MEMORANDUM OPINION AND ORDER DENYING DEFENDANT’S MOTION TO SUPPRESS EVIDENCE [DKT. NO. 43]
Pending before the Court is the motion to suppress filed by the defendant, Michael P. Lough (“Lough”), seeking to suppress evidence seized pursuant to a warrant issued by United States Magistrate Judge Theresa Carroll Buchanan of the Eastern District of Virginia. For the reasons that follow, the Court DENIES the motion (dkt. no. 43).
I. BACKGROUND
In December of 2014, the Federal Bureau of Investigation (“FBI”) became aware that a website operating on the “dark web” under the moniker “Playpen” was trafficking in child pornography. Playpen operated on the TOR network,
On February 20, 2015, the FBI seized the computer server that hosted the Playpen website from a web-hosting facility in Renoir, North Carolina. Dkt. No. 19 at 2. The FBI removed the server to a facility in the Eastern District of Virginia, at which point it obtained a search warrant
Utilizing the NIT, the FBI determined that a user living in Fairmont, West Virginia, with the user name “2tots,” had logged into the Playpen website and accessed child pornography, Dkt. No. 20-2 at 18-19. Records compiled by the Playpen server established that “2Tots” had been logged on for approximately seventeen hours between November 23, 2014 and March 1, 2015. Id at 19. The NIT revealed the IP address from which “2Tots” was logging into the Playpen site.
The government filed a one-count Information against Lough on March 15, 2016, following which he appeared before United States Magistrate Judge Michael J. Aloi on March 23, 2016 for an initial appearance, arraignment, and plea hearing. At the hearing, Lough was placed under oath and waived his right of indictment. Id. Pursuant to Fed. R. Crim. P. 11(3), the government called SA Ryan, who recounted the factual basis for Lough’s guilty plea. Lough then acknowledged the facts as stated by SA Ryan, admitted to the elements of the charge in the information, and entered his guilty plea.
Thereafter, on May 4, 2016, Lough moved to withdraw his guilty plea. Based on a recent opinion by another district court granting a defendant’s motion to suppress evidence gathered through the same NIT warrant that is the subject of this case, Lough believed he too could move to suppress such evidence (dkt. no. 17). After due consideration of his motion, on August 25, 2016, the Court vacated his guilty plea and provided the parties with a briefing schedule on the anticipated motion to suppress (dkt. no. 35).
On September 12, 2016, Lough moved to suppress all of the evidence seized as a result of the NIT warrant (dkt. no. 43), arguing it violated Fed. R. Crim. P. 41(b) because it was for a search outside the magistrate judge’s jurisdictional limit and, consequently was void ab initio. As such, he contends no good faith or other exceptions would apply and suppression of any evidence gathered as a result of its execution is therefore appropriate.
The government contends that the warrant was authorized under Fed. R. Crim. P. 41(b)(4) because the NIT was a form of tracking device. Alternatively, even if the NIT warrant violated Rule 41, it argues that this was a mere technical violation
II. APPLICABLE LAW
A. Fourth Amendment
The Fourth Amendment guarantees “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures,” and that “no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” Searches subject to Fourth Amendment protections are those in which the “government violates a subjective expectation of privacy that society recognizes as [objectively] reasonable.” United States v. Graham,
B. Federal Rule of Criminal Procedure 41(b)
Fed. R. Crim. P. 41 (b) provides in pertinent part:
At the request of a federal law enforcement officer or an attorney for the government:
(1) a magistrate judge with authority in the district — or if none is reasonably available, a judge of a state court of record in the district — has authority to issue a warrant to search for and seize a person or property located within the district;
[[Image here]]
(4) a magistrate judge with authority in the district has authority to issue a warrant to install within the district a tracking device; the warrant may authorize use of the device to track the movement of a person or property located within the district, outside the district, or both; ....
III. DISCUSSION
The NIT warrant in this case has been the subject of numerous motions to suppress filed by defendants in federal courts throughout the United States.
A. Reasonable Expectation of Privacy
Lough had no reasonable expectation of privacy in his IP address. To establish that he had a legitimate expectation of privacy, Lough must first demonstrate that he had.a “subjective expectation of privacy.” United States v. Bynum,
The third party doctrine holds that “an individual can claim no legitimate expectation of privacy in information that he has voluntarily turned over to a third party,” because when he “reveal[s] his affairs to another, [he] takes the risk ... that the information will be conveyed by that person to the Government.” Graham,
Lough could not have had a subjective expectation of privacy because he voluntarily turned over his IP address to every computer with which he made contact, including the first node of the TOR network. Although he may have wished to remain anonymous, and even hoped that the TOR would facilitate that goal, hoping and wishing are not the equivalent of expecting a certain result. At.the very least, Lough certainly knew that he was revealing his IP address to one unknown third party who, for all he knew, was a law enforcement officer.
