United States v. Anthony Jean
Opinion
After a bench trial, Anthony A. Jean pled guilty to receiving child pornography in violation of 18 U.S.C. § 2252A(a)(2), (b)(1), and possessing child pornography in violation of
In 2014, the FBI began investigating a child pornography website "Playpen." It offered users the opportunity to advertise, view, and distribute child pornography. The website's host, the Onion Router, gave anonymity to users, hiding identifying information and requiring access to Playpen through a nondescript web address. Playpen required users to create a username and password.
On February 20, 2015, a United States Magistrate Judge for the Eastern District of Virginia granted the FBI's warrant to search computers, "wherever located," accessing Playpen. The warrant approved the use of NIT, a computer program that reveals Playpen's users. The NIT would "cause" the user's computer to send its Internet Protocol address, operating system information and username, and Media Access Control address to the FBI.
FBI agents discovered a user named "regalbegal." This username belonged to Jean, living in Arkansas. On July 9, 2015, executing an Arkansas search warrant, the agents seized Jean's computer and other devices with child pornography. He admitted downloading and viewing child pornography. He confirmed his username was "regalbegal."
Jean moved to suppress his statements and all evidence from the search. He asserted that the search was unauthorized because the warrant was issued in the Eastern District of Virginia, not Arkansas. The district court denied his motion. He then moved to compel disclosure of the complete NIT code, arguing it was material to his defense. The court denied disclosure of the exploit and server codes. Jean pled guilty, preserving his right to appeal the rulings on the motions to suppress and compel.
Jean challenges the NIT warrant under Federal Rule of Criminal Procedure 41(b)(4). His challenge is preempted by
this court's decision in
United States v. Horton
,
This court reviews "rulings on pretrial motions for production for an abuse of discretion," reversing "only on a showing that the error was prejudicial to the substantial rights of the defendant."
United States v. White Horse
,
Jean argues that the district court abused its discretion by not compelling disclosure of the complete source code for all software it used to identify him, specifically the exploit and server codes. Jean believes these codes were material to his defense. The district court disagreed, finding "Jean's argument fails to 'demonstrate that the requested evidence bears some abstract logical relationship to the issues in the case.' " Summarizing the testimony of Jean's own expert, the district court found that the likelihood of any help to Jean's defense was "vanishingly small." The district court did not abuse its discretion in denying the motion to compel.
Alternatively, the court invoked the law-enforcement privilege to prevent disclosure of the exploit code, finding "any need ... is greatly outweighed by the public's interest in keeping the exploit secret." Jean contends a protective order could alleviate this concern. But the court deemed a protective order insufficient: "The risk that the information might inadvertently be leaked or otherwise used by third parties is too great." The court further found, "Mere knowledge of the particular vulnerability exploited here could potentially lead the expert to later build his own exploit, or assist others in doing so, thereby effectively circumventing a protective order." The district court did not clearly err in making these findings.
* * * * * * *
The judgment is affirmed.
The Honorable Timothy L. Brooks, United States District Judge for the Western District of Arkansas.
Reference
- Full Case Name
- UNITED STATES of America, Plaintiff-Appellee v. Anthony Allen JEAN, Defendant-Appellant
- Cited By
- 3 cases
- Status
- Published