MEMORANDUM OPINION AND ORDER
Dеnnis Ammons has been indicted for knowingly producing and receiving child pornography. His prosecution originates from the Government’s investigation of “Playpen,” a website dedicated to the distribution and discussion of matters pertinent to child pornography and the sexual abuse of children. Though a website, Playpen could not be accessed through the traditional Internet. Instead, Playpen existed on “The Onion Router” network (or “Tor,” for short). The Tor network conceals the internet protocol addresses of its users, thereby thwarting traditional techniques employed to identify Internet users. To circumvent Tor’s protections, the Federal Bureau of Investigation obtained a warrant from Magistrate Judge Buchanan of the Eastern District of Virginia to deploy a network investigative technique on Playpen’s server. The NIT would instruct a user’s computer to transmit certain information—such as the computer’s IP address—to the FBI after the user logged on to Playpen. Using the NIT, the FBI identified Ammons as a registered user on Playpen. The FBI obtained a warrant to search his residence located in Muldraugh, Kentucky оn the basis of that information. Now, Ammons seeks to suppress all information seized pursuant to the NIT warrant, including the evidence obtained during or as a result of the search of his home.
The Court holds that use of the NIT was a “search” within the meaning of the Fourth Amendment. Though Magistrate Judge Buchanan issued the NIT warrant, she lacked authority to do so under the Federal Magistrates Act, 28 U.S.C. §§ 631-639, and Federal Rule of Criminal Procedure 41(b). The ensuing search of Amnions’ computer, therefore, violated the
I.
A.
The prosecution of Dennis Ammons originates from the Government’s investigation of “Playpen,” a website “dedicated to the advertisement and distribution of child pornography” and “the discussion of matters pertinent to child sexual abuse.” [R. 24-2 at 14, ¶ 6 (Special Agent Macfar-lane’s Affidavit).] Though a website, Playpen could not be accessed through the traditional Internet. [Id at 16, ¶ 10.] Instead, Playpen existed on “The Onion Routеr” network (or “Tor,” for short). [Id. at 14, ¶ 7.] Tor is designed “specifically to facilitate anonymous communication over the Internet.” [R. 24-5 at 17, ¶ 17 (Special Agent MacHenry’s Affidavit).] It accomplishes that task in two ways.
First, Tor thwarts traditional techniques employed to identify Internet users. [R. 24-2 at 27-28, ¶ 31.] For example, the Government typically identifies users by obtaining and tracing a computer’s internet protocol address. [See R. 24-5 at 23, ¶ 32.] Whenever a person accesses a website through the Internet, the website typically logs that computer’s IP address. [R. 24-2 at 15, ¶ 8.] If the Government were tо seize control of that website, then it could retrieve the logs and discover which IP addresses accessed the site. [R. 24-5 at 23, ¶ 32.] By cross-referencing an IP address with publically-available databases, which list the IP address ranges assigned to various internet service providers, the Government could determine which ISP owned the target IP address. [Id.] The Government could then ascertain the identity of the user through an administrative subpoena issued to the ISP. [Id]
Tor changes all of that. Tor masks a user’s IP address by routing communications through “a distributed network of relay comрuters run by volunteers all over the world.” [R. 24-2 at 15, ¶ 8.] When a user on the Tor network accesses a website, the only IP address revealed to the site is that of the last computer in the relay, dubbed an “exit node.” [I'd] It is impossible, though, to trace that IP address back to the originating computer. [Id] Consequently, a user on the Tor network remains effectively anonymous to the websites he or she visits. [Id]
Second, Tor affords anonymity to those who host websites as “hidden services” on the Tor network too. [Id at 15-16, ¶ 9.] A hidden service functions just like any other website with a single exceptiоn: The website’s IP address is hidden and replaced with a Tor-based address consisting of a series of alphanumeric characters followed by the suffix “.onion.” [Id] There is no way to determine the IP address of the server hosting a hidden service. [Id]
A hidden service may only be accessed through the Tor network. [Id at 16, ¶ 10.] Even after connecting to the Tor network, though, a user cannot stumble across a hidden service while using an ordinary search engine, such as Google. [See id. at 16-17, ¶ 10.] Instead, a user must know the exact Tor-based address of the hidden service. [Id at 16,10.]
