State v. Roberts

This opinion is subject to revision before final publication in the Pacific Reporter 2015 UT 24 IN THE S UPREME C OURT OF THE S TATE OF U TAH STATE OF UTAH , Appellee, v. DANIEL ROBERTS, Appellant. No. 20120884 Filed January 30, 2015 Seventh District, Castle Dale The Honorable Douglas B. Thomas No. 101700043 Attorneys: Sean D. Reyes, Att’y Gen., Marian Decker, Asst. Att’y Gen., Salt Lake City, for appellee Sean P. Hullinger, Lehi, for appellant JUSTICE PARRISH authored the opinion of the Court, in which CHIEF JUSTICE DURRANT, ASSOCIATE CHIEF JUSTICE NEHRING , JUSTICE DURHAM , and JUSTICE LEE joined. JUSTICE PARRISH , opinion of the Court: INTRODUCTION ¶1 Daniel Roberts entered a conditional guilty plea to five charges of sexual exploitation of a minor arising from child pornography on his laptop computer. On appeal, Mr. Roberts challenges four of the district court’s pretrial rulings. He first challenges the propriety of law enforcement’s use of the Wyoming Toolkit, a computer program and database used to identify child pornography shared over the Internet through peer-to-peer file sharing networks. Mr. Roberts next challenges the district court’s ruling that denied him discovery of the Wyoming Toolkit. He also brings a constitutional challenge to Utah’s sexual exploitation of a minor statute (Sexual Exploitation Statute) under which he was charged, Utah Code section 76-5a-3 (2009) (renumbered as Utah Code section 76-5b-201). Finally, Mr. Roberts challenges the district STATE v. ROBERTS Opinion of the Court court’s denial of his motion in limine to exclude all evidence obtained by or related to the Wyoming Toolkit. We affirm the district court on all issues. BACKGROUND ¶2 Utah’s Internet Crimes Against Children task force (ICAC) works to prevent the online distribution of child pornography. The ICAC searches peer-to-peer (P2P) file sharing networks for child pornography being shared among P2P users. Gnutella, one such P2P network, allows its users to share digital files directly over the Internet.1 Gnutella uses what is called the secure hash algorithm (SHA-1) encryption method to assign a unique digital signature to each file shared over its network. Because each digital file has a different SHA-1 value, those values can be used to identify a file. Through prior investigations, law enforcement has compiled a database of thousands of SHA-1 values that correspond to files containing child pornography. This database, along with software that searches Gnutella for the identified SHA-1 values, is known as the Wyoming Toolkit. ¶3 The ICAC uses the Wyoming Toolkit to monitor Gnutella for IP addresses sharing files with suspect SHA-1 values. Once the Toolkit flags an IP address sharing a file with an SHA-1 value that matches known child pornography files, officers confirm that the suspect file is indeed child pornography either by downloading and viewing the file directly or by comparing the identified file’s SHA-1 value with SHA-1 values of known child pornography contained in databases like the National Child Victim Identification Program. Upon confirming that the identified file is child pornography, officers send an administrative subpoena to the applicable internet service provider to obtain the subscription information associated with the identified IP address. ¶4 During a 2009 investigation, the ICAC determined that an IP address in Emery County, Utah, had used Gnutella to share hundreds of “files with SHA-1 digital signatures identical to images of suspected child pornography” during a five month period. The ICAC submitted these findings to FBI Agent Sonja Nordstrom. Upon 1 For additional information on Gnutella, see Definition of: Gnutella, PCMAG.COM , http://www.pcmag.com/encyclopedia/term /43835/gnutella (last visited Jan. 20, 2015). 2 Cite as: 2015 UT 24 Opinion of the Court confirming the files contained child pornography,2 Agent Nordstrom served a subpoena on Emery Telecom, the local internet service provider, which was able to identify Mr. Roberts as the owner of the suspect IP address. Based on this information, Agent Nordstrom obtained a search warrant for Mr. Roberts’ home and computers. ¶5 Mr. Roberts was not home the day police officers executed the search warrant. Agent Nordstrom called Mr. Roberts on his cell phone to inform him of the search, but did not discuss the purpose of the investigation. Mr. Roberts told Agent Nordstrom that he was in Ogden, Utah, where his wife was in the hospital. Agent Nordstrom later spoke with Mr. Roberts’ wife, who indicated that Mr. Roberts had his laptop computer with him in Ogden. ¶6 Agent Nordstrom traveled to Ogden to meet with Mr. Roberts. Mr. Roberts brought his laptop to the meeting, and Agent Nordstrom explained to Mr. Roberts that he was being investigated for possession of child