Case Information
*1
This opinion is subject to revision before final
publication in the Pacific Reporter
S UPREME C OURT OF THE S TATE OF U TAH TATE OF U TAH , Appellee,
v. D ANIEL OBERTS , Appellant.
No. 20120884 Filed January 30, 2015 Seventh District, Castle Dale The Honorable Douglas B. Thomas No. 101700043 Attorneys: Sean D. Reyes, Att’y Gen., Marian Decker, Asst. Att’y Gen., Salt Lake City, for appellee Sean P. Hullinger, Lehi, for appellant J USTICE P ARRISH authored the opinion of the Court, in which C HIEF J USTICE D URRANT , A SSOCIATE C HIEF J USTICE N EHRING , J USTICE D URHAM , and J USTICE L EE joined.
J USTICE P ARRISH , opinion of the Court: INTRODUCTION
¶1 Daniel Roberts entered a conditional guilty plea to five charges of sexual exploitation of a minor arising from child pornography on his laptop computer. On appeal, Mr. Roberts challenges four of the district court’s pretrial rulings. He first challenges the propriety of law enforcement’s use of the Wyoming Toolkit, a computer program and database used to identify child pornography shared over the Internet through peer-to-peer file sharing networks. Mr. Roberts next challenges the district court’s ruling that denied him discovery of the Wyoming Toolkit. He also brings a constitutional challenge to Utah’s sexual exploitation of a minor statute (Sexual Exploitation Statute) under which he was charged, Utah Code section 76-5a-3 (2009) (renumbered as Utah Code section 76-5b-201). Finally, Mr. Roberts challenges the district court’s denial of his motion in limine to exclude all evidence obtained by or related to the Wyoming Toolkit. We affirm the district court on all issues.
BACKGROUND
¶2 Utah’s Internet Crimes Against Children task force (ICAC) works to prevent the online distribution of child pornography. The ICAC searches peer-to-peer (P2P) file sharing networks for child pornography being shared among P2P users. Gnutella, one such P2P network, allows its users to share digital files directly over the Internet. Gnutella uses what is called the secure hash algorithm [1]
(SHA-1) encryption method to assign a unique digital signature to each file shared over its network. Because each digital file has a different SHA-1 value, those values can be used to identify a file. Through prior investigations, law enforcement has compiled a database of thousands of SHA-1 values that correspond to files containing child pornography. This database, along with software that searches Gnutella for the identified SHA-1 values, is known as the Wyoming Toolkit.
¶3 The ICAC uses the Wyoming Toolkit to monitor Gnutella for IP addresses sharing files with suspect SHA-1 values. Once the Toolkit flags an IP address sharing a file with an SHA-1 value that matches known child pornography files, officers confirm that the suspect file is indeed child pornography either by downloading and viewing the file directly or by comparing the identified file’s SHA-1 value with SHA-1 values of known child pornography contained in databases like the National Child Victim Identification Program. Upon confirming that the identified file is child pornography, officers send an administrative subpoena to the applicable internet service provider to obtain the subscription information associated with the identified IP address.
¶4 During a 2009 investigation, the ICAC determined that an IP address in Emery County, Utah, had used Gnutella to share hundreds of “files with SHA-1 digital signatures identical to images of suspected child pornography” during a five month period. The ICAC submitted these findings to FBI Agent Sonja Nordstrom. Upon For additional information on Gnutella, see Definition of: Gnutella , PCM AG . COM , http://www.pcmag.com/encyclopedia/term /43835/gnutella (last visited Jan. 20, 2015).
confirming the files contained child pornography, Agent Nordstrom [2] served a subpoena on Emery Telecom, the local internet service provider, which was able to identify Mr. Roberts as the owner of the suspect IP address. Based on this information, Agent Nordstrom obtained a search warrant for Mr. Roberts’ home and computers.
¶5 Mr. Roberts was not home the day police officers executed the search warrant. Agent Nordstrom called Mr. Roberts on his cell phone to inform him of the search, but did not discuss the purpose of the investigation. Mr. Roberts told Agent Nordstrom that he was in Ogden, Utah, where his wife was in the hospital. Agent Nordstrom later spoke with Mr. Roberts’ wife, who indicated that Mr. Roberts had his laptop computer with him in Ogden.
¶6 Agent Nordstrom traveled to Ogden to meet with Mr. Roberts. Mr. Roberts brought his laptop to the meeting, and Agent Nordstrom explained to Mr. Roberts that he was being investigated for possession of child pornography. After some questioning, Mr. Roberts admitted that he had been downloading child pornography for approximately a year and that he had been in the process of deleting the child pornography from his computer since Agent Nordstrom had called him. After Mr. Roberts made this admission, Agent Nordstrom asked if she could see his laptop. Mr. Roberts consented. Agent Nordstrom subsequently obtained a search warrant specifically for Mr. Roberts’ laptop.
