UNITED STATES of America, Plaintiff-Appellee/Cross-Appellant, v. Timothy Ryan RICHARDS, Defendant-Appellant/Cross-Appellee.
Nos. 08-6465, 08-6503.
United States Court of Appeals, Sixth Circuit.
Argued: Jan. 21, 2011. Decided and Filed: Oct. 24, 2011.
659 F.3d 527
Before: SILER, MOORE, and GRIFFIN, Circuit Judges.
GRIFFIN, J., delivered the opinion of the court, in which SILER, J., joined. MOORE, J. (pp. 552-60), delivered a separate opinion concurring in the judgment only.
OPINION
GRIFFIN, Circuit Judge.
Defendant Timothy Ryan Richards appeals his convictions by a jury on eleven child-pornography related offenses, in violation of
I.
The government‘s investigation of defendant Richards began in July 2005, when a nineteen-year-old “adult performer” named Justin Berry contacted the Federal Bureau of Investigation (“FBI“), offering to provide information about the commercial production, advertising, sale, and distribution of child pornography videos. Berry gave this information under a limited grant of use immunity for his statements, which led to the arrest and prosecution of Richards and two other individuals, Gregory Mitchel and Aaron Brown.
The ensuing FBI investigation revealed that Richards was engaged in the production and distribution of child pornography. Despite his youth,1 Richards was a sophisticated pornography entrepreneur, operating at least a dozen websites that contained sexually explicit conduct involving adults and minors, pornographic images of boys under eighteen, and advertisements for or links to other child pornography sites.2 Some of these websites, such as CaseyandDew.tv, did not show visual pornography but did contain video discussions about sexual activity. In addition, Richards managed and operated other pornography-related websites, including billing sites.3 He profited handsomely from these websites, using advertising techniques such as sending out e-mail solicitations, setting up discounts for customers who visited multiple websites, offering standard and premium membership plans, using an on-line credit card processing company for membership payments, and, to dissuade customers from unsubscribing, requiring the customers to watch a fifteen-minute video before being permitted to terminate their memberships.4
To manage the large amount of computer data, Richards kept several computers in his home in Nashville, Tennessee, and utilized multiple servers in California that contained approximately one terabyte (a thousand gigabytes) of information. Server log records indicated that shortly after assuming control of the JustinsFriends.com website in July 2005, Richards logged into the server that controlled the website from the internet protocol address tied to his home in Nashville, Tennessee, and uploaded child pornography to the JustinsFriends.net site.
Richards, who used the online alias “Casey Masterson,” appeared in many videos in which he engaged in sexually explicit conduct with a then-minor child named Patrick Lombardi, a/k/a “Kyle.” Richards befriended and began dating Lombardi in May of 2000, when Richards was almost nineteen and Lombardi was fourteen years old. Their relationship continued for four years. During this time period, Richards produced and made available on the internet recorded images of Lombardi engaged in sexually explicit conduct when Lombar-
Shortly before Lombardi‘s eighteenth birthday, Richards and Lombardi planned a new website—CaseyandKylesCondo.com—on which they intended to show homosexual pornography with links to photos, journals, and videos. Richards registered the internet domain for this website in his own name, created the content, advertised for it, and made it part of his affiliate marketing program. According to Lombardi, Richards purposefully waited until Lombardi turned eighteen to launch the website, which included pornography of Lombardi when he was a minor. The CaseyandKylesCondo.com website was hosted on a server in Los Angeles operated by BlackSun Technologies (the “BlackSun server“). After their relationship ended, Lombardi signed a release that allowed Richards to keep the depictions of him, and thereafter Richards alone controlled the website and its contents. In January 2005, Richards registered the CaseysCondo.com domain name, and that site eventually replaced CaseyandKylesCondo.com. The CaseysCondo.com site included the explicit photographs of Lombardi in Australia.
Another website, JustinsFriends.com, was a homosexual pornographic website featuring Justin Berry and other male models. The website was originally run by Berry and Gregory Mitchel, but Berry sought out Richards’ assistance in running the website. Richards agreed to help in exchange for a percentage of the profits, and he eventually took over JustinsFriends.com in July 2005 in the wake of a falling out between Berry and Mitchel. Richards transferred the website to the BlackSun server and changed the site‘s internet domain to JustinsFriends.net, which was registered in his name. Like his other websites, Richards offered access to the sexually explicit content for a fee. The contents of JustinsFriends.net included a version of the Iceland video of Lombardi and Richards and depicted the sexual activity of another minor, “Taylor.” Federal agents saw the latter video playing in the free section of JustinsFriends.net in July 2005, during their investigation.
On September 12, 2005, agents executed a search warrant for the BlackSun server in Los Angeles, which had been identified as the host for JustinsFriends.com and JustinsFriends.net. On the same date, agents also executed a search warrant for a server in the San Francisco area (the “Hurricane Electric server“), which had hosted JustinsFriends.com and was associated with Aaron Brown. Ten days later, on the basis of information provided by Berry and Mitchel, Richards was arrested at his Nashville home. Agents then executed search warrants for the Nashville residence and a second residence to which Richards was moving. The seized items included eight computers, cameras, videotapes (including the “Casey@16” video), and documents. The subsequent search of the BlackSun server revealed that the JustinsFriends websites were stored in one of two hard drives on the server, along with several of Richards’ websites containing pornography and child pornography.
In October 2005, the government returned a single count indictment charging Richards with the distribution of child pornography. Other charges were added and, ultimately, in September 2006, a twenty-seven count third superseding indictment was issued, charging Richards with various
Pertinent to the present appeal, the district court denied Richards’ pretrial motions to suppress the fruits of the searches and seizures of the computer servers; to compel compliance with the court‘s order requiring the government to identify images to be used in its case-in-chief; and to dismiss counts in the indictment as multiplicitous.
The trial commenced on October 10, 2006. At trial, the defense did not dispute the fact that Richards operated the various websites. The defense challenged the government‘s assertion that the pornography on the websites actually depicted minors and that Richards knew of their status as minors. Lombardi testified as a prosecution witness that he was a minor when the videos were made; Richards testified on his own behalf that Lombardi and the other alleged minors, Taylor and Tory, were eighteen years of age when the images and videos were recorded.
Six of the twenty-seven counts were dismissed and not submitted to the jury. On October 26, the jury convicted Richards on eleven counts—three transportation counts, three advertising counts, two record-keeping counts, one conspiracy to transport count, one production count, and one possession count. The jury acquitted Richards on the remaining ten counts.
With a total offense level of 48 and a Category I criminal history, the recommended Guidelines sentence was life imprisonment. On November 7, 2008, the district court sentenced Richards to 16 years of imprisonment, 8 years of supervised release, and a special assessment of $1,100. Richards now timely appeals his convictions, and the government cross-appeals the sentence, which it asserts is too lenient and substantively unreasonable.
II.
A.