pornography. After some questioning, Mr. Roberts admitted that he had been downloading child pornography for approximately a year and that he had been in the process of deleting the child pornography from his computer since Agent Nordstrom had called him. After Mr. Roberts made this admission, Agent Nordstrom asked if she could see his laptop. Mr. Roberts consented. Agent Nordstrom subsequently obtained a search warrant specifically for Mr. Roberts’ laptop. ¶7 Mr. Roberts’ laptop was taken to a computer forensic lab, where an examiner found video and still images of child pornography. Mr. Roberts was charged with thirty counts of sexual exploitation of a minor, a second degree felony. UTAH CODE § 76-5a- 3 (2009).3 Before trial, Mr. Roberts made four motions that are the subject of this appeal. First, he moved to suppress the evidence of child pornography found on his laptop. Relying on the United States Supreme Court case Kyllo v. United States, 533 U.S. 27 (2001), Mr. Roberts argued that the Wyoming Toolkit, like the thermal 2 To confirm the content of these files, Agent Nordstrom compared the SHA-1 values of the files shared by Mr. Roberts with the SHA-1 values of files she had previously viewed that contained child pornography. 3 In 2011, the Legislature renumbered section 76-5a-3 as 76-5b-201 and made minor change to its substance. Because Mr. Roberts was charged prior to this amendment, we rely on the May 2009 version for purposes of his appeal. 3 STATE v. ROBERTS Opinion of the Court image scanning at issue in Kyllo, constituted a search, and therefore use of the Toolkit without a warrant violated the Fourth Amendment to the United States Constitution. Mr. Roberts further argued that he had an expectation of privacy in the contents of his computer and that by accessing those contents through the Wyoming Toolkit, the State violated his expectation of privacy through an unlawful search. The district court denied Mr. Roberts’ motion, reasoning that the Wyoming Toolkit did not have “the same intrusiveness as thermal imaging” and that “peer-to-peer file sharing is not entitled to a reasonable expectation of privacy.” ¶8 Second, Mr. Roberts moved to compel discovery of the Wyoming Toolkit and its methodologies. He also moved to compel discovery of “any and all associated program documentation, instruction manuals, technical support materials, training materials, and purchase documents . . . to verify that the images [he] is alleged to have possessed are in fact[] illegal images.” The district court granted the motion in part and denied it in part. It held that Mr. Roberts was entitled to discovery of “whatever information the State has in regards to this case,” including “any information the State has” regarding the SHA-1 values associated with the files found on Mr. Roberts’ laptop. But it denied Mr. Roberts’ motion to compel discovery of every SHA-1 value in the Wyoming Toolkit database and “the search algorithm process and methodology utilized” in the Toolkit. It reasoned that discovery of the Toolkit was unnecessary for the purpose Mr. Roberts alleged because Agent Nordstrom had personally verified that the files Mr. Roberts had shared on Gnutella were indeed child pornography and because “disclosure of investigative techniques and procedures would interfere with law enforcement efforts.” ¶9 Third, Mr. Roberts moved to dismiss the case on the ground that Utah’s Sexual Exploitation Statute is unconstitutional. Mr. Roberts argued that the statute violates the Uniform Operation of Laws Provision of the Utah Constitution on its face because it unconstitutionally distinguishes between (1) individuals who illegally possess child pornography and (2) individuals who may legally possess child pornography such as law enforcement officers acting within the scope of a criminal investigation and employees or agents of entities that report and prevent child pornography when they are acting in good faith and within the scope of their 4 Cite as: 2015 UT 24 Opinion of the Court employment.4 Mr. Roberts also argued that, as applied, the statute discriminates between prosecuting attorneys and defense attorneys who may come into possession of child pornography during their representation or prosecution of a defendant charged under the Sexual Exploitation Statute. Mr. Roberts asserted that defense attorneys, but not prosecuting attorneys, who come into possession of child pornography would be in violation of the statute. ¶10 The district court denied Mr. Roberts’ motion to dismiss, holding that the Sexual Exploitation Statute was not unconstitutional. Although the statute creates distinct classifications between those who may and may not legally possess child pornography, the district court reasoned that those classifications do not “impose any disparate treatment on persons similarly situated.” (Citing State v. Robinson, 2011 UT 30, 254 P.3d 183). 