Defendant Charles A. Borowy appeals the denial of his motion to suppress and seeks to vacate his guilty plea because of a violation of Rule 11 of the Federal Rules of Criminal Procedure. He argues that the evidence recovered by an FBI agent who accessed his shared files on the peer-to-peer file-sharing service LimeWire was unconstitutionally obtained and that the district court should have suppressed this evidence. He argues further that, because he was misinformed as to the term of supervised release to which he was subject, this court should vacate his guilty plea. We have jurisdiction under 28 U.S.C. § 1291 and affirm.
I. Background
On May 3, 2007, Special Agent Byron Mitchell logged onto LimeWire, a publically available peer-to-peer file-sharing computer program, to monitor trafficking in child pornography. Agent Mitchell conducted a keyword search in LimeWire using the term “Lolitaguy,” a term known to be associated with child pornography. From the list of results returned by this search, Agent Mitchell identified known images of child pornography using a software program that verifies the “hash marks” of files and displays a red flag next to known images of child pornography. At least one of these files was shared through what was later determined to be Borowy’s IP address. Using the “browse host” feature of LimeWire, Agent Mitchell viewed a *1047 list of the names of all of the approximately 240 files being shared from Borowy’s IP address, several of which were explicitly suggestive of child pornography and two of which were red-flagged. Agent Mitchell downloaded and viewed seven files from Borowy’s IP address, four of which were child pornography. Prior to downloading the files, Agent Mitchell did not have access to the files’ contents. Execution of a search warrant resulting from Agent Mitchell’s investigation led to the seizure of Borowy’s laptop computer, CDs, and floppy disks. Forensic examination of these items revealed more than six hundred images of child pornography, including seventy-five videos.
Borowy moved to suppress this evidence, arguing that Agent Mitchell’s activities in locating and downloading the files from LimeWire constituted a warrantless search and seizure without probable cause that violated Borowy’s Fourth Amendment rights. Borowy argued that because he had purchased and installed a version of LimeWire that allows the user to prevent others from downloading or viewing the names of files on his computer and because he attempted to engage this feature, he had a reasonable expectation of privacy in the files. However, for whatever reason, this feature was not engaged when Agent Mitchell downloaded the seven files from Borowy’s computer, and there was no restriction on Agent Mitchell’s accessing those files. 1 The district court refused to suppress the evidence, finding that Agent Mitchell’s conduct was not a search under the Fourth Amendment and that Agent Mitchell had probable cause to download the files.
Borowy conditionally pleaded guilty to possession of child pornography under 18 U.S.C. § 2252A(a)(5)(B), reserving his right to appeal the suppression decision. The plea memorandum, the district court, and counsel for both the government and the defense initially informed Borowy that the maximum term of supervised release for this crime was not more than three years. However, at the beginning of Borowy’s sentencing hearing, the district court and Borowy’s attorney correctly noted that the relevant statute calls for a period of supervised release ranging from five years to life. See 18 U.S.C. § 3583(k). Borowy concedes that he made no objection at sentencing that he had been misinformed as to the supervised release term. Borowy was sentenced to forty-five months of imprisonment followed by lifetime supervised release.
II. Discussion
A. Motion to Suppress
We review motions to suppress de novo and a trial court’s factual findings for clear error.
United States v. Howard,
Under
Katz v. United States,
Borowy argues that his case is distinguishable from
Ganoe
because of his ineffectual effort to prevent LimeWire from sharing his files. However, as in
Ganoe,
“[t]he crux of [Borowy’s] argument is that he simply did not know that others would be able to access files stored on his own computer” and that, although Borowy intended to render the files private, Ms “technical savvy” failed him.
Ganoe, 538
F.3d at 1127. Borowy, like Ganoe, was clearly aware that LimeWire was a file-sharing program that would allow the public at large to access files in his shared folder unless he took steps to avoid it.
See id.; see also United States v. Heckenkamp,
Borowy also argues that the use of a “forensic software program” that is unavailable to the general public to confirm that the files contained child pornography rendered Agent Mitchell’s conduct an unlawful Fourth Amendment search. We disagree. Borowy had already exposed the entirety of the contents of his files to the public, negating any reasonable expectation of privacy in those files.
Cf. California v. Ciraolo,
*1049
Finally, Borowy argues, citing
Arizona v. Hicks,
B. Rule 11 Error
We conduct a plain error review of a Rule 11 violation to which no objection has been made.
See United States v. Benz,
To show that the error affected his substantial rights, Borowy must prove that there is a “reasonable probability that, but for the error, he would not have entered the plea.”
United States v. Monzon,
Our sister circuits have reached divergent results when considering plain error Rule 11 violations on the basis of the same misinformation that was provided to Borowy.
Compare United States v. RiverarMaldonado,
Perhaps the most revealing evidence on this point is that, at sentencing, Borowy cited the court’s authority to impose lifetime supervised release as a factor the court should consider in reducing his prison term. Thus, rather than seeking to rectify or minimize the effect of the Rule 11 error by objecting at sentencing, arguing for a lesser term of supervised release, or seeking to withdraw his plea,
see United States v. Littlejohn,
Given the strength of the government’s case, the benefit that Borowy obtained by pleading guilty, and his focus on negotiating a lesser prison term, we conclude that Borowy has not demonstrated that the Rule 11 error affected his substantial rights.
AFFIRMED.
Notes
. Borowy asserts that this feature was not engaged because rebooting the computer caused it to reset to its default setting of sharing files. This explanation is not supported by evidence in the record.
. Because we decide only the case in front of us, we reject Borowy's argument that our *1049 decision will allow unrestricted government access to all internet communications. We do not rule on whether, if confronted with different facts — for example, where the information was not already exposed to the public at large, where the hash-mark analysis might reveal more than whether a file is known child pornography, or where the government “vacuumed” vast quantities of data indiscriminately — we might find a Fourth Amendment violation. Here we are presented only with the limited case of a targeted search of publicly exposed information for known items of contraband.
. Of the remaining two file names, it appears that the district court may have been exceedingly charitable as to at least one of them, which included the abbreviation "PTHC,” in determining that it was not suggestive of child pornography.
See Stults,
