UNITED STATES OF AMERICA v. GABRIEL WERDENE, Appellant
No. 16-3588
UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT
February 21, 2018
PRECEDENTIAL. APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA (D.C. Crim. Action No. 2-15-cr-00434-001). District Judge: Honorable Gerald J. Pappert. Argued on October 23, 2017. Before: GREENAWAY, JR., NYGAARD, FISHER, Circuit Judges.
Leigh M. Skipper
Brett G. Sweitzer [Argued]
Office of the Federal Public Defender
601 Walnut Street
Suite 540 West
Philadelphia, PA 19106
Counsel for Appellant
Louis D. Lappen
Robert A. Zauzmer
Michelle L. Morgan [Argued]
Office of United States Attorney
615 Chestnut Street
Suite 1250
Philadelphia, PA 19106
Counsel for Appellee
OPINION
GREENAWAY, JR., Circuit Judge.
This case arises from the Federal Bureau of Investigation’s (FBI) investigation into Playpen, a global online forum that existed on the dark web1 and that was dedicated to the advertisement and distribution of child pornography. The website had a substantial amount of users. In fact, more than 150,000 users collectively engaged in over 95,000 posts with over 9,000 forum topics related to child pornography. This appeal centers on the FBI’s decision to rely on a single search warrant, issued in the Eastern District of Virginia (“EDVA“), to search the computers of thousands of Playpen users across the United States and the world using a form of government-created malware termed a “Network Investigative Technique” (“NIT“).
Appellant Gabriel Werdene, a citizen of Pennsylvania, was a Playpen user whose computer was compromised by the NIT. Subsequently, he was charged in the Eastern District of Pennsylvania (“EDPA“) with one count of possessing child pornography, in violation of
We hold that the NIT warrant violated the prior version of Rule 41(b) and that the magistrate judge exceeded her authority under the Federal Magistrates Act. The warrant was therefore void ab initio, and the Rule 41(b) infraction rose to the level of a Fourth Amendment violation. However, we agree with the Government that the good-faith exception to the exclusionary rule may apply to warrants that are void ab initio, which ultimately precludes suppression in this case. We therefore will affirm on alternative grounds the District Court’s decision to deny Werdene’s suppression motion.
I. FACTS AND PROCEDURAL HISTORY
To inform our forthcoming analysis, we shall detаil how Playpen escaped traditional law enforcement detection and how the FBI circumvented the dark web to apprehend its users.
A. Tor
The Playpen site operated on the anonymous “The Onion Router” (“Tor“) network—a constituent part of the “dark web“—which allows users to conceal their actual internet protocol (“IP“) addresses while accessing the internet.3 An IP address is a unique identifier assigned by an internet service provider to every computer having access to the internet, including computer servers that host websites. Websites that the computer user visits can log the computer’s IP address, creating a digital record of activity on each website. After lawful seizure of an illicit website under normal circumstances, law enforcement is able to retrieve the website’s IP log to locate and apprеhend its users.
Tor, however, prevents websites from registering a computer’s actual IP address by sending user communications through a network of relay computers called “nodes” up until those communications reach the website. Numerous intermediary computers therefore stand between the accessing computer and the website, and the website can log the IP address of only the “exit node“, which is the final computer in the sequence. Accordingly, Playpen’s IP log—like that of other Tor websites—contained only the IP addresses of the exit nodes, rendering traditional IP identification techniques useless.
B. The Playpen Investigation
In December 2014, a foreign law enforcement agency informed the FBI that Playpen was being hosted by a computer server in North Carolina. Playpen’s administrator was identified as a person residing
The FBI’s solution was the NIT, a form of government-created malware that allowed the FBI to retrieve identifying information from Playpen users located all around the world. The NIT’s deployment worked in multiple steps. First, the FBI modified Playpen’s code so that each accessing computer—unknowingly to the user and no matter the computer’s physical location—downloaded the NIT whenever a “user or administrator log[ged] into [Playpen] by entering a username and password.” App. 133. Once downloaded, the NIT searched the accessing computer for sevеn discrete pieces of identifying information: (1) an IP address; (2) a unique identifier to distinguish the data from that of other computers; (3) the type of operating system; (4) information about whether the NIT had already been delivered; (5) a Host Name; (6) an active operating system username; and (7) a Media Access Control address. Finally, the NIT transmitted this information back to a government-controlled computer in EDVA. The FBI postulated that it could then rely on this information to identify users’ premises and distinguish their computers from other computers located within their proximity.
