MEMORANDUM AND ORDER ON DEFENDANTS’ MOTIONS TO SUPPRESS
BACKGROUND
The underlying facts are sordid and need not be elaborated beyond their essentials. The case began with an anonymous call on December 2, 2004, to a Department of Social Services (DSS) child abuse hotline. 1 The caller reported that Jane Doe, 2 the eight-year old daughter of defendant Kendra D’Andrea, was being sexually abused by her mother and the mother’s live-in boyfriend, defendant Willie Jordan. The caller also stated that pictures of Jordan performing oral sex on the girl had been posted on a Sprint PCS website. The caller provided the address of D’Andrea’s apartment (90 Veteran’s Way in Gloucester, Massachusetts), the log-in name and password for the website, and the number of a cellular telephone used by defendants.
Jerome Curley, a senior administrator at DSS, who was notified of the call, was able to access the website. After confirming the caller’s description of the posted images, he downloaded and printed them. DSS then notified the Gloucester police. Joseph Fitzgerald, a Gloucester police detective, used the images to obtain a warrant for the search of D’Andrea’s apartment from a local clerk-magistrate. 3 The warrant was executed shortly after midnight. The searching officers found D’Andrea, two young children (including Jane Doe), and a mobile camera telephone. 4 D’Andrea was then taken into custody. After being advised of her Miranda rights, she confessed. She admitted to the sexual abuse of Jane Doe and to the posting of the images on the website. She also stated that when Jordan was away on business, she would blindfold the child, pose her in a provocative manner, and transmit the sexually-charged images to Jordan via the mobile camera telephone. 5
*119
D’Andrea and Jordan now move to suppress the downloaded images,
6
the evidence seized from 90 Veteran’s Way, and any incriminating statements made by D’Andrea and Jordan.
7
Defendants allege that Curley (the DSS supervisor) violated their Fourth Amendment rights by accessing the Sprint PCS website and downloading the images.
8
As the images were critical to the clerk-magistrate’s finding of probable cause, defendants argue that the fruits of the search of D’Andrea’s apartment as well as her subsequent confession should be suppressed as the harvest of a poisonous tree.
9
Wong Sun v. United States,
DISCUSSION
Privacy analysis consists of a two-part inquiry. First, did a defendant manifest a subjective expectation of privacy in the searched premises or property? Second, is that expectation one that society is prepared to recognize as objectively reasonable?
See Rakas v. Illinois,
Thus, the Court has examined whether a person ... took normal precautions to maintain his privacy.... Similarly, the Court has looked to the way a person has used a location, to determine whether the Fourth Amendment should protect his expectations of privacy.... The Court on occasion also has looked to history to discern whether certain types of government intrusion were perceived to be objectionable by the Framers.... And, as the Court states today, property rights reflect society’s explicit recognition of a person’s authority to act as he wishes in certain areas[.]
*120
Id.
at 152-153,
In many areas of human interaction, Fourth Amendment privacy claims are deemed
per se
unreasonable. For example, there can be no reasonable expectation of privacy in matters voluntarily disclosed or entrusted to third parties, even those disclosed to a person with whom one has a confidential business relationship.
11
See Smith v. Maryland,
The
Smith
line of cases has led federal courts to uniformly conclude that internet users have no reasonable expectation of privacy in their subscriber information, the length of their stored files, and other noncontent data to which service providers must have access.
12
See Guest v. Leis,
Professor Warren LaFave, a preeminent authority on the Fourth Amendment, argues that a person who avails herself of a website’s password protection should be able to claim a reasonable expectation of privacy in the site’s contents. Professor LaFave makes the point that while a service provider has a need to access information regarding the identity of a site holder and the volume and extent of her usage, it has no legitimate reason to inspect the actual contents of the site, anymore than the postal service has a legitimate interest in reading the contents of first class mail, or a telephone company has a legitimate interest in listening to a customer’s conversations. “Reliance on protections such [as] individual computer accounts, password protection, and perhaps encryption of data should be no less reasonable than reliance upon locks, bolts, and burglar alarms, even though each form of protection is penetrable.”
