MEMORANDUM AND ORDER
Child pornography was uploaded to a website. Federal agents obtained the image from the website and used its metada-ta to identify the GPS coordinates where the photo had been taken with an iPhone. That metadata led the agents to the home of Defendant Donald Post, who then admitted to taking that photo, as well as others, of a four-year-old girl who had recently stayed at his home. Post now contends that even though he had uploaded the image to a website, he retained a privacy interest in that image’s metadata that law enforcement invaded in violation of his Fourth Amendment rights.
I. Background
A. Agents Discover The Image
During the course of their investigation into child exploitation activities, FBI agents discovered a website dedicated to
B. Metadata Provides GPS Coordinates
Another source of information — data that was embedded in the photo, called metadata — provided the answer to the needle-in-the-haystack problem the agents faced. Metadata, most commonly associated with electronic documents where it can identify when a document was created and by which user, is “data that is stored internally in a file ... not explicitly defined by the user.” Sharon D. Nelson and John W. Simek, Too Much Information: Photos taken with a digital camera contain meta-data. Should you care?, Texas Bar Journal, Jan. 2014, at 14. In digital photos, metadata typically includes “the date and time the photo was taken; camera settings, such as aperture and shutter speed; manufacturer make and model ... and — in the case of smartphones — the GPS coordinates of where the photo was taken.” Id. In most cases, this information is automatically embedded in digital pictures unless the user opts out of the features that capture the information. For instance, the Apple iPhone automatically captures the coordinates of where a picture is taken unless the user turns off the iPhone’s geo-tagging feature.
Several free websites allow users to see this metadata, also called Exif (Exchangeable image file format). For instance, users of the website opanda.com can download the site’s free software and use it to view an image’s metadata.
[[Image here]]
Screenshot from opanda.com revealing the GPS coordinates embedded in a digital photograph.
Agents used opanda.com to search the photo they had discovered on the website. Within minutes of accessing the site, opan-da.com revealed that the image was taken at GPS coordinates 29 deg. 29.4400 N 95 deg. 9.7400 W, on an Apple iPhone 4, at 00:55:11 on July 23, 2013. Tracking those GPS coordinates with Yahoo Maps, agents determined that the picture was taken at a home in League City, Texas.
C. Agents Find Post
At the first house the agents visited, the residents indicated that they did not have an Apple iPhone 4 or a leather couch similar to the one in the image, nor had any children recently been in their home. After the agents explained the purpose of their visit, the residents revealed that a registered sex offender lived in a house nearby. The agents then verified the residents’ statement by checking a sex offender database. They learned that Donald Post, a registered sex offender, lived in a home about 100 feet from the first address, within the range of error of the GPS location generated by the iPhone’s automatic geotagging feature.
The agents knocked on Post’s door and he granted them permission to enter his home.
II. Did The Search For Metadata Violate The Fourth Amendment?
In his suppression motion, Post acknowledges that he had no expectation of privacy in the image that he uploaded to the website, but contends that he did retain a privacy interest in the embedded metadata because he did not realize he was releasing that information and he intended to remain anonymous. In other words, he would split the image into two distinct parts, one of which the government could obtain because it was placed in the public domain and one of which it could not.
Whether a search implicates the Fourth Amendment “depends on (1) whether the defendant is able to establish an actual, subjective expectation of privacy with respect to the place being searched or items being seized, and (2) whether that expectation of privacy is one which society would recognize as reasonable.” United States v. Gomez,
The application of the Fourth Amendment to modern technology can present novel issues. See, e.g., Kyllo v. United States,
A hypothetical based on a technology that was novel and revolutionary not that long ago but that is now widespread— DNA — dispels both of these arguments. Assume a defendant left an article of his clothing at a crime scene in 1981. At the time, the defendant had no idea that years later crime labs would be able to conduct DNA analysis of hams present on that clothing. And in leaving the clothing, he certainly intended to do so “anonymously.” On those grounds, would the defendant be able to suppress the results of the DNA analysis? Of course not, because he left the clothing in a public place and lost any expectation of privacy he had in it, regardless of how he contemplated that clothing could be used. The same would have been true if in an earlier age a defendant had tried to argue that he meant to leave a cigarette butt in a public space, but had not intended to leave his latent fingerprint that law enforcement used to identify him. And the same is true for the image that
It is worth mentioning that this case does not implicate two Fourth Amendment issues that are currently receiving significant attention. Two district courts recently handed down conflicting opinions concerning the constitutionality of the National Security Agency’s bulk collection of telephone metadata. Compare Klayman v. Obama,
III. Conclusion
Post shared an illicit image on what is today perhaps the most public medium imaginable — the internet — so that others could see it. For the reasons explained above, he did not have a privacy interest in the metadata embedded in that image, and the government did not engage in an unconstitutional search when it used that me-tadata to find him. Accordingly, Post’s Motion to Suppress (Docket Entry No. 20) is DENIED.
Notes
. At the suppression hearing, Post also argued that he did not voluntarily consent to allow the officers to enter his home. The Court orally denied this claim during the hearing and need not expand on that ruling in this order.
. The same is true for the rules of evidence, where traditional principles are commonly applied to the admissibility of electronic information. See, e.g., Lorraine v. Market Am. Ins. Co., 241 F.R.D. 534 (D.Md.2007) (one of the first cases to thoroughly address the traditional rules of evidence as applied to electronically stored information).
. Unlike freely accessible sites like Google or Yahoo, users of the website where Post displayed the picture have to download a special browser, called a TOR browser, to gain access to the site. But that browser is available for any internet user to utilize and is the only barrier that would prevent someone from accessing the website.