Even assuming that Lough did have a subjective expectation of privacy, it is not one that society is prepared to recognize as reasonable. Castellanos,
Even if [the defendant] could show that he had a subjective expectation of privacy in his subscriber information, such an expectation would not be objectively reasonable. Indeed, “[e]very federal court to address this issue has held that subscriber information provided to an internet provider is not protected by the Fourth Amendment’s privacy expectation.”
U.S. v. Bynum,
Clearly, Lough does have a privacy interest in his home and its contents, including his computer. Nevertheless, the FBI’s use of the NIT to discover Lough’s IP address was not a search of the contents of that computer. The Supreme Court of the United States has “forged a clear distinction between the contents of communications and the non-content information that enables communications providers to transmit the content.” United States v. Graham,
In Graham, the Fourth Circuit applied this distinction to cell-site location information (“CSLI”) and concurred with the Sixth Circuit that “CSLI is non-content information because ‘cell-site • data — like mailing addresses, phone numbers, and IP addresses — are information that facilitate personal communications, rather than part of the content of those communications themselves.’” Graham,
In sum, Lough had no expectation of privacy in his IP address because he knowingly exposed it to third parties. Furthermore, the NIT did not conduct a search of the content of his computer such that it was subject to Fourth Amendment protections. The Court therefore denies Lough’s motion to suppress.
B. Validity of the Warrant
Lough asserts that Rule 41(b)(1) did not authorize the magistrate judge in the Eastern District of Virginia to issue a war
The Court agrees with Lough that the clear language of subsection (1) explicitly limits the magistrate’s “authority to issue a warrant to search for and seize a person or property” to only those persons or property “located within the district.” Fed. R. Crim. P. 41(b)(1). Here, as neither Lough nor his computer was located in the Eastern District of Virginia, Rule 41(b)(1) did not authorize the NIT warrant.
Nevertheless, because the NIT is analogous to a tracking device in both function and effect, the magistrate judge was authorized under Rule 41(b)(4) to issue a warrant for its use. Rule 41(b)(2) specifically incorporates 18 U.S.C. § 3117(b), which defines a tracking device as “an electronic or mechanical device which permits the tracking of the movement of a person or object.” Despite any further statutory definition of a “device,” “it is a word commonly used to describe ‘a tool or technique used to do a task.’ ” Jean,
The district court in United States v. Jean, tallied the courts that have specifically addressed whether the NIT was akin to a tracking device such that Rule 41(b)(4) would authorize a warrant for its implementation.
The court then addressed the final requirement, that the device be “install[ed]” within the district. First, it recognized the “problematic” nature of the requirement, given that the NIT was an intangible device, tracking intangible information, a factor that raised questions regarding the locus of the installation. Id. at *16. From the evidence before it, the court concluded that the installation of the NIT did not occur at the user’s remotely located computer, but rather at the server located in the Eastern District of Virginia. Id. at *16-17.
The Court agrees with this analysis. The NIT was imbedded in the material Lough sought to download; he came to the server to get the material; the server did not reach out to him unsolicited. See Id. at *17 (“It is also undisputed that but for Mr. Jean electronically traveling in search of child pornography to the watering hole in Virginia, the NIT could not have been deployed.” (emphasis in original)). Based on this, it is clear that the installation of the NIT occurred at the server in the Eastern District of Virginia.
A summary of the physical and virtual facts concerning how the NIT was employed is helpful. Lough took a virtual trip to the Eastern District of Virginia, but rather than travel by car, he traveled digitally — his vehicle was comprised of packets of information. Once there, the FBI attached a digital electronic tracking device to those packets, which Lough virtually rode back to the Northern District of West Virginia. Upon his virtual return, Lough parked his digital vehicle built of those packets of information on his computer, rather than in his driveway. At that point, the NIT sent back his digital address, just as a GPS tracker would send back his coordinates. Accordingly, the NIT is analogous to a tracking device authorized under Rule 41(b)(4), and the NIT warrant is an information-tracking warrant that comports with Rule 41(b)(4), which Magistrate Judge Buchanan had the authority to issue.
C. The Alleged Violation of Rule 41(b) was Technical
Even if the NIT warrant violated Rule 41(b), suppression is not warranted here. In United States v. Simmons, the Fourth Circuit opined that “[tjhere are two categories of Rule 41 violations: those involving constitutional violations, and all others.”
By definition, a constitutional violation occurs when a warrant offends the protections afforded under the Fourth Amendment, which mandates that the judge issuing the warrant do so based “upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” U.S. Const., amend. IV.
