United States v. Stevahn

FILED United States Court of Appeals Tenth Circuit February 19, 2009 UNITED STATES COURT OF APPEALS Elisabeth A. Shumaker TENTH CIRCUIT Clerk of Court UNITED STATES OF AMERICA, Plaintiff-Appellee, No. 08-8036 v. (D. Wyoming) JAMES ALLEN STEVAHN, (D.C. No. 07-CR-157-D) Defendant-Appellant. ORDER AND JUDGMENT * Before HENRY, Chief Judge, McWILLIAMS and GORSUCH, Circuit Judges. James Stevahn appeals the district court’s denial of his motion to suppress evidence that officers seized from his Gillette, Wyoming home computer, which, according to the officer’s affidavit supporting the search warrant, had been targeted as a “download candidate” for child pornography by “law enforcement officers from around the world.” Rec. vol. I, doc. 25, Att. 1 (Ex. B, Huff Aff. ¶ 4t). While we acknowledge the infirmity of the search warrant’s probable * This order and judgment is not binding precedent except under the doctrines of law of the case, res judicata and collateral estoppel. It may be cited, however, for its persuasive value consistent with Fed. R. App. P. 32.1 and 10th Cir. R. 32.1. cause, we hold the seized evidence admissible under the good faith exception the Supreme Court outlined in United States v. Leon, 468 U.S. 897 (1984). I. FACTUAL BACKGROUND On March 19, 2007, Special Agent Randy Huff, of the Wyoming Division of Criminal Investigation, received an assignment to investigate Mr. Stevahn’s Gillette, Wyoming computer that “had been seen as a download candidate by other law enforcement officers from around the world.” Rec. vol. I, doc. 25, Att. 1 (Ex. B, Huff Aff. ¶ 4t). According to Agent Huff’s affidavit in support of a March 27, 2007 application for a search warrant, “[t]he computer was observed by officers to have all or a portion of a movie that is suspected of being child pornography. . . . Two police officers observed that computer as a download candidate for the child porn movie with the SHA1 value H6v . . . EJTN [and Internet protocol] address 69.45.198.82.” Id. SHA1 (or SHA-1) is a mathematical algorithm that stands for Secure Hash Algorithm (SHA). “The United States has adopted the SHA-1 hash algorithm” for “computing a condensed representation of a message or data file”; thus it can act “like a fingerprint.” See United States v. Warren, No. 4:08 CR 189 RWS, 2008 WL 3010156, at *1 n.4 (E.D. Mo. July 24, 2008). The Internet protocol (“IP”) address Agent Huff noted designates “[a]n Internet location – called an Internet protocol address[, which] is a string of integer numbers separated by periods.” Avery Dennison Corp. v. Sumpton, 189 F.3d 868, 871 (9th Cir. 1999). -2- The circuit court of Campbell County issued a warrant to search Mr. Stevahn’s apartment on the same day, and, later that day, officers seized computer hard drives and storage devices alleged to contain images of child pornography. Mr. Stevahn was charged with one count of Receipt of Child Pornography in violation of 18 U.S.C. § 2552A(a)(2)(A) and (b)(1) (count 1), and two counts of Possession of Child Pornography in violation of 18 U.S.C. § 2552A(a)(5)(B) and (b)(2) (counts 2 and 3). Mr. Stevahn entered a conditional plea of guilty to count 1 (Receipt of Child Pornography), subject to this appeal. He received a sentence of 235 months’ imprisonment, plus supervised release for a term of life. II. DISCUSSION Mr. Stevahn appeals the district court’s application of the United States v. Leon exception to the exclusionary rule, which allows admission of otherwise excludable evidence when the officers acted in good faith. 468 U.S. 897 (1984). The district court determined that Agent Huff’s affidavit submitted in support of the warrant was lacking in probable cause, but that it was not so lacking in indicia of probable cause so as to make Agent Huff’s belief in it unreasonable. We agree with the district court’s reasoning. A. Standard of Review On an appeal from the denial of a motion to suppress, we review factual findings for clear error in the light most favorable to the government. United States v. Cantu, 405 F.3d 1173, 1176 (10th Cir. 2005). We review the warrant’s -3- probable cause requirement “very deferential[ly],” searching only for a substantial basis that the underlying affidavit provided probable cause. United States v. Riccardi, 405 F.3d 852, 860 (10th Cir. 2005). Finally, even if the above do not indicate probable cause, we may uphold the search if de novo review indicates that Leon applies. Id. B. The Affidavit did not Provide Sufficient Evidence of Probable Cause. Although we could simply affirm the district court on the basis of the good faith exception, our circuit encourages “the policy of avoiding ‘freezing’ Fourth Amendment jurisprudence, discussed by the Court in Leon, [which] compels us in this case to resolve the constitutional issue” so that magistrate judges and law enforcement officers are given some guidance in their decisionmaking. United States v. Dahlman, 13 F.3d 1391, 1398 (10th Cir. 1993); see Leon, 468 U.S. at 924 (“[N]othing will prevent reviewing courts from deciding the [Fourth Amendment] question before turning to the good-faith issue.”). Further, in this case, it would “be difficult to determine whether [Agent Huff] acted reasonably without resolving the Fourth Amendment issue.” Leon, 468 U.S. at 925. Thus, like the district court, we first consider the affidavit Agent Huff submitted in support of his application for the search warrant. According to the district court, the first third of the warrant is “boilerplate” and the officer “just fill[ed] in the blanks.” Rec. vol. III, at 11. It also outlines the process through which Agent Huff might identify SHA1 signatures: “Once a -4- matching