expectation of privacy. Where there is no reasonable expectation of privacy over the shared files, the technical aspects of the law enforcement software are not at issue. Norman, supra.
{¶ 25} Next we address defendant‘s argument that, as a means of establishing probable cause, McGinnis‘s affidavit could not be based on information he obtained through Peer Spectre in the absence of testimony concerning the technical functionality of
{¶ 26}
{¶ 27} “(1) A warrant shall issue on either an affidavit or affidavits sworn to before a judge of a court of record or an affidavit or affidavits communicated to the judge by reliable electronic means establishing the grounds for issuing the warrant. The affidavit shall name or describe the person to be searched or particularly describe the place to be searched, name or describe the property to be searched for and seized, state substantially the offense in relation thereto, and state the factual basis for the affiant‘s belief that such property is there located. * * *
{¶ 28} “(2) * * * The finding of probable cause may be based upon hearsay in whole or in part, provided there is a substantial basis for believing the source of the hearsay to be credible and for believing that there is a factual basis for the information furnished. * * * ”
{¶ 29} The gravamen of defendant‘s position is that probable cause was lacking because McGinnis was unable to testify as to the technical functionality of Peer Spectre and whether it was somehow able to search beyond what is shared, because he did not know Peer Spectre‘s standard of error. Defendant has not provided us with a single
{¶ 30} Assuming without deciding that the use of computer software is equivalent to obtaining information from a confidential informant, the affidavit supplied a probable cause basis to believe that the software was credible and reliable.
{¶ 31} In Gates v. Illinois (1983), 462 U.S. 213, 217, the United States Supreme Court considered “the application of the Fourth Amendment to a magistrate‘s issuance of a search warrant on the basis of a partially corroborated anonymous informant‘s tip.” In Gates, the Court reasoned, “[a]n informant‘s ‘veracity,’ ‘reliability,’ and ‘basis of knowledge’ are all highly relevant in determining the value of his report. * * * [T]hese elements * * * should be understood simply as closely intertwined issues that may usefully illuminate the common sense, practical question whether there is ‘probable cause’ to believe that contraband or evidence is located in a particular place.” Id. at 230.
{¶ 32} “Sufficient information must be presented to the magistrate to allow that official to determine probable cause; his action cannot be a mere ratification of the bare
{¶ 33} Gates directs appellate courts to employ a totality of the circumstances analysis to determine whether probable cause supported the issuance of a search warrant. Id. at 238. Gates also provides that “after-the-fact scrutiny by courts of the sufficiency of an affidavit should not take the form of de novo review. A magistrate‘s ‘determination of probable cause should be paid great deference by reviewing courts.‘” Id. at 236, other citation omitted; see, also, State v. George (1989), 45 Ohio St.3d 325, 330.
{¶ 34} There is a presumption of the validity of a warrant affidavit, which the defendant can overcome by an offer of proof showing the affidavit contained a knowing, intentional, or reckless falsity. State v. Roberts (1980), 62 Ohio St.2d 170, 178, citing Franks v. Delaware, 438 U.S. 154, 98 S.Ct. 2674, 57 L.Ed.2d 667. However, the validity of the affidavit will not be overcome by such showing if, when the “affidavit material
{¶ 35} The questions before us are (1) whether, under the totality of the circumstances, the affidavit provided a substantial basis for the judge‘s conclusion that there was a fair probability that child pornography would be found on a computer in the defendant‘s residence, and (2) whether there remains sufficient content in the affidavit to support the warrant after any false information is excluded. In each regard, we find in the affirmative.
{¶ 36} McGinnis‘s affidavit and testimony adequately provided a substantial basis for concluding that the information obtained from Peer Spectre was credible and reliable, including, but not limited to the following: McGinnis has many years of experience investigating internet child pornography. He was aware of Peer Spectre‘s accuracy based on information he learned from other agencies. He was trained specifically on the use of Peer Spectre and knew that Peer Spectre searches peer-to-peer, or file sharing, networks. McGinnis had used other software programs to search peer-to-peer networks and obtained the same information he got from using Peer Spectre. He has never known the other programs to search beyond shared files.
