Case Information
*1 United States Court of Appeals
For the First Circuit
No. 14-1561
UNITED STATES OF AMERICA,
Appellee,
v.
DAVID MCLELLAN,
Defendant, Appellant.
APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MASSACHUSETTS [Hon. Rya W. Zobel, U.S. District Judge]
Before
Torruella, Selya, and Lynch, Circuit Judges.
Judith H. Mizner, Assistant Federal Public Defender, Federal Public Defender Office, for appellant. Crystal S. Yang , Special Assistant United States Attorney, with whom Carmen M. Ortiz, United States Attorney, was on brief, for appellee. July 6, 2015
*2
TORRUELLA, Circuit Judge . On February 19, 2010, law enforcement officers executed a federal search warrant at 180 High Street in Taunton, Massachusetts as part of an investigation into an individual using the online usernames "babylick" and "a35scott" to trade child pornography. After speaking with one of the co- owners (who was also an occupant), the officers searched the entire single-family residence, including the bedroom of Appellant David McLellan, who was renting a bedroom in the residence. In McLellan's bedroom, officers seized numerous electronics containing more than 6.3 million images and videos of child pornography and files depicting McLellan sexually abusing an infant. McLellan was subsequently indicted on one count of sexual exploitation of children under 18 U.S.C. § 2251(a) and one count of transporting child pornography under 18 U.S.C. § 2252(a)(1). Following the denial of his request for a Franks hearing and for suppression of the evidence seized during the search, McLellan pleaded guilty, specifically reserving his right to appeal the district court's rulings. Finding no error with these rulings, we affirm.
I. Background
This investigation began in February 2008, when Canadian authorities alerted the Federal Bureau of Investigation ("FBI") that an individual in or near Boston, Massachusetts was using the username babylick to post images of child pornography to an online bulletin board system. A few months later, in June 2008, the FBI *3 obtained from Yahoo! the user information for the username a35scott. They learned that a35scott self-identified as Adam Scott from Medford, Massachusetts and that he had logged into Yahoo! from seven different IP addresses between January and May of 2008. [1] Three of the IP addresses were linked to Verizon accounts assigned to Dennis Truso in Boston, Massachusetts, one was linked to a Comcast account assigned to Greg Little in East Boston, Massachusetts, and the other two were linked to accounts in Boston, Massachusetts, and Cambridge, Massachusetts. Notably, one of the IP addresses linked to Dennis Truso matched the IP address provided by the Canadian authorities in relation to babylick, thus suggesting that the two usernames belonged to the same individual.
The FBI continued investigating a35scott, and by March 2009, it had issued a report identifying him as an active member in the Multiply.com e-group [2] "YOUCANTSEEMETOO," where he was observed posting and trading child pornography. Though the zipcode *4 associated with a35scott's Multiply.com account was in California, the IP addresses were once again traced to the internet accounts of Dennis Truso and Greg Little. The report noted, however, that a35scott was not necessarily Dennis Truso or Greg Little, but might be another member of the Truso or Little household, or another person entirely.
For reasons unclear from the record, the investigation into a35scott appears to have gone quiet from March 2009 through December 2009. The investigation resumed on December 1, 2009, however, when FBI Special Agent Raj Patel, acting in an undercover capacity, logged on to Gigatribe.com, a peer-to-peer ("P2P") file- sharing network. Like other P2P networks such as Napster, Kazaa, and Limewire, Gigatribe allows a user who has downloaded the service's software to directly connect to other users' computers in order to search and download files that other users have designated for sharing. Unlike the traditional P2P network, however, the Gigatribe system requires a user to already know another user's username and to be accepted by that other user before contact and file-sharing can occur. The Gigatribe files are also encrypted when they are exchanged. Because of these added layers of security, Gigatribe has become a preferred P2P system for trafficking child pornography.
