[Cite as State v. Lemasters, 2013-Ohio-2969.]
IN THE COURT OF APPEALS
TWELFTH APPELLATE DISTRICT OF OHIO
MADISON COUNTY
STATE OF OHIO, :
Plaintiff-Appellee, : CASE NO. CA2012-12-028
: OPINION
- vs - 7/8/2013
:
DONALD F. LEMASTERS, :
Defendant-Appellant. :
CRIMINAL APPEAL FROM MADISON COUNTY COURT OF COMMON PLEAS
Case No. CRI20110122
Stephen J. Pronai, Madison County Prosecuting Attorney, Kirsten J. Gross, 59 North Main
Street, London, Ohio 43140, for plaintiff-appellee
Tyack, Blackmore, Liston & Nigh Co., L.P.A., Jonathan T. Tyack, 536 South High Street,
Columbus, Ohio 43215, for defendant-appellant
PIPER, J.
{¶ 1} Defendant-appellant, Donald Lemasters, appeals a decision of the Madison
County Court of Common Pleas, denying his motion to suppress.
{¶ 2} Detective Marcus Penwell of the multi-jurisdictional Internet Crimes Against
Children Task Force investigates social networking sites where adults solicit children for
sexual activity. He also monitors file-sharing programs for distribution of child pornography
Madison CA2012-12-028
files. During an investigation, Detective Penwell connected with an internet protocol (IP)
address belonging to a computer that contained child pornography files. Through the use of
"Shareaza," a file sharing program, Detective Penwell was able to access and download child
pornography from the computer, which had an IP address belonging to a Time Warner Cable
internet customer.
{¶ 3} Detective Penwell obtained an investigative subpoena issued by a court and
contacted Time Warner Cable in order to determine the user of the IP address. Detective
Penwell discovered that the IP address belonged to Lemasters, and contacted the Madison
County Sheriff's Office to involve them in the investigation. Police then obtained and
executed a search warrant for Lemasters' home. Police seized over 170,000 images of child
pornography from Lemasters' home, including images of infant and toddler rape. The
images were found on Lemasters' computer and also on various DVDs that Lemasters made
from the child pornography he downloaded from his computer.
{¶ 4} Lemasters was charged with 15 counts of pandering sexually-oriented matter
involving a minor, nine counts of possession of sexually-oriented material involving a minor,
and one count of possession of criminal tools. Lemasters filed a motion to suppress
evidence of the images seized from his house. At the hearing, Detective Penwell appeared
and testified. The trial court denied Lemasters' motion to suppress, and Lemasters pled no
contest to the charges against him. The trial court found Lemasters guilty and sentenced him
to an aggregate sentence of eight years. Lemasters now challenges the trial court's decision
denying his motion to suppress, raising the following assignment of error.
{¶ 5} THE TRIAL COURT ERRED IN OVERRULING APPELLANT'S MOTION TO
SUPPRESS ALL EVIDENCE ARISING OUT OF OR RESULTING FROM THE
INVESTIGATIVE SUBPOENA SENT TO TIME WARNER CABLE BY DETECTIVE
PENWELL FOR THE PURPOSES OF DETERMINING APPELLANT'S IDENTITY.
-2-
Madison CA2012-12-028
{¶ 6} Lemasters argues in his assignment of error that the trial court erred in denying
his motion to suppress.
{¶ 7} Appellate review of a ruling on a motion to suppress presents a mixed question
of law and fact. State v. Cochran, 12th Dist. No. CA2006-10-023, 2007-Ohio-3353. Acting
as the trier of fact, the trial court is in the best position to resolve factual questions and
evaluate witness credibility. Id. Therefore, when reviewing a trial court's decision regarding a
motion to suppress, a reviewing court is bound to accept the trial court’s findings of fact if
they are supported by competent, credible evidence. State v. Oatis, 12th Dist. No. CA2005-
03-074, 2005-Ohio-6038. "An appellate court, however, independently reviews the trial
court's legal conclusions based on those facts and determines, without deference to the trial
court's decision, whether as a matter of law, the facts satisfy the appropriate legal standard."
Cochran at ¶ 12.
{¶ 8} The Fourth Amendment to the United States Constitution protects people from
illegal searches and seizures. In order to employ Fourth Amendment protections, a
defendant must have a "constitutionally protected reasonable expectation of privacy." Katz v.
United States, 389 U.S. 347, 360, 88 S.Ct. 507 (1967). The United States Supreme Court
has directed reviewing courts to consider a two-part test in order to determine whether the
Fourth Amendment is implicated. "First, has the individual manifested a subjective
expectation of privacy in the object of the challenged search? Second, is society willing to
recognize that expectation as reasonable?" California v. Ciraolo, 476 U.S. 207, 211, 106
S.Ct. 1809 (1986), citing Katz at 360.