{¶ 37} McGinnis located an IP address recorded as sharing files on May 12, 2008, three of which he recognized as being child pornography from his years of experience. He independently corroborated this by viewing the files. McGinnis obtained the account
{¶ 38} Defendant maintains that probable cause is lacking unless law enforcement downloaded or confirmed that the suspect files from the computer were contraband before obtaining the search warrant. In order to support a probable cause determination, the totality of the circumstances need only indicate a fair probability, not a certainty, that the contraband will be found at the place to be searched. United States v. Cartier (C.A.8, 2008), 543 F.3d 442. In Cartier, the court upheld the denial of a motion to suppress where the FBI relied on information supplied by the Spanish Guardia that defendant had downloaded child pornography from a peer-to-peer file sharing network. Cartier, like defendant, argued that probable cause for the search warrant was lacking because the FBI had not verified the reliability of the software prior to obtaining the warrant. The court rejected the argument finding the evidence established that the FBI knew the Spanish Guardia “to be a reliable law enforcement agency that used a trustworthy means of computer forensics.” Id. at 446. McGinnis‘s testimony likewise establishes his knowledge that Peer Spectre is a trustworthy source of information used by law enforcement agencies.
{¶ 39} Defendant‘s first assignment of error is overruled.
{¶ 41} The granting or denial of a motion to compel discovery is reviewed under an abuse-of-discretion standard. The inquiry is whether the trial court‘s decision is unreasonable, arbitrary, or unconscionable. State ex rel. V. Cos. v. Marshall (1998), 81 Ohio St.3d 467, 469, 692 N.E.2d 198.
{¶ 42} The trial court denied defendant‘s motion to compel a mirror image forensic copy of Peer Spectre used in the investigation, any and all instruction/operation and/or training manuals associated with the software, and Peer Spectre‘s source code. The court‘s order instructed defendant to contact the software company regarding issues pertaining to the programming of Peer Spectre.
{¶ 43} Defendant had urged the court to compel production of the information from the state pursuant to
{¶ 44} “(c) Documents and tangible objects. Upon motion of the defendant the court shall order the prosecuting attorney to permit the defendant to inspect and copy or photograph books, papers, documents, photographs, tangible objects, buildings or places, or copies or portions thereof, available to or within the possession, custody or control of the state, and which are material to the preparation of his defense, or are intended for use3
{¶ 45} Defendant also cites to the provisions of
{¶ 46} The information sought by defendant is not a mental examination or scientific test and was not subject to production on that basis. While defendant speculates that the information may have been favorable to him in challenging the reliability of the software‘s results, the state maintains that it did not have possession, custody or control of the information. The evidence supports the state‘s position. Peer Spectre‘s owner, Wiltse, averred in his affidavit that Peer Spectre is copyrighted, the source code is not distributed to anyone, and the use of Peer Spectre is restricted to trained law enforcement officers. Wilste averred that defendant could not discern how the software application used by the state operated without the source code.
{¶ 47} Alternatively, the state contends the information is not material to the defense, and the release of the restricted use software would compromise a worldwide network of trained law enforcement personnel and possibly the database.
{¶ 48} Defendant asserts that the information would enable him to challenge the reliability of the results of the software. However, the evidence establishes that an
{¶ 49} Because the state was not in possession of the source code, and without it one cannot discern how the software operates, the trial court did not abuse its discretion by denying the motion to compel, and this assignment of error is overruled.
{¶ 50} “III. The defendant-appellant‘s right to due process of law as guaranteed by Article 1, Section 10 of the Ohio State Constitution and the Fourteenth Amendment to the United States Constitution was violated when he was sentenced to sixteen (16) years.”
{¶ 51} “IV. The court‘s imposition of consecutive sentences, without making appropriate findings and reasons as required by
{¶ 52} The third and fourth assignments of error are overruled.
{¶ 54} Defendant contends his sentence is not supported by clear and convincing evidence and is contrary to law. He also argues that the trial court abused its discretion by imposing a 16-year sentence.
