State v. Lemasters

[Cite as State v. Lemasters, 2013-Ohio-2969.] IN THE COURT OF APPEALS TWELFTH APPELLATE DISTRICT OF OHIO MADISON COUNTY STATE OF OHIO, : Plaintiff-Appellee, : CASE NO. CA2012-12-028 : OPINION - vs - 7/8/2013 : DONALD F. LEMASTERS, : Defendant-Appellant. : CRIMINAL APPEAL FROM MADISON COUNTY COURT OF COMMON PLEAS Case No. CRI20110122 Stephen J. Pronai, Madison County Prosecuting Attorney, Kirsten J. Gross, 59 North Main Street, London, Ohio 43140, for plaintiff-appellee Tyack, Blackmore, Liston & Nigh Co., L.P.A., Jonathan T. Tyack, 536 South High Street, Columbus, Ohio 43215, for defendant-appellant PIPER, J. {¶ 1} Defendant-appellant, Donald Lemasters, appeals a decision of the Madison County Court of Common Pleas, denying his motion to suppress. {¶ 2} Detective Marcus Penwell of the multi-jurisdictional Internet Crimes Against Children Task Force investigates social networking sites where adults solicit children for sexual activity. He also monitors file-sharing programs for distribution of child pornography Madison CA2012-12-028 files. During an investigation, Detective Penwell connected with an internet protocol (IP) address belonging to a computer that contained child pornography files. Through the use of "Shareaza," a file sharing program, Detective Penwell was able to access and download child pornography from the computer, which had an IP address belonging to a Time Warner Cable internet customer. {¶ 3} Detective Penwell obtained an investigative subpoena issued by a court and contacted Time Warner Cable in order to determine the user of the IP address. Detective Penwell discovered that the IP address belonged to Lemasters, and contacted the Madison County Sheriff's Office to involve them in the investigation. Police then obtained and executed a search warrant for Lemasters' home. Police seized over 170,000 images of child pornography from Lemasters' home, including images of infant and toddler rape. The images were found on Lemasters' computer and also on various DVDs that Lemasters made from the child pornography he downloaded from his computer. {¶ 4} Lemasters was charged with 15 counts of pandering sexually-oriented matter involving a minor, nine counts of possession of sexually-oriented material involving a minor, and one count of possession of criminal tools. Lemasters filed a motion to suppress evidence of the images seized from his house. At the hearing, Detective Penwell appeared and testified. The trial court denied Lemasters' motion to suppress, and Lemasters pled no contest to the charges against him. The trial court found Lemasters guilty and sentenced him to an aggregate sentence of eight years. Lemasters now challenges the trial court's decision denying his motion to suppress, raising the following assignment of error. {¶ 5} THE TRIAL COURT ERRED IN OVERRULING APPELLANT'S MOTION TO SUPPRESS ALL EVIDENCE ARISING OUT OF OR RESULTING FROM THE INVESTIGATIVE SUBPOENA SENT TO TIME WARNER CABLE BY DETECTIVE PENWELL FOR THE PURPOSES OF DETERMINING APPELLANT'S IDENTITY. -2- Madison CA2012-12-028 {¶ 6} Lemasters argues in his assignment of error that the trial court erred in denying his motion to suppress. {¶ 7} Appellate review of a ruling on a motion to suppress presents a mixed question of law and fact. State v. Cochran, 12th Dist. No. CA2006-10-023, 2007-Ohio-3353. Acting as the trier of fact, the trial court is in the best position to resolve factual questions and evaluate witness credibility. Id. Therefore, when reviewing a trial court's decision regarding a motion to suppress, a reviewing court is bound to accept the trial court’s findings of fact if they are supported by competent, credible evidence. State v. Oatis, 12th Dist. No. CA2005- 03-074, 2005-Ohio-6038. "An appellate court, however, independently reviews the trial court's legal conclusions based on those facts and determines, without deference to the trial court's decision, whether as a matter of law, the facts satisfy the appropriate legal standard." Cochran at ¶ 12. {¶ 8} The Fourth Amendment to the United States Constitution protects people from illegal searches and seizures. In order to employ Fourth Amendment protections, a defendant must have a "constitutionally protected reasonable expectation of privacy." Katz v. United States, 389 U.S. 347, 360, 88 S.Ct. 507 (1967). The United States Supreme Court has directed reviewing courts to consider a two-part test in order to determine whether the Fourth Amendment is implicated. "First, has the individual manifested a subjective expectation of privacy in the object of the challenged search? Second, is society willing to recognize that expectation as reasonable?" California v. Ciraolo, 476 U.S. 207, 211, 106 S.Ct. 1809 (1986), citing Katz at 360. {¶ 9} As stated by the court in Katz, "what a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection." 