¶7 Mr. Roberts’ laptop was taken to a computer forensic lab, where an examiner found video and still images of child pornography. Mr. Roberts was charged with thirty counts of sexual exploitation of a minor, a second degree felony. U TAH C ODE § 76-5a- 3 (2009). Before trial, Mr. Roberts made four motions that are the [3]
subject of this appeal. First, he moved to suppress the evidence of child pornography found on his laptop. Relying on the United States Supreme Court case Kyllo v. United States , 533 U.S. 27 (2001), Mr. Roberts argued that the Wyoming Toolkit, like the thermal [2] To confirm the content of these files, Agent Nordstrom compared the SHA-1 values of the files shared by Mr. Roberts with the SHA-1 values of files she had previously viewed that contained child pornography. In 2011, the Legislature renumbered section 76-5a-3 as 76-5b-201
and made minor change to its substance. Because Mr. Roberts was charged prior to this amendment, we rely on the May 2009 version for purposes of his appeal.
image scanning at issue in Kyllo , constituted a search, and therefore use of the Toolkit without a warrant violated the Fourth Amendment to the United States Constitution. Mr. Roberts further argued that he had an expectation of privacy in the contents of his computer and that by accessing those contents through the Wyoming Toolkit, the State violated his expectation of privacy through an unlawful search. The district court denied Mr. Roberts’ motion, reasoning that the Wyoming Toolkit did not have “the same intrusiveness as thermal imaging” and that “peer-to-peer file sharing is not entitled to a reasonable expectation of privacy.”
¶8 Second, Mr. Roberts moved to compel discovery of the Wyoming Toolkit and its methodologies. He also moved to compel discovery of “any and all associated program documentation, instruction manuals, technical support materials, training materials, and purchase documents . . . to verify that the images [he] is alleged to have possessed are in fact[] illegal images.” The district court granted the motion in part and denied it in part. It held that Mr. Roberts was entitled to discovery of “whatever information the State has in regards to this case,” including “any information the State has” regarding the SHA-1 values associated with the files found on Mr. Roberts’ laptop. But it denied Mr. Roberts’ motion to compel discovery of every SHA-1 value in the Wyoming Toolkit database and “the search algorithm process and methodology utilized” in the Toolkit. It reasoned that discovery of the Toolkit was unnecessary for the purpose Mr. Roberts alleged because Agent Nordstrom had personally verified that the files Mr. Roberts had shared on Gnutella were indeed child pornography and because “disclosure of investigative techniques and procedures would interfere with law enforcement efforts.”
¶9 Third, Mr. Roberts moved to dismiss the case on the ground that Utah’s Sexual Exploitation Statute is unconstitutional. Mr. Roberts argued that the statute violates the Uniform Operation of Laws Provision of the Utah Constitution on its face because it unconstitutionally distinguishes between (1) individuals who illegally possess child pornography and (2) individuals who may legally possess child pornography such as law enforcement officers acting within the scope of a criminal investigation and employees or agents of entities that report and prevent child pornography when they are acting in good faith and within the scope of their employment. Mr. Roberts also argued that, as applied, the statute [4]
discriminates between prosecuting attorneys and defense attorneys who may come into possession of child pornography during their representation or prosecution of a defendant charged under the Sexual Exploitation Statute. Mr. Roberts asserted that defense attorneys, but not prosecuting attorneys, who come into possession of child pornography would be in violation of the statute.
¶10 The district court denied Mr. Roberts’ motion to dismiss,
holding that the Sexual Exploitation Statute was not
unconstitutional. Although the statute creates distinct classifications
between those who may and may not legally possess child
pornography, the district court reasoned that those classifications do
not “impose any disparate treatment on persons similarly situated.”
(Citing
State v. Robinson
,
The relevant language of Utah Code section 76-5a-3, effective May 2009, is as follows:
(1) A person is guilty of sexual exploitation of a minor: (a) when the person:
(i) knowingly produces, possesses, or possesses with intent to distribute child pornography; or (ii) intentionally distributes or views child pornography;
. . . .
(5) This section may not be construed to impose criminal or civil liability on:
(a) any entity or an employee, director, officer, or agent of an entity when acting within the scope of employment, for the good faith performance of: (i) reporting or data preservation duties required under any federal or state law; or (ii) implementing a policy of attempting to prevent the presence of child pornography on any tangible or intangible property, or of detecting and reporting the presence of child pornography on the property; or
(b) any law enforcement officer acting within the scope of a criminal investigation.