Playpen оperated on the Tor network as a hidden service from around August 2014 to March 2015. [Id at 16-17, ¶¶ 10-11.] Upon registering for an account, potential users were warned not to enter a real email address or to post identifying information in their profiles. [Id at 18, ¶ 13.] Playpen informed potential users that the website and its administrators were unable to determine the IP addresses of any
In December 2014, a foreign law-enforcement agency advised the Federal Bureau of Investigation that a United States-based IP address appeared to be associated with Playpen. [Id. at 25, ¶ 28.] Shortly after, the FBI confirmed that the IP address belonged to Centrilogic, a server hosting company headquartered in Lenoir, North Carolina. [Id. at 25-26, ¶ 28.] The FBI subsequently obtained and executed a search warrant in Jаnuary 2015. [Id.] Upon discovering that the target server contained a copy of Playpen, the FBI transported it to a government-controlled server in Newington, Virginia, located in the Eastern District of Virginia. [See id. at 25-27, ¶¶ 28, 30.] On February 19, 2015, the FBI apprehended the suspected administrator of, and assumed control over, Playpen. [Id. at 26-27, ¶ 30.]
The FBI wished to continue operating Playpen for a limited time (from February 20 to March 5, 2015) so as to identify its users. [Id.] To that end, the Government sought and obtained a warrant from Magistrate Judge Buchanan of the Eastern District of Virginia to deploy a network investigative technique (or “NIT,” for short) on Playpen’s server. [Id. at 27-28, ¶ 31; see also id. at 2-4 (NIT Search Warrant).] The NIT is a series of code that instructed a user’s computer to transmit certain information to the FBI after the user logged on to Playpen. [Id. at 28, ¶ 32-33.] In detail, the information consisted of the computer’s IP address, oper-. ating system, “host name,” active operating system username, media access control address, and a unique identifier (to distinguish the data sent from other devices). [Id. at 4.]
Using the NIT, the FBI determined that a person going by the username “H8RL3Y” had registered on Playpen on March 4, 2015. [R. 24-5 at 24, ¶ 37.] Between March 4 and March 5, “H8RL3Y” accessed several images of child pornography over a six-hour period of activity. [Id. at 24-25, ¶¶ 37-39.] Cross-referencing the IP address associated with “H8RL3Y’ against publically-available databases, the FBI determined that the IP address belonged to a Time Warner Cable subscriber. [Id. at 26, ¶ 40.] Through an administrative subpoena issued to TWC, the FBI traced the IP address to a home in Muld-raugh, Kentucky, where Dennis Ammons (along with his sister and her two minor children, “Jane Doe” and “Jane Roe” resided. [See id. at 26-27, ¶¶ 41-43; R. 1 at 5-6, ¶¶ 9-11 (Criminal Complaint and Affidavit).]
On Decembеr 8, 2015, FBI Special Agent Virginia MacHenry sought and obtained from Magistrate Judge Lindsay in the Western District of Kentucky a warrant to search Ammons’ residence for evidence of child pornography. [R. 24-6 at 1 (Residential Search Warrant).] Law-enforcement officers executed that warrant on December 15. [R. 1 at 5, ¶ 9.] During an interview with law-enforcement officers, Ammons admitted to looking at child pornography, but officers made no arrest at that time. [Id.]
Subsequently, on December 29, 2015, a staff member with the Family and Children’s Place in Louisville, Kentucky, conducted an interview with “Jane Doe,” a sixteen-year-old girl. [Id, at 6, ¶ 10.] (Special Agent MacHenry observed the interview via closed-circuit television. [Id.])
B.
