Lead Opinion
Steven Horton and Beau Croghan were indicted separately for accessing child pornography in violation of 18 U.S.C. § 2252A(a)(5)(B). Both men-moved to suppress evidence obtained through a warrant authorizing a search of their respective computers through the use of a Network Investigative Technique (NIT). In a combined order, the district court granted sup
I. Background
The Onion Router (“Tor”) network exists to provide anonymity to Internet users by masking user data, hiding information by tunneling it through a series of interconnected computers. The Tor Project, a not-for-profit research organization in Massachusetts, provides free downloads of the Tor program on its website. Although Tor’s' intended users include whistleblow-ers, journalists, law enforcement personnel, activists, and privacy-minded consumers, users with more nefarious motives have used Tor’s anonymity capabilities for criminal purposes.
In September 2014, :the FBI began investigating an internet forum for sharing child pornography hosted on the Tor network called “Playpen.” Accessible through a web address of seemingly random letters and numbers, users entered Playpen by creating a username and password. Playpen had more than 150,000 registered accounts. In January 2015, FBI agents gained access to Playpen servers and relocated the website content to servers in a secure government facility in the Eastern District of Virginia. The agents assumed administrative control of the site. Although FBI investigators could monitor Playpen traffic, users were still cloaked by the Tor encryption technology.
On February 20, 2015, FBI Special Agent Douglas Macfarlane, a 19-year veteran of the agency, applied for a warrant in the Eastern District of Virginia to search computers that accessed Playpen. The warrant described the application of the NIT, which sent computer code to Playpen users’ computers that instructed the computers to transmit certain information back to the government. The information sent back included the computer’s Internet Protocol (IP) address, operating system information, operating system us-ername, and its Media Access Control (MAC) address, which is a unique number assigned to each network modem. Although Playpen was hosted in the Eastern District of Virginia, the warrant explained that “the NIT may cause [a defendant’s] computer—wherever located—to send to a computer controlled by or known to the government, network level messages containing information that may assist in identifying the computer.” A United States magistrate judge signed the warrant, and the FBI began collecting the personal data of Playpen users.
During the warrant period, Horton accessed Playpen with the username “boy-buttloverl23.” The FBI located Horton in the Southern District of Iowa through information obtained by the NIT. Horton was arrested and charged' in Iowa. Cro-ghan also accessed Playpen during the relevant time period, using the username “beau2358.”- Through the NIT, law - enforcement located -his home in Iowa, executed a search of his home, and indicted him. Both Horton and Croghan moved to suppress evidence obtained through the NIT. In a combined order, the district court found that the magistrate judge exceeded her statutory authority by issuing -the NIT warrant beyond the district court’s jurisdictional boundaries. See Fed. R. Crim. P. 41(b). The district court noted that “a warrant issued without proper jurisdiction is void ab initio and ... any search conducted pursuant to such warrant is the' equivalent of a warrantless search.” United States v. Croghan,
. This single NIT warrant executed in Virginia has-implicated more than a hundred defendants across the United States, More than 40 district courts have held
II. Discussion
“On appeal from a grant of a motion to suppress, we review a district court’s findings, of fact for clear error and its legal conclusions de novo.” United States v. Marasco,
A. The Fourth Amendment
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
U.S. Const, amend. IV. “[W]hat [a citizen] seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.” Katz v. United States,
We first address whether a warrant was required for the use of a NIT. At least one district court in this circuit has determined that a warrant would likely be unnecessary for an NIT that exclusively searched for IP addresses, relying on a line of cases allowing third-party subpoenas of the same. See Jean,
B. Magistrate Jurisdiction
Congress provided judicial authority to United States magistrate judges “within the district in which sessions are held by the court that appointed the magistrate judge ... and elsewhere as authorized by law.” 28 U.S.C. § 636(a). This authority may be modified by the Rules of Criminal Procedure. Id. § 636(a)(1). When the NIT warrant was issued in this case, Federal Rule of Criminal Procedure 41 authorized a magistrate judge “to issue a warrant to search for and seize a person or property located within the district.” Fed. R. Crim. P. 41(b)(1). The Rule provided exceptions to this jurisdictional limitation for property moved outside of the jurisdiction, for domestic and international terrorism, for the installation of a tracking device, and for property located outside of a federal district. See id.
The government argues that the tracking-device exception in Rule 41(b)(4) should apply here. This exception authorizes the magistrate judge “to issue a warrant to install within the district a tracking device,” see id., using “an electronic or mechanical device which permits the tracking of the movement of a person or object,” 18 U.S.C. § 3117(b). The government argues that the defendants made a “virtual” trip to the Eastern District of Virginia to access child pornography and that investigators “installed” the NIT within that district. Although plausible, this argument is belied by how the NIT actually worked: it was installed on the
C. Rule M Violation
Once we have determined that Rule 41 has been violated, we next consider whether the violation was merely technical or instead rises to the level of a violation of the Fourth Amendment. United States v. Krueger,
On this question, the district court determined that “because ‘the magistrate judge lacked authority,.and thus jurisdiction, to issue the NIT Warrant, there simply was no judicial approval? of the NIT Warrant- as required by the Fourth Amendment.” Croghan,
In United States v. Glover, the D.C. Circuit rejected a warrant that authorized the installation of an audio recording device in a defendant’s vehicle, “regardless of whether the vehicle was located in the District of Columbia, District of Maryland, or the Eastern District of Virginia.”