¶11 The district court also rejected Mr. Roberts’ as-applied challenge to the statute. While it acknowledged that defense attorneys and prosecutors are similarly situated and that the statute discriminates between them, it concluded that the distinction is justified by a legitimate government interest in eliminating the market for child pornography. It also observed that law enforcement allows defense attorneys to view evidence of child pornography as part of their representation, if they do so at the Regional Computer Forensics Lab (RCFL). It therefore held that although prosecutors and defense attorneys are treated differently under the statute, the restriction on defense attorneys is not overly burdensome, is reasonable, and is justified by the State’s interest in eliminating the dissemination of child pornography.
¶12 Finally, Mr. Roberts filed a motion in limine to preclude the State from offering expert testimony on the Wyoming Toolkit. He argued that the admission of evidence regarding “the technical elements of the Wyoming Toolkit, the scientific principles that underlie the technology, or the reliability of the inputs required by the system” would be impermissible under the Utah Rules of Evidence because “[t]he reliability of the methods has not been demonstrated by the State, nor has the defense had opportunity to challenge them.”
¶13 The district court held an evidentiary hearing on Mr. Roberts’ motion to exclude expert testimony, during which the State presented the testimony of Special Agent Coy Acocks, an expert on the Wyoming Toolkit. Agent Acocks testified as to the methodologies of the Toolkit, explaining that the technology used to develop the Toolkit is publicly available and could be used by anyone to search P2P networks. He also testified that the Toolkit correctly identifies child pornography files with extraordinarily high accuracy. Agent Acocks explained that officers using the Toolkit do not rely on the Toolkit alone to obtain a warrant to search a suspected computer. Rather, they conduct further investigation by reviewing files that the Toolkit has identified as child pornography to confirm the Toolkit’s accuracy. Mr. Roberts presented no competing expert testimony or other evidence challenging Agent Acocks’ testimony.
¶14 At the conclusion of the hearing, the district court ruled from the bench that the Wyoming Toolkit employed reliable methods based on “fairly common and available standard processes.” The court found that the officers using the Toolkit are well trained, that the SHA-1 values’ reported accuracy is reliable, and that the process used to ascertain IP addresses is reliable. The court also found that the Toolkit “is simply a tool to be used by law enforcement officers as one step in the investigation of a case. It is not the conclusion.” Once officers use the Toolkit to identify possible child pornography, they undertake additional steps to assure that the files identified by the Toolkit and associated with a certain IP address are actually child pornography. The court thus concluded that the Wyoming Toolkit was a reliable basis for expert testimony.
¶15 Mr. Roberts entered a plea agreement with the State under which he pled conditionally guilty to five counts of sexual exploitation of a minor. The State dismissed the remaining twenty- five counts. The district court subsequently sentenced Mr. Roberts to concurrent prison terms of one-to-fifteen years, but suspended the prison terms and placed Mr. Roberts on 36 months of probation, including 240 days in the county jail. Mr. Roberts timely appealed his conviction to the court of appeals, which certified his appeal to this court. He challenges each of the pretrial rulings identified above. We have jurisdiction under Utah Code section 78A-3-102(3)(b).
STANDARDS OF REVIEW
¶16 Different standards of review apply to each of Mr. Roberts’
arguments. We review for correctness the district court’s denial of
Mr. Roberts’ motion to suppress on the ground that law
enforcement’s use of the Wyoming Toolkit constituted an unlawful
search.
State v. Tripp
,
ANALYSIS
I. MR. ROBERTS’ ARGUMENTS ARE ADEQUATELY BRIEFED
¶17 As a preliminary matter, we address the State’s contention that Mr. Roberts’ arguments are inadequately briefed. The State argues that Mr. Roberts’ appellate brief “is filled with conclusory assertions and virtually bereft of citations to the record” and “provides no meaningful analysis” of the district court’s rulings. The State thus asks us to dismiss each of Mr. Roberts’ arguments as inadequately briefed.
¶18 Rule 24 of the Utah Rules of Appellate Procedure
“prescribe[s] standards for the form, organization, and content of a
brief on appeal.”
State v. Nielsen,
¶19 Despite the discretionary nature of our briefing
requirements, we have seen an increasing number of appellees who
spend considerable time arguing over the adequacy of the
appellant’s brief, rather than addressing the merits of the appellant’s
position. In taking such an approach, appellees are often guilty of the
very deficiency of which they complain. Although the briefing
standard articulated in rule 24(a) is directed in the first instance to
appellants, rule 24(b) applies those same requirements to the brief of
the appellee.