On December 31, 2015, Special Agent MacHenry filed a criminal complaint and affidavit of probable cause, [see R. 1 at 1-7], and obtained from Magistrate Judge Brennenstuhl in the Western District of Kentucky a warrant to arrest Ammons, [see R. 6 at 1 (Arrest Warrant) ]. Law-enforcement officers arrested Ammons on January 5, 2016. [Id] On February 2, Am-mons was indicted for knowingly producing and receiving child pornography. [R. 9 at 1-2 (Indictment).] Now, Ammons seeks to suppress all information seized pursuant to the NIT warrant, including the evidence obtained during or as a result of the search of his home.
II.
Ammons argument goes something like this: Magistrate Judge Buchanan lacked jurisdiction under the Federal Magistrates Act, which incorporates Federal Rule of Criminal Procedure 41(b), to issue the NIT warrant. [R. 24 at 5-7.] In the absence of such jurisdiction, the NIT warrant was void from the beginning. [Id. at 7.] Consequently, the Government’s search of his computer violated the Fourth Amendment. The Government, for its part, resists Am-mons on each point. [See R. 29 at 2-9 (Response).] In the alternative, the Government finds the good-faith exception to the exclusionary rule applicable in these circumstances. [Id. at 13-15.]
The Court holds that use of the NIT was a “search” within the meaning of the Fourth Amendment. Though Magistrate Judge Buchanan issued the NIT warrant, she lacked authority to do so under the Federal Magistrates Act and Federal Rule of Criminal Procedure 41(b). The ensuing search of Ammons’ computer, therefore, violated the Fourth Amendment. Yet, Magistrate Judge Buchanan’s mistaken belief as to the extent of her jurisdiction, absent any indication of reckless conduct on the Government’s part, does not warrant suppression.
III.
A.
The threshold question is whether use of the NIT on Ammons’ personal computer was a search under the Fourth Amendment. See Kyllo v. United States,
Here, the Court holds that use of the NIT on Ammons’ computer was a search within the meaning of the Fourth Amendment. United States v. Adams, No. 6:16-cr-11-Orl-40GJK,
The Government replies, though somewhat perfunctorily, that use of the NIT was not a “search” because Ammons lacked a reasonable expectation of privacy in the .information seized, such as in his IP address. [See R. 29 at 12.] It is true that, as a general proposition, an individual does not possess a reasonable expectation in his IP address. See Carpenter,
B.
Since use of the NIT amounted to a Fourth Amendment search, the Court turns to whether the Federal Magistrates Act, 28 U.S.C. §§ 631-639, authorized Magistrate Judge Buchanan to issue the NIT warrant. Under the Federal Magistrates Act, a magistrate judge possesses “all powers and duties conferred or imposed ... by law or by the [Federal] Rules of Criminal Procedure.” 28 U.S.C. § 636(a)(1). Federal Rule of Criminal Procedure 41(b), in turn, grants magistrate judges the authority to issue warrants in certain circumstances. See Fed. R. Crim. P. 41(b)(1)-(5). Rule 41(b)(1) articulates the general principle: A magistrate judge “has authority to issue a warrant to search for and seize a person or property located within the district” of his or her commission. Fed. R. Crim. P. 41(b)(1). There are, of course, exceptions to that gеneral statement. For example, a magistrate judge has authority to issue a warrant for “a person or property outside the district if the person or property is located within the district when the warrant is issued,” Fed. R. Crim. P. 41(b)(2), and for the installation of a tracking device within the district, even if the person or property happens to travel outside the district later, Fed. R. Crim. P. 41(b)(4).
In this case, Ammons argues that Magistrate Judge Buchanan lacked jurisdiction to issue the NIT warrant under 28 U.S.C. § 636(a), which incorporates Federal Rule of Criminal Procedure 41(b), because the wаrrant authorized a search of property located outside (and never inside) her judicial district. [R. 24 at 6-7.] The Government disagrees, maintaining that Rule 41(b)(1), (2), and (4) conferred the necessary authority to Magistrate Judge Buchanan. [R. 29 at 6-9.] The Government’s position, however, is untenable: The Court holds that Magistrate Judge Buchanan had no authority to issue the NIT warrant under 28 U.S.C. § 636(a)(1) and Federal Rule of Criminal Procedure 41(b).
1.