4 The relevant language of Utah Code section 76-5a-3, effective May 2009, is as follows: (1) A person is guilty of sexual exploitation of a minor: (a) when the person: (i) knowingly produces, possesses, or possesses with intent to distribute child pornography; or (ii) intentionally distributes or views child pornography; .... (5) This section may not be construed to impose criminal or civil liability on: (a) any entity or an employee, director, officer, or agent of an entity when acting within the scope of employment, for the good faith performance of: (i) reporting or data preservation duties required under any federal or state law; or (ii) implementing a policy of attempting to prevent the presence of child pornography on any tangible or intangible property, or of detecting and reporting the presence of child pornography on the property; or (b) any law enforcement officer acting within the scope of a criminal investigation. 5 STATE v. ROBERTS Opinion of the Court ¶11 The district court also rejected Mr. Roberts’ as-applied challenge to the statute. While it acknowledged that defense attorneys and prosecutors are similarly situated and that the statute discriminates between them, it concluded that the distinction is justified by a legitimate government interest in eliminating the market for child pornography. It also observed that law enforcement allows defense attorneys to view evidence of child pornography as part of their representation, if they do so at the Regional Computer Forensics Lab (RCFL). It therefore held that although prosecutors and defense attorneys are treated differently under the statute, the restriction on defense attorneys is not overly burdensome, is reasonable, and is justified by the State’s interest in eliminating the dissemination of child pornography. ¶12 Finally, Mr. Roberts filed a motion in limine to preclude the State from offering expert testimony on the Wyoming Toolkit. He argued that the admission of evidence regarding “the technical elements of the Wyoming Toolkit, the scientific principles that underlie the technology, or the reliability of the inputs required by the system” would be impermissible under the Utah Rules of Evidence because “[t]he reliability of the methods has not been demonstrated by the State, nor has the defense had opportunity to challenge them.” ¶13 The district court held an evidentiary hearing on Mr. Roberts’ motion to exclude expert testimony, during which the State presented the testimony of Special Agent Coy Acocks, an expert on the Wyoming Toolkit. Agent Acocks testified as to the methodologies of the Toolkit, explaining that the technology used to develop the Toolkit is publicly available and could be used by anyone to search P2P networks. He also testified that the Toolkit correctly identifies child pornography files with extraordinarily high accuracy. Agent Acocks explained that officers using the Toolkit do not rely on the Toolkit alone to obtain a warrant to search a suspected computer. Rather, they conduct further investigation by reviewing files that the Toolkit has identified as child pornography to confirm the Toolkit’s accuracy. Mr. Roberts presented no competing expert testimony or other evidence challenging Agent Acocks’ testimony. ¶14 At the conclusion of the hearing, the district court ruled from the bench that the Wyoming Toolkit employed reliable methods based on “fairly common and available standard processes.” The court found that the officers using the Toolkit are well trained, that the SHA-1 values’ reported accuracy is reliable, 6 Cite as: 2015 UT 24 Opinion of the Court and that the process used to ascertain IP addresses is reliable. The court also found that the Toolkit “is simply a tool to be used by law enforcement officers as one step in the investigation of a case. It is not the conclusion.” Once officers use the Toolkit to identify possible child pornography, they undertake additional steps to assure that the files identified by the Toolkit and associated with a certain IP address are actually child pornography. The court thus concluded that the Wyoming Toolkit was a reliable basis for expert testimony. ¶15 Mr. Roberts entered a plea agreement with the State under which he pled conditionally guilty to five counts of sexual exploitation of a minor. The State dismissed the remaining twenty- five counts. The district court subsequently sentenced Mr. Roberts to concurrent prison terms of one-to-fifteen years, but suspended the prison terms and placed Mr. Roberts on 36 months of probation, including 240 days in the county jail. Mr. Roberts timely appealed his conviction to the court of appeals, which certified his appeal to this court. He challenges each of the pretrial rulings identified above. We have jurisdiction