Richards first contends that the district court erred in denying his motion to suppress evidence obtained from the search of the BlackSun computer server because the search warrant was overbroad under the
On September 12, 2005, FBI Special Agent Monique Winkis applied in the Western District of Virginia for a warrant to seize and search the BlackSun server.5 Specifically, her 27-page affidavit that was cross-referenced in the application for the search warrant requested permission to search the BlackSun server “for the contents of the websites known as justin-friends.com and/or justinfriends.net and stored wire and electronic communications and transactional records that may be evidence of violations of [
Agent Winkis stated that federal agents made an undercover purchase of a membership to JustinsFriends.net after being redirected there by the JustinsFriends.com website, where they saw, inter alia, sexually-explicit videos of Berry and Taylor, both minors at the time. The company that processed memberships for the Justins Friends websites advertised its name as “Neova.net.” Further investigation identified BlackSun as the web hosting company for the websites; this information was confirmed by BlackSun representatives. The BlackSun facility in Los Angeles, California, has 2,000 servers; investigators discovered that the particular server in question, which hosted both JustinsFriends.com and JustinsFriends.net was located “in cabinet 200.02, server number 4 and has a sticker on it that states collegeboyslive.”
In her affidavit, Agent Winkis stated that James Fottrell, the Manager of the High Technology Investigative Unit in the Child Exploitation Section of the U.S. Department of Justice, informed her that upon approval and execution of the search warrant, the contents of the server and/or hard drives hosting the Justins-Friends.com and Justins Friends.net websites would be “imaged” (exact copies made) so that their contents could be examined at an FBI field office and other locations following completion of the on-site search. Fottrell further advised Winkis that “the entirety of the unallocated space of the servers on which materials relating to IP address 66.54.91.171 are found should be searched because the unallocated space of those servers is likely to contain relevant evidence of materials that have been deleted or otherwise moved from the servers.” Agent Winkis represented that “[i]t is difficult to know, prior to the search, which exact method of extracting the evidence will be needed and used and which expert possesses sufficient specialized skills to best obtain the evidence and subsequently analyze it,” but “[n]o matter which method is used, data analysis protocols are exacting scientific procedures, designed to protect the integrity of the evidence and to recover even hidden, erased, compressed, password-protected, or encrypted files.” Any content or materials unrelated to the investigation would be erased or deleted from the government storage devices within a reasonable time. On the basis of the foregoing information, Agent Winkis submitted that
probable cause exists to conclude that servers found in cabinet 200.02, server 4, located at BlackSun, ... contains content associated with the websites www.justinsfriends.com and www.justinsfriends.net and have been used to facilitate the production, possession, receipt and distribution (sale) of child pornography in violation of [
18 U.S.C. §§ 2251 ,2252 , and2252A ]. Further, that there is probable cause to believe that evidence of such criminal offenses is currently located on the server used by www.justinsfriends.com and www.justinsfriends.net and located in cabinet 200.02, server 4 ... as specifically setforth in Attachment A to the Search Warrant.
Attachment A described the BlackSun premises and the specific server to be searched, “cabinet number 200.02, server number 4.” Attachment B listed the items to be seized:
1. All content of the justinsfriends.com and/or justinsfriends.net servers at BlackSun 1200 West 7th Street, Los Angeles, California 90017, including any computer files that were or may have been used as a means to advertise, transport, distribute, or possess child pornography, ... as well as any child pornography images.
2. All business records, in any form, which pertain to the justinsfriends.com and/or justinsfriends.net account and its use of IP address 66.54.91.171, to include all e-mail, ICQ communications, log files of any and all activity, or other communications sent by or received by the account holders, directly, or indirectly, whether saved or deleted, and any and all credit card numbers or other methods or identifiers used to pay for the account, including, but not limited to:
- e-mail and other correspondence between BlackSun and the individual or entity that created and/or controls the website known as justinsfriends.com and/or justinsfriends.net;
- any and all transactional records including File Transfer Protocol (FTP) if available, HTTP logs, port 80 logs, and logs including the dates and times the customer uploaded content to the website known as justinsfriends.com and/or justinsfriends.net; and
- any records of customer service complaints made to BlackSun concerning the website known as justins-friends.com and/or justinsfriends.net.
- any records of subscribers to the justinsfriends.com and/or justins-friends.net website(s).
(Emphasis removed.)6
On September 12, 2005, a magistrate judge issued the warrant, which on its face authorized a search of “BlackSun, 66.54.91.171, Server # 4, Cabinet # 200.02, 1200 West 7th Street, Los Angeles, CA 90017.” It was executed that same day, with the eventual search yielding some of Richards’ child-pornography websites on Server # 4.
Richards moved to suppress the fruits of the seizure and search of the BlackSun server on the grounds that the warrant authorized seizing only those sections of the server hosting Justins Friends.com and JustinsFriends.net; alternatively, if the warrant did in fact authorize seizure of the entire server, then the warrant was unconstitutionally overbroad.
At the suppression hearing convened by the district court, James Fottrell, the government‘s expert, testified that the Black-Sun server was a commercial web server, which provided configuration for websites and “serve[d] up” those webpages for computers requesting access through the internet. Each website‘s files were stored in the server‘s directory, either in a folder structure that distinguishes between websites or in an “intermeshed” structure that contains elements common to the websites. Each server had an operating system and an account for an administrator, who had access to and complete control over the files stored on the server. Each website operator had control over the website and the file directories associated with it, but could not alter content on other sites or in
Fottrell‘s examination of the entire server after its seizure revealed that Justins-Friends.net was stored in one of two hard drives on the server, along with six other websites, including Richards’ CandKcondo.com, PenisClub.com, CaseysCondo.com, Premium.ckcondo.com, and CollegeBoys-Live.com. Fottrell found an administrator account and user accounts for “Casey” and “Aaron” on the server. At the time of the suppression hearing, he had not yet detected any “locks or barriers” at the web site level on the server that would have precluded users from accessing the entire server, and he confirmed that the BlackSun administrator had unfettered access to the server.
Fottrell explained that he would not restrict his search for child pornography offenses to the folders associated with the JustinsFriends websites, but would search the entire server because, in his experience, individuals intentionally mislabel directory structures to hide the presence of child pornography and thus store it in other locations on the server. Moreover, servers have unallocated space, which might contain deleted files, log records, relevant e-mails, and there may be commonalities with the credit card transaction processors, advertising, or shared links. Thus, without looking at individual server files, Fottrell would not know whether any of the websites were related.
At the conclusion of the hearing, the district court denied Richards’ motion to suppress. Noting that Richards conceded that unallocated server space could be searched, the court found probable cause to search the entire server because: (1) the agents did not know how many websites were on the server before seizing it; and (2) the server administrator had access to all of the sites and, therefore, “could have secreted in any other websites [or in the unallocated space] information relevant to the investigation concerning the child pornography contained on the [JustinsFriends websites].” The court concluded that the search warrant was not impermissibly overbroad.
B.
When reviewing the denial of a motion to suppress, we review the district court‘s findings of fact for clear error and its conclusions of law de novo, considering the evidence in the light most favorable to the government. United States v. Lucas, 640 F.3d 168, 173 (6th Cir. 2011). We review de novo a district court‘s determination of particularity. United States v. Greene, 250 F.3d 471, 477 (6th Cir. 2001). “The proponent of a motion to suppress has the burden of establishing that his own Fourth Amendment rights were violated by the challenged search or seizure.” Rakas v. Illinois, 439 U.S. 128, 130 n. 1, 99 S. Ct. 421, 58 L. Ed. 2d 387 (1978).