set of digital signatures was identified, [Agent Huff] could use publicly available software to request a list of internet network computers that are reported as download candidates of known images. This feature allows [Agent Huff] to conduct undercover operations that involve images of child sexual abuse.” Rec. vol. I, doc. 25, Att. 1 (Ex. B, Huff Aff. ¶ 4n). The second part of the affidavit notes, but fails to explain, how “officers from around the world” came to perceive Mr. Stevahn’s computer as a “download candidate:” Id. ¶ 4t. The balance of the affidavit describes the computer items necessary for a computer expert to conduct a thorough investigation of activities conducted on a computer. At the hearing on the motion to suppress, the district court expressed its dismay with the affidavit more frankly: “What we’re dealing with here . . . is a boiler plate affidavit where you plug in the address, you have a place where you can throw in a photograph, and the language is markedly similar, if not identical, to language presented to the Court in other cases.” Rec. vol. III, at 5. The court -5- determined, however, that the use of the boilerplate language standing alone, did not cause concern, rather, the affidavit’s omissions troubled the court. Rec. vol. I, doc. 29, at 4-5. The court agreed with Mr. Stevahn’s argument that no information was given as to the investigative techniques the officers used, the software the officers used, what it was used for, or its reliability, not to mention the identity of the officers or where they were from. See id. at 4 (“The use of such a generic label breeds suspicion that the affiant knew very little about them.”). And, although the “SHA1 value” has a certain “reliability,” this is limited as to whether the tagged item is a pornographic movie or not, see Rec. vol. I, doc. 25, Att. 1 (Ex. B, Huff Aff. ¶ 4t); this has no relation to Mr. Stevahn’s computer. Accordingly, we agree with the district court’s depiction of the affidavit’s verbiage: “This language is awfully general.” Rec. vol. III, at 14. In addition, defense counsel offered simple alternatives that would have saved the affidavit: If we’re not going to identify the officers or where they’re from or what kind of investigative techniques they used then at least let’s identify the manner in which they identified this defendant’s computer because what we’re left with, . . . is this agent’s manner, and his manner doesn’t tell us what the name of the software is that he’s using or the reliability of that software. .... [W]hat we’re asking for isn’t going to be earth-shattering here -6- . . . . All the officer has to do is say, “I received this information from officers around the world who informed me they used ‘X’ software to identify this computer as one trafficking these illicit images, and that software is known to be reliable.” Rec. vol. III, at 6, 9. Noting the district court’s experience in these matters and its concerns, officers should consider including such indicia of reliability going forward in these cases. As to independent corroboration of Agent Huff’s statement, we agree with the defendant that there is no corroboration apart from certain unidentified officers somewhere in the world having seen Mr. Stevahn’s computer as an undefined “download candidate” by virtue of the unknown unidentified publicly available software. We also agree with the district court that the affidavit facially lacked probable cause because there was “no information connecting information regarding [Agent] Huff’s experience to the observations of the ‘two officers’ or officers ‘around the world.’” Rec. vol. I, doc. 29, at 5. The government’s argument in support of the sufficiency of the evidence in support of probable cause is similarly unhelpful. Arguing that “[t]he district court and [Mr. Stevahn] find fault (and lack of probable cause) with the absence of language which connects the Background portion of the affidavit with the Current Investigation portion,” the government argues that it “believe[s] that such a conclusion can only be reached by interpreting the affidavit in a hypertechical [sic] rather than a common sense manner.” Aple’s Br. at 10. The district court’s -7- rationale is neither “hypertechical” nor hypertechnical, it reflects practical, real concerns that should be addressed. Finally, we agree that Agent Huff’s inability to testify at the hearing left these deficiencies unremedied. “While an assessment of the affidavit’s showing of probable cause will be made looking only at the affidavit itself, testimony from the affiant would aid the Court in determining whether or not the affidavit’s deficiencies were merely a function of sloppy draftsmanship.” Rec. vol. I, doc. 29, at 5-6 n.1. Accordingly, we hold that the district court’s assessment that the affidavit lacked sufficient evidence to provide probable cause was correct. C. The Leon Exception to the Exclusionary Rules Applies. We turn finally to the application of the Leon exception to the exclusionary rule, which is designed to deter future unlawful police misconduct. 