In February 2015, the FBI obtained a search warrant from a magistrate judge in EDVA to deploy the NIT to all “activating computers.” App. 106. An “activating computer” was defined in the search warrant as the computer of “any user or administrator who logs into [Playpen] by entering a username and passwоrd.” Id. Further, the NIT could be deployed to any activating computer “wherever located.” App. 136 (emphasis added). In other words, this single warrant authorized the FBI to retrieve identifying information from computers all across the United States, and from all around the world. Most importantly, these computers were overwhelmingly located outside of EDVA.
C. Charges Against Werdene and Suppression Motion
Analysis of the NIT data revealed the IP address of a Playpen user, eventually identified as Werdene, residing in Bensalem, Pennsylvania. In the final month of the website’s operation, Werdene was logged in for approximately ten hours and made six text postings, commenting on child pornography and sharing links under the username “thepervert.” The FBI obtained a separate search warrant for Werdene’s home from a magistrate judge in EDPA, where agents seized one USB drive and one DVD containing child pornоgraphy.5
In September 2015, Werdene was charged in EDPA with one count of possessing child pornography, in violation of
The District Court denied the motion in a memorandum and order issued оn May 18, 2016. It first held that the NIT warrant violated Rule 41(b) because the magistrate judge in EDVA was without authority to issue a warrant to search Werdene’s computer in EDPA. But the District Court also held that the NIT was not a “search” within the meaning of the Fourth Amendment because Werdene lacked a reasonable expectation of privacy to his computer’s IP address. It concluded that the Fourth Amendment was not implicated, and that the Rule 41(b) violation was only “technical” in nature. The District Court therefore denied the suppression motion on the bases that the Government did not intentionally disregard the Rule’s requirements and that Werdene was not prejudiced by the violation. This appeal followed.
On June 7, 2016, Werdene pled guilty pursuant to a plea agreement in which he reserved his right to appeal the District Court’s ruling on the suppression motion. On September 7, 2016, the District Court accepted the recommendation of the U.S. Probation Office and applied a downward variance from the United States Federal Sentencing Guideline’s range of 51-63 months. It sentenced Werdene to 24 months’ imprisonment, a term of supervised release of five years, and restitution in the amount of $1,500.
II. JURISDICTION AND STANDARD OF REVIEW
The District Court had original jurisdiction over this case pursuant to
III. DISCUSSION
This case requires us to decide a multitude of issues regarding Rule 41 and the Fourth Amendment. First, we must determine whether the NIT warrant violated Rule 41. If it did not, then we will affirm the District Court because there is no basis to grant Werdene’s suppression motion. Second, if it did violate Rule 41, then we are required to decide whether the breach rose to the level of a Fourth Amendment violation. To do so, we consider whether the NIT warrant, by being issued by a magistrate judge beyond her jurisdiction, was void ab initio and, if so, whether such a transgression constituted a Fourth Amendment violation in the founding era. See Virginia v. Moore, 553 U.S. 164, 168 (2008). If we do not find that a Fourth Amendment violation occurred, then the suppression motion must be denied unless Werdene can prove that he was prejudiced by the error or that the FBI acted with
For the reasons discussed below, we hold that the NIT warrant violated Rule 41(b). As a result, the magistrate judge not only exceeded her authority under the Rule as then drafted, but also under the Federal Magistrates Act, rendering the warrant void ab initio and raising the magnitude of the infraction from a technical one to a Fourth Amendment violation. On the other hand, we also hold that the good-faith exception applies to such warrants, which, given the circumstances of this case, precludes suppression. We therefore will affirm on alternative grounds the District Court’s decision to deny Werdene’s suppression motion.