389 U.S. at 351. Instead, "a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties." Smith v. Maryland, 442 U.S. 735, 743, 99 S.Ct. 2577 -3- Madison CA2012-12-028 (1979). As this court has specifically held, a subscriber does not have a reasonable expectation of privacy with respect to his subscriber information, including the IP address associated with his internet service. State v. Hamrick, 12th Dist. No. CA2011-01-002, 2011- Ohio-5357, ¶ 19, jurisdiction declined 131 Ohio St.3d 1513, 2011-Ohio-5357. {¶ 10} In Hamrick, the appellant was using a file-sharing program to share child pornography over the internet. In the exact same manner as what occurred in the case at bar, Detective Penwell became aware of an IP address that was linked to child pornography. Detective Penwell moved for an investigative subpoena, which he delivered to Time Warner Cable. Time Warner then identified Hamrick as the subscriber in question. A search warrant was later obtained and executed, and police seized 339 images and 28 videos of child pornography. Hamrick was indicted on several counts of illegal use of a minor in nudity- oriented material and pandering obscenity involving a minor. Hamrick moved to suppress the images seized from his home, arguing that his Fourth Amendment rights were violated where the police did not gain a search warrant before obtaining information from Time Warner. The trial court overruled Hamrick's motion to suppress, and Hamrick appealed to this court. {¶ 11} In our decision, we found that Hamrick's "constitutional rights were not violated when law enforcement obtained his subscriber information from Time Warner because he ha[d] not demonstrated an objectively reasonable expectation of privacy in this information." 2011-Ohio-5357 at ¶ 18. In so holding, we reasoned that "when appellant entered an agreement with Time Warner for internet service, he knowingly revealed the subscriber information associated with his IP address, including his name, address, and telephone number. Appellant cannot now claim to have a Fourth Amendment privacy interest in this information." Id. at ¶ 19. Despite Lemasters' suggestion that we stray from our decision in Hamrick, we decline to do so and find the reasoning set forth in Hamrick also applicable to the case at bar. -4- Madison CA2012-12-028 {¶ 12} Lemasters claims that our reasoning in Hamrick should be adjusted in light of recent case law holding that use of a GPS to track a suspect's movements constitutes a search and implicates the Fourth Amendment. United States v. Jones, __U.S.__, 132 S.Ct. 945 (2012). In Jones, the United States Supreme Court held very specifically that "the Government's installation of a GPS device on a target's vehicle, and its use of that device to monitor the vehicle's movements, constitutes a 'search.'" Id. at 949. In so holding, the court reasoned that by placing a GPS on the suspect's car, "the Government physically occupied private property for the purpose of obtaining information." Id. The court went on to state that "we have no doubt that such a physical intrusion would have been considered a 'search' within the meaning of the Fourth Amendment when it was adopted." Id. {¶ 13} Despite Lemasters' arguments to the contrary, the Jones holding does not stand for the proposition that a person has a reasonable expectation of privacy in information that he freely shares with third parties or to files that are shared openly with others through a file-sharing program. While Lemasters spends a great amount of time in his brief quoting and referencing the concurring opinions in Jones that suggest that the Fourth Amendment should be stretched to include other privacy rights, we are bound only by the majority opinion of the court, rather than questions raised and suggestions made within the dicta of concurring opinions. Therefore, the rule of law from Jones that governs Fourth Amendment jurisprudence is that the placement of a GPS on one's car is trespassory in nature and that such placement requires a warrant. {¶ 14} The trespassory nature of installing a GPS is clearly absent from the current facts of this case. Just as Hamrick freely shared his information with Time Warner, Lemasters did the same thing when he registered his information in order to make use of the Time Warner internet service. Lemasters also opened his files for public sharing and exhibited absolutely no expectation of privacy in them. Lemasters did nothing to make his -5- Madison CA2012-12-028 information private or to protect any expectation of privacy, and Detective Penwell did not perform any trespass in order to obtain from Time Warner the information that Lemasters openly and freely shared regarding his IP address. We decline to extend Jones in the manner advocated by Lemasters. {¶ 15} Since the release of the Supreme Court's decision in Jones, several courts have been asked to decide whether accessing file-sharing programs and IP address information constitutes a search that implicates the Fourth Amendment. In finding that no expectation of privacy exists in such cases, the courts have not analyzed the issue as being controlled by Jones. {¶ 16} For