468 U.S. at 906 (noting that the exclusionary rule operates as a “judicially created remedy designed to safeguard Fourth Amendment rights generally through its deterrent effect, rather than a personal constitutional right of the party aggrieved”). Evidence seized pursuant to an invalid warrant need not always be suppressed. Herring v. United States, 129 S. Ct. 695, 701 (2009) (“The fact that a Fourth Amendment violation occurred – i.e., that a search or arrest was unreasonable – does not necessarily mean that the exclusionary rule applies. Indeed, exclusion has always been our last resort, not our first impulse, and our precedents establish important principles that constrain application of the exclusionary rule.” (internal -8- quotation marks and citations omitted)). “Inherent in Leon’s exception to the exclusionary rule is the view that permitting people to get away with crime is too high a price to pay for errors that . . . stem from negligence rather than disdain for constitutional requirements.” United States v. Woolsey, 535 F.3d 540, 546 (7th Cir. 2008) (internal quotation marks omitted). “When police act under a warrant that is invalid for lack of probable cause, the exclusionary rule does not apply if the police acted ‘in objectively reasonable reliance’ on the subsequently invalidated search warrant. We (perhaps confusingly) called this objectively reasonable reliance ‘good faith.’” Herring, 129 S. Ct. at 701 (quoting Leon, 468 U.S. at 922, and n.23); United States v. Rowland, 145 F.3d 1194, 1206 (10th Cir. 1998) (“In Leon, the Supreme Court modified the Fourth Amendment exclusionary rule by holding that evidence seized pursuant to a search warrant later found to be invalid need not be suppressed if the executing officers acted in objectively reasonable, good-faith reliance on the warrant.”). In Leon, the Court also identified four specific situations in which an officer’s reliance on a subsequently invalidated warrant could not be considered to be objectively reasonable: (1) when the warrant is issued on the basis of an affidavit that the affiant knows (or is reckless in not knowing) to contain false information; (2) when the issuing magistrate abandons his neutral and detached role and serves as a rubber stamp for police activities; (3) when the affidavit is so -9- lacking in indicia of probable cause that a belief in its existence is objectively unreasonable; and (4) when the warrant is so facially deficient that it cannot reasonably be presumed to be valid. See 468 U.S. at 923. In Herring, the Supreme Court clarified that abuses that give rise to the exclusionary rule are narrow, and most typically involve flagrant police misconduct: An error that arises from nonrecurring and attenuated negligence is thus far removed from the core concerns that led us to adopt the rule in the first place. And in fact since Leon, we have never applied the rule to exclude evidence obtained in violation of the Fourth Amendment, where the police conduct was no more intentional or culpable than this. 129 S. Ct. at 702. Mr. Stevahn appears to raise situation (3) (so lacking in indicia of probable cause) and (4) (facial deficiency) together. We briefly examine these two situations in tandem. Mr. Stevahn’s arguments center around the reliability of the affidavit, and its lack of corroboration, without recognizing the agent’s ability to rely on the issuing judge’s determination. “[W]hen reviewing an officer’s reliance upon a warrant, we must determine whether the underlying documents are “devoid of factual support, not merely whether the facts they contain are legally sufficient. Thus, it is only when an officer’s reliance was wholly unwarranted that good faith is absent.” United States v. McKneely, 6 F.3d 1447, 1454 (10th Cir. 1993) (emphasis in original) (internal quotation marks and citations omitted). “A corollary to the presumption -10- in favor of good faith reliance upon warrants is that police officers should be entitled to rely upon the probable-cause determination of a neutral magistrate when defending an attack on their good faith for either seeking or executing a warrant particularly where, with the benefit of hindsight and thoughtful reflection, reviewing judges still cannot agree on the sufficiency of the affidavit.” Id. (internal quotation marks omitted). We agree with the district court that Agent Huff’s affidavit, while in part boilerplate, was not “bare bones.” Rec. vol. I, doc. 29, at 7; United States v. Wilhelm, 80 F.3d 116, 121 (4th Cir. 1996) (A bare bones affidavit is one that contains “wholly conclusory statements, which lack the facts and the circumstances from which a magistrate can independently determine probable cause.” (quoting United States v. Laury, 985 F.2d 1293, 1311 n.23 (5th Cir. 1993)). A “bare bones” affidavit is usually insufficient because it falls into Leon’s third exception, as not providing “the magistrate with a substantial basis for determining the existence of probable cause.” See Wilhelm, 80 F.3d at 123 (finding “bare bones” affidavit insufficient for this reason). Agent Huff’s affidavit was not so wholly conclusory that a neutral magistrate could not independently determine probable cause. As the district court noted, the affidavit included a detailed accounting of the various investigatory techniques Agent Huff used and “set forth the reasons for his belief that a search of [Mr. Stevahn’s] apartment would yield evidence of child -11- pornography. Additionally, it included additional investigatory steps taken to link the observed IP address to [Mr. Stevahn’s] computer.” Rec. vol. I, doc. 29, at 7. We do not believe that this is a case where Agent Huff acted objectively unreasonably, thus his conduct did not “trigger the exclusionary rule.” Herring, 129 S. Ct. at 702 (requiring “police conduct . . . be sufficiently deliberate that exclusion can meaningfully deter it, and sufficiently culpable that such deterrence is worth the price paid by the justice system” to trigger the exclusionary rule). III. CONCLUSION The problems with the warrant were not so egregious so as to restrict the operation of Leon’s good faith exception. Thus, we therefore AFFIRM the district court’s denial of Mr. Stevahn’s motion to suppress. Entered for the Court, Robert H. Henry Circuit Judge -12-