UNITED STATES OF AMERICA v. NEIL C. KIENAST; UNITED STATES OF AMERICA v. MARCUS A. OWENS; UNITED STATES OF AMERICA v. BRAMAN B. BROY
No. 17-1840, No. 17-1989, No. 17-2439
United States Court of Appeals For the Seventh Circuit
Argued February 6, 2018 — Decided October 23, 2018
Before RIPPLE, SYKES, and BARRETT, Circuit Judges.
Appeal from the United States District Court for the Eastern District of Wisconsin. No. 1:16-cr-00103-WCG-1 — William C. Griesbach, Chief Judge. Appeal from the United States District Court for the Eastern District of Wisconsin. No. 2:16-cr-00038-JPS-1 — J.P. Stadtmueller, Judge. Appeal from the United States District Court for the Central District of Illinois. No. 1:16-cr-10030-MMM-JEH-1 — Michael M. Mihm, Judge.
I.
In 2014, the Federal Bureau of Investigation began investigating a child pornography forum called Playpen. This site created an anonymous space for its membership of over 150,000 people to discuss, consume, and share child pornography.
Playpen exists solely on the dark web, so it can be accessed only through a series of affirmative steps. First, the user must download The Onion Router (Tor) software. The Tor software makes user information untraceable by relaying it through a series of interconnected computers. It also allows a user to access the Tor network, where Playpen and other “hidden services” websites are hosted. Once on this network, a user must enter a specific sixteen-character web address to visit Playpen. Finally, Playpen requires visitors to create a username and password before granting them access to its contents.
In 2015, FBI agents gained access to Playpen‘s servers and relocated them to a government facility in the Eastern District of Virginia. The FBI then operated the website for about two weeks in order to observe Playpen users. But while the FBI could observe Playpen traffic, Tor prevented it from identifying any specific user information.
To unmask and apprehend the anonymous Playpen users, the FBI sought a warrant in the Eastern District of Virginia to use a Network Investigative Technique (NIT). The NIT deployed computer code instructing computers that accessed Playpen to send identifying information to the government.
In support of its warrant application to deploy the NIT, the FBI submitted a 31-page affidavit from a special agent who specialized in child pornography cases. The affidavit detailed Playpen‘s architecture and contents, explained the nature of the Tor network, and described the numerous affirmative steps a user had to take to locate Playpen and access its contents. The affidavit further asserted that use of the NIT was necessary to identify and locate the users and administrators of Playpen, because other investigative procedures had either failed or would likely fail.
The affidavit also provided details about the proposed NIT. Special computer code would be added to the digital content on the Playpen website. After a user entered a username and password to access Playpen, the website would cause the user‘s computer to download that code. The code would then instruct the user‘s computer to send back the following information: (1) the computer‘s IP address and the date and time that it was determined; (2) a unique identifier to distinguish data from that of other computers accessing Playpen; (3) the computer‘s operating system; (4) information about whether the NIT had already been delivered to the computer; (5) the computer‘s host name; (6) the operating system‘s username; and (7) the computer‘s media access control address.
A federal magistrate judge in the Eastern District of Virginia issued the NIT Warrant in February 2015. The magistrate judge approved the use of the NIT to obtain information from all “activating computers,” which the warrant described as the computers “of any user or administrator who logs into [Playpen] by entering a username and password.”
The three defendants on appeal were such users. At various times during the nearly two weeks that the government hosted the Playpen servers, Neil Kienast, Marcus Owens, and Braman Broy accessed Playpen. By entering their usernames and passwords, they unknowingly triggered the NIT, which unmasked their identities. Once identified, FBI agents in the Eastern District of Virginia notified FBI regional offices in the defendants’ home districts. Local FBI agents then obtained warrants to search the defendants’ computers and homes. Each search unearthed child pornography.
On the basis of evidence recovered in these searches, grand juries charged the defendants with receiving, possessing, or viewing child pornography in violation of
II.
All three defendants assert that the searches performed by the NIT violated the
Suppression of evidence is a “last resort.” Hudson v. Michigan, 547 U.S. 586, 591 (2006). It is not a personal constitutional
The Court has instructed that the exclusionary rule be limited to cases in which its deterrent effect on police conduct will outweigh its “heavy costs.” Id. at 237. Strong cases for exclusion involve “deliberate, reckless, or grossly negligent disregard for
The defendants offer two major arguments against applying the good-faith exception in this case. The first is that the good-faith exception is categorically inapplicable when the warrant is void ab initio (or “from the beginning“). According to the defendants, this warrant is void because the magistrate judge lacked the authority to issue it.