under Utah Code section 78A-3-102(3)(b). STANDARDS OF REVIEW ¶16 Different standards of review apply to each of Mr. Roberts’ arguments. We review for correctness the district court’s denial of Mr. Roberts’ motion to suppress on the ground that law enforcement’s use of the Wyoming Toolkit constituted an unlawful search. State v. Tripp, 2010 UT 9, ¶ 23, 227 P.3d 1251. Because district courts “have broad discretion in matters of discovery,” we review for an abuse of discretion the district court’s ruling that denied Mr. Roberts discovery of the Wyoming Toolkit. Green v. Louder, 2001 UT 62, ¶ 37, 29 P.3d 638. Mr. Roberts’ constitutional challenge to the Sexual Exploitation Statute presents a question of law that we review for correctness, recognizing that “all statutes are presumed to be constitutional and the party challenging a statute bears the burden of proving its invalidity.” State v. Angilau, 2011 UT 3, ¶ 7, 245 P.3d 745 (internal quotation marks omitted). Finally, because district courts “have considerable discretion in determining the admissibility of expert testimony,” we review Mr. Roberts’ challenge to the expert testimony regarding the Wyoming Toolkit for an abuse of discretion. State v. Butterfield, 2001 UT 59, ¶ 28, 27 P.3d 1133. ANALYSIS I. MR. ROBERTS’ ARGUMENTS ARE ADEQUATELY BRIEFED ¶17 As a preliminary matter, we address the State’s contention that Mr. Roberts’ arguments are inadequately briefed. The State 7 STATE v. ROBERTS Opinion of the Court argues that Mr. Roberts’ appellate brief “is filled with conclusory assertions and virtually bereft of citations to the record” and “provides no meaningful analysis” of the district court’s rulings. The State thus asks us to dismiss each of Mr. Roberts’ arguments as inadequately briefed. ¶18 Rule 24 of the Utah Rules of Appellate Procedure “prescribe[s] standards for the form, organization, and content of a brief on appeal.” State v. Nielsen, 2014 UT 10, ¶ 33, 326 P.3d 645. Rule 24 requires that the arguments “contain the contentions and reasons of the appellant with respect to the issues presented . . . with citations to the authorities, statutes, and parts of the record relied on.” UTAH R. APP. P. 24(a)(9). This standard for adequate briefing is a subjective standard, and determining compliance is left to the discretion of the appellate court. Nielsen, 2014 UT 10, ¶ 34. In exercising this discretion, we assess the adequacy of a brief “not as a matter of gauging procedural compliance with the rule, but as a necessary component of our evaluation of the case on its merits.” Id. While we may exercise our discretion to disregard or strike briefs that do not comply with rule 24’s substantive requirements, UTAH R. APP. P. 24(k), we are not required to do so. See State v. Thomas, 961 P.2d 299, 305 (Utah 1998) (explaining that “failure to cite to pertinent authority may not always render an issue inadequately briefed”). Therefore, like the marshaling requirement imposed by rule 24(a)(9) of the Rules of Appellate Procedure, our adequate briefing requirement is not a “hard-and-fast default notion.” Nielsen, 2014 UT 10, ¶ 40. Instead, it is a “natural extension of an appellant’s burden of persuasion.” Id. ¶ 41. As a result, appellants who fail to follow rule 24’s substantive requirements will likely fail to persuade the court of the validity of their position. ¶19 Despite the discretionary nature of our briefing requirements, we have seen an increasing number of appellees who spend considerable time arguing over the adequacy of the appellant’s brief, rather than addressing the merits of the appellant’s position. In taking such an approach, appellees are often guilty of the very deficiency of which they complain. Although the briefing standard articulated in rule 24(a) is directed in the first instance to appellants, rule 24(b) applies those same requirements to the brief of the appellee. Broderick v. Apartment Mgmt. Consultants, L.L.C., 2012 UT 17, ¶ 10, 279 P.3d 391. As a result, an appellee who argues only that the appellant has inadequately briefed issues will likely fail to submit a brief that “contain[s] the contentions and reasons of the appellee with respect to the issues presented in the opposing brief.” 