{¶ 9} As stated by the court in Katz, "what a person knowingly exposes to the public,
even in his own home or office, is not a subject of Fourth Amendment protection." 389 U.S.
at 351. Instead, "a person has no legitimate expectation of privacy in information he
voluntarily turns over to third parties." Smith v. Maryland, 442 U.S. 735, 743, 99 S.Ct. 2577
-3-
Madison CA2012-12-028
(1979). As this court has specifically held, a subscriber does not have a reasonable
expectation of privacy with respect to his subscriber information, including the IP address
associated with his internet service. State v. Hamrick, 12th Dist. No. CA2011-01-002, 2011-
Ohio-5357, ¶ 19, jurisdiction declined 131 Ohio St.3d 1513, 2011-Ohio-5357.
{¶ 10} In Hamrick, the appellant was using a file-sharing program to share child
pornography over the internet. In the exact same manner as what occurred in the case at
bar, Detective Penwell became aware of an IP address that was linked to child pornography.
Detective Penwell moved for an investigative subpoena, which he delivered to Time Warner
Cable. Time Warner then identified Hamrick as the subscriber in question. A search warrant
was later obtained and executed, and police seized 339 images and 28 videos of child
pornography. Hamrick was indicted on several counts of illegal use of a minor in nudity-
oriented material and pandering obscenity involving a minor. Hamrick moved to suppress the
images seized from his home, arguing that his Fourth Amendment rights were violated where
the police did not gain a search warrant before obtaining information from Time Warner. The
trial court overruled Hamrick's motion to suppress, and Hamrick appealed to this court.
{¶ 11} In our decision, we found that Hamrick's "constitutional rights were not violated
when law enforcement obtained his subscriber information from Time Warner because he
ha[d] not demonstrated an objectively reasonable expectation of privacy in this information."
2011-Ohio-5357 at ¶ 18. In so holding, we reasoned that "when appellant entered an
agreement with Time Warner for internet service, he knowingly revealed the subscriber
information associated with his IP address, including his name, address, and telephone
number. Appellant cannot now claim to have a Fourth Amendment privacy interest in this
information." Id. at ¶ 19. Despite Lemasters' suggestion that we stray from our decision in
Hamrick, we decline to do so and find the reasoning set forth in Hamrick also applicable to
the case at bar.
-4-
Madison CA2012-12-028
{¶ 12} Lemasters claims that our reasoning in Hamrick should be adjusted in light of
recent case law holding that use of a GPS to track a suspect's movements constitutes a
search and implicates the Fourth Amendment. United States v. Jones, __U.S.__, 132 S.Ct.
945 (2012). In Jones, the United States Supreme Court held very specifically that "the
Government's installation of a GPS device on a target's vehicle, and its use of that device to
monitor the vehicle's movements, constitutes a 'search.'" Id. at 949. In so holding, the court
reasoned that by placing a GPS on the suspect's car, "the Government physically occupied
private property for the purpose of obtaining information." Id. The court went on to state that
"we have no doubt that such a physical intrusion would have been considered a 'search'
within the meaning of the Fourth Amendment when it was adopted." Id.
{¶ 13} Despite Lemasters' arguments to the contrary, the Jones holding does not
stand for the proposition that a person has a reasonable expectation of privacy in information
that he freely shares with third parties or to files that are shared openly with others through a
file-sharing program. While Lemasters spends a great amount of time in his brief quoting
and referencing the concurring opinions in Jones that suggest that the Fourth Amendment
should be stretched to include other privacy rights, we are bound only by the majority opinion
of the court, rather than questions raised and suggestions made within the dicta of concurring
opinions. Therefore, the rule of law from Jones that governs Fourth Amendment
jurisprudence is that the placement of a GPS on one's car is trespassory in nature and that
such placement requires a warrant.
{¶ 14} The trespassory nature of installing a GPS is clearly absent from the current
facts of this case. Just as Hamrick freely shared his information with Time Warner,
Lemasters did the same thing when he registered his information in order to make use of the
Time Warner internet service. Lemasters also opened his files for public sharing and
exhibited absolutely no expectation of privacy in them. Lemasters did nothing to make his
-5-
Madison CA2012-12-028
information private or to protect any expectation of privacy, and Detective Penwell did not
perform any trespass in order to obtain from Time Warner the information that Lemasters
openly and freely shared regarding his IP address. We decline to extend Jones in the
manner advocated by Lemasters.