When Agent Patel logged in to Gigatribe on December 1, he observed a35scott logged in as well. Agent Patel proceeded to *5 browse a35scott's shared directory and discovered numerous files with names indicative of child pornography, such as "!-baby unsorted" and "7yo private, cbaby and dea (5yo)." He selected three files to download, but, midway through the downloads, a35scott blocked Agent Patel's access. As a result, two of the three files were only partially downloaded and could not be opened. The third file, however, titled "Boner0170 (Thai boys).jpg," was fully downloaded (the "December 1 Download"). This file contained a collage of twenty-five images of child pornography, mostly consisting of two prepubescent boys either partially clothed or naked with a focus on their genitals.
The FBI was able to trace the file's origin to a single IP address -- 173.76.210.90. This IP address was registered to Verizon and, according to Verizon's records, was assigned to the residential high speed internet service account of Darryl J. St. Yves, located at 180 High Street in Taunton, Massachusetts. The FBI confirmed St. Yves's residential address with both the Massachusetts Registry of Motor Vehicles ("RMV") and the United States Postal Service ("USPS"), and agents visibly observed that a single mailbox at 180 High Street listed St. Yves and two other occupants -- Keller and Theobold.
Armed with this information, FBI Special Agent John Locke applied for a search warrant for 180 High Street on February 11, 2010. In his affidavit in support of the warrant, Special Agent *6 Locke recounted the investigation by Special Agent Patel linking the Gigatribe download to an IP address belonging to the account of St. Yves, as well as the FBI's subsequent confirmation that St. Yves lived at 180 High Street both at the time of the download and at the time of the affidavit. The affidavit also described how individuals involved in the transportation and possession of child pornography often keep their pornography close by in secure locations and how complicated forensic examinations of electronics are often necessary to discover the hidden files containing child pornography. Accordingly, the affidavit concluded that there was "probable cause to believe that there exists evidence, fruits and instrumentalities" of the crimes of the transportation and possession of child pornography at 180 High Street and that "Darryl J. St. Yves and/or other residents, as yet unknown," committed those crimes. The magistrate judge agreed and issued the search warrant.
Notably, the affidavit omitted certain information presumably known to Agent Locke. For example, it did not reference either the February 2008 Canadian tip regarding "babylick" or the March 2009 report detailing the FBI's investigation into a35scott's involvement in the YOUCANTSEEMETOO e-group on Multiply.com. It also failed to mention that this activity had been linked to IP addresses traced to Dennis Truso, Greg Little, and two others, and not to Darryl J. St. Yves. The affidavit did, however, state that *7 it did "not contain every fact known to [Special Agent Locke] with respect to this investigation" but rather "it contain[ed] those facts that [he] believe[d] to be necessary to establish probable cause for issuance of a search warrant" for 180 High Street.
The FBI agents executed the warrant on February 19, 2010. When they arrived, both St. Yves and McLellan were present. St. Yves explained to the agents that he and Keller owned -- and occupied -- the residence and that they had rented a third room -- the room formerly occupied by Theobold -- to McLellan "approximately" two months prior, on or about December 1, 2009. He added that all three occupants used his Verizon internet service via a router which created a wireless network, but each resident had his own computers and did not share files. The agents then informed St. Yves that they were looking for child pornography and would be examining all the computers to determine who was most likely responsible. St. Yves admitted that he possessed some child pornography but had not actively searched for it; rather, it was downloaded along with adult pornography videos St. Yves had collected. Upon further inquiry, the FBI agents learned that St. Yves claimed to be unfamiliar with the username a35scott, to not use Yahoo!, and to have never used Gigatribe. St. Yves also told the agents that McLellan was "the most knowledgeable about computers" among the three residents.
Following this conversation, the FBI proceeded to search 180 High Street. They seized several computers, 497 CDs and DVDs, five hard drives, one four-gigabyte thumb drive, and three cell phones from McLellan's bedroom. A subsequent forensic examination of these items revealed images and videos of child pornography, including ones of McLellan sexually abusing an infant. [3] Accordingly, on August 2, 2012, McLellan was indicted on one count of sexual exploitation of children under 18 U.S.C. § 2251(a) and one count of transporting child pornography under 18 U.S.C. § 2252(a)(1).
