United States v. Henderson

FILED United States Court of Appeals Tenth Circuit February 17, 2010 PUBLISH Elisabeth A. Shumaker Clerk of Court UNITED STATES COURT OF APPEALS TENTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellee, v. No. 09-8015 HAROLD G. HENDERSON, Defendant-Appellant. Appeal from the United States District Court for the District of Wyoming (D.C. No. 2:06-CR-174-WFD-1) John H. Robinson, Jamieson & Robinson, LLC, Casper, Wyoming for the Defendant– Appellant. Stephanie I. Sprecher, Assistant United States Attorney (Kelly H. Rankin, United States Attorney, with her on the briefs), Casper, Wyoming for the Plaintiff–Appellee. Before TACHA, SEYMOUR, and LUCERO, Circuit Judges. LUCERO, Circuit Judge. While executing a warrant to search Harold Henderson’s home, law enforcement officers discovered child pornography on Henderson’s computer. Henderson filed a motion to suppress this evidence, arguing that it was obtained in violation of his Fourth Amendment rights and, therefore, that the exclusionary rule should preclude its introduction. On denial of his motion, Henderson conditionally pled guilty to receipt of child pornography, preserving his right of review. Exercising jurisdiction under 28 U.S.C. § 1291, we affirm the denial of Henderson’s motion to suppress. I In June 2005, Special Agent Robert Leazenby of the Wyoming Division of Criminal Investigation conducted a state-wide digital child pornography probe. He received information that a computer with a particular internet protocol (“IP”) address downloaded and shared two videos.1 Each video had a secure hash algorithm (“SHA”) value associated with child pornography.2 Leazenby confirmed that videos with the 1 As this court has previously explained: [A]n IP address . . . is a unique number identifying the location of an end- user’s computer. When an end-user logs onto a[n] . . . internet service provider, they are assigned a unique IP number that will be used for that entire . . . session. Only one computer can use a particular IP address at any specific date and time. United States v. Hamilton, 413 F.3d 1138, 1141 n.2 (10th Cir. 2005). 2 An SHA value serves as a digital fingerprint: Continued . . . -2- relevant SHA values depicted children engaging in sexual activity. He also received information from Bresnan Communications, an internet service provider, that the relevant IP address had been assigned to a computer located at 3824 Gregg Way, Apartment C, in Cheyenne, Wyoming. Based in part on this information, Leazenby applied for and received a warrant to search the Gregg Way apartment. Leazenby’s supporting affidavit provides his professional background; describes the general protocol investigating officers use to identify distributors of child pornography, including how officers usually determine that a computer at a given IP address has transferred a video with a particular SHA value; and states that Leazenby “learned” that a computer with the relevant IP address had shared videos with child-pornography-related SHA values.3 His affidavit, however, does not Computer files offered on peer-to-peer software can be analyzed and identified by a mathematical algorithm known as [SHA]. A SHA value of a computer file is, so far as science can ascertain presently, unique. No two computer files with different content have ever had the same SHA value. From investigations of child pornography that have been conducted in the past, law enforcement maintains a database of the SHA values of computer files that have been discovered to contain known images of child pornography. United States v. Klynsma, No. CR 08-50145-RHB, __ F.3d __, 2009 WL 3147790, at *6 (D. S.D. Sept. 29, 2009). 3 The affidavit provides: On June 13, 2005 your Affiant was assigned to investigate a computer in Cheyenne, Wyoming that was sharing movies of child pornography. Affiant learned that on May 25, 2005, a computer with an IP address of Continued . . . -3- identify: (1) who informed Leazenby that a computer with the relevant IP address had transferred child pornography; or (2) the method used in this case to establish that a computer at the specified IP address transferred videos with child-pornography- associated SHA values. Upon executing the search warrant, law enforcement discovered that three individuals, including Henderson, lived in the Gregg Way apartment. The apartment also contained three computers. Agents conducted a forensic review of the three computers and found child pornography on Henderson’s computer. Coincidentally, Henderson’s computer was actually in the process of downloading child pornography while the agents conducted the search. This led to the seizure of Henderson’s hard drive and related computer items. Henderson was indicted for receipt and possession of child pornography in violation of 18 U.S.C. § 2252A(a)(2)(A), (a)(5)(B), (b)(1), and (b)(2). He initially pled guilty, but his resulting conviction and sentence were vacated because he had been erroneously advised regarding the mandatory minimum sentence for his crimes. 69.146.128.218 offered to contribute to the distribution of a movie file with the SHA value of ZZLGX2MOZQ7CX2353J5RYVKFJ7BPBPQE. ... Your Affiant learned that on June 1, 2005, a computer with the same IP address of 69.146.128.218 offered to contribute to the distribution of a movie file with the SHA value QQ4CQNK5HG2IAAYHW3MRWZ2GFI5J4JRF. -4- After his case was set for a new trial, Henderson filed a motion to suppress evidence resulting from the search of his apartment. He argued that the warrant was not supported by probable cause and that police could not have reasonably relied on the warrant in good faith. In assessing probable cause, the district court noted that “the reliability of matching the SHA[] values and IP numbers cannot be disputed with any merit. The science behind ‘fingerprinting’ these computers . . . appears rock solid . . . .” Nevertheless, the court determined “the reliability of the information [is], in this case, insufficient to establish probable cause” because