OPINION & ORDER
[Resolving Doc. No. 23]
Defendant Brian E. Sawyer moves the Court to suppress evidence found during
I. Background
In this case, the United States charges the Defendant with possession and distribution of child pornography, in violation of 18 U.S.C. § 2252(a)(2) and 18 U.S.C. § 2252A(a). The government bases its charges on evidence found on the Defendant’s computer, which was seized during the execution of a search warrant on March 4, 2011. [Doc. 23-1 at 2-3.] The warrant was based upon information obtained as a result of the Defendant Sawyer’s peer to peer file sharing. [Id. at 2-3.]
The Defendant used a “closed” peer-to-peer file sharing program called GigaTribe. [Id. at 1.] Normally, peer-to-peer file sharing programs, such as LimeWire or Kazaa, allow anyone using the same software to view and download files from the shared folder on any other user’s computer, without special permission. Thus, in these “open” file sharing programs, any files stored in the shared folder on a user’s hard drive are visible and may be downloaded by any other person using that same program.
The Defendant used a program called GigaTribe that is slightly different from these “open” programs. With GigaTribe, a user’s files are not automatically made publicly available to all other users; instead, users may view and download files only after receiving specific authorization. [Id. at 1.] Consent to view and download files on GigaTribe is given when a user adds another user to his or her private list of so-called “friends.” [Id. at 1.] GigaTribe users may become “friends” with other users through an electronic invitation; acceptance of this invitation allows the “friends” to directly browse and download files that are stored on each other’s computers over the internet. [Id. at 1.] Individuals using the program select specified folders on their computer that they wish to share, and “friends” can browse, search, and download any of the files stored in those folders. [Id. at 1.] GigaTribe also features a chat function that allows users to communicate with each other. [Id. at 2.]
At the time of the events in question, the Defendant’s GigaTribe username was “happyb.” [Id. at 2.] While using his “happyb” username, the Defendant became online friends with another user, “SB,” allowing the two accounts to access each other’s shared folders to browse and download files. [Id. at 2.] Agent Couch previously obtained written consent from the user in control of the of the “SB” username to use that account for “any purpose relating to an official investigation by the above law enforcement authority [FBI], including (but not limited to) sending and receiving e-mail or conducting any other electronic communications, accessing stored information, and using and disclosing such communications or information.” [Doc. 23-3.] On February 22, 2011, Special Agent Barry Couch of the FBI (“Agent Couch”) logged into the GigaTribe network using the “SB” user name, viewed the Defendant’s shared file list, and downloaded twenty-eight images of child pornography. [Id. at 2.] While downloading the images, Agent Couch and the Defendant, still using the “happyb” and “SB” usernames, engaged in a private chat about sexual contact with minors. [Id. at 2.]
During the download process, Agent Couch ascertained the internet protocol (IP) address for the Defendant’s internet connection; the Defendant’s physical address was later obtained through a subpoena from Time Warner Cable. [Doc. 23-1
On April 6, 2011, a federal grand jury indicted the Defendant on one count of receipt and distribution of images of child pornography in violation of 18 U.S.C. § 2252(a)(2) and one count of possession of a computer containing child pornography in violation of 18 U.S.C. § 2252A(a). [Doc. 7.] The Defendant now moves the Court to suppress all evidence seized when Agent Couch logged onto the “SB” user name and downloaded files on February 22, 2011, as well as any evidence later seized as a result of that search and seizure, including the Defendant’s computer. [Doc. 23.]
II. Analysis
The Fourth Amendment protects individuals against “unreasonable searches and seizures” by the government and protects privacy interests where an individual has a reasonable expectation of privacy.
Smith v. Maryland,
First, the Court must determine whether Defendant Sawyer has a Fourth Amendment privacy interest in the materials stored on his computer that were shared on GigaTribe. A general consensus has formed among courts that an individual does not have a Fourth Amendment privacy interest in information made available on a public peer to peer filing sharing programs, such as LimeWire or Kazaa, since their expectation of privacy in that shared information is not objectively reasonable.
United States v. Borowy,
In the current case, however, where a person shares files over a “closed” network — in which only pre-approved friends have access — -an expectation of privacy is somewhat more reasonable. Unlike in an open program, where any user can see and download the files, Defendant Sawyer’s files were only visible to his “friends.” [Doc. 23-1 at 1-3.] Nonetheless, despite the program affording some greater degree of privacy, the rationale of the decisions analyzing open file sharing programs is still persuasive here and the Court finds that Sawyer did not have an objectively reasonable expectation of privacy in the files that were shared over GigaTribe.
United States v. Ladeau,
Moreover, even if Defendant Sawyer possessed a privacy interest in the shared files stored on his computer, the Court finds that consent was given to search those files. First, Defendant Sawyer himself directly consented to the February 22 downloads. Simply because the government obtained access to these files through use of a ruse does not render the consent involuntary. Rather, “it is well established that an undercover officer may gain entrance [to a home] by misrepresenting his identity and may gather evidence while there.”
United States v. Pollard,
Second, as to third party consent, the owner of the “SB” account also validly consented to Agent Couch searching the shared folder on Defendant Sawyer’s computer. It is well accepted that a third party with authority or control over property subject to a search may grant law enforcement consent to search that property.
Morgan,
Here, by becoming “friends” with “SB,” Defendant Sawyer granted the “SB” user-name the authority to access any files or folders designated as shared. The owner of the “SB” name then voluntarily consented to Agent Couch using that username to access the shared folders and files on Sawyer’s computer. [Doc. 23-3.] It makes little difference that “SB” was granted authority to access and download the files on the computer over the internet, rather than through a grant of physical access to the computer actually storing those files, particularly since Agent Couch only accessed the files remotely over the internet. As such, the Court finds that even if the Defendant has a Fourth Amendment privacy interest in the shared files on his computer, that the user in control of the “SB” gave effective third-party consent to a police search of those shared files.
For the foregoing reasons, the Court DENIES the Defendant’s motion to suppress.
IT IS SO ORDERED.
Notes
. This case is easily distinguishable from
United States v. Hardin,