On April 23, 2013, McLellan filed a motion attacking the search from two angles. First, he argued that the search was unconstitutional -- and thus the seized electronics should be suppressed -- because the warrant was insufficiently particular. To support this claim, McLellan alleged that 180 High Street was a "multi-unit dwelling" and the affidavit failed to provide probable cause to search his specific room because there was no evidence to link anyone other than St. Yves to the December 1, 2009, download. Second, McLellan requested a hearing under Franks v. Delaware, 438 U.S. 154 (1978), because, he contended, the affidavit in support of the search warrant omitted material information that would have negated probable cause. Specifically, McLellan argued that had the *9 magistrate judge been informed that a35scott had been linked to IP addresses connected to Dennis Truso, Greg Little, and others -- but not to St. Yves -- in 2008 and early 2009, the magistrate judge would have found the December 1, 2009, download to be stale by February 2010 because there would have been evidence suggesting that a35scott frequently moved around and "piggyback[ed]" on the internet service of others.
The district court heard arguments on McLellan's motion on October 16, 2013, and orally denied the motion at the conclusion of the hearing. Regarding the particularity argument, the district court found that
in light of the undisputed facts that this appears to be a single family dwelling in which there were a number of individuals, three specific, there was, that the warrant was sufficiently particular. There was here no separate entrance to the street. The room in question was not equipped for independent living. It appeared that the occupants had joint access to the common areas. And there's no sufficient evidence that the police understood that the house, a single family house, was subdivided. The search warrant I rule was sufficiently particular.
As to McLellan's Franks argument, the district court agreed that "certain data was omitted" but emphasized that "[t]here can be no Franks hearing unless the omitted information was critical to the probable cause determination." The district court went on to hold that
the omitted information was not recklessly omitted and the information was not essential *10 or critical to the probable cause determination. The warrant does state that the affidavit does not contain every fact known to me with respect to this investigation. The magistrate was put on notice of that. It's also unclear to the Court at this stage that the affiant here or indeed the investigative team ever had a full picture of [a]35scott's movements at the time the warrant was issued.
Now, since I decline to find that the omission was intentional or reckless that's sufficient standing by itself to deny a Franks hearing.
Also, the second prong, if I address that, in this case, I find that had this information been known and all disclosed in the [affidavit], the well-known proclivity of those who possess this child obscenity hang onto it does not cut against probable cause here and the two month gap here is not, does not make this information stale and indeed supports the issuance of the warrant in this case. [4]
With both his request for a Franks hearing and motion to suppress denied, McLellan opted to plead guilty to the two-count indictment while reserving his right to appeal the district court's rulings. On May 15, 2014, the district court sentenced McLellan to 204 months of imprisonment followed by fifteen years of supervised release. This timely appeal followed.
II. Discussion
A. The Franks Hearing
McLellan first argues that the district court erred in denying his request for a Franks hearing. We disagree.
1. Standard of Review
We review the denial of a Franks hearing for clear error.
United States v. Grant,
2. The Requirements for a Franks Hearing The Fourth Amendment protects individuals against unreasonable intrusion by the government. This protection stems from the Amendment's instruction that "no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and *12 particularly describing the place to be searched, and the persons or things to be seized." U.S. Const. amend. IV.
As we have repeatedly emphasized, "[a]n affidavit
supporting a search warrant is presumptively valid." United States
v. Gifford,
If, however, this preliminary showing is made, the
defendant is entitled to a hearing -- known as a Franks hearing --
where he or she can try to establish by a preponderance of the
evidence that the affiant did in fact make a false statement or
*13
omission "knowingly and intentionally, or with reckless disregard
for the truth" and that "with the recklessly omitted information
added to the affidavit, the reformed affidavit fails to establish
probable cause." Gifford,
As to the second prong, a warrant is based on probable
cause when "'the affidavit upon which a warrant is founded
demonstrates in some trustworthy fashion the likelihood that an
offense has been committed and that there is sound reason to
believe that a particular search will turn up evidence of it.'"
