United States v. Neil Kienast
Opinion
In 2015, federal agents infiltrated a child pornography website called Playpen and deployed a computer program to identify Playpen's users. This operation resulted in the successful prosecution of defendants all around the country, including Neil Kienast, Marcus Owens, and Braman Broy, whose appeals are consolidated before us. Kienast, Owens, and Broy, like many other defendants caught in this sting, argue that the warrant authorizing the Playpen searches was invalid and that the fruit of those searches-the defendants' identities-should therefore have been suppressed. Every circuit that has considered the suppression argument has rejected it, and so do we. Even assuming that these digital searches violated the Fourth Amendment, the good-faith exception to the exclusionary rule applies. We affirm all three judgments.
*526 I.
In 2014, the Federal Bureau of Investigation began investigating a child pornography forum called Playpen. This site created an anonymous space for its membership of over 150,000 people to discuss, consume, and share child pornography.
Playpen exists solely on the dark web, so it can be accessed only through a series of affirmative steps. First, the user must download The Onion Router (Tor) software. The Tor software makes user information untraceable by relaying it through a series of interconnected computers. It also allows a user to access the Tor network, where Playpen and other "hidden services" websites are hosted. Once on this network, a user must enter a specific sixteen-character web address to visit Playpen. Finally, Playpen requires visitors to create a username and password before granting them access to its contents.
In 2015, FBI agents gained access to Playpen's servers and relocated them to a government facility in the Eastern District of Virginia. The FBI then operated the website for about two weeks in order to observe Playpen users. But while the FBI could observe Playpen traffic, Tor prevented it from identifying any specific user information.
To unmask and apprehend the anonymous Playpen users, the FBI sought a warrant in the Eastern District of Virginia to use a Network Investigative Technique (NIT). The NIT deployed computer code instructing computers that accessed Playpen to send identifying information to the government.
In support of its warrant application to deploy the NIT, the FBI submitted a 31-page affidavit from a special agent who specialized in child pornography cases. The affidavit detailed Playpen's architecture and contents, explained the nature of the Tor network, and described the numerous affirmative steps a user had to take to locate Playpen and access its contents. The affidavit further asserted that use of the NIT was necessary to identify and locate the users and administrators of Playpen, because other investigative procedures had either failed or would likely fail.
The affidavit also provided details about the proposed NIT. Special computer code would be added to the digital content on the Playpen website. After a user entered a username and password to access Playpen, the website would cause the user's computer to download that code. The code would then instruct the user's computer to send back the following information: (1) the computer's IP address and the date and time that it was determined; (2) a unique identifier to distinguish data from that of other computers accessing Playpen; (3) the computer's operating system; (4) information about whether the NIT had already been delivered to the computer; (5) the computer's host name; (6) the operating system's username; and (7) the computer's media access control address.
A federal magistrate judge in the Eastern District of Virginia issued the NIT Warrant in February 2015. The magistrate judge approved the use of the NIT to obtain information from all "activating computers," which the warrant described as the computers "of any user or administrator who logs into [Playpen] by entering a username and password."
The three defendants on appeal were such users. At various times during the nearly two weeks that the government hosted the Playpen servers, Neil Kienast, Marcus Owens, and Braman Broy accessed Playpen. By entering their usernames and passwords, they unknowingly triggered the NIT, which unmasked their identities. Once identified, FBI agents in the Eastern District of Virginia notified FBI regional *527 offices in the defendants' home districts. Local FBI agents then obtained warrants to search the defendants' computers and homes. Each search unearthed child pornography.
On the basis of evidence recovered in these searches, grand juries charged the defendants with receiving, possessing, or viewing child pornography in violation of 18 U.S.C. § 2252A. The defendants each moved to suppress the evidence obtained as a result of the NIT Warrant, raising assorted challenges to its validity. The respective district courts denied their motions to suppress and the defendants entered conditional guilty pleas, reserving the right to appeal the denial of their suppression motions. These appeals followed.
II.
All three defendants assert that the searches performed by the NIT violated the Fourth Amendment and that the evidence obtained by them should have therefore been suppressed. We need not decide, however, whether the searches violated the Fourth Amendment. Even if they did, the district courts did not err by declining to suppress the evidence, because the good-faith exception to the exclusionary rule applies.
Suppression of evidence is a "last resort."
Hudson v. Michigan
,
The Court has instructed that the exclusionary rule be limited to cases in which its deterrent effect on police conduct will outweigh its "heavy costs."
Id.
at 237,
The defendants offer two major arguments against applying the good-faith exception in this case. The first is that the good-faith exception is categorically inapplicable when the warrant is void ab initio (or "from the beginning"). According to the defendants, this warrant is void because the magistrate judge lacked the authority to issue it. Federal Rule of Criminal Procedure 41(b)(1) authorizes a magistrate judge "to issue a warrant to search for and seize a person or property located within the [magistrate judge's] district." This warrant, they say, extended to people and property located outside the magistrate's district. Defendants contend that a void warrant is tantamount to no warrant at all, nullifying the good-faith exception. 1
*528
We disagree. Even if the warrant were void
ab initio
, we would treat this like any other constitutional violation. We see no reason to make the good-faith exception unavailable in such cases. The deterrence rationale for the exclusionary rule aims at the conduct of the police, not the conduct of the magistrate judge.
See
Davis
,
The defendants' second argument is that the good-faith exception fails on its own terms because the agents did not execute this search in good faith.