We disagree. Even if the warrant were void ab initio, we would treat this like any other constitutional violation. We see no reason to make the good-faith exception unavailable in such cases. The deterrence rationale for the exclusionary rule aims at the conduct of the police, not the conduct of the magistrate judge. See Davis, 564 U.S. at 238 (focusing the cost-benefit analysis in exclusion cases on the “flagrancy of the police misconduct” at issue). Thus, whether the magistrate judge lacked authority has no impact on the rule. As Leon explains, “[p]enalizing the officer for the magistrate‘s error, rather than his own, cannot logically contribute to the deterrence of
The defendants’ second argument is that the good-faith exception fails on its own terms because the agents did not execute this search in good faith.2 Leon states that the good-faith exception might not apply in cases where: (1) “the issuing magistrate wholly abandoned his judicial role“; (2) the warrant was “so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable“; or (3) “a warrant [was] so facially deficient” that the “executing officers [could not] reasonably presume it to be valid.” Leon, 468 U.S. at 923.
The defendants focus on the third scenario, arguing that the officers should have recognized this warrant as facially invalid. They maintain that a well-trained officer, familiar with computer investigations and associated warrants, knows that a magistrate judge lacks the authority to authorize a warrant outside his or her own district. This warrant permitted the officers to access information originating from computers around the country. Thus, the defendants say, the officers should have known that the magistrate judge lacked authority to issue it.
The defendants are wrong—the officers could have reasonably relied on the magistrate judge‘s conclusion that this
The defendants raise other theories of bad faith. They note that “where the officer seeking the warrant was dishonest or reckless in preparing the affidavit,” the good-faith exception does not apply. United States v. Harris, 464 F.3d 733, 740 (7th Cir. 2006). Owens maintains that the affidavit accompanying the NIT Warrant contained dishonest statements that omitted material information. The affidavit, for example, describes the Playpen homepage as featuring “two images depicting
Nor do we think that the police behavior here was reckless. The defendants believe that the warrant was reckless because it was overinclusive. They insist that it sweeps up innocent actors that stumble upon Playpen but don‘t engage in any illegal activity. But by the time such actors have downloaded the software needed to access the dark web, entered the specific, sixteen-digit character jumble that is Playpen‘s web address, and logged into the site featuring at least one sexually suggestive image of a child, we are very skeptical that they are surprised to find themselves on a website offering child pornography.
The record establishes that the FBI acted reasonably both when it prepared its affidavit and when it executed the search warrants. Faced with the daunting task of apprehending tens of thousands of individuals engaged in perverse crimes but cloaked in anonymity through their use of Tor, the FBI developed a sophisticated tool to unmask and locate those suspected criminals. The agency fully and accurately described the NIT to the neutral and detached magistrate judge who signed the warrant. We join the five circuits who have held the good-faith exception applicable to this NIT Warrant. See Levin,
III.
Kienast and Owens individually raise additional challenges to their convictions. We address these in turn.
Kienast asserts that the district court erred by denying his motion to compel the government to allow him to review the NIT source code and cross-examine the FBI special agent who created the affidavit. According to Kienast, he needs this information to establish the scope of the
Owens argues that the fruit of the NIT search should be suppressed because the government‘s conduct was so “outrageous” that it violated his right to due process. He cites Rochin v. California, which holds that certain conduct that “shocks the conscience” can constitute a due process violation. 342 U.S. 165, 172 (1952) (police pumping the stomach of a suspect to obtain evidence violated due process). Owens asserts that by operating the Playpen website after seizing it, the
There is no conflict between our cases and the Supreme Court‘s. In United States v. Russell, the Court left open the possibility that the government‘s engagement in illegal activity might violate due process if it is “shocking to the universal sense of justice.” 411 U.S. at 431-32. In that case, an undercover agent supplied the defendant with an essential ingredient for the manufacture of methamphetamine as part of an operation to gather evidence against him. While the Court determined that this conduct did not shock the conscience, it said that it “may some day be presented with a situation in which the conduct of law enforcement agents is so outrageous that due process principles would absolutely bar the government from invoking judicial processes to obtain a conviction.” Id.
Thus, the Supreme Court did not foreclose the “outrageous conduct” defense—but it did not mandate its application either. And “[w]e repeatedly have reaffirmed our decision not to recognize the defense.” United States v. Smith, 792 F.3d 760, 765 (7th Cir. 2015); see also United States v. Stallworth, 656 F.3d 721, 730 (7th Cir. 2011) (“Outrageous government conduct is not a defense in this circuit.“). Our cases are
Owens makes one last pitch: he asks us to remand his case for a Franks hearing. In Franks v. Delaware, the Court held that the
IV.
The arguments that the defendants raise on appeal concerning the constitutionality of the NIT Warrant all lead to the same outcome: the agents acted in good-faith reliance on the NIT Warrant, and there is nothing to deter by applying the exclusionary rule. The defendants’ distinct arguments are without merit. Each defendant‘s judgment of conviction is accordingly AFFIRMED.