United States v. Chiaradio, 684 F.3d 265, 279 (1st Cir. 2012)
(quoting United States v. Aguirre,
3. The Omitted Information Was Immaterial McLellan argues that Agent Locke intentionally and recklessly omitted material information regarding the FBI's investigation into a35scott prior to the December 1 Download from his affidavit, and had this information been included in the affidavit, probable cause would have been lacking. Specifically, McLellan points to: (1) the February 2008 Canadian tip into babylick; (2) the March 2009 report detailing a35scott's involvement in the YOUCANTSEEMETOO e-group on Multiply.com, which was registered with a California zip code; and (3) the links between these child pornographic activities and IP addresses traced to Dennis Truso, Greg Little, and others, but not to Darryl J. St. Yves (collectively, the "Omitted Information"). This information, according to McLellan, revealed that whoever a35scott was, he or she was nomadic and never remained at the same place for very long, and thus when the FBI applied for the warrant two months after Agent Patel's single December 1 Download, there was no longer probable cause to believe that a35scott would still be at 180 High *15 Street. In other words, the information contained in the affidavit was stale. [5]
The parties do not dispute that this information was
omitted from the affidavit,
[6]
though they do disagree over whether
*16
or not the omission was intentional and/or reckless. We need not
decide this, however, because the inclusion of the Omitted
Information would have been immaterial to the probable cause
determination. See Rigaud,
Information contained in an affidavit is stale if it
established probable cause at some point in the past but does not
support probable cause at the time of the warrant's issuance. Sgro
v. United States,
[m]eticulous compliance involves more than an agent's own judgment as to the ultimate importance of a piece of information to a judgment of probable cause. The agent also should, in the interest of both judicial economy and fairness, ask the further question, "Is this information so trivial, remote or irrelevant that no reasonable official could assign it weight in coming to a decision to issue the warrant?" Unless an affirmative answer can be given, the information should be included -- even if, in context, its weight seems too slight to tip the balance away from a finding of probable cause.
United States v. Stewart,
Here, the Omitted Information would not have led the magistrate to conclude that the connection between a35scott and 180 High Street was stale. The Omitted Information shows that from February 2008 until March 2009, a35scott was using IP addresses assigned to Dennis Truso in Boston, Greg Little in East Boston, and two other accounts in Boston and Cambridge -- with the majority of those uses occurring between January and May 2008. This information can be taken in multiple ways. It could mean, as McLellan argues, that a35scott was nomadic and moving around, using whatever internet he or she could find. [7] However, it could also indicate locations where a35scott lived, worked, and/or spent his or her free time during that time span. [8]
*18 Either way, this ambiguous information as to a35scott's travels between January 2008 and March 2009 has very little relevance to a35scott's location in February 2010. To the contrary, even taking into account this Omitted Information, the best information the FBI had in February 2010 as to a35scott's current location was still the trace of the December 1 Download to St. Yves's account at 180 High Street. Nothing in the Omitted Information suggests, for example, that a35scott had used an IP address linked to a different location between December 1, 2009, and the filing of the affidavit on February 11, 2010; nor does it suggest that a35scott had used IP addresses linked to multiple or different locations around the time of the December 1 Download. And without any evidence that a35scott had relocated, we do not believe this two-plus-month delay in applying for the warrant rendered the information in the affidavit stale. This is especially true considering those two months were used by the FBI to corroborate (through checks with the RMV and USPS and with a drive-by site visit to 180 High Street) that St. Yves -- the account holder for the targeted IP address -- had not moved. Cf. United States v. Tiem Trinh, 665 F.3d 1, 13-14 (1st Cir. 2011) (holding that information contained in an affidavit was not stale where one month had elapsed between the warrant's issuance and the last observed narcotics-related activity); United States v. actually more likely.