Magistrate Judge Buchanan had no authority to issue the NIT warrant under Rule 41(b)(1). Henderson,
The Government responds that where, as here, it is impossible to identify the location of the property to be searched prior to obtaining a warrant, Rule 41(b)(1) ought to be interpreted to allow a magistrate judge “in the district with the strongest known connection to the search” to issue a warrant. [R. 29 at 8-9.] To accept the Government’s position, however, the
2.
For almost identical reasons, Rule 41(b)(2) bestowed no authority on Magistrate Judge Buchanan to issue the NIT warrant. Henderson,
3.
Rule 41(b)(4) afforded Magistrate Judge Buchanan no authority to issue the NIT warrant either. Henderson,
4.
Because Magistrate Judge Buchanan had no jurisdiction or authority under the Federal Magistrates Act to issue the NIT warrant, the Court holds that the NIT warrant was void from the beginning (or ab initio, in Latin). See United States v. Master,
C.
The question, then, bеcomes whether the warrantless search of Am-mons’ computer violated the Fourth Amendment.
Here, the Government points to the “ongoing abuse” of children, as well as the need to obtain users’ identifying information, as sufficient justification for conducting the search. [R. 29 at 11-12.] Notwithstanding the weight of those interests, the Court finds no exigent circumstances warranted the search of Ammons’ computer. The exigent circumstances doctrine addresses “situations where ‘real immediate and serious consequences will certainly occur if a police officer postpones action to obtain a warrant.’ ” United States v. Williams,
D.
Nonetheless, the Court must decide if suppression is the appropriate remedy for that unconstitutional search. See United States v. Buford,
The good-faith exception to the exclusionary rule, applied across a large swath of cases, reflects that balance. See id. at 238-39,
In this case, the Government suggests that suppression is inappropriate because the FBI agents reasonably and in good faith obtained, relied upon, and executed the NIT warrant. [R. 29 at 13-15.] Am-mons objects. He argues that the good-faith exception is categorically unavailable in situations where a warrant (such as the NIT warrant here) is void ab initio. [R. 24 at 9-13.] Even if the good-faith exception were available, though, he maintains the FBI agents could not reasonably rely on the NIT warrant due to the obvious jurisdictional defect. [Id. at 13-14.] Though not without some support, the Court finds Am-mons’ position unpersuasive: Resort to the good-faith exception is not only available, but also is appropriate, in these circumstances.
1.
The Court holds that the good-faith exception is not foreclosed where the warrant relied upon is void ab initio. United States v. Eure, No. 2:16cr43,
The Sixth Circuit Court of Appeals’ decision in United States v. Master,
The holding of Master is clear: The good-faith exception to the exclusionary rule is not foreclosed in situations where a warrant is void ab initio. Master,
2.
In this ease, the Court finds suppression to be inappropriate in light of Herring and the good-faith exception. Henderson,
True enough, Magistrate Judge Buchanan misapprehended the limits on her juris
The FBI agents can hardly be faulted for failing “to understand the intricacies of the jurisdiction of federal magistrаtes.” Darby,
Exclusion “cannot ‘pay its way’ ” under these circumstances. Davis,
IV.
IT IS HEREBY ORDERED that Dennis Ammons’ Motion to Suppress, [R. 24], is DENIED.
IT IS SO ORDERED.
Notes
. Absent the information seized pursuant to the NIT warrant, there is no dispute that the Governmеnt would have lacked the probable cause necessary to obtain the residential search warrant.
. Although, so far, most courts seem to analyze the lack of authority to issue the NIT
. The Government seems to suggest that "if the [NIT] warrant could not have been issued, then no warrant could have been obtained in a reasonable amount of time to identify” Playpen’s users. [R. 29 at 12 (Response).] The Government’s argument is of no moment. Even if no magistrate judge could issue the NIT warrant, there is no reason to question the authority of a district judge to do so, since the Federal Magistrates Act and Federal Rule of Criminal Procedure 41(b) "bear only on the authority of magistrate judges to issue warrants.” United States v. Levin,
. Though Ammons cites United States v. Scott, 260 F.3d 512 (6th Cir. 2001), abrogated by United States v. Master,
