United States v. Robert Beatty

NOT PRECEDENTIAL UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT _____________ No. 10-3634 _____________ UNITED STATES OF AMERICA v. ROBERT EUGENE BEATTY, Appellant _____________ On Appeal from the United States District Court For the Western District of Pennsylvania (Crim. No. 1-08-cr-00051-001) District Judge: Honorable Sean J. McLaughlin _____________ Submitted under Third Circuit L.A.R. 34.1(a) July 14, 2011 BEFORE: SLOVITER, FUENTES, and FISHER, Circuit Judges (Opinion Filed: July 14, 2011) _____________ OPINION OF THE COURT _____________ FUENTES, Circuit Judge. Robert Beatty appeals the District Court‟s decision to deny his motion to suppress evidence of contraband retrieved from a search of his home computer, as well as subsequent statements made to law enforcement officials. For the reasons set forth below, we will affirm. I. We write primarily for the parties and therefore discuss only the facts necessary to explain our decision. Pennsylvania State Trooper Robert Pearson had been conducting an online investigation of child pornography using a peer-to-peer (“P2P”) network. See e.g., United States v. Stults, 575 F.3d 834, 837 (8th Cir. 2009) (explaining the purpose of a P2P network). Using search terms that typically yield child pornography, Pearson was able to locate eleven files with graphic titles implicating sex acts with a child. With the help of a Wyoming Internet Crimes Against Children (“Wyoming ICIC”) Task Force database, Pearson was able to cross reference and match each file‟s Secured Hash Algorithm (“SHA1”) to known child pornography files. See e.g., United States v. Miknevich, 638 F.3d 178, 181 n.1 (3d Cir. 2010) (noting the significance of the SHA1 is that it can act like a fingerprint for a message or data file). It was later determined that these files belonged to appellant Robert Beatty. Based on this information, Federal Bureau of Investigations (“FBI”) special agent Tom Brenneis applied for a warrant to search Beatty‟s home. The supporting affidavit included the process by which the files were retrieved and the exact name of each file. The affidavit did not state that Pearson or Brenneis opened and viewed any of the files. Following the issuance and execution of a search warrant, the police seized Beatty‟s 2 computer, which contained hundreds of child pornographic movies and arrested him. Shortly after, Beatty made various inculpatory statements to the police. Beatty was charged with one count of receiving/distributing visual depictions of minors engaged in sexually explicit conduct, in violation of 18 U.S.C. §§ 2252(a)(2) and 2252 (b)(1). Beatty was also charged with one count of possessing visual depictions of minors engaged in explicit sexual conduct which had been shipped in interstate and foreign commerce, in violation of 18 U.S.C. §§ 2252 (a)(4)(B) and 2252(b)(2). He moved to suppress evidence recovered from the search of his home and computer, as well as statements he made to the FBI. Specifically, he challenged the adequacy of the probable cause on which the search warrant was issued. The District Court held that the “highly graphic titles of the files … and [] Pearson‟s confirmation that these same files were among those identified by the Wyoming ICAC Task Force as „known child pornography‟” was enough to establish probable cause that evidence of a crime would be found on Beatty‟s computer. United States v. Beatty, No. 1:08-cr-51-SJM, 2009 WL 5220643, at *4 (W.D. Penn. Dec. 31, 2009). Beatty filed a timely appeal. The District Court had jurisdiction pursuant to 18 U.S.C. § 3121 and we have jurisdiction over the District Court‟s final order pursuant to 28 U.S.C. § 1291. Our review of the District Court‟s decision denying Beatty‟s motion to suppress for lack of probable cause is plenary. United States v. Loy, 191 F.3d 360, 365 (3d Cir. 1999). However, we must not conduct a de novo review of the magistrate judge‟s finding 3 of probable cause. See United States v. Whitner, 219 F.3d 289, 296 (3d Cir. 2000). It is our job to determine that the magistrate had a “substantial basis” to conclude that the affidavit supporting the warrant established probable cause. United States v. Jones, 994 F.2d 1051, 1054 (3d Cir. 1993). During this process, we must only assess the facts presented to the magistrate judge, in this case, what was before her within the “four corners” of the supporting affidavit. Id. at 1055. In doing so, we must pay great deference to the magistrate judge‟s finding of probable cause. Illinois v. Gates, 462 U.S. 213, 236 (1983). But, this “does not mean that reviewing courts should simply rubber stamp a magistrate [judge]‟s conclusion.” United States v. Tehfe, 722 F.2d 1114, 1117 (3d Cir. 1983). II. A. The Fourth Amendment protects the right to be free from “unreasonable searches and seizures.” U.S. Const. amend. IV. If a warrant is issued , it must be based “upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” Id. A magistrate judge may find probable cause when, after considering the totality of the circumstances, “there is a fair probability that contraband or evidence of a crime will be found in a particular place.” Gates, 462 U.S. at 238. As opposed to a “neat set of legal rules,” probable cause is a “fluid concept-turning on the assessment of probabilities in particular factual contexts.” 