Leazenby’s affidavit did not indicate the source of the listed IP address and SHA values. Despite this lack of probable cause, the court found that a reasonable officer could have relied upon the warrant in good faith; hence the evidence was admissible. After this ruling, Henderson entered a conditional guilty plea to the receipt charge, and the possession charge was dismissed. The court sentenced Henderson to sixty-three months’ imprisonment, followed by a life term of supervised release. Henderson timely appealed. II Under the exclusionary rule, the government may not introduce into evidence “tangible materials seized during an unlawful search [or] . . . testimony concerning knowledge acquired during an unlawful search.” Murray v. United States, 487 U.S. 533, 536 (1988) (citations omitted). However, exclusion is far from assured if law enforcement has obtained a warrant, but the warrant is later determined to be unsupported -5- by probable cause. If law enforcement could have acted in objective good faith in executing a warrant—that is, if an officer could have acted in objectively reasonable reliance on a magistrate’s determination of probable cause—the exclusionary rule does not apply. United States v. Leon, 468 U.S. 897, 921-23 (1984). The government wisely conceded at oral argument that Leazenby’s affidavit is insufficient to establish probable cause. Notably, the affidavit fails to identify how Leazenby’s source determined that a computer with the relevant IP address—rather than some other computer—shared videos with child-pornography-related SHA values.4 Accordingly, the sole issue before us is whether the district court properly determined that evidence resulting from this unlawful search was nonetheless admissible due to the good faith exception. We review this question de novo. United States v. Vanness, 342 F.3d 1093, 1097 (10th Cir. 2003). A In Leon, the Supreme Court applied the good faith exception to a case in which “the affidavit included no facts indicating the basis for the informants’ statements concerning [the defendant’s] criminal activities and was devoid of information establishing the informants’ reliability.” 468 U.S. at 905. We are faced with a similar situation. This affidavit fails to disclose the source of Leazenby’s information and does 4 Although the district court determined that “[t]he science behind ‘fingerprinting’ . . . these computers appears rock solid,” it apparently overlooked the fact that the affidavit does not state that Leazenby’s source in fact engaged in the scientific, rock-solid method generally used by law enforcement. -6- not contain any information establishing the source’s reliability. Further, the affidavit does not establish the method Leazenby’s source used to match the illegal videos with the relevant IP address; consequently, it does not adequately indicate the basis for the source’s statements that a computer at that IP address transferred child pornography. Although these errors make the search illegal, Leon counsels that they do not necessarily require application of the exclusionary rule. We presume an officer’s acts to be in objective good faith when supported by a warrant. United States v. Cardall, 773 F.2d 1128, 1133 (10th Cir. 1985). This presumption, however, is not absolute; it can be overcome by demonstrating that a warrant was “based on an affidavit so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable.” Leon, 468 U.S. at 923 (quotation omitted). Reliance is “entirely unreasonable” only if the affidavit submitted in support of the warrant is “devoid of factual support.” Cardall, 773 F.3d at 1133. An affidavit has enough factual support to justify reliance if it “establishe[s] a minimally sufficient nexus between the illegal activity and the place to be searched.” United States v. Gonzales, 399 F.3d 1225, 1230-31 (10th Cir. 2005) (quotation omitted). Leazenby’s affidavit is not devoid of factual support. It states that Leazenby’s source determined that a particular computer downloaded two videos with SHA values associated with child pornography. That computer had an IP address mapping to the Gregg Way apartment. Combined, these facts provide a minimal nexus between a -7- computer in the Gregg Way apartment and the receipt and possession of child pornography. B Even if an affidavit is not devoid of factual support, an officer cannot hide behind the good faith exception if she “knows or should have known that a search warrant was invalid.” United States v. McKneely, 6 F.3d 1447, 1455 (10th Cir. 1993). Law enforcement officials are presumed to have a reasonable knowledge of the law. Leon, 468 U.S. at 919 n.20. As a result, prior court decisions resting on functionally identical facts can put law enforcement on notice that an affidavit is insufficient to establish probable cause. Leazenby’s affidavit was based on a standardized form affidavit, which was used by law enforcement officials throughout Wyoming at the time of the investigation. Both the U.S. District Court for the District of Wyoming and this court have held that an affidavit based on the same standardized form did not establish probable cause. United States v. Stevahn, 313 Fed. App’x 138, 140-42 (10th Cir. 2009) (unpublished) (affirming district court’s finding of no probable cause). But cf. United States v. Harrison, 566 F.3d 1254, 1256-57 (10th Cir. 2009) (declining to determine whether the form affidavit was sufficient to establish probable cause because the good faith exception applied). Henderson, however, has not pointed us to any similar decision issued before his apartment was searched. Accordingly, he has failed to prove that law enforcement was -8- on notice that the form affidavit used by Leazenby was insufficient to establish probable cause. III Given that Henderson has not overcome the presumption that law enforcement officers acted in objective good faith when executing a warrant to search his home, we AFFIRM the district court’s denial of his motion to suppress. ENTERED FOR THE COURT Carlos F. Lucero Circuit Judge -9-