The
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
“It is well-settled that items to be seized pursuant to a search warrant must be described with particularity to
The particularity requirement may be satisfied through the express incorporation or cross-referencing of a supporting affidavit that describes the items to be seized, even though the search warrant contains no such description. Id. at 439-40. “[T]he degree of specificity required is flexible and will vary depending on the crime involved and the types of items sought.” Greene, 250 F.3d at 477; see also Guest v. Leis, 255 F.3d 325, 336 (6th Cir. 2001) (“A search warrant must particularly describe the things to be seized, but the description, whose specificity will vary with the circumstances of the case, will be valid if it is as specific as the circumstances and the nature of the activity under investigation permit.“) (internal quotation marks omitted).
“The cases on particularity are actually concerned with at least two rather different problems: one is whether the warrant supplies enough information to guide and control the agent‘s judgment in selecting what to take; and the other is whether the category as specified is too broad in the sense that it includes items that should not be seized.” United States v. Upham, 168 F.3d 532, 535 (1st Cir. 1999) (citations and internal quotation marks omitted). It is the latter problem—overbreadth—that is alleged by Richards in this case. “[I]nfirmity due to overbreadth does not doom the entire warrant; rather, it requires the suppression of evidence seized pursuant to that part of the warrant ..., but does not require the suppression of anything described in the valid portions of the warrant....” Greene, 250 F.3d at 477 (internal quotation marks omitted).
We recently observed, in the context of determining that the search of a defendant‘s laptop computer did not exceed the scope of his consent to search his home, that
analogizing computers to other physical objects when applying Fourth Amendment law is not an exact fit because computers hold so much personal and sensitive information touching on many private aspects of life.... [T]here is a far greater potential “for the ‘intermingling’ of documents and a consequent invasion of privacy when police execute a search for evidence on a computer.” United States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001).
United States v. Lucas, 640 F.3d 168, 178 (6th Cir. 2011); see also United States v. Comprehensive Drug Testing, Inc., 621 F.3d 1162, 1177 (9th Cir. 2010) (“The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no proba-
Courts that have addressed the permissible breadth of computer-related searches have grappled with how to balance two interests that are in tension with each other:
On one hand, it is clear that because criminals can—and often do—hide, mislabel, or manipulate files to conceal criminal activity, a broad, expansive search of the hard drive may be required.... On the other hand, ... granting the Government a carte blanche to search every file on the hard drive impermissibly transforms a limited search into a general one.
United States v. Stabile, 633 F.3d 219, 237 (3d Cir. 2011) (citation and internal quotation marks omitted).
Our court has not yet had occasion to confront this issue in depth. Ultimately, however, given the unique problem encountered in computer searches,8 and the practical difficulties inherent in implementing universal search methodologies, the majority of federal courts have eschewed the use of a specific search protocol9 and, instead, have employed the Fourth Amendment‘s bedrock principle of reasonableness on a case-by-case basis: “While officers must be clear as to what it is they are seeking on the computer and conduct the search in a way that avoids searching files of types not identified in the warrant, ... a computer search may be as extensive as reasonably required to locate the items described in the warrant based on probable cause.” United States v. Burgess, 576 F.3d 1078, 1092 (10th Cir.), cert. denied, 558 U.S. 1097, 130 S. Ct. 1028, 175 L. Ed. 2d 629 (2009) (citations and internal quotation marks omitted). We agree with the Tenth Circuit‘s succinct assessment in Burgess that
it is folly for a search warrant to attempt to structure the mechanics of the search and a warrant imposing such limits would unduly restrict legitimate search objectives. One would not ordinarily expect a warrant to search filing cabinets for evidence of drug activity to prospectively restrict the search to “file cabinets in the basement” or to file folders labeled “Meth Lab” or “Customers.” And there is no reason to so limit computer searches. But that is not to say methodology is irrelevant.
Respect for legitimate rights to privacy in papers and effects requires an officer executing a search warrant to first look in the most obvious places and as it becomes necessary to progressively move from the obvious to the obscure. That is the purpose of a search protocol which structures the search by requiring an analysis of the file structure, next looking for suspicious file folders, then looking for files and types of files most likely to contain the objects of the search by doing keyword searches.
But in the end, there may be no practical substitute for actually looking in many (perhaps all) folders and sometimes at the documents contained within those folders, and that is true whether the search is of computer files or physical files. It is particularly true with image files.
Id. at 1094 (footnote omitted).
As is the case with paper documents, on occasion in the course of a reasonable search, investigating officers may examine, “at least cursorily,” some “innocuous documents ... in order to determine whether they are, in fact, among those papers authorized to be seized.” Andresen v. Maryland, 427 U.S. 463, 482 n. 11, 96 S. Ct. 2737, 49 L. Ed. 2d 627 (1976); see also Stabile, 633 F.3d at 234 (applying Andresen to a computer search); United States v. Banks, 556 F.3d 967, 973 (9th Cir. 2009) (holding that search warrant for a computer and other items, for evidence of child pornography, was not overbroad, noting, “[a] generalized seizure of business documents may be justified if it is demonstrated that the government could not reasonably segregate ... documents on the basis of whether or not they were likely to evidence criminal activity“) (citation and internal quotation marks omitted).10
Applying a reasonableness analysis on a case-by-case basis, the federal courts have rejected most particularity challenges to warrants authorizing the seizure and search of entire personal or business computers. See, e.g., Stabile, 633 F.3d at 239 (determining that the search of a computer folder was objectively reasonable because “criminals can easily alter file names ... to conceal contraband” and the officer “took steps to ensure that his investigation complied with the state search warrant“); Banks, 556 F.3d at 973 (holding that warrant to search personal computer for items connected to “child pornography” or “minors engaged in sexually explicit conduct” was not overbroad because the warrant sought only evidence of child pornography and no more limited search would have
In other words, in general, “[s]o long as the computer search is limited to a search for evidence explicitly authorized in the warrant, it is reasonable for the executing officers to open the various types of files located in the computer‘s hard drive in order to determine whether they contain such evidence.” United States v. Roberts, No. 3:08-CR-175, 2010 WL 234719, at *15 (E.D. Tenn. Jan. 14, 2010) (quoting United States v. Jack, No. S-07-0266, 2009 WL 453051, at *4 (E.D. Cal. Feb. 20, 2009)). Under the facts of the present case, this principle should be applied to Richards’ computer server as well.
C.
Like the district court, we find no ambiguity in the search warrant‘s authorization to seize and search the entire server. The warrant identified “BlackSun 66.54.91.171, Server # 4, Cabinet # 200.02” at the BlackSun facility address. Attachment B to the warrant listed, as one of the items to be seized, “[a]ll content of the justins-friends.com and/or justinsfriends.net ser-vers at BlackSun ... including any com-
Nor was the warrant overbroad. Richards argues that the BlackSun server was set up in a neatly compartmentalized and segregated fashion, rendering it entirely unnecessary to search beyond the content maintained in the Justins Friends file directory. However, hindsight is 20/20. At the time of the seizure, agents did not know how and where the Justins-Friends-related content would be stored on the server. Richards does not dispute that the government had probable cause to believe that the Justins Friends websites involved child pornography. Agent Winkis‘s affidavit explained that “[i]t is difficult to know, prior to the search, which exact method of extracting the evidence will be needed and used and which expert possesses sufficient specialized skills to best obtain the evidence and subsequently analyze it.” It also indicated that a forensic procedure could uncover “even hidden, erased, compressed, password-protected, or encrypted files.” Therefore, as explained by James Fottrell, searching the entire server was necessary to look for child pornography related to the Justins-Friends websites because individuals often mislabel directory files, the server might contain related websites, and the unallocated server space might contain materials pertaining to those websites.