example, the United States District Court for the Eastern District of Missouri declined to extend Jones in the same manner that Lemasters asserts. United States v. Nolan, E.D.Mo. No. 1:11CR 82 CEJ, 2012 WL 1192183 (Mar. 6, 2012). In Nolan, the court stated that the appellant's reliance on Jones was "misdirected." Id. at *10. In so stating, the court reasoned that while Jones states that a search warrant is required before a police officer can "legally attach a GPS device to a suspect's vehicle," accessing one's files and internet information through peer-to-peer sharing is not a search because the files are not "private." Id. The court concluded, "when Mr. Nolan placed the images in his shared folder, he was offering them to the world. * * * Mr. Nolan's privacy was not invaded by [the police] because Mr. Nolan offered them to [the police] and to anyone else on the world wide network." Id. {¶ 17} Similarly, the United States District Court for the Eastern District of New York has also found an appellant's attempt to apply Jones to facts similar to the case at bar "misplaced." United States v. Brooks, E.D.N.Y. No. 12-CR-166 (RRM), 2012 WL 6562947, *5 (Dec.17, 2012). In Brooks, the appellant had multiple images of child pornography on his computer, and used a file-sharing program to access and share the images. The -6- Madison CA2012-12-028 investigating officer downloaded the files from Brooks' computer, and then procured Brooks' identity through the use of his IP address. {¶ 18} The Brooks court disregarded the appellant's reliance on Jones, and stated, In contrast to Jones, there is no evidence here that the undercover agent made any physical intrusion on a constitutionally protected area. The agent did not install any device or software on Brooks' computer to enable monitoring or tracking, did not physically enter Brooks' home, and did not physically access his computer. * * * As such, the undercover agent did not physically intrude on any of Brooks' constitutionally protected areas. Therefore, because this situation involves "merely the transmission of electronic signals without trespass," the Katz reasonable-expectation-of-privacy governs this analysis, which, as discussed above, does not implicate Brooks' Fourth Amendment rights. Id. {¶ 19} Additionally, the Sixth Circuit recently considered whether an appellant had a reasonable expectation of privacy in files he shared using a file-sharing program. United States v. Conner, 6th Cir. No. 12-3210, 2013 WL 1490109 (Apr. 11, 2013). In Conner, the appellant was convicted of multiple counts related to his possession of child pornography. Conner used the file sharing service "LimeWire" to share files containing child pornography with other interested users. Once again, Detective Penwell used the file-sharing program to access child pornography files on Conner's computer, after having moved for an investigatory subpoena from the court and receiving Conner's IP address information from his internet service provider. {¶ 20} Conner argued to the Sixth Circuit that he had a reasonable expectation of privacy in his files, and that Detective Penwell should have secured a warrant before using the file sharing program to access child pornography files on his computer. The Sixth Circuit, in affirming the district court's denial of Conner's motion to suppress, stated that "public exposure of information in this manner defeats an objectively reasonable expectation of privacy under the Fourth Amendment." 2013 WL 1490109 at *4. However, the court never -7- Madison CA2012-12-028 discussed Detective Penwell's use of the file-sharing program or obtaining IP address information as the trespassory invasion or "physical intrusion" contemplated by Jones. {¶ 21} Similarly, the United States District Court for the Western District of Pennsylvania recognized that "internet subscribers who use [internet service providers] to connect to the internet from their homes do not have a reasonable expectation of privacy in their subscriber information or IP addresses because they have conveyed this information to third parties in order to connect to the internet." United States v. Stanley, W.D. Penn. No. 11-272, 2012 WL 5512987 (Nov.14, 2012). Despite Jones, the court did not analyze the police investigation of the appellant's IP address as a trespassory search invoking the appellant's Fourth Amendment rights. {¶ 22} Well-settled legal pronouncements regarding reasonable expectation of privacy as it relates to file-sharing and IP address information have not changed in the wake of Jones, and this court will not diverge from established precedent to hold otherwise. Lemaster's Fourth Amendment rights were not implicated by Detective Penwell's use of the file-sharing system, or in his obtaining Lemasters' information from Time Warner based upon Lemaster's IP address. {¶ 23} Lemasters also argues that Detective Penwell violated the federal Electronic Communications Privacy Act, 18 U.S.C. 2701 et seq. (ECPA), by obtaining information