A. Federal Magistrate Judge Jurisdiction
The Federal Magistrates Act,
While
B. The NIT Warrant Violated Rule 41(b)
We must first determine whether the NIT warrant violated Rule 41(b). The Government conceded below that “[a]lthough Rule 41 does authorize a judge to issue a search warrant for a search in another district in some circumstances, it does not explicitly do so in these circumstances.” App. 91 (Government Br. in Opposition to Motion to Suppress) (emphasis added). Given the concession, the Government instead argued that the Rule set forth an illustrativе, rather than exhaustive, list of circumstances in which a magistrate judge may issue a warrant.
On appeal, however, the Government curiously has reversed course, and now contends that the NIT was in fact explicitly authorized by
According to the Government, under this Rule, “the NIT warrant properly authorized use of the NIT to track the movement of information—the digital child pornography content requested by users who logged into Playpen’s website—as it traveled from the server in [EDVA] through the encrypted Tor network to its final destination: the users’ computers, wherever located.” Government Br. at 30. At that point, the NIT caused the Playpen users’ computers to transmit the identifying information back to the FBI over the open internet, thus enabling law enforcement to locate and identify the user. In the Government’s estimation, the NIT is similar to a transmitter affixed to an automobile that is programmed to send location-enabling signals (like GPS coordinates) back to a government-controlled receiver because it was designed to send location-enabling information (like an actual IP address) back to a government-controlled computer. “Thus, although not a physical beeper affixed to a tangible object [as was the case in, for example, United States v. Karo, 468 U.S. 705 (1984)], the NIT operated as a digital tracking device of intangible information within the meaning of
We need not resolve Werdene’s contention that the Government waived this argument because we find that the Government’s tracking device analogy is inapposite. As an initial matter, it is clear that the FBI did not believe that the NIT was a tracking device at the time that it sought the warrant. Warrants issued under
More importantly, the analogy does not withstand scrutiny. The explicit purpose of the warrant was not to track movement—as would be required under
Furthermore,
The government argues that the defendants made a “virtual” trip to the Eastern District of Virginia to access child pornography and that investigators “installed” the NIT within that district. Although plausible, this argument is belied by how the NIT actually worked: it was installed on the defendants’ computers in their homes in Iowa. . . . [W]e agree with the district court that the “virtual trip” fiction “stretches the rule too far.”
Horton, 863 F.3d at 1047-48 (citations omitted).
The Government correctly contends that
C. The NIT Warrant Violated the Fourth Amendment
Since the NIT warrant violated Rule 41(b), we next consider the nature of the violation to assess if suppression is warranted. See United States v. Simons, 206 F.3d 392, 403 (4th Cir. 2000) (“There are two categories of
The Fourth Amendment guarantees that:
[t]he right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall not be violated, and no Warrant shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
“[T]he overriding function of the Fourth Amendment is to protect personal privacy and dignity against unwarranted intrusion by thе State.” Reedy v. Evanson, 615 F.3d 197, 228 (3d Cir. 2010) (quoting Schmerber v. California, 384 U.S. 757, 767 (1966)); see also United States v. Pollard, 326 F.3d 397, 410 (3d Cir. 2003) (“The Fourth Amendment’s ‘central concern . . . is to protect liberty and privacy from arbitrary and oppressive interference by government officials.’” (quoting United States v. Ortiz, 422 U.S. 891, 895 (1975))). The Fourth Amendment only prohibits unreasonable searches and seizures, and the Supreme Court has counseled that the Fourth Amendment encompasses “at a minimum, the degree of protection it afforded when it was adopted.” Jones, 565 U.S. at 411. Accordingly, “[w]e look to the statutes and common law of the founding era to determine the norms that the Fourth Amendment was meant to preserve.” Moore, 553 U.S. at 168; see also United States v. Phillips, 834 F.3d 1176, 1179 (11th Cir. 2016).