13
LaFave, 1
Search and Seizure
§ 2.6 at 721 (4th ed.2006). Professor LaFave’s argument is persuasively echoed in
Warshak v. United States,
[T]he reasonable expectation of privacy inquiry in the context of shared communications must necessarily focus on two narrower questions than the general fact that the communication was shared with another. First we must specifically identify the party with whom the communication is shared, as well as the parties from whom disclosure is shielded. Clearly, under Katz [v. United States,389 U.S. 347 ,88 S.Ct. 507 ,19 L.Ed.2d 576 (1967)], the mere fact that a communication is shared with another person does not entirely erode all expectations of privacy, because otherwise eavesdropping would never amount to a search. It is true, however, that by sharing communications with someone else, the speaker or writer assumes the risk that it could be revealed to the government by that person, or obtained through a subpoena directed to that person.
The second necessary inquiry pertains to the precise information actually conveyed to the party through whom disclosure is sought or obtained. This distinction provides the obvious crux for the different results in Katz and Smith, because although the conduct of the telephone user in Smith “may have been calculated to keep the contents of his conversation private, his conduct was not and could not have been calculated *122 to preserve the privacy of the number he dialed.” [Smith,]442 U.S. at 743 ,99 S.Ct. 2577 . Like the depositor in Miller, the caller in Smith “assumed the risk” of the phone company disclosing the records that he conveyed to it. Yet this assumption of the risk is limited to the specific information conveyed to the service provider, which in the telephone context excludes the content of the conversation. It is apparent, therefore, that although the government can compel disclosure of a shared communication from the party with whom it was shared, it can only compel disclosure of the specific information to which the subject of it has been granted access.
Id. at 470-71 (emphasis in original).
The protections of the Fourth Amendment, it must be emphasized, apply only to the actions of the State and its agents.
Burdeau v. McDowell,
Defendants make no argument— nor could one credibly be made — that the anonymous caller was acting as an agent of the State in reporting the abuse of Jane Doe to DSS.
14
The argument rather is that the DSS administrator (Curley) who accessed the website and downloaded the images of the abuse violated defendants’ Fourth Amendment rights.
15
This argument fails for the simple reason that Curley intruded no further into defendants’ zone of privacy than did the anonymous caller. Where a private party, acting on his or her own, searches a closed container, a subsequent warrantless search of the same container by government officials does not further burden the owner’s already frustrated expectation of privacy.
16
United States v. Jacobsen,
At day’s end, this case falls clearly into the “assumption of the risk” exception identified in
Warshak
and Supreme Court precedent.
17
“It is well-settled that when an individual reveals private information to another, he assumes the risk that his confidant will reveal that information to the authorities, and if that occurs the Fourth Amendment does not prohibit governmental use of that information.”
Jacobsen,
THE FRANKS HEARING REQUEST
While a judicial ruling on a motion to suppress is ordinarily confined to the “four corners” of the affidavit, there are circumstances in which a defendant may challenge the truthfulness of statements made by an applicant for a search warrant.
See Franks v. Delaware,
To mandate an evidentiary hearing, the challenger’s attack must be more than conclusory and must be supported by more than a mere desire to cross-examine. There must be allegations of deliberate falsehood or of reckless disregard *124 for the truth, and those allegations must be accompanied by an offer of proof. They should point out specifically the portion of the warrant affidavit that is claimed to be false; and they should be accompanied by a statement of supporting reasons. Affidavits or sworn or otherwise reliable statements of witnesses should be furnished, or their absence satisfactorily explained.
Id.
at 171,
Defendants’ request for a
Franks
hearing is flawed by two fundamental errors, one legal, and the other factual. A
Franks
hearing is addressed to the veracity and care of the affiant.
Id.
at 171,
The defendants’ factual error is more straightforward. They state that a summary of the hotline monitor’s account of the anonymous call provided by a DSS supervisor to a Secret Service agent does not make any reference to D’Andrea’s apartment. Putting aside the layers of hearsay contained in the agent’s report, an original copy of the DSS Intake Information Form, which was provided to the court under seal, makes it plain that the caller did give the hotline monitor D’Andrea’s address. Moreover, defendants misstate what the agent wrote in his report. His summary begins with a reference to an anonymous caller reporting that a child was being sexually abused “at the D’Andrea residence.”
ORDER
For the foregoing reasons, the motion to suppress physical evidence is DENIED. The motion to suppress D’Andrea’s statements is DENIED. The motion for an evidentiary hearing is DENIED. The motion for a Franks hearing is DENIED. The Clerk will set the case for trial. 20
SO ORDERED.