from Time Warner. According to the ECPA, A governmental entity may require a provider of electronic communication service or remote computing service to disclose a record or other information pertaining to a subscriber to or customer of such service (not including the contents of communications) only when the governmental entity— (A) obtains a warrant issued using the procedures described in the Federal Rules of Criminal Procedure (or, in the case of a State court, issued using State warrant procedures) by a court of competent jurisdiction; -8- Madison CA2012-12-028 (B) obtains a court order for such disclosure under subsection (d) of this section; According to 18 U.S.C. 2703(d), A court order for disclosure under subsection (b) or (c) may be issued by any court that is a court of competent jurisdiction and shall issue only if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation. In the case of a State governmental authority, such a court order shall not issue if prohibited by the law of such State. A court issuing an order pursuant to this section, on a motion made promptly by the service provider, may quash or modify such order, if the information or records requested are unusually voluminous in nature or compliance with such order otherwise would cause an undue burden on such provider. {¶ 24} The facts are clear that Detective Penwell did not obtain a warrant before obtaining Lemasters' information from Time Warner. Instead, Detective Penwell was granted an investigative subpoena from a judge, which authorized him to require Time Warner to share the information regarding Lemasters' IP address. However, Lemasters argues that the investigative subpoena is not a court order as contemplated in the ECPA because it did not follow state guidelines for a proper court order as stated in R.C. 2935.23. {¶ 25} According to R.C. 2935.23, After a felony has been committed, and before any arrest has been made, the prosecuting attorney of the county, or any judge or magistrate, may cause subpoenas to issue, returnable before any court or magistrate, for any person to give information concerning such felony. The subpoenas shall require the witness to appear forthwith. Before such witness is required to give any information, he must be informed of the purpose of the inquiry, and that he is required to tell the truth concerning the same. He shall then be sworn and be examined under oath by the prosecuting attorney, or the court or magistrate, subject to the constitutional rights of the witness. Such examination shall be taken in writing in any form, and shall be filed with the court or magistrate taking the testimony. {¶ 26} Detective Penwell testified that he obtained the investigative subpoena by -9- Madison CA2012-12-028 submitting relevant facts to the judge, including that he was investigating suspected child pornography and that he had downloaded child pornography images from the IP address in question. However, no representatives from Time Warner appeared as a witness, and the judge issued the investigative subpoena without taking any testimony regarding the issue. While it may be true that the investigative subpoena was issued without witness testimony, the remedy Lemasters seeks is unavailable to him. {¶ 27} As this court also stated in Hamrick, the ECPA does not provide suppression of evidence as a remedy should information be obtained in a manner not consistent with state law. We recognized in Hamrick that while the ECPA specifically allows for civil damages and criminal punishment for violations of the ECPA, the statute states nothing about the suppression of information in a court proceeding. Instead, congress "clearly intended for suppression not to be an option for a defendant whose electronic communications have been intercepted in violation of the ECPA." 2011-Ohio-5357 at ¶ 17; see also United States v. Ferguson, 508 F.Supp.2d 7, 10 (D.C.2007) (finding that the ECPA "does not provide for a suppression remedy"). {¶ 28} The ECPA specifically states, "the remedies and sanctions described in this chapter are the only judicial remedies and sanctions for nonconstitutional violations of this chapter." 18 U.S.C. 2708. While Lemasters argues that his constitutional rights have been violated so that suppression is a valid remedy under the ECPA, we have already stated that Lemasters' Fourth Amendment rights were neither implicated nor violated because he had no reasonable expectation of privacy in his IP address information or the files he shared. {¶ 29} Having found that Lemasters' did not have a reasonable expectation of privacy, that Detective Penwell's obtaining information from Time Warner was not a search that implicated the Fourth Amendment, and that suppression is not a valid remedy contemplated by the ECPA, the trial court did not err in denying Lemasters' motion to suppress. As such, - 10 - Madison CA2012-12-028 Lemasters' single assignment of error is overruled. {¶ 30} Judgment affirmed. RINGLAND, P.J., and M. POWELL, J., concur. - 11 -