We must therefore determine whether the circumstances of this case constituted a Fourth Amendment violation during the founding era.7 “The principle animating
The NIT warrant was therefore void ab initio because it violated
It follows that the Rule 41(b) viоlation was of constitutional magnitude because “at the time of the framing . . . a warrant issued for a search or seizure beyond the territorial jurisdiction of a magistrate’s powers under positive law was treated as no warrant at all.” Krueger, 809 F.3d at 1123 (Gorsuch, J., concurring); see also Engleman v. Deputy Murray, 546 F.3d 944, 948-49 (8th Cir. 2008) (“Under a historical understanding of the Fourth Amendment, the jurisdiction of the issuing judge and the executing officer is limited, and a warrant is not valid if an officer acts outside of that limited jurisdiction.“).
The Government retorts that the NIT warrant was valid for the purposes of the Fourth Amendment because it met the Supreme Court’s three constitutional requirements for validity: it was “(1) supported by probable cause, (2) sufficiently particular, and (3) issued by a neutral and detached magistrate.” Government Br. at 36 (citing Dalia v. United States, 441 U.S. 238, 255 (1979)). Furthermore, the Government frames Rule 41(b) as a venue provision that is entirely procedural in nature and not substantive – accordingly, beсause the Fourth Amendment is silent about the proper venue for applying for a search warrant, a Rule 41(b) violation can “only rarely [be] deemed constitutional.” Id. at 38. But none of this overcomes our dispositive finding that the magistrate judge acted outside of her jurisdiction under
“technical.”” United States v. Glover, 736 F.3d 509, 515 (D.C. Cir. 2013).9
D. The Exclusionary Rule and Good Faith Exception
Having established that a
The exclusionary rule is a prudential doctrine that “prevent[s] the government from relying at trial on evidence obtained in violation of the [
Rather, the exclusionary rule aims to deter government violations of the
In Katzin, we explained how the good-faith exception to the exclusionary rule effectuates this balance:
Where the particular facts of a case indicate that law enforcement officers
aсt[ed] with an objectively reasonable good-faith belief that their conduct [was] lawful, or when their conduct involve[d] only simple, isolated negligence, there is no illicit conduct to deter. In such circumstances, the deterrence rationale loses much of its force and exclusion cannot pay its way. Alternatively, where law enforcement conduct is deliberate, reckless, or grossly negligent or involves recurring or systemic negligence, deterrence holds greater value and often outweighs the associated costs.
769 F.3d at 171 (internal quotation marks and citations omitted). We also acknowledged that the Supreme Court has applied the good-faith exception “across a range of cases.” Id. (quoting Davis, 564 U.S. at 238); see, e.g., Davis, 564 U.S. at 241 (good-faith exception applicable when warrant is invalid due to later-reversed binding appellate precedent); Herring, 555 U.S. at 147-48 (undiscovered error in police-maintained database); Arizona v. Evans, 514 U.S. 1, 14-16 (1995) (undiscovered error in court-maintained database); Illinois v. Krull, 480 U.S. 340, 349-50 (1987) (subsequently overturned statute); Massachusetts v. Sheppard, 468 U.S. 981, 980 (1984) (judicial clerical error on warrant); Leon, 468 U.S. at 922 (later-invalidated warrant).
On appeal, Werdene contends that the good-faith exception should not apply when a
However, the fundamental flaw with Werdene’s argument is that it does not appreciate the distinction between the validity of the warrant and the deterrence rationale of the exclusionary rule and the good-fаith exception. Implicit in his argument is the assumption that where “the magistrate lacks authority to issue the contested warrant, the supposed ‘good faith’ of the officer who executes the warrant can do nothing to confer legal status upon the [void] warrant.” Master, 614 F.3d at 242. But “whether to suppress evidence under the exclusionary rule is a separate question from whether the Government has violated an individual’s
Thus, in each of the Supreme Court’s good-faith exception cases, “the Court has not focused on the type of
Having determined that the good-faith exception is applicable, we turn to whether it precludes suppression in this case. Here, the FBI sought and received a warrant, and we have identified only four scenarios in which reliance on a warrant is unreasonable:
- the magistrate issued the warrant in reliance on a deliberately or recklessly false affidavit;
- the magistrate abandoned his judicial role and failed to perform his neutral and detached function;
- the warrant was based on an affidavit so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable; or
- the warrant was so facially deficient that it failed to particularize the place to be searched or the things to be seized.
