Dеfendant Gregory Maurek has been indicted for receipt, distribution, and possession of child pornography. He moves to suppress all evidence acquired in the search of his computer [Doc. No. 15] on the grounds that (1) law enforcement’s use of the “Torrential Downpour” software program to access files from his computer constituted a warrantless search; and (2) the warrant authorizing the search lacked probable cause because the supporting affidavit neither disclosed the fact that “Torrential Downpour” was only accessible to law enforcement, nor did it describe the software’s technical or scientific reliability. The government filed its brief in opposition and an evidentiary hearing was held September 14,2015. For the reasons stated below, Defеndant’s motion is denied.
BACKGROUND
'As previously noted in this Court’s Order of August 31, 2015 [Doc. No. 22], Bit-Torrent is a peer-to-peer (“P2P”) file sharing network that is used to distribute large amounts of data over the Internet.- Bit-Torrent is one of the most popular P2P networks used by individuals, as well as Ares, KaZaA, eDonkey, DirectConnect and Gnutella. Warner Bros. Records, Inc. v. Docs 1-4, No. 2:07-cv-0424-TC,
BitTorrent has allowеd users to share files anonymously with other users. Instead of relying on a central server to distribute data directly to individual users, the BitTorrent protocol allows individual users to distribute data among themselves by exchanging pieces of the file with each other to eventually obtain a whole copy of the file. When using the BitTorrent protocol, every user simultaneously receives information from and trаnsfers information to one another. In the BitTorrent vernacular, individual downloaders/distributors of a particular file are called “peers.” The group of peers involved in downloading/distributing a particular file is called a “swarm.” A server which' stores a list of peers in a swarm is called a “tracker.” ■A computer program that implements :the BitTorrent protocol is called a “Bit-Torrent cliеnt.”
First Time Videos, LLC v. Does 1-76,
• The affidavit recounted the investigative steps-that were taken to‘identify Defendant’s computer. Agent Newman attested that on March 18, 2015, Detective Chris Lamer of the Moore Police Department conducted an online undercover investigation and he was able to connect with a computer with IP address 68.97.10.183 and download numerous files. Based on Agent Newman’s review of the files, as well as her training and experience, she determined that the files depicted children under the age оf eighteen engaged in sexually explicit conduct and thus constituted “child pornography” as that term is defined in 18 U.S.C. § 2256(8).
At the evidentiary' hearing, the Court heard testimony from Robert Erdely, who teaches courses in online investigations of child pornography and participated in the development of Torrential Downpour. He testified that Torrential Downpour is a law enforcement surveillance sоftware that is used exclusively by law enforcement. It is used to track, investigate, and eventually arrest those sharing child pornography through various P2P sharing networks. Mr. Erdely testified that Torrential Downpour is “somewhat unique” in that.(l) it is designed to target and download files from a single IP address, as opposed to multiple sources, and restrict downloads to come from only that particular address (this is called a “single source download”); (2) Torrential Downpour creates a detailed log of events for evidentiary purposes; and (3) Torrential Downpour does not share files. Mr. Erdely provided additional testimony on the overall nuances of Torrential Downpour and its role in the field of P2P file sharing. Of particular note, he stated Torrential Downpour’s direct connection capabilities were no different from other commercially available versions of BitTorrent and it (Torrential Downpour) had no rate of error.
Through a subpoena, Detective Lamer discovered the street address corresponding with the aforementioned IP address at the date and time of the downloads. He then conducted a search of the Oklahoma Department of Motor Vehicles records and confirmed that Defendant had a valid Oklahoma Driver’s License which listed him as residing at the same street address. The search warrant application was granted and upon execution of the warrant, agents seized and confiscated several digital storage devices from Defendant’s residence. Child pornography, consisting of both videos and still images, was found on a computer.
STANDARD
The purpose of a suppression hearing is “to determine preliminarily the
DISCUSSION
I. Whether Use Of The “Torrential Downpour” Software Constituted A Warrantless Search
The Fourth Amendment protects only reasonable expectations of privacy. Katz v. United States,
The Tenth Circuit, and numerous other federal courts, including this Court, have uniformly held there is no reasonable expectation of privacy in files made available to the public through peer-to-peer file-sharing networks. See United States v. Brese, No. CR-08-52-D,
As one court stated, “[r]ather than evidencing a subjective expectation of privacy, Defendant’s participation in the Bit-Torrent swarm demonstrates the" exact opposite. By using peer-to-peer file sharing BitTorrent software, Defendant opened up his computer to allow other users of Bit-Torrent to access certain files to' download. By opening his computer to the public, Defendant negates any claim he may have to subjective expectation of privacy in the files he made accessible to BitTorrent users online.” United States v. Palmer, No. 2:15-cr-1-FtM-38DNF,
Defendant does not dispute that the files downlоaded from his computer were found and shared over the BitTorrent P2P network. Defendant, therefore, has not established a reasonable, subjective expectation of privacy and his Motion to Suppress is overruled on this ground.' Defendant’s attempt to distinguish the law enforcement version of the software as somehow different, or more invasive, than standard P2P programs does not alter the fact that he allowed public access to the files on his computer which contained images of child pornography, and thus compels no different conclusion.