Although Richards contends that the warrant failed to distinguish between “shared” and “dedicated” servers, Agent Winkis explained that distinction in her affidavit. In any event, before the search, investigators did not know whether the server was shared or dedicated, and, if shared, whether any websites were related, whether users had access to the entire server, or how the directory was organized. The trial evidence confirmed that the websites on the server were related through cross-promotion and use of the same images and videos, and that the user “Casey” (Richards) had administrative rights over the BlackSun server to control all the contents associated with that server. However, it was only after the search that Fottrell discovered that the Justins-Friends content was separated from the other sites and divided into distinct file directories. “The prohibition of general searches is not to be confused with a demand for precise ex ante knowledge of the location and content of evidence.... The proper metric of sufficient specificity is whether it was reasonable to provide a more specific description of the items at that juncture of the investigation.” United States v. Meek, 366 F.3d 705, 716 (9th Cir. 2004).
In light of the information known at the time the search warrant was issued, we hold that it was not unconstitutionally overbroad. The scope of the warrant was
Out of over 2,000 servers at the Black-Sun facility, investigators pinpointed the specific IP address and server that hosted the JustinsFriends websites—“BlackSun 66.54.91.171, Server # 4, Cabinet # 200.02“—and in conducting their search and seizure, did not exceed the bounds of reasonableness required by the
D.
Moreover, for the sake of argument, were the warrant overbroad, we hold in the alternative that suppression of the evidence is not required under the Leon good-faith exception, “which allows admission of evidence ‘seized in reasonable, good-faith reliance on a search warrant that is subsequently held to be defective.‘” United States v. Paull, 551 F.3d 516, 523 (6th Cir. 2009) (quoting United States v. Leon, 468 U.S. 897, 905, 104 S. Ct. 3405, 82 L. Ed. 2d 677 (1984)). “The Leon Court based its refusal to suppress evidence in such situations on its conclusion that ‘the marginal or nonexistent benefits produced by suppressing evidence obtained in objectively reasonable reliance on a subsequently invalidated search warrant cannot justify the substantial costs of exclusion.‘” United States v. Hodson, 543 F.3d 286, 292 (6th Cir. 2008) (quoting Leon, 468 U.S. at 922). Leon made clear that only in exceptional circumstances is law enforcement to disregard a magistrate judge‘s authorization—for instance, when a warrant is “so lacking in indicia of probable cause as to render official belief in its existence unreasonable[,]” or when a warrant is “so facially deficient that it could not reasonably be presumed valid.” Hodson, 543 F.3d at 292 (citations and internal quotation marks omitted).
Neither of these exceptions applies here. Agent Winkis‘s affidavit explained in detail the facts establishing probable cause to believe that child pornography was distributed through JustinsFriends.net. Further, the warrant was not “so facially deficient” in describing the items to be seized that the agents could not reasonably presume it to be valid. See United States v. Potts, 586 F.3d 823, 834 (10th Cir. 2009) (applying Leon good-faith exception where reasonable officers could have read the warrant‘s multiple references to child pornography in attachment to apply to the entire warrant). The affidavit set forth why it was necessary to image the server. Hence, this is not a situation where “even a cursory reading of the warrant ... would have revealed a glaring deficiency that any reasonable police officer would have known
III.
Next, Richards contends that the government‘s initial refusal to identify the pornographic images embraced by the charges, and its subsequent identification of over 20,000 images, constitutes an obfuscation of the letter and intent of
Rule 16 “is intended to prescribe the minimum amount of discovery to which the parties are entitled, and leaves intact a court‘s discretion to grant or deny the broader discovery requests of a criminal defendant.” United States v. Jordan, 316 F.3d 1215, 1249 n. 69 (11th Cir. 2003) (citation and internal quotation marks omitted). If a party fails to comply with Rule 16, the district court has discretion to impose a number of sanctions—it may order discovery, grant a continuance, exclude the undisclosed evidence, or enter any other order that is just under the circumstances. United States v. Jordan, 544 F.3d 656, 667 (6th Cir. 2008) (citing
On April 5, 2006, pursuant to the district court‘s order granting defendant‘s motion to compel production of discovery, the government provided Richards with copies of the hard drives seized from his computers and from the BlackSun and Hurricane Electric servers. On May 19, 2006, Richards moved for an order requiring the government to identify the images it would use in its case-in-chief. The district court granted the motion, ordering the government to identify the images by August 25, 2006. The government complied, identifying 20,429 computer files.
This information was provided in a flexible digital format, Microsoft Excel, and included the corresponding file path and file source for each identified file. The government also provided Richards with a “hash” value for each file and a database of the hash values of all the images on the servers in Microsoft Access database format, which could be used to identify duplicate images. Counsel for the government consulted with Richards’ attorney on August 25, August 28, and again on August 30, 2006, and provided detailed explanations and guidance about the images and the evidence anticipated for trial. The government identified the child victims, previewed the nature of the charges in the impending superseding indictment, and responded to defense counsel‘s queries about specific files.
On August 30, 2006, the defense filed a motion to compel the government to comply with the identification order, complaining that the government had provided a list of over 20,000 files, rather than what the defense believed was required—“a list of a dozen or so files/images with a corresponding representation of which files/images relate[d] to each count in the Indictment.” In response, the government offered to answer defense counsel‘s future questions about specific files and stated that it did not intend to show 20,000 images at trial, but planned to introduce “restored websites, each of which require[d] the use of thousands of the files listed,” and to display some images and identify the multiple places where the images were found. The district court de-
The issue arose again on the second day of the October 2006 trial, when a federal agent testified about the images and videos found on the BlackSun server. Defense counsel objected that it was impossible to know, in advance, whether the images had been previously identified by the government. The district court ordered the government to preview with defense counsel the images it would show to the jury. Consequently, during a recess, the parties reviewed the exhibits and the government provided an exhibit list. When the trial resumed, defense counsel successfully objected to the introduction of several exhibits that were not included on the August list, but again expressed frustration about the sheer volume of images and being “swamped with trying to pick the needle out of the haystack....”
Recently, in Warshak, we rejected the defendants’ contention that the district court abused its discretion under Rule 16 by allowing the government to turn over millions of pages of electronic discovery evidence in an allegedly “disorganized and unsearchable format“:
[D]efendants cite scant authority suggesting that a district court must order the government to produce electronic discovery in a particular fashion. Furthermore, it bears noting that Federal Rule of Criminal Procedure 16, which governs discovery in criminal cases, is entirely silent on the issue of the form that discovery must take; it contains no indication that documents must be organized or indexed. Thus, if we are to find that the district court abused its discretion, we must do so despite a pronounced dearth of precedent suggesting that the district court was wrong.