Broderick v. Apartment Mgmt. Consultants, L.L.C.
,
¶20 In this case, although the State’s initial brief addressed the merits of some of Mr. Roberts’ claims, it did not address the merits of two of his claims. Instead, it argued only that those claims had been inadequately briefed. In so doing, the State took the risk that we would disagree with its assessment of the adequacy of Mr. Roberts’ briefing and thereby forfeit its chance to respond to the merits of those two claims. While we could have defaulted the State for its failure to argue the substance of the issues, we exercised our discretion to provide the State with an opportunity to supplement its brief. We caution, however, that an appellee who fails to respond to the merits of an appellant’s argument will risk default. Rather than challenging the adequacy of an appellant’s brief, an appellee should instead layout the relevant legal standard and point out why the appellant has failed to carry his burden of persuasion.
¶21 Having clarified the standard for adequate briefing, we
conclude that most of Mr. Roberts’ arguments are adequately
briefed. Although Mr. Roberts’ arguments are in some instances
poorly articulated and weakly supported by legal authority, his
briefing does not fall below the requirements of rule 24. Unlike cases
where the appellant “failed to cite
any
case law from
any
jurisdiction
in order to set forth the elements of, or the legal standards for, his
claims,”
Carlton v. Brown
,
¶22 In summary, Mr. Roberts has adequately briefed most of his arguments. That some of his arguments are not well organized or persuasive does not necessarily mean they are inadequately briefed. Instead, it suggests that Mr. Roberts has not satisfied his burden of persuasion on appeal. [5]
We do, however, agree with the State as to the inadequacy of Mr. Roberts’ arguments that the district court erred in denying his motion to clarify its ruling on the discovery of the Wyoming Toolkit. Although Mr. Roberts asserts error, he does not direct us to any place in the record where the district court made a ruling on this
(continued...) II. THE DISTRICT COURT DID NOT ERR IN DENYING MR. ROBERTS’ MOTION TO SUPPRESS ¶23 Mr. Roberts argues that the district court erred in denying his motion to suppress the evidence of child pornography found on his computer under the theory that law enforcement’s use of the Wyoming Toolkit constituted an illegal search. According to Mr. Roberts, the warrant that the State obtained to search his computer was based on an unlawful search of the files Mr. Roberts shared on Gnutella. He argues that the evidence obtained from that search therefore should have been suppressed. He also argues that the administrative subpoena issued to Emery Telecom was improper. We disagree. Law enforcement’s use of the Wyoming Toolkit to identify files freely shared on P2P networks does not constitute a search. And the Emery Telecom subpoena was procedurally sound under the law as it existed at the time it was issued.
A. Use of the Wyoming Toolkit to Identify Child Pornography in a File
Shared Openly on a P2P Network Is Not a Search
¶24 The Fourth Amendment to the United States Constitution
prohibits “unreasonable searches and seizures.” Government
conduct that infringes upon a subjective and “reasonable expectation
of privacy” constitutes a search and therefore cannot take place
absent a valid warrant or a recognized exception to the warrant
requirement.
State v. Price
, 2012 UT 7, ¶ 9, 270 P.3d 527 (internal
quotation marks omitted). A subjective and reasonable expectation
of privacy exists when “(1) an individual has ‘exhibited an actual
(subjective) expectation of privacy’ and (2) ‘the expectation [is] one
that society is prepared to recognize as reasonable.’”
Id.
(alteration
in original) (quoting
Katz v. United States
,
(...continued) issue, nor does he explain the district court’s basis for denying the motion. Indeed, Mr. Roberts failed to request the transcript of the hearing in which the court heard argument on this issue. As a result, we have no basis on which to review the district court’s ruling on the discoverability of the Wyoming Toolkit.
¶25 Although we have yet to consider whether a reasonable
expectation of privacy exists in a file shared over a P2P network,
several federal courts have considered the issue and none has found
an expectation of privacy.
See United States v. Hill
,
¶26 In this case, Mr. Roberts publicly shared his files on Gnutella, thereby rendering them publicly available to anyone with a Gnutella client. And because Mr. Roberts made no effort to limit access to his files on Gnutella, he exhibited no subjective expectation of privacy in those files. Neither the ICAC’s investigation of Mr. Roberts’ publicly shared files nor its use of the Wyoming Toolkit to identify the files as child pornography constituted a search. The Wyoming Toolkit merely enabled the ICAC officers to recognize files with SHA-1 values associated with child pornography. But it did not allow the government to access private information on Mr. Roberts’ computer. It therefore did not invade a constitutionally protected private space.
