Todd Randall Finley pleaded guilty to possession of child pornography and receipt and distribution of child pornography. He argues in this appeal that the
I.
The state of Wyoming maintains a database related to sharing of child pornography files on the internet. The Wyoming database contains several types of information, including Internet Protocol (IP) addresses that share child pornography files, the port numbers used for sharing such files, 2 and the Secure Hash Algorithm (SHA) value of known child pornography files. 3
In February 2008, a law enforcement officer in Wyoming contacted Special Agent Troy Boone of the South Dakota Division of Criminal Investigation with a tip that the IP address 24.230.167.215 might be associated with internet activity involving child pornography and might be registered to someone in South Dakota. Agent Boone searched the Wyoming database for activity involving the IP address 24.230.167.215, which revealed that known child pornography images were being shared on that IP address from February 2-14. Agent Boone then searched an online database that keeps track of which companies are issued which IP addresses. The IP address in question was registered to Midcontinent Communications in South Dakota. Agent Boone sent Midcontinent a subpoena on February 14 to determine who had access to the IP address 24.230.167.215 from February 2-14. Mid-continent responded four days later, stating that the only account that accessed the IP address on those dates was Finley’s account.
On February 16, 2008, Agent Boone accessed a file-sharing network and reviewed a publicly available list of 868 files located at the IP address 24.230.167.215. By comparing the SHA values of the file list with the database of known child pornography files, Agent Boone confirmed that several of the files offered from the IP address have previously been identified through their SHA values as depicting child pornography. Agent Boone also downloaded and viewed the files from the IP address, leading him to conclude that the files contained images consistent with child pornography. Agent Boone then contacted Agent Craig Scherer of U.S. Immigration and Customs Enforcement (ICE) regarding potential violations of federal child pornography laws.
On February 27, 2008, Agent Scherer requested a warrant to search Finley’s property and premises. In support, Agent Scherer submitted an affidavit detailing the investigation by Agent Boone, including the fact that Agent Boone had downloaded child pornography files from the IP address 24.230.167.215 on February 16, 2008. The affidavit further stated:
19. SA Boone conducted an Internet search on the origin of the IP address 24.230.167.215 and found it to be issued to a DSL modem subscriber with Mid-continent Communications. On February 18, 2008, SA Boone received the results of a subpoena request from Mid-continent Communications which indicated that one account had been accessing the IP address 24.230.167.215 on the date and time that SA Boone downloaded the files containing child pornography. The account contained the following information:
Name: Todd Finley
ICE executed the search warrant on February 28, 2008 at Finley’s residence in Vermillion, South Dakota. During the search, several items were seized, including a hard drive containing over two hundred video clips of child pornography. Finley was indicted for receipt and distribution of child pornography in violation of 18 U.S.C. § 2252A(a)(2)(A) and possession of child pornography in violation of 18 U.S.C. §§ 2252A(a)(5)(B) and 2256(8)(A).
Finley moved to suppress the evidence obtained as a result of the search warrant, claiming that the affidavit supporting the search warrant contained a false statement made deliberately or with reckless disregard for the truth. Specifically, Finley asserted that there is nothing to support the statement in ¶ 19 that Finley’s account accessed the IP address 24.230.167.215 on February 16, 2008 (i.e., “the date and time that SA Boone downloaded the files containing child pornography”). Agent Boone’s inquiry to Midcontinent was limited to the dates of February 2-14. Therefore, Finely argues, the statement in ¶ 19 was false to the extent it connected Finley to the IP address beyond that limited time period.
A magistrate judge 4 granted Finley’s request for a Franks 5 hearing. At the hearing, Agent Scherer testified that his affidavit was based on information relayed by Agent Boone and that Agent Boone reviewed and approved the affidavit. Agent Boone acknowledged that the information from Midcontinent was limited to the time period ending February 14. He also acknowledged that, on February 16, he did not know who was accessing the IP address when he downloaded files containing child pornography. Agent Boone explained that IP addresses are capable of belonging to different people throughout time. Nevertheless, he testified that there must have been only one subscriber to IP address 24.230.167.215 from February 2 through February 16 because the IP address, port number, and file list were consistent throughout that time period. These consistencies, according to Agent Boone, eliminated the possibility that another computer was responsible for sharing of the files containing child pornography.
The magistrate judge denied Finley’s motion to suppress, concluding that Finley “ultimately failed to prove that ¶ 19 contains a deliberate or reckless falsity.” The district court reached the same conclusion, finding that the false statement in ¶ 19 was neither a knowingly nor recklessly false statement. The district court relied on the good-faith-reliance doctrine from
United States v. Leon,
II.
To void a search warrant under
Franks,
a defendant must show by a preponderance of evidence that (1) the affiant included in the warrant affidavit “a false statement knowingly and intentionally, or with reckless disregard for the truth,” and (2) “the affidavit’s remaining content is insufficient to establish probable cause.”
Franks v. Delaware,
The applicable test is “not simply whether the affiant acknowledged that what he reported was true, but whether, viewing all of the evidence, the affiant must have entertained serious doubts as to the truth of his statements or had obvious reasons to doubt the accuracy of the information he reported.”
United States v. Clapp,
Finley argues that ¶ 19 of Agent Scherer’s affidavit was so important that it is “inconceivable” that Agent Boone could have failed to notice and understand the falsehood. To be sure, the affidavit falsely represented that Midcontinent’s subpoena response addressed the date on which Agent Boone downloaded child pornography files from the relevant IP address. Moreover, ¶ 19 was the only portion of the affidavit connecting Agent Boone’s investigation with Finley. However, materiality of a falsehood is not determinative of the affiant’s state of mind.
See United States v. Bulgatz,
As there has been no showing of a deliberate or reckless falsehood, we do not reach the question of whether the remaining facts in Agent Scherer’s affidavit were sufficient to establish probable cause. Similarly, we do not address whether the good faith exception to the exclusionary rule applies in this case, although we note that our precedent appears to foreclose such a result if a
Franks
violation has occurred.
See United States v. Gipp,
ill.
For the foregoing reasons, the judgment of the district court is affirmed.
Notes
. The Honorable Lawrence L. Piersol, United States District Judge for the District of South Dakota.
. A port is the conduit for which the computer talks to the Internet. Computers use ports to manage network traffic, thereby allowing different applications on the same computer to share network resources simultaneously. Ports are identified by a number, commonly known as a port number.
. The SHA is a mathematical algorithm that allows for unique identification of digital images and videos. SHA values are, in essence, unique digital fingerprints or signatures.
See United States v. Klynsma,
No. CR. 08-50145-RHB,
. The Honorable John E. Simko, United States Magistrate Judge for the District of South Dakota.
.
Franks v. Delaware,
.
See also United States v. Elliott,
. Finley argues that it is improper to consider information beyond the four corners of Agent Scherer's affidavit in order to validate the search warrant. In support, he cites cases stating that the government cannot use extrinsic evidence to rehabilitate affidavits that contain insufficient information to demonstrate probable cause.
See, e.g., Whiteley v. Warden,
. We have stated that omission of material information from an affidavit can form the basis of a
Franks
violation where the additional information would have
negated
probable cause.
See, e.g., United States v. Neal,