4 Id. at 232. As such, the warrant‟s supporting affidavit must be read in a common sense and nontechnical matter. Id. at 230-31. B. Beatty argues that the warrant‟s supporting affidavit was facially deficient. Among other reasons, he argues that 1) an overly broad and unconstitutional definition of “child pornography” tainted the reliability of the description of the files and 2) no one involved in the issuance of the warrant viewed the files, which, combined with the lack of a reasonably specific description of the contents of the files, did not allow the magistrate judge to make an independent assessment of probable cause. App. Br. 19. We start by addressing the issue of taint. The Government contends that this Court “embrace[s] redaction as a practice and principle of law.” United States v. Christine, 687 F.2d 749, 755 (3d Cir. 1982). When an affidavit has been tainted unconstitutionally, our precedent allows us to redact that taint from the warrant, “striking from [it] those severable phrases and clauses that are invalid for lack of probable cause or generality and preserving those severable phrases and clauses that satisfy the Fourth Amendment.” Id. at 754. Beatty alleges that the supporting affidavit made use of 18 U.S.C. §§ 2256(8)(b) & (d) and its erroneous and unconstitutional definition of “child pornography,” which tainted the magistrate judge‟s ability to determine probable cause. See Ashcroft v. Free Speech Coalition, 535 U.S. 234 (2002) (striking down these sections of the statute as overbroad and unconstitutional). This argument falls short because even when 18 U.S.C. §§ 2256(8)(b) & (d) are redacted from the affidavit, there is still enough information 5 available to a magistrate judge to allow for an independent assessment of probable cause. See Beatty, 2009 WL 5220643, at *8-10 (discussing the history of two statutory definitions in question and why they were deemed unconstitutional). We disagree with Beatty‟s remaining argument because the magistrate judge does not have to view the images herself. Beatty cites to decisions in other circuits to bolster this contention. See United States v. Battershell, 457 F.3d 1048, 1051-53 (9th Cir. 2006); United States v. Syphers, 426 F.3d 461, 467 (1st Cir. 2005); United States v. Chrobak, 289 F.3d 1043, 1045 (10th Cir. 2002). However, in United States v. Miknevich, a case recently decided by this court, we expressly rejected the notion that a magistrate judge must review the contents of the actual files in question. 638 F.3d at 183. In Miknevich, we reasoned that without viewing the actual images, the “magistrate [judge] could have drawn a reasonable inference of the file‟s contents based on its highly descriptive name and SHA1 value.” Id. at 184. The District Court came to the same conclusion in this case, and we agree that the titles and SHA1 values of the files established probable cause. Just as we found in Miknevich, the graphic titles of the files found on Beatty‟s computer “contained highly graphic references to specific sexual acts involving children.”1 Id. Additionally, the SHA1 values belonging to the files on Beatty‟s computer bore the same SHA1 values as known child pornography in the Wyoming ICIC 1 The files include names such as “r@ygold- pedo - 13yo brother fucks 11yo sister and sperm inside 61 943 812.mpg,” “(Pthc) 14yo Isabel – (Rape and Fuck) (R@ygold.mpg (sic),” and “(Hussyfan) (phtc) (r@ygold) (babyshivid) Jessica 11yo get fuckt (sic) good.mpg.” J.A. 103 6 Task Force database. Together, these factors allowed a strong inference to be made by the magistrate judge which establishes probable cause. Therefore, the District Court correctly concluded that “the Magistrate Judge was entitled to infer from the highly descriptive and graphic file names and the other information presented in the affidavit [the SHA1 values] that there was a fair probability that [Beatty‟s] computer would contain material prohibited under either 18 U.S.C. §§2252 or 2252A.” Beatty, 2009 WL 5220643, at *11.2 The motion to suppress was properly denied. III. For the foregoing reasons, we will affirm the District Court‟s decision to deny the motion to suppress both the files found on Beatty‟s computer and his subsequent statements. 2 We will not reach the issue of good faith reliance on a warrant as we have already decided that the affidavit supporting the warrant was sufficient to establish probable cause. 7