While executing a warrant to search Harold Henderson’s home, law enforcement officers discovered child pornography on Henderson’s computer. Henderson filed a motion to suppress this evidence, arguing that it was obtained in violation of his Fourth Amendment rights and, therefore, that the exclusionary rule should preclude its introduction. On denial of his motion, Henderson conditionally pled guilty to receipt of child pornography, preserving his right of review. Exercising jurisdiction under 28 U.S.C. § 1291, we affirm the denial of Henderson’s motion to suppress.
I
In June 2005, Special Agent Robert Leazenby of the Wyoming Division of Criminal Investigation conducted a statewide digital child pornography probe. He received information that a computer with a particular internet protocol (“IP”) address downloaded and shared two videos. 1 Each video had a secure hash algorithm (“SHA”) value associated with child pornography. 2 Leazenby confirmed that vid *1200 eos with the relevant SHA values depicted children engaging in sexual activity. He also received information from Bresnan Communications, an internet service provider, that the relevant IP address had been assigned to a computer located at 3824 Gregg Way, Apartment C, in Cheyenne, Wyoming.
Based in part on this information, Leazenby applied for and received a warrant to search the Gregg Way apartment. Leazenby’s supporting affidavit provides his professional background; describes the general protocol investigating officers use to identify distributors of child pornography, including how officers usually determine that a computer at a given IP address has transferred a video with a particular SHA value; and states that Leazenby “learned” that a computer with the relevant IP address had shared videos with child-pornography-related SHA values. 3 His affidavit, however, does not identify: (1) who informed Leazenby that a computer with the relevant IP address had transferred child pornography; or (2) the method used in this case to establish that a computer at the specified IP address transferred videos with child-pornography-associated SHA values.
Upon executing the search warrant, law enforcement discovered that three individuals, including Henderson, lived in the Gregg Way apartment. The apartment also contained three computers. Agents conducted a forensic review of the three computers and found child pornography on Henderson’s computer. Coincidentally, Henderson’s computer was actually in the process of downloading child pornography while the agents conducted the search. This led to the seizure of Henderson’s hard drive and related computer items.
Henderson was indicted for receipt and possession of child pornography in violation of 18 U.S.C. § 2252A(a)(2)(A), (a)(5)(B), (b)(1), and (b)(2). He initially pled guilty, but his resulting conviction and sentence were vacated because he had been erroneously advised regarding the mandatory minimum sentence for his crimes.
After his case was set for a new trial, Henderson filed a motion to suppress evidence resulting from the search of his apartment. He argued that the warrant was not supported by probable cause and that police could not have reasonably relied on the warrant in good faith. In assessing probable cause, the district court noted that “the reliability of matching the SHA[ ] values and IP numbers cannot be disputed with any merit. The science behind ‘fingerprinting’ these computers ... appears rock solid....” Nevertheless, the court determined “the reliability of the information [is], in this case, insufficient to establish probable cause” because Leazenby’s affidavit did not indicate the source of the listed IP address and SHA values. Despite this lack of probable cause, the court found that a reasonable officer could have relied upon the warrant in good faith; hence the evidence was admissible.
*1201 After this ruling, Henderson entered a conditional guilty plea to the receipt charge, and the possession charge was dismissed. The court sentenced Henderson to sixty-three months’ imprisonment, followed by a life term of supervised release. Henderson timely appealed.
II
Under the exclusionary rule, the government may not introduce into evidence “tangible materials seized during an unlawful search [or] ... testimony concerning knowledge acquired during an unlawful search.”
Murray v. United States,
The government wisely conceded at oral argument that Leazenby’s affidavit is insufficient to establish probable cause. Notably, the affidavit fails to identify how Leazenby’s source determined that a computer with the relevant IP address — rather than some other computer — shared videos with child-pornography-related SHA values.
4
Accordingly, the sole issue before us is whether the district court properly determined that evidence resulting from this unlawful search was nonetheless admissible due to the good faith exception. We review this question de novo.
United States v. Vanness,
A
In
Leon,
the Supreme Court applied the good faith exception to a case in which “the affidavit included no facts indicating the basis for the informants’ statements concerning [the defendant’s] criminal activities and was devoid of information establishing the informants’ reliability.”
We presume an officer’s acts to be in objective good faith when supported by a warrant.
United States v. Cardall,
Leazenby’s affidavit is not devoid of factual support. It states that Leazenby’s source determined that a particular computer downloaded two videos with SHA values associated with child pornography. That computer had an IP address mapping to the Gregg Way apartment. Combined, these facts provide a minimal nexus between a computer in the Gregg Way apartment and the receipt and possession of child pornography.
B
Even if an affidavit is not devoid of factual support, an officer cannot hide behind the good faith exception if she “knows or should have known that a search warrant was invalid.”
United States v. McKneely,
Leazenby’s affidavit was based on a standardized form affidavit, which was used by law enforcement officials throughout Wyoming at the time of the investigation. Both the U.S. District Court for the District of Wyoming and this court have held that an affidavit based on the same standardized form did not establish probable cause.
United States v. Stevahn,
III
Given that Henderson has not overcome the presumption that law enforcement officers acted in objective good faith when executing a warrant to search his home, we AFFIRM the district court’s denial of his motion to suppress.
Notes
. As this court has previously explained:
[A]n IP address ... is a unique number identifying the location of an enduser’s computer. When an end-user logs onto a[n] ... internet service provider, they are assigned a unique IP number that will be used for that entire ... session. Only one computer can use a particular IP address at any specific date and time.
United States
v.
Hamilton,
. An SHA value serves as a digital fingerprint: Computer files offered on peer-to-peer software can be analyzed and identified by a mathematical algorithm known as [SHA]. A SHA value of a computer file is, so far as science can ascertain presently, unique. No two computer files with different content have ever had the same SHA value. From investigations of child pornography that have been conducted in the past, law enforcement maintains a database of the SHA values of computer files that have been discovered to contain known images of child pornography.
United States v. Klynsma,
No. CR 08-50145-RHB,
. The affidavit provides:
On June 13, 2005 your Affiant was assigned to investigate a computer in Cheyenne, Wyoming that was sharing movies of child pornography. Affiant learned that on May 25, 2005, a computer with an IP address of 69.146.128.218 offered to contribute to the distribution of a movie file with the SHA value of ZZLGX2MOZQ7CX2353J5RYVKF J7BPBPQE.
Your Affiant learned that on June 1, 2005, a computer with the same IP address of 69.146.128.218 offered to contribute to the distribution of a movie file with the SHA value
QQ4CQNK5HG2IAAYHW3MRWZ2G FI5J4JRF.
. Although the district court determined that "[t]he science behind 'fingerprinting' ... these computers appears rock solid,” it apparently overlooked the fact that the affidavit does not state that Leazenby's source in fact engaged in the scientific, rock-solid method generally used by law enforcement.