{¶ 15} Since the release of the Supreme Court's decision in Jones, several courts
have been asked to decide whether accessing file-sharing programs and IP address
information constitutes a search that implicates the Fourth Amendment. In finding that no
expectation of privacy exists in such cases, the courts have not analyzed the issue as being
controlled by Jones.
{¶ 16} For example, the United States District Court for the Eastern District of Missouri
declined to extend Jones in the same manner that Lemasters asserts. United States v.
Nolan, E.D.Mo. No. 1:11CR 82 CEJ, 2012 WL 1192183 (Mar. 6, 2012). In Nolan, the court
stated that the appellant's reliance on Jones was "misdirected." Id. at *10. In so stating, the
court reasoned that while Jones states that a search warrant is required before a police
officer can "legally attach a GPS device to a suspect's vehicle," accessing one's files and
internet information through peer-to-peer sharing is not a search because the files are not
"private." Id. The court concluded, "when Mr. Nolan placed the images in his shared folder,
he was offering them to the world. * * * Mr. Nolan's privacy was not invaded by [the police]
because Mr. Nolan offered them to [the police] and to anyone else on the world wide
network." Id.
{¶ 17} Similarly, the United States District Court for the Eastern District of New York
has also found an appellant's attempt to apply Jones to facts similar to the case at bar
"misplaced." United States v. Brooks, E.D.N.Y. No. 12-CR-166 (RRM), 2012 WL 6562947,
*5 (Dec.17, 2012). In Brooks, the appellant had multiple images of child pornography on his
computer, and used a file-sharing program to access and share the images. The
-6-
Madison CA2012-12-028
investigating officer downloaded the files from Brooks' computer, and then procured Brooks'
identity through the use of his IP address.
{¶ 18} The Brooks court disregarded the appellant's reliance on Jones, and stated,
In contrast to Jones, there is no evidence here that the
undercover agent made any physical intrusion on a
constitutionally protected area. The agent did not install any
device or software on Brooks' computer to enable monitoring or
tracking, did not physically enter Brooks' home, and did not
physically access his computer. * * * As such, the undercover
agent did not physically intrude on any of Brooks' constitutionally
protected areas. Therefore, because this situation involves
"merely the transmission of electronic signals without trespass,"
the Katz reasonable-expectation-of-privacy governs this analysis,
which, as discussed above, does not implicate Brooks' Fourth
Amendment rights.
Id.
{¶ 19} Additionally, the Sixth Circuit recently considered whether an appellant had a
reasonable expectation of privacy in files he shared using a file-sharing program. United
States v. Conner, 6th Cir. No. 12-3210, 2013 WL 1490109 (Apr. 11, 2013). In Conner, the
appellant was convicted of multiple counts related to his possession of child pornography.
Conner used the file sharing service "LimeWire" to share files containing child pornography
with other interested users. Once again, Detective Penwell used the file-sharing program to
access child pornography files on Conner's computer, after having moved for an investigatory
subpoena from the court and receiving Conner's IP address information from his internet
service provider.
{¶ 20} Conner argued to the Sixth Circuit that he had a reasonable expectation of
privacy in his files, and that Detective Penwell should have secured a warrant before using
the file sharing program to access child pornography files on his computer. The Sixth Circuit,
in affirming the district court's denial of Conner's motion to suppress, stated that "public
exposure of information in this manner defeats an objectively reasonable expectation of
privacy under the Fourth Amendment." 2013 WL 1490109 at *4. However, the court never
-7-
Madison CA2012-12-028
discussed Detective Penwell's use of the file-sharing program or obtaining IP address
information as the trespassory invasion or "physical intrusion" contemplated by Jones.
{¶ 21} Similarly, the United States District Court for the Western District of
Pennsylvania recognized that "internet subscribers who use [internet service providers] to
connect to the internet from their homes do not have a reasonable expectation of privacy in
their subscriber information or IP addresses because they have conveyed this information to
third parties in order to connect to the internet." United States v. Stanley, W.D. Penn. No.
11-272, 2012 WL 5512987 (Nov.14, 2012). Despite Jones, the court did not analyze the
police investigation of the appellant's IP address as a trespassory search invoking the
appellant's Fourth Amendment rights.
{¶ 22} Well-settled legal pronouncements regarding reasonable expectation of privacy
as it relates to file-sharing and IP address information have not changed in the wake of
Jones, and this court will not diverge from established precedent to hold otherwise.
Lemaster's Fourth Amendment rights were not implicated by Detective Penwell's use of the
file-sharing system, or in his obtaining Lemasters' information from Time Warner based upon
Lemaster's IP address.