II. Whether The Government Was Required To Disclose The Exclusive Nature Of Torrential Downpour And Prove Its Technical And Scientific Reliability
Defendant’s failure to show a reasonable expectation of privacy effеctively completes this Court’s analysis. See Mahan v. Bunting, No. 1:13-CV-00165,
“A search warrant can issue only upon a showing of probable, cause.” United States v. Long,
A search warrant must be voided where a court: (1) finds that the affiant knowingly or recklessly included false statements in or omitted material information from an affidavit in support of a search warrant; and (2) concludes, after excising such false statements and considering such material omissions, that the corrected affidavit does not support a finding of probable cause. United States v. Garcia-Zambrano,
Information omitted from an affidavit is material only if it affects’ a finding of probable cause. United States v. Kennedy,
In United States v. Chiaradio,
The FBI developed and employed a special version of LimeWire, known as “enhanced peer-to-peer software” (EP2P), which was customized to assist child pornography investigations. .The EP2P software differed from LimeWire in three principal respects:
First, when a user of the commercially available version of LimeWire tries to download a file, the program sеeks out all the users who are sharing the same file and downloads different pieces of that file from multiple locations in order to optimize download speed. EP2P eliminates that functionality; it allows downloading from only one source at a time, thus ensuring that the ■ entire file is available on that source’s computer.Second, in its commercially available iteration, LimeWire responds to a search term by displaying basic information such as the names of-the available files, file types, and the file sharers’ Internet Protocol (IP) addresses. EP2P displays not only that data but also the identity of the Internet Service Provider (ISP) and the city and state associated with the IP address sharing a. particular file. Third, EP2P has been modified so that an agent can easily compare the hash value (essentially, the digital fingerprint) of an available file with the hash valuеs of confirmed videos and images of child pornography. Taken together, these three modifications permit agents to download a file from a single source, learn the general location of the source, and facilitate the identification of child pornography as such.
Chiaradio,
On appeal, the defendant contended, as here, that the search warrant affidavit lacked probable cause because it was based on “largely untested” software and the government did not sufficiently demonstrate the software’s reliability pursuant to Daubert v. Merrell Dow Pharm., Inc.,
The court also rejected the defendant’s second contention, which also mirrors Defendant’s challenge , to Torrential Downpour, that the affidavit .contained knowing or reckless material omissions about the reliability of EP2P. The First Circuit held the alleged omissions in the supporting affidavit were not material and had they been included, they would not have diluted thе affidavit’s showing of probable cause, but rather “had the affiant included the additional statements describing what was known about EP2P’s reliability, those statements would have served no purpose except" to strengthen the affidavit. It
The Court likewise overrules Defendant’s contentions. The material fact law enforcement was obligated to disclose was its use of investigative technology to track, identify, and download the files from Defendant’s .computer. This fact was fully disclosed. More exacting details and disclosures simply were not required to establish probable cause. See United States v. Biglow,
And, as the court observed in Chiaradio, had more information about the intricacies of Torrential Downpour been included, these additional disclosures would not have affected the determination of probable cause because they would have merely provided the magistrate judge with further information regarding the source аnd capabilities of the automated software. Under the totality of the circumstances, the affidavit provided a substantial basis for the magistrate’s conclusion that there was probable cause for issuing the challenged warrant.
CONCLUSION
Defendant’s Motion to Suppress [Doc. No. 15] is DENIED.
Notes
. The Court expresses no opinion on whether Defendant met the preliminary showing to require an evidentiary hearing under Franks v. Delaware,
. See also United States v. Hill,
. EP2P's ability to target a single source is obviously akin to Torrential Downpour’s ability to download from a single IP address.
. The Daubert factors, which are meant to assist trial courts in determining whether proposed expert testimony is based on reliable methods and principles, ask (1) whether the particular theory can be and has been tested; (2) whether the theory has been subjected to peer review and рublication; (3) the known or potential rate of error; (4) the existence and maintenance of standards controlling the technique’s operation; and (5) whether the technique has achieved general acceptance in the relevant scientific or expert community. Daubert,