Bucuvalas, 970 F.2d 937, 940-41 (1st Cir. 1992) (finding
information in an affidavit not to be stale where events related to
the conspiracy charge took place four years prior to the search
warrant application because a co-conspirator was seen bribing a
police officer one month before the warrant and the affiant had
verified that a person related to the conspiracy was still
designated as a record owner for the premises), abrogated on other
grounds by Cleveland v. United States,
The Omitted Information, therefore, does not render a35scott's link to 180 High Street in February 2010 stale, and as such does not negate the probable cause finding. [9] See Rigaud, 684 *20 F.3d at 173 n.5 ("With an omission, the inquiry is whether its inclusion in an affidavit would have led to a negative finding by the magistrate on probable cause."); Woodbury, 511 F.3d at 98 (explaining that a reviewing court examines an affidavit in "a practical, commonsense fashion" to determine whether it "would warrant a man of reasonable caution to believe that evidence of a crime will be found" (citations and internal quotation marks omitted)). Because McLellan failed to make this preliminary showing, he cannot satisfy the prerequisites for a Franks hearing. Accordingly, there was no error -- let alone a clear error -- in the district court's decision to deny McLellan's request.
B. The Motion to Suppress
McLellan also argues that even taking the warrant as is -- i.e., without considering the Omitted Information -- his motion to suppress should have been granted because the "multi-unit" character of 180 High Street made the warrant insufficiently particular. As such, the search of his room exceeded the warrant's permissible scope. Once again, we disagree.
1. Standard of Review
Our review of the district court's denial of McLellan's
motion to suppress is bifurcated: "we review its findings of fact
for clear error and apply de novo review 'to the application of law
to those facts and to conclusions of law.'" United States v.
Werra,
2. The Fourth Amendment's Particularity Requirement
The Fourth Amendment requires that a search "be justified
by probable cause and . . . satisfy the particularity requirement,
which limits the scope and intensity of the search." Mousli, 511
F.3d at 12 (quoting United States v. Bonner,
3. The Warrant for 180 High Street Was Sufficiently Particular
Here, McLellan argues that 180 High Street was a multi-
unit dwelling, and thus the search of his room violated the Fourth
Amendment's particularity requirement. This argument is in deep
trouble before it even begins, however, because the district court
made a factual determination that 180 High Street was a single-
*23
family residence. Specifically, the district court found that
McLellan's room "was not equipped for independent living" because
there was no separate entrance to the street and the occupants had
joint access to the common areas such as the kitchen and living
rooms. Though McLellan disagrees with the court's ultimate
conclusion as to a single- versus multi-family residence, he does
not dispute this underlying description of his room and the
premises.
[10]
Accordingly, we are hard-pressed to disagree with the
district court's factual finding that 180 High Street is a single-
family residence; and at the very least, the finding is in no way
clearly erroneous. See Ferreras,
Perhaps recognizing that this argument is a lost cause, McLellan also contends that even if the warrant was particular on its face, information learned during the execution of the warrant revealed a "factual mistake" regarding the premises which required the FBI to exclude McLellan's bedroom from its search. See Garrison, 480 U.S. at 87 ("[The officers] were required to discontinue the search of respondent's apartment as soon as they . . . were put on notice of the risk that they might be in a unit erroneously included within the terms of the warrant."); Ricciardelli, 998 F.2d at 17 n.10 (noting that when police executing a warrant discover a factual mistake, they "'must reasonably limit their search accordingly'" (quoting Garrison, 480 U.S. at 89 n.14)). We reject McLellan's contention that any "mistake" was made.
Contrary to McLellan's contention, the additional
information gathered by the FBI actually increased the likelihood
that McLellan -- and not one of the other occupants -- was
a35scott.