{¶ 23} Lemasters also argues that Detective Penwell violated the federal Electronic
Communications Privacy Act, 18 U.S.C. 2701 et seq. (ECPA), by obtaining information from
Time Warner. According to the ECPA,
A governmental entity may require a provider of electronic
communication service or remote computing service to disclose a
record or other information pertaining to a subscriber to or
customer of such service (not including the contents of
communications) only when the governmental entity—
(A) obtains a warrant issued using the procedures described in
the Federal Rules of Criminal Procedure (or, in the case of a
State court, issued using State warrant procedures) by a court of
competent jurisdiction;
-8-
Madison CA2012-12-028
(B) obtains a court order for such disclosure under subsection (d)
of this section;
According to 18 U.S.C. 2703(d),
A court order for disclosure under subsection (b) or (c) may be
issued by any court that is a court of competent jurisdiction and
shall issue only if the governmental entity offers specific and
articulable facts showing that there are reasonable grounds to
believe that the contents of a wire or electronic communication,
or the records or other information sought, are relevant and
material to an ongoing criminal investigation. In the case of a
State governmental authority, such a court order shall not issue if
prohibited by the law of such State. A court issuing an order
pursuant to this section, on a motion made promptly by the
service provider, may quash or modify such order, if the
information or records requested are unusually voluminous in
nature or compliance with such order otherwise would cause an
undue burden on such provider.
{¶ 24} The facts are clear that Detective Penwell did not obtain a warrant before
obtaining Lemasters' information from Time Warner. Instead, Detective Penwell was granted
an investigative subpoena from a judge, which authorized him to require Time Warner to
share the information regarding Lemasters' IP address. However, Lemasters argues that the
investigative subpoena is not a court order as contemplated in the ECPA because it did not
follow state guidelines for a proper court order as stated in R.C. 2935.23.
{¶ 25} According to R.C. 2935.23,
After a felony has been committed, and before any arrest has
been made, the prosecuting attorney of the county, or any judge
or magistrate, may cause subpoenas to issue, returnable before
any court or magistrate, for any person to give information
concerning such felony. The subpoenas shall require the witness
to appear forthwith. Before such witness is required to give any
information, he must be informed of the purpose of the inquiry,
and that he is required to tell the truth concerning the same. He
shall then be sworn and be examined under oath by the
prosecuting attorney, or the court or magistrate, subject to the
constitutional rights of the witness. Such examination shall be
taken in writing in any form, and shall be filed with the court or
magistrate taking the testimony.
{¶ 26} Detective Penwell testified that he obtained the investigative subpoena by
-9-
Madison CA2012-12-028
submitting relevant facts to the judge, including that he was investigating suspected child
pornography and that he had downloaded child pornography images from the IP address in
question. However, no representatives from Time Warner appeared as a witness, and the
judge issued the investigative subpoena without taking any testimony regarding the issue.
While it may be true that the investigative subpoena was issued without witness testimony,
the remedy Lemasters seeks is unavailable to him.
{¶ 27} As this court also stated in Hamrick, the ECPA does not provide suppression of
evidence as a remedy should information be obtained in a manner not consistent with state
law. We recognized in Hamrick that while the ECPA specifically allows for civil damages and
criminal punishment for violations of the ECPA, the statute states nothing about the
suppression of information in a court proceeding. Instead, congress "clearly intended for
suppression not to be an option for a defendant whose electronic communications have been
intercepted in violation of the ECPA." 2011-Ohio-5357 at ¶ 17; see also United States v.
Ferguson, 508 F.Supp.2d 7, 10 (D.C.2007) (finding that the ECPA "does not provide for a
suppression remedy").
{¶ 28} The ECPA specifically states, "the remedies and sanctions described in this
chapter are the only judicial remedies and sanctions for nonconstitutional violations of this
chapter." 18 U.S.C. 2708. While Lemasters argues that his constitutional rights have been
violated so that suppression is a valid remedy under the ECPA, we have already stated that
Lemasters' Fourth Amendment rights were neither implicated nor violated because he had no
reasonable expectation of privacy in his IP address information or the files he shared.
{¶ 29} Having found that Lemasters' did not have a reasonable expectation of privacy,
that Detective Penwell's obtaining information from Time Warner was not a search that
implicated the Fourth Amendment, and that suppression is not a valid remedy contemplated
by the ECPA, the trial court did not err in denying Lemasters' motion to suppress. As such,
- 10 -
Madison CA2012-12-028
Lemasters' single assignment of error is overruled.
{¶ 30} Judgment affirmed.
RINGLAND, P.J., and M. POWELL, J., concur.
- 11 -