8 Cite as: 2015 UT 24 Opinion of the Court Brown v. Glover, 2000 UT 89, ¶ 22, 16 P.3d 540. Appellees who rely solely on inadequate briefing arguments therefore assume a considerable risk of defaulting on appeal. ¶20 In this case, although the State’s initial brief addressed the merits of some of Mr. Roberts’ claims, it did not address the merits of two of his claims. Instead, it argued only that those claims had been inadequately briefed. In so doing, the State took the risk that we would disagree with its assessment of the adequacy of Mr. Roberts’ briefing and thereby forfeit its chance to respond to the merits of those two claims. While we could have defaulted the State for its failure to argue the substance of the issues, we exercised our discretion to provide the State with an opportunity to supplement its brief. We caution, however, that an appellee who fails to respond to the merits of an appellant’s argument will risk default. Rather than challenging the adequacy of an appellant’s brief, an appellee should instead layout the relevant legal standard and point out why the appellant has failed to carry his burden of persuasion. ¶21 Having clarified the standard for adequate briefing, we conclude that most of Mr. Roberts’ arguments are adequately briefed. Although Mr. Roberts’ arguments are in some instances poorly articulated and weakly supported by legal authority, his briefing does not fall below the requirements of rule 24. Unlike cases where the appellant “failed to cite any case law from any jurisdiction in order to set forth the elements of, or the legal standards for, his claims,” Carlton v. Brown, 2014 UT 6, ¶ 20, 323 P.3d 571, Mr. Roberts has generally cited to legal authority to support his arguments. And while his citations to the record are sparse, he has, for the most part, directed this court to the relevant motions, memoranda, and district court rulings that are the subject of his appeal. ¶22 In summary, Mr. Roberts has adequately briefed most of his arguments. That some of his arguments are not well organized or persuasive does not necessarily mean they are inadequately briefed. Instead, it suggests that Mr. Roberts has not satisfied his burden of persuasion on appeal.5 5 We do, however, agree with the State as to the inadequacy of Mr. Roberts’ arguments that the district court erred in denying his motion to clarify its ruling on the discovery of the Wyoming Toolkit. Although Mr. Roberts asserts error, he does not direct us to any place in the record where the district court made a ruling on this (continued...) 9 STATE v. ROBERTS Opinion of the Court II. THE DISTRICT COURT DID NOT ERR IN DENYING MR. ROBERTS’ MOTION TO SUPPRESS ¶23 Mr. Roberts argues that the district court erred in denying his motion to suppress the evidence of child pornography found on his computer under the theory that law enforcement’s use of the Wyoming Toolkit constituted an illegal search. According to Mr. Roberts, the warrant that the State obtained to search his computer was based on an unlawful search of the files Mr. Roberts shared on Gnutella. He argues that the evidence obtained from that search therefore should have been suppressed. He also argues that the administrative subpoena issued to Emery Telecom was improper. We disagree. Law enforcement’s use of the Wyoming Toolkit to identify files freely shared on P2P networks does not constitute a search. And the Emery Telecom subpoena was procedurally sound under the law as it existed at the time it was issued. A. Use of the Wyoming Toolkit to Identify Child Pornography in a File Shared Openly on a P2P Network Is Not a Search ¶24 The Fourth Amendment to the United States Constitution prohibits “unreasonable searches and seizures.” Government conduct that infringes upon a subjective and “reasonable expectation of privacy” constitutes a search and therefore cannot take place absent a valid warrant or a recognized exception to the warrant requirement. State v. Price, 2012 UT 7, ¶ 9, 270 P.3d 527 (internal quotation marks omitted). A subjective and reasonable expectation of privacy exists when “(1) an individual has ‘exhibited an actual (subjective) expectation of privacy’ and (2) ‘the expectation [is] one that society is prepared to recognize as reasonable.’” Id. (alteration in original) (quoting Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan, J., concurring)). In this case, we must decide whether Mr. Roberts had a subjective expectation of privacy in files he shared on Gnutella and, if so, whether that expectation of privacy was objectively reasonable. 5 (...continued) issue, nor does he explain the district court’s basis for denying the motion. Indeed, Mr. Roberts failed to request the transcript of the hearing in which the court heard argument on this issue. As a result, we have no basis on which to review the district court’s ruling on the discoverability of the Wyoming Toolkit. 