In United States v. Krueger, the Tenth Circuit determined that a similar Rule 41
For looking to the common law at the time of the framing it becomes quickly obvious that a warrant issued for a search or seizure beyond the territorial jurisdiction of a magistrate’s powers under positive law was treated as no warrant at all—as ultra vires and void ab initio to use some of the law’s favorite Latin phrases—as null and void without ' regard to potential questions of “harmlessness” (such as, say, whether another judge in the appropriate jurisdiction would have issued the same warrant if asked).... The principle animating the common law at the time of the Fourth Amendment’s framing was clear: a warrant may travel only -so far as the power of its issuing official. And that principle seems clearly applicable—and disposi-tive—here.
Id. at 1123-24 (Gorsuch, J., concurring).
The district court followed this logic, finding the NIT warrant invalid at its inception and therefore the constitutional equivalent of a warrantless search. Croghan,
D. Good-Faith Exception
“The fact that a Fourth Amendment violation occurred—ie., that a search or arrest was unreasonable—does not necessarily mean that the exclusionary rule applies,” Herring v. United States,
“The Fourth Amendment contains no provision expressly precluding the use of evidence obtained in violation of its commands, and an examination of its origin and purposes makes clear that the use of fruits of a past unlawful search or seizure ‘work[s] no new Fourth Amendment wrong.’ ” Leon,
To hold that the good-faith exception is applicable here would collapse the distinction between a voidable and a void warrant. But this distinction is meaningful: the former involves “judicial error,” such as “misjudging the sufficiency of the evidence or the warrant application’s fulfillment of the statutory requirements[,]” while the latter involves “judicial authority,” ie., a judge “act[ing] outside of the law, outside of the authority granted to judges in the first place.”
Levin,
In Master, the Sixth Circuit analyzed a case in which a state judge issued a warrant for a search outside of his jurisdictional boundaries that he “had no authority to issue.”
In Leon, the Supreme Court noted that “[penalizing the officer for the magistrate’s error, rather than his own, cannot logically contribute to the deterrence of Fourth Amendment violations.”
Having determined that the Leon exception may apply to a warrant void ab initio, the question remains whether it should apply here. “To trigger the exclusionary rule, police conduct must be sufficiently deliberate that exclusion can meaningfully deter it, and sufficiently culpable that such deterrence is worth the price paid by the justice system.” Herring,
Because Leon provides an exception for good faith, we apply it as long as the circumstances do not demonstrate bad faith, such as:
(1) when the affidavit or testimony supporting the warrant contained a false statement made knowingly and intentionally or with reckless disregard for its truth, thus misleading the issuing judge; (2) when the issuing judge “wholly abandoned his judicial role” in issuing the warrant; (3) when the affidavit in support of the warrant is “so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable”; and (4) when the warrant is “so facially deficient” that no police officer could reasonably presume the warrant to be valid.
Houston,
The defendants argue that the NIT warrant demonstrates such bad faith. The defendants argue that the NIT warrant affidavit exhibited a reckless disregard for its truth by listing the Eastern District of Virginia as the place to be searched, when law enforcement knew that computers could be searched anywhere in the country. At least one court has agreed with this reasoning. See Workman,
The defendants also argue that the NIT warrant was facially deficient because FBI agents should have known that a warrant purporting to authorize thousands of searches throughout the country could not be valid. Specifically, Horton argues that “there can be no credible argument that officers reasonably believed that none of the 214,898 members of [Playpen] were located outside of Virginia.” E.g., In re Warrant to Search a Target Compt. at Premises Unknown,
“For exclusion to be appropriate, the deterrence benefits of suppression must outweigh its heavy costs.” Davis,
III. Conclusion
Accordingly, we reverse the district court’s order suppressing the evidence and remand these cases for further proceedings.
Notes
. On December 1, 2016, Federal Rule of Criminal Procedure 41(b)(6) was added to provide an additional exception to the magistrate's jurisdictional limitation by allowing warrants for programs like the NIT:
a magistrate judge with authority in any district where activities related to a crime may have occurred has authority to issue a warrant to use remote access to search electronic storage media and to seize or copy electronically stored information located within or outside that district if:
(A) the district where the media or information is located has been concealed through technological means; or
(B) in an investigation of a violation of 18 U.S.C. § 1030(a)(5), the media are protected computers that have been damaged without authorization and are located in five or more districts.
. The defendants and Amicus Curiae argue that the NIT warrant failed to meet the Fourth Amendment’s particularity requirement. Because we find that the NIT warrant failed to meet constitutional standards on alternative grounds, we decline to address this issue.
. Additionally, the defendants argue that the FBI's sting operation itself was unreasonable, but this issue has no bearing on whether law enforcement acted ■ reasonably by obtaining and relying on the NIT warrant, Thus, we will not address this issue.
Concurrence Opinion
concurring in part and dissenting in part.
I respectfully dissent from Parts II.B and II.C of the court’s opinion. Under Federal Rule of Criminal Procedure 41(b)(4), a magistrate judge is authorized to issue a warrant to install a tracking devibe within - the magistrate’s district regardless of whether the movement of the
