United States v. Jeffrey Harney
Opinion
This case presents the latest installment in the government's investigation of a child pornography website called Playpen. As part of a nationwide investigation into this website and as part of the nationwide search warrant that went with it, the government searched Jeffrey Harney's computer and found illicit images. Harney moved to suppress the evidence and asked the district court to require the United States to turn over all of the background information related to its search. The district court denied both motions. Harney pleaded guilty to receiving child pornography but reserved the right to appeal the denial of his suppression and discovery motions. We affirm.
I.
In 2015, the Federal Bureau of Investigation gained control over Playpen, a large child pornography website. Agents moved a controlled server containing a copy of the website to a government building in Virginia and continued operating the site in hopes of nabbing its users. The nature of the site complicated the government's efforts. It uses "The Onion Router," known to insiders as Tor, which conceals users' internet protocol addresses and other identifying information.
Through a 33-page affidavit, the government sought a warrant that would identify the individuals veiled behind the usernames. The proposed warrant, the affidavit explained, would authorize additional instructions to the content that a computer automatically downloaded when visiting the site. The added instructions would cause the user's computer to send back seven specific pieces of information about the computer, including the actual IP address. A magistrate judge in the Eastern District of Virginia authorized the government to use the technique to search any computer that logged into Playpen with a username and password over the next 30 days.
The technique worked. It identified several users of Playpen. One of them was Harney. He created a Playpen profile and spent about an hour and 20 minutes on the site during the window of observation. Harney viewed several images or videos of child pornography on the site. The protocol captured Harney's IP address, which allowed agents to get his physical address from his internet provider.
Armed with that information, officers obtained a warrant to search Harney's house. During the search, Harney admitted he had downloaded child pornography onto his computer. A forensic examination confirmed as much. Harney had 3,640 images, including 1,199 videos, of child pornography on his computer.
The government charged Harney with four counts of receiving and one count of possessing child pornography. Harney moved to suppress the evidence, arguing that a warrant authorizing such an investigation violated the Fourth Amendment. Harney also asked the court to require the government to hand over all of the information about the technique. The district court denied both motions. Even if the warrant violated the Fourth Amendment, it ruled, the good-faith exception applied. And given the government's willingness to produce some information about the technique, it also ruled, Harney failed to show a legitimate need for the rest.
Harney pleaded guilty to one count of receiving child pornography,
II.
Motion to suppress
. The Fourth Amendment protects against "unreasonable searches and seizures" and requires that warrants be based on "probable cause" and "particularly describ[e] the place to be searched, and the persons or things to be seized." U.S. Const. amend. IV. When officials violate those commands, courts ordinarily suppress the resulting evidence.
See
Mapp v. Ohio
,
The investigators acted in good faith in relying on this warrant. Special Agent Douglas Macfarlane submitted a 33-page affidavit to the issuing magistrate, explaining the need for the search and detailing how it would work. The warrant spelled out that the government could search those computers that logged into Playpen with a username and password. And it listed the seven items the government sought from each computer. When the magistrate granted the warrant on the basis of all of this information, the officers were entitled to execute it.
Harney objects on several grounds.
The warrant, he says, did not adequately describe the places the government would search, as the government did not know where the searched computers would be located. But that frequent reality of web-based searches does not transform the warrant into a general warrant, which "specified only an offense" and left officers free to search or arrest anyone.
Steagald v. United States
,
The warrant thus sufficiently described the place to be searched, saying all that reasonably could be said under the circumstances. Every circuit court to address the question has answered it the same way.
United States v. Levin
,
To the extent Harney means to argue that the agents could not rely on the warrant in good faith because it allowed the government to search computers outside of the Eastern District of Virginia, that does not work either. Our decision in
United States v. Moorehead
holds to the contrary.
Trying to nudge outside Moorehead 's domain, Harney says it doesn't apply because he didn't create his Playpen account until after the magistrate issued the warrant. But Harney never offers any explanation why that distinction matters with respect to these types of warrants-all designed to target future access to the website. Nor can we think of any such explanation. Nothing in Moorehead itself, moreover, remotely suggests such a good-for-Tuesdays-but-not-for-Wednesdays distinction.