There are a number of factors that counsel against such a finding. First, the overwhelming majority of the discovery at issue was taken directly from [the defendants’ company‘s] computers, which means the defendants had ready access to that information....
Furthermore, ... an expert witness who testified for the defense indicated that, with the use of certain software, he could perform “very quick and thorough” searches of the electronic discovery. Consequently, it does not appear that the discovery materials were nearly as unsearchable as the defense purports.
Lastly, it should be observed that the government did provide the defense with something of a guide to the electronic discovery. In response to the defense‘s discovery request, the government furnished the defendants with a detailed room-by-room inventory of all items seized from the company, including a listing of the various computers that were imaged. That listing surely offered the defendants some aid in identifying and marshaling the documents relevant to the litigation. Accordingly, we decline to hold that the district court abused its discretion in failing to order the government to produce discovery in a different form.
Warshak, 631 F.3d at 296-97 (footnotes, citation, and internal quotation marks omitted); see also United States v. Prince, 618 F.3d 551, 561-62 (6th Cir. 2010) (rejecting the defendant‘s claim under
Similarly, we find no abuse of discretion in the district court‘s denial of Richards’ motion to compel identification of evidence under Rule 16. Richards conceded in his pretrial motion for identification of images that
IV.
Richards also appeals, on hearsay grounds, the district court‘s ruling admitting into evidence certain age-labeled discs containing pornographic images of Lombardi when he was allegedly a minor. The images and videos of Lombardi, produced by Richards during their relationship, were placed on separate discs by the government. In preparation for trial, a federal agent interviewed Lombardi as to his age and the location where each image or video was filmed. The discs were then labeled accordingly with Lombardi‘s age at production (“16-17” and “17“) and the location, and each disc was initialed by Lombardi and the agent. The images and videos were shown to the jury during the agent‘s testimony.
Defense counsel objected to both the premature admission and display of the images and the labeling on the discs. The government responded that the labels would be authenticated by Lombardi‘s subsequent testimony and explained that it showed the videos when the agent testified so that Lombardi would not have to view the pornography of himself in front of the jury. The district court provisionally admitted the images, but ordered that the
On direct examination, Lombardi identified his handwriting on ten discs, the content of and his age in each image, and confirmed that he had reviewed each image with the agent. Defense counsel then cross-examined Lombardi about his age in particular images and videos. At the conclusion of Lombardi‘s testimony, the district court opined that the labels had been adequately authenticated and allowed the labeled discs to be admitted and submitted to the jury during deliberations. In doing so, the court overruled defense counsel‘s objection to the purported “imprimatur ... of seeing those ages written on there” and his fear that the jury “may attach too much significance” to the labels, noting that defense counsel had cross-examined and impeached Lombardi.
Richards now argues that the labeling on the discs was inadmissible hearsay, emphasizing that he was convicted on several child-pornography counts directly related to Lombardi‘s testimony that he was underage at the time the videos were made. Richards concedes, however, that a hearsay objection to the contents of the labels was never raised below and, therefore, our review of this issue is limited to plain-error analysis. See United States v. Knowles, 623 F.3d 381, 385 (6th Cir. 2010) (“A district court‘s decision to admit evidence in a jury trial that is objected to for the first time on appeal is subject to plain error review.“). The plain error exception to the contemporaneous-objection rule is to be used solely in those circumstances in which a miscarriage of justice would otherwise result. Id. “For us to correct an error not raised at trial: (1) there must be error; (2) the error must be plain; and (3) the error must affect substantial rights.” Id. (citations omitted). If these conditions are met, we “may then exercise [our] discretion to notice a forfeited error, but only if (4) the error seriously affect[s] the fairness, integrity, or public reputation of judicial proceedings.” Id. at 385-86 (citation and internal quotation marks omitted). Here, we find no such plain error in the district court‘s determination that redaction of the labels was unnecessary.
In United States v. Bentley, 489 F.3d 360 (D.C. Cir. 2007), the jury, in a prosecution for firearm and drug possession offenses, asked to see the drug evidence during its deliberations. Id. at 362. A deputy marshal inadvertently delivered not only the drugs, which had been admitted into evidence, but also the labels attached to the bags of drug evidence, which had not been admitted. Id. The labels—pre-printed forms filled out by the police after the search of the defendant‘s residence—listed the defendant‘s name and address, his physical description, details about the charged offense, and a description of the materials inside each bag. Id. at 365. The Bentley court held that “because the labels were merely cumulative of properly admitted evidence, even if they constituted hearsay, their inadvertent delivery to the jury was harmless.” Id. The court also rejected the defendant‘s argument that the labels were nonetheless prejudicial because they provided a “‘neat condensation’ of the government‘s theories[,]” stating: “[T]he testimony of the officer who filled in the labels made clear that he did so merely to preserve the chain of custody of their contents. The jury was therefore aware that the labels served only an administrative function, rather than as an expression of the government‘s theory of the defendant[‘s] liability.” Id.
Bentley‘s rationale is equally applicable here. Lombardi‘s age at the time of production of the images was, without question, a pivotal issue in this case. However, the agent and Lombardi both verified the accuracy of the information on the labels, and Lombardi provided direct testimony concerning his age at the time the videos were made. Defense counsel countered by cross-examining Lombardi about his age in the specific videos; in addition, Richards testified at trial that Lombardi was eighteen when the images were made. The age-labeling on the discs thus became cumulative evidence which, as made clear to the jury, served a limited record-keeping purpose. In submitting the discs to the jury, the district court rightly ruled that the jury was capable of deciding for itself whether the images depicted Lombardi as a minor. In fact, the jury acquitted defendant on three counts which were based on videos from age-labeled discs, but convicted defendant on six other counts related to Lombardi‘s claim that he was underage. Under these circumstances, Richards has failed to demonstrate plain error affecting his substantial rights as a result of submission of the age-labeled discs to the jury.
V.
Next, Richards argues that the district court erred in denying his motion to dismiss Counts 1 and 16 as multiplicitous, in violation of the Double Jeopardy Clause of the
“Whether an indictment suffers from a problem of duplicity or multiplicity is a legal question that this Court reviews de novo.” United States v. Swafford, 512 F.3d 833, 844 (6th Cir. 2008). “Generally, an indictment may not charge a single criminal offense in several counts without offending the rule against ‘multiplicity’ and implicating the double jeopardy clause.” United States v. Davis, 306 F.3d 398, 417 (6th Cir. 2002) (citation and internal quotation marks omitted). Where an indictment includes more than one count charging the same statutory violation, the question is whether Congress intended the facts underlying each count to constitute a separate unit of prosecution. Swafford, 512 F.3d at 844. “The inquiry as to what constitutes the correct unit of prosecution focuses in part on the identification of the key element of the federal offense.” United States v. Esch, 832 F.2d 531, 541 (10th Cir. 1987).
Consistent with the logic that the possession, receipt, or distribution of child pornography on different mediums or computer devices constitutes separate offenses, the use of distinct websites to transport child pornography likewise is not redundant for double jeopardy purposes.