{¶ 55} The trial court imposed the maximum sentence of eight years on 81 counts of the indictment. Then the court grouped the offenses into categories. The court segregated Counts 1 through 11, which involved images defendant made available for sharing, from Counts 12 through 81, which were based on images/videos found on defendant‘s computer hard drive that depicted children involved in sexual acts. For all counts in each grouping, defendant received maximum but concurrent eight-year prison terms, however, the sentences in Counts 1 through 11 were to be served consecutively to the sentences in counts 12 through 81, for an aggregate term of 16 years in prison. The court then imposed a four year prison sentence for Counts 82 through 94, which involved images that depicted nude children but did not involve any sexual acts, and imposed a one-year prison term on the final count for possessing criminal tools, i.e., the computer.
{¶ 56} Defendant argues that the maximum sentence on 82 counts, as well as the imposition of consecutive sentences, was not supported by sufficient reasoning and does not comport with the purposes of felony sentencing set forth in
{¶ 57} In imposing its sentence, the court noted that it is “well-known the defendant has otherwise been a law-abiding, productive citizen.” The record reflects a long marriage to his wife and that they raised a daughter who is successful. Defendant‘s wife, daughter, and others in their community continued to support him throughout these proceedings and advocated on his behalf at sentencing. According to the record,
{¶ 58} The court emphasized that defendant‘s conduct victimized the subjects of the child pornography every time the media is viewed, shared, or downloaded. Defendant recognized this harm, which he discussed during his allocution. Defendant stated he had an addiction, which escalated as he focused on younger and younger subjects. The court cited this admission during sentencing. Defendant acknowledged the heinous nature of the crimes, which was echoed by the state as well as the court. The state described other sexually explicit content found on defendant‘s computer, including
{¶ 59} The record establishes that defendant‘s conduct was “relentless and ongoing” for a period of eight years until he was stopped by law enforcement intervention. With respect to the images found on defendant‘s computer, the court expressed, “[e]verything you could possibly imagine occurred on this computer. And everything you could possibly imagine was shared with other individuals.”
{¶ 60} Defendant asserts that his sentence is inconsistent with sentences imposed for similar crimes by similar offenders. He refers us to sentencing journal entries from other cases in this district where individuals convicted of multiple counts of pandering sexually-oriented matter involving a minor received lesser sentences than his, ranging from community control sanctions to four years in prison. According to defendant, all of those individuals were also indicted as a result of Operation Safety Net. However, these journal entries tell us little, if anything, of the offender characteristics and provide no information beyond the convictions and terms of the sentences.
{¶ 61} On the other hand, our research has revealed that in at least one other case an individual who was indicted in the same investigation received the same 16-year sentence as defendant, which this court upheld. See State v. Cooper, Cuyahoga App. No. 93308, 2010-Ohio-1983, ¶ 19-21.
{¶ 63} We acknowledge that a 16 year prison term imposed on a first-time offender who has, by all accounts, led an otherwise productive, law abiding life is a harsh sentence and is perhaps not one that we may have imposed. Nonetheless, the sentence was significantly less than what the court could have imposed based on defendant‘s 95 convictions. There was ample testimony in the record of the harm that has been, and continues to be, inflicted upon the victims who are the subjects of the material being viewed in these types of cases. The images, once uploaded, continue to circulate on the internet where individuals, like defendant, view them and make them available for viewing by others. The wide range of sentences that have been apparently imposed on
{¶ 64} The third assignment of error is overruled.
{¶ 65} Judgment affirmed, and the case is remanded to correct the sentencing journal entry to accurately reflect defendant‘s classification as a Tier II sex offender.
It is ordered that appellee recover of appellant its costs herein taxed.
The Court finds there were reasonable grounds for this appeal.
It is ordered that a special mandate issue out of this Court directing the Common Pleas Court to carry this judgment into execution. The defendant‘s conviction having been affirmed, any bail pending appeal is terminated. Case remanded to the trial court for execution of sentence.
A certified copy of this entry shall constitute the mandate pursuant to
JAMES J. SWEENEY, JUDGE
MELODY J., STEWART, P.J., and FRANK D. CELEBREZZE, JR., J., CONCUR