Notes
. The identity of the caller is known to the parties. While she did not give her name, she identified herself to the hotline operator as a former girlfriend and the mother of one of defendant Willie Jordan's children. She is identified by name in defendants' pleadings.
. I will refer to the child by the pseudonym "Jane Doe.”
. The affidavit submitted by Detective Fitzgerald in support of the warrant application exhibits a high degree of computer sophistication.
. The camera phone was searched pursuant to separate state and federal warrants authorizing the examination of its contents. It was found to contain a number of sexually explicit pictures of Jane Doe. There is no merit in defendants' argument that the seizure of the camera phone was unauthorized. The warrant permitted the seizure of "cameras” and "computer storage devices.” The modern cellular telephone fits easily into these categories. It can also be a "computer accessory,” as the warrant also specified.
.Jordan was arrested in Michigan and returned to Massachusetts on a warrant obtained by the Gloucester police. At the time of his arrest, police seized Jordan's personal cell phone. There is no indication in the record that a search of its contents yielded anything of an incriminating nature.
. At Jordan’s request, Sprint removed the images from the website before a preservation letter could be served by police. Consequently, the DSS copies of the images are all that remain.
. It is not clear from the record that Jordan in fact made any incriminating admissions.
. As part of the federal investigation, agents obtained warrants a year later for the Sprint PCS account records, as well as for records associated with defendants' cell phones.
. The court denied defendants’ request for an evidentiary hearing after determining on the basis of defendants’ submissions and oral argument that a hearing was unnecessary. The purpose of such a hearing, as defendants defined it, would have been to establish the reasonableness of their expectation of privacy in the website. As will be seen from the analysis, the granting of such an expectation has no bearing on the outcome of the motion. There is no requirement that an evidentiary hearing be held where a defendant has failed to "allege facts ‘sufficiently definite, specific, detailed and non-conjectural, to enable the court to conclude that a substantial claim is presented.' ”
United States
v.
Migely,
.Defendants allege that there is a material inconsistency between Fitzgerald’s warrant affidavit and a Secret Service agent's report summarizing a DSS supervisor's account of what she had been told by the hotline worker. The Fitzgerald affidavit states that DSS had received a tip that Jane Doe was the victim of sexual abuse that "was occurring at 90 Veteran's Way.” According to defendants, the agent's report does not quote the DSS supervisor as saying that the hotline monitor had been told by the tipster of D’Andrea's address. The (no longer) anonymous caller told an investigator for the defendants that when she made the report to DSS, she did not know where D'Andrea lived.
. I recognize that some State courts have come to a different conclusion interpreting their own State Constitutions.
See, e.g., State v. Reid,
. A URL (Uniform Resource Locator) is the commonly used textual designation of the address of an Internet website. The URL is used to locate the specific web server that hosts the site.
See In re Pharmatrak, Inc.,
. Professor LaFave acknowledges that when telephone access to a website is possible, more difficult issues are raised. LaFave, 1
Search and Seizure
§ 2.6 at 716 (4th ed.2006). The premise of Professor LaFave's argument — that a service provider has no legitimate reason to monitor the contents of an internet site — may not be as rock solid as it appears.
See Doe v. GTE Corp.,
. Nor would the State be responsible for the caller's acts even had she hacked her way into the defendants’ website (instead of obtaining the password from one of the defendants).
. There is no dispute that for purposes of the state action requirement, Curley was a state actor.
See Commonwealth v. Howard,
.A website, like a computer file, is properly analogized to a file cabinet or other physical containers in which records can be stored.
. D'Andrea states in her affidavit that she never gave the password to anyone and that she "thought” the same was true of Jordan. Jordan states in his affidavit that he never "voluntarily” gave the website information to anyone else. As the government persuasively argues, the "anonymous” caller could have learned the information from no one other than one (or both) of the defendants.
. The government’s "emergency intervention” argument, based on
Brigham City, Utah v. Stuart,
- U.S. -,
.
Illinois v. Gates,
. Because the case raises issues of legal (although not factual complexity), the government's motion to exclude the time taken by the court to render its decision will be allowed. The government will file a proposed *125 Speedy Trial Act Order to that effect within seven (7) days.