¶27 Without acknowledging the federal case law undermining
his argument, Mr. Roberts relies on the United States Supreme
Court’s opinion in
Kyllo v. United States
,
¶28 Mr. Roberts focuses on the fact that the government in Kyllo used technology that is not publicly available. He argues that, like the thermal imaging scanners at issue in Kyllo , the Wyoming Toolkit is not accessible to the public. But the greater concern in Kyllo was that the government was using the technology to intrude the privacy of the home. The Wyoming Toolkit, on the other hand, is used only to identify child pornography in files that are publicly shared on P2P network. Unlike thermal imaging scanners, the Toolkit does not intrude on any interest in which the defendant has a reasonable expectation of privacy. Use of the Toolkit therefore does not constitute an unlawful search.
B. A Search Did Not Take Place When Law Enforcement Obtained Mr. Roberts’ Subscription Information from His Internet
Service Provider
¶29 In addition to challenging the government’s use of the Wyoming Toolkit, Mr. Roberts argues that the government conducted an unconstitutional search when it used his IP address to identify him through the Emery Telcom subpoena. But Mr. Roberts once again ignores the overwhelming weight of authority finding no reasonable expectation of privacy in subscription information, like an IP address, given to an internet service provider. See Perrine , 518 F.3d at 1204 (”Every federal court to address this issue has held that subscriber information provided to an internet provider is not protected by the Fourth Amendment’s privacy expectation.”).
¶30 Although Mr. Roberts points to no case law in support of his position, he relies on two recently enacted statutes that he argues are relevant to the propriety of the Emery Telecom subpoena. The first, Senate Bill 46, which became effective on March 25, 2014, amends the administrative subpoena statute to require the signature of a judge rather than a prosecutor for all administrative subpoenas. 2014 Utah Laws 254–55 (ch. 47); see also U TAH C ODE § 77-22-2.5. The second, House Bill 128, which became effective on July 1, 2014, added provisions to the Utah Code that now require law enforcement to obtain a warrant to search for the location information of an electronic device. 2014 Utah Laws 942–43 (ch. 223); see also U TAH C ODE § 77-23c-101 to -103.
¶31 Mr. Roberts relies on our per curiam decision in State v. Belgard, 615 P.2d 1274, 1276 (1980), to argue that these statutory amendments apply retroactively to his case and that the administrative subpoena issued to Emery Telecom in 2009 was procedurally deficient. In Belgard , this court, quoting the Seventh Circuit, stated:
It is well established that when a lower court relies on a legal principle which is changed by treaty, statute, or decision prior to direct review, an appellate court must apply the current law rather than the law as it existed at the time the lower court acted. ‘Intervening and conflicting decisions will thus cause the reversal of judgments which were correct when entered.’ Id. (quoting United States v. Fitzgerald , 545 F.2d 578, 581 (7th Cir. 1976)). When viewed in isolation, the Fitzgerald and Belgard line of cases appears to support the retroactive application of these statutes. But the United States Supreme Court has clarified that this rule is inapplicable where the legislature has expressed its intent that a statute not be applied retroactively. Kaiser Aluminum & Chem. Corp. v. Bonjorno , 494 U.S. 827, 837–38 (1990) (explaining that, in the context of retroactivity, “where [legislative] intent is clear, it governs”).
¶32 In Utah, the Legislature has expressed a clear presumption
against retroactive application. U TAH C ODE § 68-3-3 (“A provision of
the Utah Code is not retroactive, unless the provision is expressly
declared to be retroactive.”). As a result, we generally “apply the law
as it exists at the time of the event regulated by the law in question.”
State v. Clark
,
¶33 In this case, neither statute on which Mr. Roberts relies declares that it applies retroactively. We therefore apply the law as it existed at the time of the relevant event, which in this case was the State’s issuance of the administrative subpoena Emery Telecom in October 2009. At that time, Utah Code section 77-22-2.5(2) permitted prosecutors to issue administrative subpoenas, and the Utah Code did not require a warrant to search an electronic device’s location information. Because the Emery Telecom subpoena was issued in compliance with the law at the time, we reject Mr. Roberts’ challenge to its validity.
¶34 In summary, we hold that the government’s use of the Wyoming Toolkit to identify child pornography in files shared on a P2P network does not constitute a search. And under the law that was in place at the time, a search did not take place when law enforcement obtained Mr. Roberts’ subscription information through the subpoena to Emery Telecom. We therefore affirm the district court’s denial of Mr. Roberts’ motion to suppress.