Harney adds that Special Agent Macfarlane could not rely on the warrant because he did not base the affidavit on personal knowledge. That is wrong on the facts and the law. Factually, Macfarlane conveyed firsthand knowledge in the affidavit. He worked in the Bureau's Violent Crimes Against Children section, investigating child pornography offenses. And he based the affidavit in part on his "experience, training[,] and background." R. 36 at 6. Legally, officers need not base affidavits on their own knowledge or observations as long as the supporting facts establish probable cause.
United States v. Kinison
,
Harney insists that investigators could not rely on the warrant in good faith because it authorized illegal or outrageous conduct: the government's continued operation of Playpen. In limited circumstances, it's true, we have suggested that the government's investigative conduct could be so conscience-shocking that it would violate due process.
See, e.g.
,
United States v. Napier
,
One could be forgiven for thinking we had already put the defense to rest in 1994 in
United States v. Tucker
,
But since then we have been less categorical about the defense, leaving some sliver of hope that one day, some day, the defense might apply. The outrageous-conduct defense calls to mind the
Lemon
test, another "docile and useful monster" "worth keeping around" because "it is so easy to kill" again and again.
Lamb's Chapel v. Ctr. Moriches Union Free Sch. Dist.
,
Even if we pretend once more that such a defense might exist, Harney did not establish any basis for invoking it. The government after careful consideration made the difficult decision to continue operating this website briefly. That had a downside (exposing the pictured children to more harm) and an upside (apprehending individuals who fuel the demand for more child pornography).
See
United States v. Anzalone
,
Even so, Harney counters, we should suppress the evidence against him because the government harmed child victims by keeping the site going. Harney is not an ideal spokesperson for this position, and he is not a great candidate to profit from it. Yes, the government kept Playpen going for a while longer. But Harney (and others) freely broke the law. To access the site, Harney had to download the router's software, enter Playpen's exact web address, and create a username and password to access the content. Why should we throw away the evidence that he violated child pornography laws because the government's decision to employ the technique meant that
more
criminals might view the images too? We see no good reason.
See
United States v. Kienast
,
United States v. Sherman
does not say otherwise.
Neither did the government violate
Motion for discovery . Harney asked the district court to make the government turn over all of the information about the network investigative technique. The protocol had several components: the instructions sent to the computer, the data stream between Harney's computer and the government's, the code used to create identifiers for Harney's information, the code used to infiltrate Tor, and the server tool used to store the intelligence from Harney's computer. The government gave Harney a copy of the information it got from his computer and said it would provide the instructions sent to Harney's computer, the data stream between the computers, and an offline copy of Playpen's website. That was not enough, Harney claims; the government should turn over every piece of this information.
Criminal Rule 16 requires the United States to provide a defendant copies of data and documents in its possession if, as relevant here, that information "is
material to preparing the defense." Fed. R. Crim. P. 16(a)(1)(E). That means Harney must show, with more than conclusory arguments,
United States v. Phillip
,
No abuse of discretion occurred. Harney has not shown that the government engaged in wrongdoing (the only way the evidence could help his defense) in employing the technique. He commissioned an expert to evaluate the technique, but the expert could not identify any errors in the government's efforts. Nor did Harney to our knowledge try to use the information the United States offered to give him to show that the technique didn't operate as expected. That leaves us with nothing more than conjecture about what the additional evidence might show. As against the government's interest in keeping the non-case-specific data under wraps so that would-be criminals cannot thwart future government operations, Harney thus comes up short.
But, Harney retorts, he can't know what might have gone wrong with the technique until he can evaluate all of its components. Harney worries the government may not have stored the information from his computer properly or that the technique might have allowed third parties to put images on his computer. While those may be valid concerns in general, Harney has not shown a problem with them here, at least not one that overrides the government's interest in keeping the generic components of the technique secret. The government offered to give Harney the instructions it sent to his computer and the data stream between his computer and the government's. That would have allowed Harney to compare the information the government found on his computer and had already produced in discovery with the information the government obtained from his computer using the network investigative technique. And it would have given Harney the chance to argue that he hadn't viewed or downloaded the images. If Harney had identified any issues along those lines, this might be a different case. But he made no use of what the government offered. The district court did not abuse its discretion by excusing the government from providing even more of this information without some evidence to support Harney's argument.
For these reasons, we affirm.
Reference
- Full Case Name
- UNITED STATES of America, Plaintiff-Appellee, v. Jeffrey W. HARNEY, Defendant-Appellant.
- Cited By
- 9 cases
- Status
- Published