The FBI affidavit belies this contention. It clearly explained that only those users who affirmatively sign into the Playpen site using their screen name and password would have the NIT attached to their requested downloads of information from the site. The NIT warrant searched the server in the Eastern District of Virginia for users who were specifically visiting the site and, even more specifically, only for those users who explicitly requested that information be sent to their computers by way of downloaded pictures and videos. This is a far cry from a “wide ranging general search” that might mistakenly search some unaffiliated computer. Id. Accordingly, the NIT warrant possessed the requisite particularity to satisfy the Fourth Amendment.
Notwithstanding the absence of a constitutional violation, the Court must still determine whether any non-constitutional violation of Rule 41(b) occurred that would warrant suppression. Suppression is warranted only if Lough was “prejudiced by the violation,” or when “there is evidence of intentional and deliberate disregard of a provision in the Rule.” Simons,
Lough contends that he was prejudiced because the “search authorized by the Residential Warrant would not have occurred but for the information derived from the improperly issue NIT warrant.” Dkt. No. 43 at 13. What he overlooks, however, is that, even had the magistrate judge concluded she lacked authority under Rule 41(b) to issue the warrant, the FBI could have simply presented it to the district court judge in that same district. See Jean,
Nor was there any “evidence of intentional and deliberate disregard of a provision in the Rule.” Simons,
In summary, the Court concludes that any violation of Rule 41(b) alleged by Lough was not constitutional in nature; any jurisdictional defect’ in the magistrate judge issuing the warrant was not prejudicial to Lough because a district judge could have issued the same warrant; and, finally, the magistrate judge did not intentionally and deliberately disregard a provision in the Rule. Consequently, suppression is not required in this case.
D. Exceptions to the Exclusionary Rule
Assuming, arguendo, that a Fourth Amendment violation occurred in the issuance or execution of the NIT warrant, the Court nonetheless must analyze “whether suppression is the proper remedy.” See U.S. v. Davis,
The exclusionary rule is a drastic remedy that exacts a high social cost. See Nix v. Williams,
To help counteract the drastic nature of the exclusionary rule, the Supreme Court in Leon articulated the “good faith” exception. Davis,
The Supreme Court has been abundantly clear that “the reach of the exclusionary rule does not extend beyond police conduct to punish the mistakes of others, be they judicial officers or employees, or even legislators.” U.S. v. McCane,
Importantly, the Supreme Court has explained why the exclusionary rule does not apply to mistakes by judicial officers:
First, the exclusionary rule is designed to deter police misconduct rather than to punish the errors of judges and magistrates. Second, there exists no evidence suggesting that judges and magistrates are inclined to ignore or subvert the Fourth Amendment or that lawlessness among these actors requires application of the extreme sanction of exclusion.
Third, and most important, we discern no basis, and are offered none, for believing that exclusion of evidence seized pursuant to a warrant will have a significant deterrent effect on the issuing judge or magistrate. Many of the factors that indicate that the exclusionary rule cannot provide an effective “special” or “general” deterrent for individual offending law enforcement officers apply as well to judges or magistrates. And, to the extent that the rule is thought to operate as a “systemic” deterrent on a wider audience, it clearly can have no such effect on individuals empowered to issue search warrants. Judges and magistrates are not adjuncts to the law enforcement team; as neutral judicial officers, they have no stake in the outcome of particular criminal prosecutions. The threat of exclusion thus cannot be expected significantly to deter them. Imposition of the exclusionary sanction is not necessary meaningfully to inform judicial officers of their errors, and we cannot conclude that admitting evidence obtained pursuant to a warrant while at the same time declaring that the warrant was somehow defective will in any way reduce judicial officers’ professional incentives to comply with the Fourth Amendment, encourage them to repeattheir mistakes, or lead to the granting of all colorable warrant requests.
Leon,
The good faith exception is not without limits, however. Courts have identified the following four circumstances where it should not apply:
(1) [T]he magistrate or judge in issuing a warrant was misled by information in an affidavit that the affiant knew was false or would have known was false except for his reckless disregard of the truth;
(2) [T]he issuing magistrate wholly abandoned his judicial role ...;
(3) [T]he affidavit supporting the warrant is so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable; and
(4) [Ujnder the circumstances of the case the warrant is so facially deficient, i.e., in failing to particularize the place to be searched or the things to be seized that the executing officers cannot reasonably presume it to be valid.
U.S. v. Doyle,
Critically, in the Fourth Circuit, the “flagrancy of police misconduct” is a determinative factor in analyzing the propriety of applying the exclusionary rule. Davis,
Lough argues that because Magistrate Judge Buchanan lacked authority to issue the NIT warrant beyond her jurisdiction it is void ab initio, making the good faith exception inapplicable. In support, he cites Levin, which differentiated between a warrant that was subsequently invalidated and a warrant that was “void at its outset,” finding the latter to be “no warrant at all.”