III. THE DISTRICT COURT DID NOT ABUSE ITS DISCRETION
IN DENYING MR. ROBERTS’ MOTION TO COMPEL
DISCOVERY OF THE WYOMING TOOLKIT
¶35 Mr. Roberts argues that the district court abused its
discretion in denying his motion to compel discovery of the
Wyoming Toolkit, including its methodologies and all of the SHA-1
values in its database. We review this claim for an abuse of
discretion and the appellant bears a heavy burden in showing that
the district court abused its discretion.
R & R Energies v. Mother Earth
Indus., Inc.
,
¶36 In ruling on the motion to compel, the district court allowed Mr. Roberts to discover any information the State had regarding his case, including the SHA-1 values associated with files found on his laptop. But the district court denied the remainder of Mr. Roberts’ discovery request for two independent reasons: (1) that discovery of the Toolkit would not produce the evidence Mr. Roberts sought (i.e., verification that the files Mr. Roberts had shared and that the Toolkit had detected were indeed child pornography) and (2) that disclosure of all of the Toolkit’s methodologies and SHA-1 values would harm future ICAC investigations.
¶37 Mr. Roberts’ main argument on appeal is that the Toolkit and its methodologies are not privileged. But the district court did not hold that the Toolkit was privileged information; it merely held that discovery of all aspects of the Toolkit and its methodologies were not relevant and would be harmful to future ICAC investigations. And because Mr. Roberts provides no authority to the contrary, he has failed to show that the district court abused its discretion by denying discovery.
¶38 Moreover, Mr. Roberts does not address the district court’s
alternative ground for denying the motion: that discovery of the
Toolkit would not be useful in verifying that the files Mr. Roberts
had shared on Gnutella contained child pornography.
See Salt Lake
Cnty. v. Butler, Crockett & Walsh Dev. Corp.
,
¶39 In summary, Mr. Roberts has failed to meet his burden of persuasion on appeal. And where the district court permitted discovery of those aspects of the Wyoming Toolkit that were most relevant to Mr. Roberts’ case, it did not abuse its discretion in denying discovery of the entire Toolkit database, its methodologies, and all of its SHA-1 values. We therefore affirm the district court’s discovery ruling.
IV. MR ROBERTS’ CONSTITUTIONAL CHALLENGE TO THE
SEXUAL EXPLOITATION STATUTE FAILS ¶40 Mr. Roberts challenges the Sexual Exploitation Statute under the Uniform Operation of Laws Provision of the Utah Constitution. U TAH C ONST . art. I, § 24 (“All laws of a general nature shall have uniform operation.”). He argues that the statute creates at least two unconstitutional classifications. First, he claims that the statute unconstitutionally distinguishes between individuals who can legally view child pornography (i.e., law enforcement officers acting to further a criminal investigation and employees of designated entities acting in good faith to report or prevent child pornography) and those who may not. See U TAH C ODE § 76-5a-3 (2009). Second, he argues that the statute unconstitutionally distinguishes between prosecuting attorneys who encounter child pornography as part of their work and similarly situated criminal defense attorneys. We reject both arguments—the first on its merits and the second due to a lack of standing. [6] Mr. Roberts clearly has standing to raise his first challenge to the Sexual Exploitation Statute because (1) he has suffered an injury (i.e.,
(continued...) A. The Classifications Created by the Sexual Exploitation Statute
Are Constitutional
¶41 For a statute to comply with the Uniform Operation of Laws
Provision of the Utah Constitution, “it is not enough that it be
uniform on its face. What is critical is that the operation of the law be
uniform.”
Gallivan v. Walker
,
¶42 Looking to the first Robinson requirement, Mr. Roberts correctly argues that the Sexual Exploitation Statute creates certain classifications. Most notably, it imposes criminal and civil liability on individuals who “knowingly produce[], possess[], or possess[] with intent to distribute” or “intentionally distribute[] or view[] child pornography”; but the statute exempts from liability law enforcement officers who encounter child pornography as part of a criminal investigation and employees of certain organizations acting in good faith and within the scope of their employment to report or prevent child pornography. U TAH C ODE § 76-5a-3 (2009).
¶43 Under the second
Robinson
requirement, however, these
classifications are not unconstitutional because they do not
discriminate between similarly situated individuals. The key
distinction between the individuals in each classification is the
context within which they view, possess, or distribute child
pornography. The statute exempts only those law enforcement
officers “acting within the scope of a criminal investigation” and
only employees of specific entities who are “acting within the scope
of employment” and “for the good faith performance of” reporting
or preventing child pornography.
Id.