United States v. Pavulak, 700 F.3d 651, 664 (3d Cir. 2012) (quoting United States v. Stearn, 597 F.3d 540, 561 n.19 (3d Cir. 2010)). The first three scenarios are entirely inapplicable here – Werdene contends only that the NIT warrant was facially deficient because it allegedly did not identify the location to be searched. But the NIT warrant adequately described the “Place to be Searched” as the “activating computers . . . of any user or administrator who logs into [Playpen] by entering a username and password,” and it described the “Information to be Seized . . . from any ‘activating’ computer” as seven discrete pieces of information. App. 106-07. The warrant was therefore far from facially deficient because it specified which computers would be searched and what information would be retrieved. See United States v. McLamb, 880 F.3d 685, 691 (4th Cir. 2018) (“Nor was the [NIT] warrant so ‘facially deficient . . . that the executing officers [could not] reasonably presume it to be valid.’” (second alteration in original) (quoting Leon, 468 U.S. at 923)); United States v. Levin, 874 F.3d 316, 323 (1st Cir. 2017) (same).
Here, the NIT warrant was issued by a neutral and detached, duly appointed magistrate judge, who determined that the warrant was supported by probable cause and particularly described the places to be searched and things to be seized. This, on its own, is sufficient for us to determine that the FBI acted in good-faith, especially because there is no evidence that it exceeded the scope of the warrant. See Leon, 468 U.S. at 922 (“‘[A] warrant issued by a magistrate normally suffices to establish’ that a law enforcement officer has ‘acted in good faith in conducting the search.’” (quoting United States v. Ross, 456 U.S. 798, 823, n.32 (1982))); see also Pavulak, 700 F.3d at 663 (“Ordinarily, the ‘mere existence оf a warrant . . . suffices to prove that an officer conducted a search in good faith.’” (quoting Stearn, 597 F.3d at 561)).
The
More importantly, the exclusionary rule “applies only where it ‘result[s] in appreciable deterrence.’” Herring, 555 U.S. at 141 (quoting Leon, 468 U.S. at 909) (emphasis added). Thus, even though
IV. CONCLUSION
For the reasons above, we will affirm on alternative grounds the District Court’s decision to deny Werdene’s suppression motion.
United States of America v. Gabriel Werdene
No. 16-3588
NYGAARD, Circuit Judge, concurring.
I join Judge Greenaway’s well-reasoned opinion without reservation. However, I write separately to highlight a somewhat nuanced legal point that would go unnoticed were I not to comment. In an attempt to save the search at issue here from the strictures of the
Now, the Government says that their tracking device argument is not waived because we can affirm on any basis that is supported by the record, see, e.g., Murray v. Bledsoe, 650 F.3d 246, 247 (3d Cir. 2011), and the Appellant does not quibble with that notion. Instead, Werdene argues that this prerogative is not available to an appellate court when a party has conceded the point on which we wish tо affirm in district court. This is an interesting question and one that in my nearly three decades on this court I have not encountered. The Government offers no authority to the contrary. Werdene points to one Supreme Court opinion and a couple of court of appeals opinions in support of his position. For example, in Steagald v. United States, 451 U.S. 204 (1981), the Government conceded a particular factual point in the District Court (related to the ownership of a residence) and did so again in opposition to the petition for certiorari in the Supreme Court. But, in its brief to the Court, the Government argued the very point it had previously conceded in the District Court, maintaining that the Court could affirm by relying on any basis present on the record. 451 U.S. at 209. The Supreme Court, to loosely paraphrase, would have none of it. The Court instructed that the Government loses its right to raise factual issues in the Supreme Court “when it has made contrary assertions in the courts below, when it has acquiesced in contrary findings by those courts, or when it has failed to raise such questions in a timely fashion during the litigation.” Id. The other cases cited by the Appellant, United States v. Ornelas-Ledesma, 16 F.3d 714, 721 (7th Cir. 1994), United States v. Albrektsen, 151 F.3d 951, 954 (10th Cir. 1998), and United States v. Scales, 903 F.2d 765, 770 (10th Cir. 1990), all hold the Government to be bound by concessions it made in District Court.