Here, despite Richards’ claim to the contrary, CaseyandKylesCondo.com and CaseysCondo.com were not the same website. Although CaseysCondo.com eventually replaced CaseyandKylesCondo.com, the government‘s expert, James Fottrell, emphatically disagreed that the two websites were one and the same. The domain names were different and therefore required separate acts of registration, which occurred when Richards discontinued use of the CaseyandKylesCondo.com site, first registered in January 2003, and replaced it with the CaseysCondo.com website in early 2005. Fottrell opined that, although these two websites drew content from the same folder on the BlackSun server, it did not necessarily mean they were the same website—the sites could have operated at the same time and drawn different images from the same folder because they were on different domains. Fottrell testified that e-mails recovered from customers of these websites were consistent with the sites’ simultaneous operation at some point in time prior to the government‘s seizure.
Moreover, in his effort to attract new customers, Richards marketed CaseysCondo.com as a new and different entity. On the site, he recounted his history of operating pornographic sites, including CaseyandKylesCondo.com, and stated that his “current website was born” when, in Sep
Based upon this evidence, the district court did not err in denying Richards’ motion to dismiss Counts 1 and 16 as multiplicitous. We agree fully with the government that punishing, through multiple offenses, a defendant who funnels child pornography through different websites is consistent with Congress‘s intent to halt the dissemination of such images and to stop the sexual abuse of children. See New York v. Ferber, 458 U.S. 747, 759-60, 102 S. Ct. 3348, 73 L. Ed. 2d 1113 (1982) (“The distribution of photographs and films depicting sexual activity by juveniles is intrinsically related to the sexual abuse of children. . . . The most expeditious if not the only practical method of law enforcement may be to dry up the market for this material by imposing severe criminal penalties on persons selling, advertising, or otherwise promoting this product.“); cf. United States v. McNerney, 636 F.3d 772, 777, 780 (6th Cir. 2011) (taking note of “Congress’ significant purpose in prohibiting the dissemination of child pornography” in holding that “duplicate digital images, like duplicate hard copy images, should be counted separately for purposes of calculating a sentence enhancement pursuant to [U.S.S.G.]
VI.
Richards’ remaining arguments are also without merit. He contends that the district court violated the Confrontation Clause by precluding him from cross-examining and impeaching a prosecution witness—an adult performer and former friend—about his previous sexual acts involving minors. The district court did not abuse its discretion in determining that the witness‘s sexual encounters with minors were of peripheral relevance to the case. See United States v. Reid, 625 F.3d 977, 986 (6th Cir. 2010) (“The district court retains wide latitude insofar as the Confrontation Clause is concerned to impose reasonable limits on such cross-examination based on concerns about, among other things, harassment, prejudice, confusion of the issues, the witness’ safety, or interrogation that is repetitive or only marginally relevant.“) (citation and internal quotation marks omitted).
Lastly, Richards’ cursory argument alluding to cumulative error has no merit because “cumulative-error analysis is not relevant where no individual ruling was erroneous.” United States v. Deitz, 577 F.3d 672, 697 (6th Cir. 2009).
VII.
The government cross-appeals Richards’ sentence of sixteen years’ imprisonment and eight years of supervised release on the ground that it is substantively unreasonable. With a total offense level of 48 and a Category I criminal history, the advisory Guidelines range was life imprisonment.
We review the district court‘s sentencing decision for substantive reasonableness under a deferential abuse-of-discretion standard. United States v. Jones, 641 F.3d 706, 711 (6th Cir. 2011) (citing Gall v. United States, 552 U.S. 38, 51, 128 S. Ct. 586, 169 L. Ed. 2d 445 (2007)). “A sentence is substantively unreasonable if the district court selects a sentence arbitrarily, bases the sentence on impermissible factors, fails to consider relevant sentencing factors, or gives an unreasonable amount of weight to any pertinent factor.” United States v. Camiscione, 591 F.3d 823, 832 (6th Cir. 2010) (quoting United States v. Lapsins, 570 F.3d 758, 772 (6th Cir. 2009)). The Supreme Court in Gall v. United States, 552 U.S. 38, 128 S. Ct. 586, 169 L. Ed. 2d 445 (2007), “re
We “must give due deference to the district court‘s decision that the
Pointing out that Richards’ sixteen-year term of imprisonment is only one year more than the mandatory minimum sentence that he faced on the child-pornography production count alone, see
Certainly there are troubling aspects in the district court‘s sentencing rationale, particularly its mitigation of the seriousness of Richards’ actions, by noting that his relationship with minors was to a certain extent consensual behavior. That said, we disagree with the government that the district court abused its sentencing discretion. The sentencing record
In the court‘s view, this defendant has serious mental health issues related to his addictions and his different, identifiable internet persona, “Casey.” With addiction treatment, mental health treatment, and sex offender treatment, the court has hope that this young man, “stopped in his tracks at 24” (the government‘s words) from engaging in illegal child pornography activity, can reform and lead a productive life after 16 years of incarceration. The defendant is a gay man who will remain a gay man, but his taste for sex with adolescents must be changed. If 16 years of sex offender, mental health and addiction treatment cannot change that pattern, certainly 30 or 40 years has no better chance of doing so. And following his period of incarceration, he will be on an extensive period of supervised release, with sex offender special conditions that put substantial limitations on his freedom and provide more opportunity for treatment and close supervision of his activities.
This sentence is sufficient but not greater than necessary to accomplish the goals of sentencing. It reflects the seriousness of the offense, will promote respect for the law and be just punishment for the offenses of this defendant. It will provide the defendant with needed treatment for a substantial period of time, which should provide an adequate deterrence to further criminal conduct on the part of this defendant, who has no criminal record, and hopefully will protect the public from further crimes of this defendant during his 16 years in prison and 8 years of close supervision after he is released.
“It is the essence of discretion that it may properly be exercised in different ways and likewise appear differently to different eyes.” United States v. Andrews, 633 F.2d 449, 465 (6th Cir. 1980) (en banc) (Engel, J., dissenting). As in other cases, “[w]hile we cannot say that this is the sentence we would have given, neither can we say that this variance exceeded the discretion Gall gives district court judges.” United States v. Beach, 275 Fed. Appx. 529, 535 (6th Cir. 2008) (holding in transportation and receipt of child pornography case that downward variance to 96 months’ imprisonment from a Guidelines range of 210 to 240 months was not substantively unreasonable under the circumstances).
Here, as in Grossman, “[t]he district court never lost sight of the sentence recommended by the guidelines and gave ample reasons for reducing the sentence as far as he did.” Id. at 597. Our reminder in United States v. Vonner, 516 F.3d 382 (6th Cir. 2008), is apt here:
[United States v.] Booker[, 543 U.S. 220, 125 S. Ct. 738, 160 L. Ed. 2d 621 (2005)] empowered district courts, not appellate courts and not the Sentencing Commission. Talk of presumptions, plain error and procedural and substantive rules of review means nothing if it does not account for the central reality that Booker breathes life into the authority of district court judges to engage in individualized sentencing within reason in applying the
§ 3553(a) factors to the criminal defendants that come before them. . . . [T]he central lesson . . . [is] that districtcourts have considerable discretion in this area and thus deserve the benefit of the doubt when we review their sentences and the reasons given for them. Vonner, 516 F.3d at 392; see also United States v. Guthrie, 557 F.3d 243, 256 (6th Cir. 2009) (“District courts enjoy discretion in sentencing based on their ring-side perspective on the sentencing hearing and [their] experience over time in sentencing other individuals. Accordingly, we do not presume to read the mind of a sentencing judge, on a search for impropriety.“) (citation and internal quotation marks omitted); Paull, 551 F.3d at 529 (“Far from being impermissible or inadequate, [the] analysis of the considerations the court found most important—the defendant‘s circumstances and the seriousness of the crime—is just the sort of balancing a sentencing court should be doing.“).