Any law enforcement officer or
(...continued)
criminal prosecution and conviction), (2) that injury was caused by
the statute’s alleged unconstitutionality, and (3) we have the
authority to redress his injury if we determine the statute is
unconstitutional.
See Carlton v. Brown
,
employee of an exempt entity who knowingly or intentionally produces, possesses, views, or distributes child pornography for any other reason will be subject to the same criminal liability as other individuals. Because this classification does not distinguish between similarly situated individuals, it fails the second requirement of the Robinson test. The Sexual Exploitation Statute therefore does not violate the Uniform Operation of Laws Provision of the Utah Constitution based on this classification.
B. Mr. Roberts Lacks Standing to Challenge the Constitutionality of the Sexual Exploitation Statute’s Disparate Treatment of Prosecutors and
Criminal Defense Attorneys
¶44 Mr. Roberts also contends that the Sexual Exploitation Statute unconstitutionally distinguishes between prosecuting attorneys and defense attorneys. Specifically, he argues that [7]
prosecuting attorneys, are exempt under the Sexual Exploitation Statute when viewing, possessing, or distributing child pornography within the scope of a criminal investigation. Defense attorneys, on the other hand, are granted no such exemption, and thus would be in violation of the statute by possessing, viewing, or distributing child pornography as part of their legal representation of a criminal defendant.
¶45 On its face, the Sexual Exploitation Statute provides no
exemption for criminal defense attorneys who must view evidence
that may include child pornography in order to zealously advocate
for their clients. Before addressing the constitutionality of this
apparent oversight, however, we must first determine whether
Mr. Roberts has standing to bring this challenge.
See Gregory v.
Shurtleff
, 2013 UT 18, ¶ 9, 299 P.3d 1098 (“Since standing is a
jurisdictional requirement, we first must determine whether
In 2009, the Legislature amended the Sexual Exploitation Statute
to expressly exclude liability for law enforcement officers and
employees of exempt organizations.
See
U TAH C ODE § 76-5b-201(6).
It did not, however, include an exemption for others involved in the
judicial process who may be required to view child pornography
during the course and within the scope of their employment. As a
practical matter, those involved in the judicial process, including
judges, court staff, jurors, and lawyers—both prosecuting and
defense—are unlikely to be prosecuted under this statute.
Nevertheless, the Legislature may wish to consider broadening the
exclusion to include such participants in the judicial process.
Appellants have standing to bring any of their claims.”);
see also State
v. Tuttle,
¶46 Standing requires that we view the constitutionality of a
statute from the perspective of the party raising the challenge.
See
State v. Hoffman
,
¶47 Under the first requirement, a party may only challenge a
statute “to the extent the alleged basis of its infirmity is, or will be,
applied to his detriment.”
Hoffman
,
¶48 And although Mr. Roberts alleges an indirect harm to criminal defendants based on defense counsel’s fear of prosecution, he has not shown that his counsel genuinely feared prosecution so as to render his counsel’s representation ineffective. While Mr. Roberts baldly asserts that his counsel was “unable to challenge the provenance and character of the evidence against him” because counsel was “at jeopardy of criminal prosecution” under the statute, he wholly fails to substantiate this assertion. In fact, defense counsel was given government-sanctioned access to the child-pornography evidence at the RCLF without threat of prosecution. As the district court noted in ruling on this issue, “[d]efense counsel has not alleged that its access to the evidence was in any way inadequate under the facts of this case.”
¶49 Defense counsel’s purported fear of prosecution and the
impact of that fear on counsel’s representation of Mr. Roberts are
speculative at best, and therefore are insufficient to demonstrate an
injury for purposes of standing.
See Midvale City Corp. v. Haltom
,
¶50 We next consider whether Mr. Roberts has standing under
our alternative, public-interest test.
See Gregory
,
¶51 Mr. Roberts has not presented any argument as to why he should be granted standing under our alternative test. By not presenting any argument, Mr. Roberts fails to satisfy his burden of showing that he is entitled to public-interest standing.
¶52 In summary, we conclude that Utah’s Sexual Exploitation Statute does not violate the Uniform Operation of Laws Provision of the Utah Constitution because it does not treat similarly situated individuals differently. And Mr. Roberts lacks standing to challenge the constitutionality of the Sexual Exploitation Statute’s purported disparate treatment of prosecuting and defense attorneys.