[11]
First, by talking to St. Yves, the FBI learned that all
*25
three occupants shared St. Yves's internet account via a wireless
router, and thus every internet connection established from any of
the occupants' computers would trace back to the same IP address.
See In re BitTorrent Adult Film Copyright Infringement Cases, 296
F.R.D. 80, 84 (E.D.N.Y. 2012) (explaining that "[i]f you use a
router to share an Internet connection, the router gets the IP
address issued directly from the ISP" and thus "[a]n IP address
provides only the location at which one of any number of computer
devices may be deployed, much like a telephone number can be used
for any number of telephones" (internal quotation marks omitted));
Patrick Collins, Inc. v. Doe 1,
The motion to suppress, therefore, was properly denied.
III. Conclusion
For the reasons explained above, McLellan fails to make a preliminary showing that the Omitted Information from Agent Locke's affidavit would have negated the magistrate judge's probable cause finding, and thus the district court did not err in denying his request for a Franks hearing. Moreover, because we agree with the district court's conclusion that the warrant was sufficiently particular, McLellan's motion to suppress was properly denied.
AFFIRMED .
Notes
[1] An IP address, or Internet Protocol address, "is the unique
address assigned to every machine on the internet." United States
v. Cameron,
[2] Multiply.com was a social networking website from March 2004 through May 2013 which provided users with a medium to share photos, videos, and other information with their network of contacts. In addition to providing a means to connect with contacts, the service also allowed registered users to create "e- groups" in order to meet and socialize with other members who may have similar interests.
[3] When McLellan was sentenced in May 2014, the forensic examination was still ongoing, yet over 6.3 million files had already been uncovered.
[4] The district court also held that even if the search did exceed
the warrant, or if the affidavit contained intentionally or
recklessly omitted material information, the FBI acted in good
faith, and thus denial was still appropriate pursuant to United
States v. Leon,
[5] It is important to take a moment to emphasize what McLellan is
not arguing. He is not suggesting that the affidavit in support of
the warrant was stale because it was unlikely he would have kept
his illicit child pornography for more than two months. This
argument would readily fail, as courts have held time and time
again that child pornography traders and collectors maintain their
collections for long periods of time, and often store it in safe,
close, and easily accessible locations. See United States v.
Morales-Aldahondo,
[6] Indeed, the affidavit itself states that it "does not contain every fact known to [Agent Locke] with respect to this investigation" but rather "contains those facts that [he] believe[d] to be necessary to establish probable cause." Though we have upheld warrants based on affidavits with similar language in the past -- and do so again today -- we once again caution law enforcement officers about this practice. "[T]he best way to ensure that the Fourth Amendment's probable cause requirement is complied with is to meticulously comply with it." Khounsavanh , 113
[7] McLellan also implies that the Omitted Information could suggest
that a35scott was merely using whatever nearby internet he or she
could connect to. Putting aside the fact that McLellan provides
absolutely no evidence to support this allegation, we have
previously rejected the argument that the possibility of a third
party stealing a subscriber's internet access defeats probable
cause to search the subscriber's residence. See Grant,
[8] In fact, given that there were multiple links to Dennis Truso and Greg Little over a multi-month span, this latter scenario is
[9] With good reason, McLellan does not challenge that without the
Omitted Information, probable cause to search 180 High Street for
a35scott and child pornography existed following the December 1
Download. See, e.g., Chiaradio,
[10] Indeed, McLellan's only rebuttal is that the house was connected to a shared driveway which could accommodate eight to ten cars. This fact, which was included in the affidavit, does not change our conclusion about the residence in this case.
[11] Remember, the warrant authorized a search of 180 High Street because there was probable cause to believe that "Darryl J. St. Yves and/or other residents, as yet unknown, of 180 High Street" had possessed and transmitted child pornography from an internet account assigned to that address under the username a35scott. Thus, it was not only St. Yves the FBI was interested in, but rather all internet users at that address.