Following our deferential review, we hold that Richards’ sixteen-year sentence was not an abuse of discretion and therefore affirm it.
VIII.
For the foregoing reasons, we affirm Richards’ convictions and sentence.
KAREN NELSON MOORE, Circuit Judge, concurring in the judgment only.
I write separately because I would affirm the district court solely on the basis of the good-faith exception to a subsequently invalidated warrant. I agree with the majority‘s conclusion that the search warrant explicitly authorized the search of the entire server. I disagree, however, that the Federal Bureau of Investigation (“FBI“) had probable cause to search the entire server. The majority‘s analysis applies our case law on searches of personal computers to searches of shared space without a moment‘s pause to consider the differences between the two. The rule announced by the majority would authorize the government to invade the privacy of any number of unidentified individuals or companies without any probable cause, just because they may, without their knowledge, share server space with suspected criminals.
I. WARRANT LACKED PROBABLE CAUSE TO SEARCH ENTIRE SERVER
A company like BlackSun provides web hosting services to other parties by allowing them to make use of its servers. A server is a computer that provides services to other computers; web servers, for example, send web pages to a computer when a user enters a specific URL1 into his or her browser. R. 87-1 (BlackSun Aff. at ¶ 8(a)). Web servers at a place like BlackSun can be “shared,” meaning one server may host “multiple websites of unrelated companies,” id. at ¶ 8(h), or one company or individual can lease an entire server. In such instances, the leasing company may use the server solely for its own websites, or it may in turn sublease the space to other unaffiliated websites just as BlackSun does.
On any given server, there can be any number of user accounts with varying levels of access. Each server has an administrative account to access the whole server; each website has an individual operator account to access just the website‘s directory. The government wants to analogize a server to a house with many open rooms. The appellant wants to analogize a server to an apartment with many locked units.
Two hypothetical servers may be useful to illustrate this point.2 Hypothetical Server A is owned by BlackSun, which then leases the space to 30 unaffiliated websites. Each website has its own user account on the server for its operator to log on remotely and make changes to his or her website directory. The operator of one website cannot put content in the directory of another website because his user account does not have access. The server has an administrator account that an employee at BlackSun uses to maintain the server. This administrator has access to every directory but is not affiliated with any of the websites. The administrator of this hypothetical server is like the landlord of the server, and each room or unit is separated from the other by a lock and key.
Hypothetical Server B is also owned by BlackSun, but instead BlackSun leases the entire space to Company B. Company B now maintains the administrator account itself and can set up as many websites on the server as it wants. It could use the server solely to host its own websites. It could set up six websites of its own and sublease the remaining space to a seventh, unaffiliated website. It could set up no websites of its own and sublease all the space to unaffiliated websites, just as BlackSun did with Server A. Company B as administrator maintains rights over the whole space and can access all the directories, whether the websites are operated by Company B or subleased and operated by unaffiliated companies. Server B is now more like a 30-bedroom house leased to one person, who may then choose to occupy all the rooms himself, fill them with his relatives, or sublet one or all of them to complete strangers and give them each locks on their rooms.
It should be obvious that, depending on whether a building is structured like Server A or Server B, the government may or may not have probable cause to search all the rooms when criminal activity is reasonably linked to one. The majority, however, would draw no distinction.
Neither party disputes that at the time of the seizure3 and search, the investigating officers had probable cause to suspect that the site justinsfriends.net contained child pornography. The affidavit in support of the search warrant states that BlackSun confirmed that it was the current web hosting company for justinsfriends.net and justinsfriends.com (together, “JustinsFriends“).4 R. 87-1 (BlackSun Aff. at ¶ 46). The only additional communication from BlackSun provided in the supporting affidavit is the following:
BlackSun is located at 1200 West 7th Street, Los Angeles, California 90017. BlackSun is an 18,000 square foot facility and has 2000 servers. The websites www.justinsfriends.com and www.justinsfriends.net websites [sic] resolving to IP address [xyz] resolve to one server that is a server owned and leased by BlackSun. The server is in cabinet
Based on the information that the FBI knew at the time the warrant was issued, probable cause existed to search any part of the server that someone affiliated with JustinsFriends could access. But the affidavit does not indicate that the FBI had any reason to suspect that someone affiliated with JustinsFriends was the administrator of the server as opposed to someone at BlackSun. The fact that some person had universal access to the server, without more, is insufficient grounds to justify a search of the entire server. Limiting the search to only a portion of the server under these circumstances is more consistent with our prior cases on electronic searches.
“A search warrant must particularly describe the things to be seized, but the description, whose specificity will vary with the circumstances of the case, will be ‘valid if it is as specific as the circumstances and the nature of the activity under investigation permit.‘” Guest v. Leis, 255 F.3d 325, 336 (6th Cir. 2001) (quoting United States v. Henson, 848 F.2d 1374, 1383 (6th Cir. 1988), cert. denied, 488 U.S. 1005 (1989)). General warrants that merely authorize “wide-ranging rummaging searches” violate the Fourth Amendment. United States v. Logan, 250 F.3d 350, 364-65 (6th Cir.), cert. denied, 534 U.S. 895 (2001). Although cases addressing particularity are often concerned with supplying enough information to the agents executing the warrant, of equal concern “is whether the category as specified is too broad in the sense that it includes items that should not be seized.” United States v. Upham, 168 F.3d 532, 535 (1st Cir.), cert. denied, 527 U.S. 1011 (1999); see also United States v. Greene, 250 F.3d 471, 476-78 (6th Cir. 2001). Given that the individual server was clearly identified by location and name, the issue in this case stems from the breadth of the warrant—whether the warrant should have covered the entire server.
I agree with the majority that, in the course of a reasonable search, investigating officers may have to examine cursorily innocuous documents “in order to determine whether they are, in fact, among those papers authorized to be seized.” Andresen v. Maryland, 427 U.S. 463, 482 n. 11 (1976). The same is true in an electronic search. When a warrant authorizes the search of a personal computer for child pornography, the agents are not required to open only the files or folders labeled “child pornography” even though this may result in brief access of private, innocuous material. United States v. Burgess, 576 F.3d 1078, 1093-94 (10th Cir.), cert. denied, 558 U.S. 1097 (2009). This flexibility recognizes that the owner of the computer has access to the full hard drive and may hide criminal activity under non-criminal names. That, however, is not the situation here.
As discussed above, a server like the one at BlackSun is inherently different from a personal computer in that it may belong entirely to one person, and thus be like a
Almost all of the cases offered by the majority to justify the search of the entire server involve searches of computers or hard drives within the complete control of the individual suspected of criminal activity.5 Only two cases address somewhat comparable situations to the facts at hand, where the government sought to search space shared by many users, and both of these cases counsel against a blanket rule permitting searches of entire servers in all situations.
In Guest, state police had probable cause to believe that obscene material was being posted to two different electronic bulletin boards.6 255 F.3d at 336-37.