V. THE DISTRICT COURT DID NOT ABUSE ITS DISCRETION IN DENYING MR. ROBERTS’ MOTION TO PRECLUDE EXPERT
TESTIMONY ON THE WYOMING TOOLKIT
¶53 Mr. Roberts’ final argument is that the district court erred
in denying his motion in limine to preclude expert testimony on the
Wyoming Toolkit. He contends that the Wyoming Toolkit does not
satisfy the reliability test for expert testimony required by rule 702
of the Utah Rules of Evidence. Mr. Roberts carries a heavy burden
in seeking reversal of this ruling because we grant district courts
broad discretion in determining the admissibility of expert
testimony.
State v. Hollen
,
¶54 Rule 702 of the Utah Rules of Evidence governs the
admissibility of expert witness testimony. It requires first that the
testimony of an expert witness “help the trier of fact to understand
the evidence or to determine a fact at issue.” U TAH R. E VID . 702(a).
Second, a party seeking to rely on expert scientific or technical
testimony may do so only “if there is a threshold showing that the
principles or methods that are underlying in the testimony (1) are
reliable, (2) are based upon sufficient facts or data, and (3) have been
reliably applied to the facts.”
Id.
702(b). The advisory committee
notes to rule 702 emphasize that a party seeking to admit expert
testimony “is required to make only a ‘threshold’ showing . . .
[, which] requires only a basic foundational showing of indicia of
reliability for the testimony to be admissible, not that the opinion is
indisputably correct.”
Id.
702 advisory committee note. This low
threshold permits district court judges, as the gatekeepers of
evidence, to err on the side of admission as long as there is some
minimal indication that the evidence is reliable. We note, however,
that the rigor of rule 702 “will vary depending on the complexity of
the particular case.”
Eskelson ex rel. Eskelson v. Davis Hosp. & Med.
Ctr.
,
¶55 In this case, the district court held that expert testimony on the Wyoming Toolkit satisfied rule 702's threshold of reliability. The court found that the Toolkit’s use of SHA-1 values to identify child pornography files was based on a reliable “mathematical formula” that results in “an extraordinarily high degree of correlation between the SHA-1 value and the actual image.” The court also found that the Wyoming Toolkit uses software that is “readily available” and “fairly common,” thereby refuting Mr. Roberts’ claim that the Toolkit relies on undefined scientific methods. The court further found that the officers using the Toolkit were well trained and that adequate safeguards were in place to assure that a file identified by the Toolkit was indeed child pornography. The court thus found that the Wyoming Toolkit was reliable, was based upon sufficient facts or data, and was reliably applied to the facts of Mr. Roberts’ case.
¶56 On appeal, Mr. Roberts argues that the expert testimony on the Wyoming Toolkit did not satisfy the reliability requirements of rule 702, but he provides no authoritative support for his claim. He offers no evidence to refute the district court’s reliability determination, cites to no legal or other authority that might [8]
undermine the reliability of the Wyoming Toolkit, and points to nothing in the record to support his position. Instead, he simply asserts without any supporting authority that the Toolkit is not as reliable as the district court found it to be. In short, Mr. Roberts has failed to provide any evidence that the district court abused its discretion in admitting the expert testimony on the Wyoming Toolkit. Contrary to Mr. Roberts’ unsupported claims, the State provided substantial evidence of the Toolkit’s accuracy and the validity of its methodologies. Based on this evidence, the district court’s finding that the Toolkit was reliable was supported by the evidence and therefore met rule 702's threshold reliability requirement.
¶57 In summary, we affirm the district court’s denial of Mr. Roberts’ motion in limine because Mr. Roberts has not provided any evidence that the district court abused its discretion under rule 702 of the Utah Rules of Evidence by admitting expert testimony about the Wyoming Toolkit.
CONCLUSION
¶58 We affirm each of the district court’s pretrial rulings in this
case. First, the district court correctly found that the State’s use of the
Wyoming Toolkit did not constitute a search under the Fourth
Amendment because Mr. Roberts had no reasonable expectation of
privacy in files he publicly shared on a P2P network. Nor did an
Mr. Roberts could have argued that he was unable to present
evidence about the Toolkit because he was denied discovery. But he
has neither raised nor briefed that argument here, so we decline to
address it.
See Diversified Holdings, L.C. v. Turner
, 2002 UT 129,
¶ 10 n.4,
unlawful search take place when law enforcement obtained Mr. Roberts’ subscription information from Emery Telecom. Second, the district court did not abuse its discretion in limiting Mr. Roberts’ discovery of the Wyoming Toolkit database and its methodologies. Third, the district court correctly dismissed Mr. Roberts’ constitutional challenges to the Sexual Exploitation Statute. Finally, the district court did not abuse its discretion in admitting expert testimony on the Wyoming Toolkit. We therefore affirm Mr. Roberts’ conviction for violation of the Sexual Exploitation Statute.