Our case differs slightly in that the concession here was legal, not factual. In my view, this is a difference without a distinction. If, as here, the issue or argument has been conceded or waived before a district court, then we must not affirm on that basis. Judge Greenaway elided the issue as unnecessary to a decision in the cause before us. Slip Op. at 13. I do not disagree. I point out my thoughts on this matter nonetheless solely to remind practitioners of that old adage, “you cannot have it both ways.” In my opinion, conceding a fact or a legal point in the District Court prevents us from affirming on that basis.
Notes
The amendment provides that in two specific circumstances a magistrate judgе in a district where activities related to a crime may have occurred has authority to issue a warrant to use remote access to search electronic storage media and seize or copy electronically stored information even when that media or information is or may be located outside of the district.
First, he contends that a published decision by the United States District Court for the Southern District of Texas in 2013—In re Warrant to Search a Target Computer at Premises Unknown, 958 F. Supp. 2d 753 (S.D. Tex. 2013)—put the FBI on notice that NIT-like warrants violate
Furthermore, In re Warrant was decided by a single magistrate judge in Texas – it has no binding precedential authority and does not reflect the opinions of judges in other jurisdictions. Contrary to Werdene’s assertions at oral argument, the legal landscape here was entirely unlike that in Katzin, where government agents relied on a 3-1 federal circuit split to conduct a warrantless search. 769 F.3d at 180-81. It was therefore entirely conceivable for the FBI to believe that reasonable magistrate judges could differ on the legality of the NIT. This view is reinforced by the fact that a number of federal district courts have issued opinions reaching different conclusions on NIT-related suppression motions. Compare United States v. Levin, 186 F. Supp. 3d 26 (D. Mass. 2016) (NIT case granting suppression), vacated and remanded, 874 F.3d at 324, with United States v. Michaud, No. 3:15-CR-05351-RJB, 2016 WL 337263 (W.D. Wash. Jan. 28, 2016) (NIT case denying suppression).
Second, Werdene argues that the FBI breached the Department of Justice’s Computer Crime and Intellectual Property Section’s revised manual for U.S. Attorney’s Offices. See DEPARTMENT OF JUSTICE, CRIMINAL DIVISION, COMPUTER CRIME AND INTELLECTUAL PROPERTY SECTION, SEARCHING AND SEIZING COMPUTERS AND OBTAINING ELECTRONIC EVIDENCE IN CRIMINAL INVESTIGATIONS (3d ed. 2009). This manual was published in 2009 and advises that “[a]gents should obtain multiple warrants if they have reason to believe that a network search will retrieve data stored in multiple locations.” Id. at 84. However, we decline to impute to the FBI agents the same understanding of legal nuances that is expected from the U.S. Attorney’s Office. See United States v. Tracey, 597 F.3d 140, 152 (3d Cir. 2010) (“[T]he knowledge and understanding of law enforcement officers and their appreciation for constitutional intricacies are not to be judged by the standards applicable to lawyers.” (quoting United States v. Cardall, 773 F.2d 1128, 1133 (10th Cir. 1985))); see also Workman, 863 F.3d at 1321 (“We expect agents executing warrants to be ‘reasonably well-trained,’ but we do not expect them to understand legal nuances the way that an attorney would.”).