A more relevant comparison could be made to United States v. Adjani, 452 F.3d 1140, 1146 (9th Cir.), cert. denied, 549 U.S. 1025 (2006). In Adjani, the court upheld the search of someone else‘s computer in executing a search warrant at a suspect‘s residence. Upon first determining that probable cause existed to search computers found at the suspect‘s residence, the court next addressed whether the probable cause extended to a computer on the premises known to belong to the suspect‘s roommate. The court found that it did. “The agents, acting pursuant to a valid warrant to look for evidence of a computer-based crime, searched computers found in Adjani‘s residence and to which he had apparent access. That one of the computers actually belonged to [the roommate] did not exempt it from being searched, especially given her association with Adjani and participation (however potentially innocuous) in some of his activities as documented in the agent‘s supporting affidavit.” Id. at 1146 (emphasis added).7
All of these cases emphasize that the person suspected of criminal activity, whether identifiable or anonymous, had the ability to hide the illegal files anywhere on the computers or hard drives that were ultimately searched. United States v. Mann, 592 F.3d 779, 784 (7th Cir.) (broad search reasonable because defendant “could have images of women in locker rooms virtually anywhere on his computers“), cert. denied, 130 S. Ct. 3525 (2010); United States v. Stabile, 633 F.3d 219, 234 (3d Cir. 2011) (“[A] broad seizure was required because evidence of financial crimes could have been found in any location on any of the six hard drives, and this evidence very likely would have been disguised or concealed somewhere on the hard drive.“), cert. denied, 132 S. Ct. 399 (2011); Adjani, 452 F.3d at 1146 (permitting search of all computers that suspect could access, even if not his); United States v. Sherman, 372 Fed. Appx. 668, 675-76 (8th Cir. 2010) (unpublished opinion) (“[Defendant] fails to acknowledge he had access to all components of the computer system used in his business and that the computer data could be manipulated, stored in different formats, or stored outside of the [specific program suspected of misuse].“).
Here, neither the warrant nor the supporting affidavit indicates a reason to believe that the owner of JustinsFriends had access to the entire server. The majority views the lack of knowledge regarding who
That is not to say that a warrant to search the entire server may never be “as specific as the circumstances and the nature of the activity under investigation permit.” United States v. Ables, 167 F.3d 1021, 1033 (6th Cir.) (quoting Henson, 848 F.2d at 1383), cert. denied, 527 U.S. 1027 (1999). Indeed, probable cause might have been established in this case had the FBI agent requesting the warrant included additional facts in the warrant or supporting affidavit known at the time. We know from the evidence presented at the suppression hearing and later at trial that BlackSun provided FBI agents at least some information regarding the structure of Server # 4 at the time the warrant was issued. BlackSun indicated that they leased the entire server to one individual, last name unknown. James Fottrell testified that when a server is leased in its entirety to one person or entity, it is more likely that the websites on that server are related. Had this information been included in the supporting affidavit, there may have been sufficient probable cause to search the entire server even without knowing anything else about the internal structure of the server.
FBI agents may not always be able to obtain such details about the internal structure of a server prior to imaging it. But the majority‘s position excuses the investigating agents from asking such simple questions as “Who leases this server?” and “What other websites are on this server?” When such answers are not forthcoming, the FBI could issue an administrative subpoena in order to gain more information about the structure of the server in question. Alternatively, the warrant itself could be structured to require computer personnel to make an initial determination based solely by looking at the user accounts as to what areas someone affiliated with the suspect site had access. Upon making such a determination, only those directories would be imaged for searching, or if already imaged due to on-site difficulties, any non-affiliated directories would be returned.10
The advent of fast, cheap networking has made it possible to store information at remote third-party locations, where it is intermingled with that of other users. . . . As a result, people now have personal data that are stored with that of innumerable strangers. Seizure of, for example, Google‘s email servers to look for a few incriminating messages could jeopardize the privacy of millions. Id. at 1176.
The rule advanced by the majority in this case could also jeopardize the privacy of innumerable strangers to the crime. Here, the FBI agents made no showing that they had probable cause to believe that every directory on Server # 4 was accessible to the operators of JustinsFriends. They also made no effort to determine first what directories on Server # 4 were accessible to the operators of JustinsFriends, or whether the operators were also administrators. Requiring such a preliminary showing when possible, or at a minimum requiring an initial inquiry before searching, allows legitimate interests of law enforcement to be advanced while still maintaining safeguards against the privacy of people who signed up for web hosting services and were never told that their site shared space with a child pornographer on the other side of the country.
When the government has probable cause to search for drugs in a specific apartment, we have never held that the existence of a landlord with keys to every other apartment in the building creates probable cause to search every apartment. But if the landlord happens to live in the very apartment suspected of containing drugs, his universal access may become relevant. Here, however, the warrant provided no probable cause to believe that someone connected to JustinsFriends had access to the entire server. I would therefore hold the search warrant unconstitutional because it was overly broad.
II. GOOD-FAITH EXCEPTION APPLIES
The only remaining question is whether the agents are entitled to rely on an invalid warrant under the good-faith exception in United States v. Leon, 468 U.S. 897, 914-15, 104 S. Ct. 3405, 82 L. Ed. 2d 677 (1984).11 I agree that they are, but for different reasons than the majority. The only potential Leon situation applicable here is whether the affidavit was “so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable. . . .” United States v. Schultz, 14 F.3d 1093, 1098 (6th Cir. 1994) (quoting Leon, 468 U.S. at 923).12
Whether an affidavit lacks indicia of probable cause “is a less demanding showing than the ‘substantial basis’ threshold required to prove the existence of probable cause in the first place.” United States v. Carpenter, 360 F.3d 591, 595 (6th Cir.) (en banc), cert. denied, 543 U.S. 851 (2004). The inquiry is whether an agent reading the warrant in a “practical, common sense manner” would be able to detect the deficiency. United States v. Van Shutters, 163 F.3d 331, 337 (6th Cir. 1998), cert. denied, 526 U.S. 1077 (1999). In Van Shutters, we upheld reliance on an affidavit describing both the criminal activity and a location with such particularity that a reasonable executing agent would make the “common sense inference” that
In this case, I disagree with the majority that the affidavit explains why it was necessary to image the entire server. Majority Op. at 542-43. The only area of the server for which the affidavit explains why a search is necessary relates to the unallocated space:
I have been informed by James Fottrell, that the entirety of the unallocated space of the servers on which materials relating to IP address [xyz] are found should be searched because the unallocated space of those servers is likely to contain relevant evidence of materials that have been deleted or otherwise moved from the servers.
R. 87-1 (BlackSun Aff. at ¶ 55). An explanation like the one above is never offered as to why probable cause exists to image the whole server; only the details of how the server is going to be imaged are given. The remaining parts of the affidavit, however, suggest a sufficient nexus between the illegal activity and the server as a whole to support a good-faith belief in the warrant‘s validity even though probable cause was ultimately lacking, particularly given the level of detail in the affidavit and the technical nature of the search.
I would therefore hold that the good-faith exception in Leon justifies affirming the district court‘s decision to deny the motion to suppress, despite the invalidity of the underlying warrant. I therefore concur in the judgment.