2
Leon
states that the good-faith exception might not apply in cases where: (1) "the issuing magistrate wholly abandoned his judicial role"; (2) the warrant was "so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable"; or (3) "a warrant [was] so facially deficient" that the "executing officers [could not] reasonably presume it to be valid."
Leon
,
The defendants focus on the third scenario, arguing that the officers should have recognized this warrant as facially invalid. They maintain that a well-trained officer, familiar with computer investigations and associated warrants, knows that a magistrate judge lacks the authority to authorize a warrant outside his or her own district. This warrant permitted the officers to access information originating from computers around the country. Thus, the defendants say, the officers should have known that the magistrate judge lacked authority to issue it.
The defendants are wrong-the officers could have reasonably relied on the magistrate judge's conclusion that this warrant was consistent with Rule 41. This warrant poses difficult conceptual questions about what occurred. Perhaps the warrant impermissibly allowed the search of computers outside the magistrate judge's district,
*529
as the defendants suggest. But the government suggests another theory. It notes that under Rule 41(b)(4), a magistrate judge can issue a warrant for the installation of a "tracking device" within the district that can track movement outside the district. Fed. R. Crim. P. 41(b)(4). The government characterizes the NIT as such a device, maintaining that its installation occurred in-district because the defendants were accessing servers located in that district. Choosing between these frameworks has split district courts across the country, which underscores the difficulty of the question.
3
See
United States v. Taylor
,
The defendants raise other theories of bad faith. They note that "where the officer seeking the warrant was dishonest or reckless in preparing the affidavit," the good-faith exception does not apply.
United States v. Harris
,
Nor do we think that the police behavior here was reckless. The defendants believe that the warrant was reckless because it was overinclusive. They insist that it sweeps up innocent actors that stumble upon Playpen but don't engage in any illegal activity. But by the time such actors have downloaded the software needed to access the dark web, entered the specific, sixteen-digit character jumble that is Playpen's web address, and logged into the site featuring at least one sexually suggestive image of a child, we are very skeptical that they are surprised to find themselves on a website offering child pornography.
The record establishes that the FBI acted reasonably both when it prepared its affidavit and when it executed the search warrants. Faced with the daunting task of apprehending tens of thousands of individuals engaged in perverse crimes but cloaked in anonymity through their use of Tor, the FBI developed a sophisticated tool to unmask and locate those suspected criminals. The agency fully and accurately described the NIT to the neutral and detached magistrate judge who signed the warrant. We join the five circuits who have held the good-faith exception applicable to this NIT Warrant.
See
Levin
,
*530 III.
Kienast and Owens individually raise additional challenges to their convictions. We address these in turn.
Kienast asserts that the district court erred by denying his motion to compel the government to allow him to review the NIT source code and cross-examine the FBI special agent who created the affidavit. According to Kienast, he needs this information to establish the scope of the Fourth Amendment violation. The district court rejected his motion, holding that the information Kienast sought was immaterial to the good-faith determination. We review a district court's ruling on a motion to compel discovery for abuse of discretion.
Thermal Design, Inc. v. Am. Soc'y of Heating, Refrigerating & Air-Conditioning Eng'rs, Inc.
,
Owens argues that the fruit of the NIT search should be suppressed because the government's conduct was so "outrageous" that it violated his right to due process. He cites
Rochin v. California
, which holds that certain conduct that "shocks the conscience" can constitute a due process violation.
There is no conflict between our cases and the Supreme Court's. In
United States v. Russell
, the Court left open the possibility that the government's engagement in illegal activity might violate due process if it is "shocking to the universal sense of justice."
Thus, the Supreme Court did not foreclose the "outrageous conduct" defense-but it did not mandate its application either. And "[w]e repeatedly have reaffirmed our decision not to recognize the defense."
United States v. Smith
,
*531
Russell
,
Owens makes one last pitch: he asks us to remand his case for a
Franks
hearing. In
Franks v. Delaware
, the Court held that the Fourth Amendment entitles a defendant to an evidentiary hearing when a defendant makes a substantial preliminary showing that the police procured a warrant to search his property with intentional or reckless misrepresentations in the warrant affidavit and such statements were necessary to a finding of probable cause.
IV.
The arguments that the defendants raise on appeal concerning the constitutionality of the NIT Warrant all lead to the same outcome: the agents acted in good-faith reliance on the NIT Warrant, and there is nothing to deter by applying the exclusionary rule. The defendants' distinct arguments are without merit. Each defendant's judgment of conviction is accordingly AFFIRMED.
We note that Rule 41 was amended in 2016 to expressly permit magistrate judges to issue warrants such as the NIT Warrant here. See Fed. R. Crim. P. 41(b)(6)(A).
Sometimes, the defendants' arguments seem centered on the agents located in the Eastern District of Virginia; other times, their arguments drift to attack the local agents who executed the search warrants. Our analysis does not depend on which agents were allegedly at fault.
Two courts of appeals have held that the NIT Warrant violated Rule 41 but that the good-faith exception applied.
See
Werdene
,
Reference
- Full Case Name
- UNITED STATES of America, Plaintiff-Appellee, v. Neil C. KIENAST, Defendant-Appellant. United States of America, Plaintiff-Appellee, v. Marcus A. Owens, Defendant-Appellant. United States of America, Plaintiff-Appellee, v. Braman B. Broy, Defendant-Appellant.
- Cited By
- 28 cases
- Status
- Published