In Levin, the district court began by noting that the applicability of the good faith exception to a warrant that was void ab initio was a matter of first impression in the First Circuit, and that no Supreme Court decisions post-Leon had specifically dealt with the issue. Id. at *11. It went on to recognize that the Sixth Circuit was the only Circuit Court to address whether the good faith exception applied to a warrant void ab initio.
As part of that discussion, Levin analyzed United States v. Scott,
In Levin, although the district court was not bound by the rulings in either Scott or Master, it chose to follow the reasoning in Scott. Id. at *12. In light of the holding of the Supreme Court in Herring, however, the reasoning of the Sixth Circuit in Master is more persuasive. Therefore, whether the warrant is void ab initio or voided at a later date is immaterial to the question presented. The true measure of whether the good faith exception applies under Leon is determined by balancing the deterrent effect against the societal costs. See Herring,
A review of the facts of this case establishes that no circumstances exist that warrant exclusion. The FBI agents acted responsibly, providing the magistrate judge with a highly detailed affidavit that clearly established probable cause. Furthermore, there is no evidence that the magistrate judge abandoned her judicial role, or that the warrant was so facially invalid that the executing agents could not presume it to be valid. Nor is there any evidence that the FBI agent swore to anything in the affidavit that he knew to be false or would have known to be false except for his reckless disregard of the truth. At bottom, there simply is no misconduct here, a fact that ultimately dooms Lough’s motion. See Davis,
V. CONCLUSION
For the reasons discussed, the Court concludes as follows:
1) Lough had no reasonable expectation of privacy in his IP address, nor did the NIT constitute a Fourth Amendment search of the content of his computer; thus, a warrant was unnecessary;
2) Even so, the NIT warrant complied with Rule 41(b)(4) because the NIT is sufficiently akin to a tracking device;
3) Moreover, any violation of Rule 41(b) was non-constitutional in nature, and there was no prejudice to Lough, nor any evidence of intentional and deliberate disregard of the Rule; and
4) Finally, the good faith exception renders suppression improper in this case.
Accordingly, the Court DENIES Lough’s motion to suppress.
It is so ORDERED.
The Court directs the Clerk to transmit copies of this order to counsel of record and all appropriate agencies.
Notes
. "TOR” is an acronym for "the onion router.” The TOR network provides online anonymity to users by "bouncing their communications around a distributed network of relay computers run by volunteers all around the world, thereby masking the user's actual IP address which could otherwise be used to identify a user.” Dkt. No. 19-1 at 11-12,
. The NIT also revealed the "host and logon name” for Lough’s computer, which was "mi-keandjulie.” Dkt. No. 20-2 at 20. The host and logon name was not necessary for securing the subpoena on Frontier Communications nor was it needed to secure the Residential warrant.
. See, e,g., United States v. Scarbrough,
. Tellingly, the TOR project, which supplies the software and platform that Lough utilized to visit the Playpen website, warns users that sites they visit through TOR could see their identifying information: "Tor cannot solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don’t want sites you visit to see your identifying information.” See https://www.torproject.org^ about/overview.html.en#stayinganonymous, last visited November 7, 2016.
. See also United States v. Wheelock,
. See, e.g., Werdene,
. Lough also argues that the warrant violated the Federal Magistrates Act, 28 U.S.C. § 636(a), which provides similar jurisdictional limitations on the warrant power of magistrate judges. Under 28 U.S.C. § 636(a)(1), however, the Act expands magistrate's jurisdiction to include "elsewhere as authorized by law — (1) all powers and duties conferred or imposed ... by the Rules of Criminal Procedure for the United States District Courts.” Thus, because § 636(a)(1) clearly allows the Rules of Criminal Procedure to expand the jurisdictional sphere of a magistrate judge’s authority, the Court’s inquiry here is limited to what Fed. R. Crim. P. 41(b) authorized in this case.
. See Jean,
. Rule 41(a)(2)(A) defines “Property” to "included documents, books, papers, any other tangible objects, and information.” (emphasis added).
. See also, e.g., Davis v. U.S.,
. In support, McCane cites Arizona v. Evans,
. This view also makes more sense when looking at the Supreme Court decisions. For example, justifying exclusion when a warrant is void ab initio, but inclusion when a warrant is non-existent, as in Herring, would require some semantic gymnastics.
. The government posits that the exigent circumstances exception applies to bar suppression. After review, the Court finds this theory unpersuasive, but nonetheless denies suppression for the other reasons stated.