10 Cite as: 2015 UT 24 Opinion of the Court ¶25 Although we have yet to consider whether a reasonable expectation of privacy exists in a file shared over a P2P network, several federal courts have considered the issue and none has found an expectation of privacy. See United States v. Hill, 750 F.3d 982, 986 (8th Cir. 2014) (“[A] defendant has no reasonable expectation of privacy in files . . . retrieved from his personal computer where [the defendant] admittedly installed and used LimeWire to make his files accessible to others for file sharing.” (second and third alterations in original) (internal quotation marks omitted)); United States v. Conner, 521 F. App’x 493, 497 (6th Cir. 2013) (finding no reasonable expectation of privacy in files shared through a P2P file-sharing program); United States v. Norman, 448 F. App’x 895, 897 (11th Cir. 2011) (same); United States v. Borowy, 595 F.3d 1045, 1047–48 (9th Cir. 2010) (same); United States v. Perrine, 518 F.3d 1196, 1205 (10th Cir. 2008) (same). We agree with this federal precedent and hold that there is no reasonable expectation of privacy in a file that an individual publicly shares on a P2P network. ¶26 In this case, Mr. Roberts publicly shared his files on Gnutella, thereby rendering them publicly available to anyone with a Gnutella client. And because Mr. Roberts made no effort to limit access to his files on Gnutella, he exhibited no subjective expectation of privacy in those files. Neither the ICAC’s investigation of Mr. Roberts’ publicly shared files nor its use of the Wyoming Toolkit to identify the files as child pornography constituted a search. The Wyoming Toolkit merely enabled the ICAC officers to recognize files with SHA-1 values associated with child pornography. But it did not allow the government to access private information on Mr. Roberts’ computer. It therefore did not invade a constitutionally protected private space. ¶27 Without acknowledging the federal case law undermining his argument, Mr. Roberts relies on the United States Supreme Court’s opinion in Kyllo v. United States, 533 U.S. 27 (2001). In Kyllo, the Court held that the use of thermal imaging scanners to detect high-intensity lamps used to grow marijuana in a home constituted an unlawful search. Id. at 40. The Court reasoned that the thermal imaging intruded on the interior of the home, which is protected by a high expectation of privacy. Id. The Court thus held that where “the Government uses a device that is not in general public use, to explore details of the home that would previously have been unknowable without physical intrusion, the surveillance is a ‘search’ and is presumptively unreasonable without a warrant.” Id. 11 STATE v. ROBERTS Opinion of the Court ¶28 Mr. Roberts focuses on the fact that the government in Kyllo used technology that is not publicly available. He argues that, like the thermal imaging scanners at issue in Kyllo, the Wyoming Toolkit is not accessible to the public. But the greater concern in Kyllo was that the government was using the technology to intrude the privacy of the home. The Wyoming Toolkit, on the other hand, is used only to identify child pornography in files that are publicly shared on P2P network. Unlike thermal imaging scanners, the Toolkit does not intrude on any interest in which the defendant has a reasonable expectation of privacy. Use of the Toolkit therefore does not constitute an unlawful search. B. A Search Did Not Take Place When Law Enforcement Obtained Mr. Roberts’ Subscription Information from His Internet Service Provider ¶29 In addition to challenging the government’s use of the Wyoming Toolkit, Mr. Roberts argues that the government conducted an unconstitutional search when it used his IP address to identify him through the Emery Telcom subpoena. But Mr. Roberts once again ignores the overwhelming weight of authority finding no reasonable expectation of privacy in subscription information, like an IP address, given to an internet service provider. See Perrine, 518 F.3d at 1204 (”Every federal court to address this issue has held that subscriber information provided to an internet provider is not protected by the Fourth Amendment’s privacy expectation.”). ¶30 Although Mr. Roberts points to no case law in support of his position, he relies on two recently enacted statutes that he argues are relevant to the propriety of the Emery Telecom subpoena. The first, Senate Bill 46, which became effective on March 25, 2014, amends the administrative subpoena statute to require the signature of a judge rather than a prosecutor for all administrative subpoenas. 2014 Utah Laws 254–55 (ch. 47); see also UTAH CODE § 77-22-2.5. The second, House Bill 128, which became effective on July 1, 2014, added provisions to the Utah Code that now require law enforcement to obtain a warrant to search for the location information of an electronic device. 2014 Utah Laws 942–43 (ch. 223); see also UTAH CODE § 77-23c-101 to -103. ¶31 Mr. Roberts relies on our per curiam decision in State v. Belgard, 615 P.2d 1274, 1276 (1980), to argue that these statutory amendments apply retroactively to his case and that the administrative subpoena issued to Emery Telecom in 2009 was procedurally deficient. In Belgard, this court, quoting the Seventh 12 Cite as: 2015 UT 24 Opinion of the Court Circuit, stated: It is well established that when a lower court relies on a legal principle which is changed by treaty, statute, or decision prior to direct review, an appellate court must apply the current law rather than the law as it existed at the time the lower court acted. ‘Intervening and conflicting decisions will thus cause the reversal of judgments which were correct when entered.’ Id. (quoting United States v. Fitzgerald, 545 F.2d 578, 581 (7th Cir. 1976)). When viewed in isolation, the Fitzgerald and Belgard line of cases appears to support the retroactive application of these statutes. But the United States Supreme Court has clarified that this rule is inapplicable where the legislature has expressed its intent that a statute not be applied retroactively. Kaiser Aluminum & Chem. Corp. v. Bonjorno, 494 U.S. 827, 837–38 (1990) (explaining that, in the context of retroactivity, “where [legislative] intent is clear, it governs”). ¶32 In Utah, the Legislature has expressed a clear presumption against retroactive application. UTAH CODE § 68-3-3 (“A provision of the Utah Code is not retroactive, unless the provision is expressly declared to be retroactive.”). As a result, we generally “apply the law as it exists at the time of the event regulated by the law in question.” State v. Clark, 2011 UT 23, ¶ 13, 251 P.3d 829. Because the intent of the Legislature is clear in this regard, we repudiate our Belgard decision insofar as it purportedly expresses a presumption in favor of retroactive application. ¶33 In this case, neither statute on which Mr. Roberts relies declares that it applies retroactively. We therefore apply the law as it existed at the time of the relevant event, which in this case was the State’s issuance of the administrative subpoena Emery Telecom in October 2009. At that time, Utah Code section 77-22-2.5(2) permitted prosecutors to issue administrative subpoenas, and the Utah Code did not require a warrant to search an electronic device’s location information. Because the Emery Telecom subpoena was issued in compliance with the law at the time, we reject Mr. Roberts’ challenge to its validity. ¶34 In summary, we hold that the government’s use of the Wyoming Toolkit to identify child pornography in files shared on a P2P network does not constitute a search. And under the law that was in place at the time, a search did not take place when law enforcement obtained Mr. Roberts’ subscription information through 13 STATE v. ROBERTS Opinion of the Court the subpoena to Emery Telecom. We therefore affirm the district court’s denial of Mr. Roberts’ motion to suppress. III. THE DISTRICT COURT DID NOT ABUSE ITS DISCRETION IN DENYING MR. ROBERTS’ MOTION TO COMPEL DISCOVERY OF THE WYOMING TOOLKIT ¶35 Mr. Roberts argues that the district court abused its discretion in denying his motion to compel discovery of the Wyoming Toolkit, including its methodologies and all of the SHA-1 values in its database. We review this claim for an abuse of discretion and the appellant bears a heavy burden in showing that the district court abused its discretion. R & R Energies v. Mother Earth Indus., Inc., 936 P.2d 1068, 1079 (Utah 1997). To meet this burden, the appellant must show either “an erroneous conclusion of law or [that] there is no evidentiary basis” for the district court’s discovery ruling. Id. (internal quotation marks omitted). Mr. Roberts has shown neither. ¶36 In ruling on the motion to compel, the district court allowed Mr. Roberts to discover any information the State had regarding his case, including the SHA-1 values associated with files found on his laptop. But the district court denied the remainder of Mr. Roberts’ discovery request for two independent reasons: (1) that discovery of the Toolkit would not produce the evidence Mr. Roberts sought (i.e., verification that the files Mr. Roberts had shared and that the Toolkit had detected were indeed child pornography) and (2) that disclosure of all of the Toolkit’s methodologies and SHA-1 values would harm future ICAC investigations. ¶37 Mr. Roberts’ main argument on appeal is that the Toolkit and its methodologies are not privileged. But the district court did not hold that the Toolkit was privileged information; it merely held that discovery of all aspects of the Toolkit and its methodologies were not relevant and would be harmful to future ICAC investigations. And because Mr. Roberts provides no authority to the contrary, he has failed to show that the district court abused its discretion by denying discovery. ¶38 Moreover, Mr. Roberts does not address the district court’s alternative ground for denying the motion: that discovery of the Toolkit would not be useful in verifying that the files Mr. Roberts had shared on Gnutella contained child pornography. See Salt Lake Cnty. v. Butler, Crockett & Walsh Dev. Corp., 2013 UT App 30, ¶ 28, 297 P.3d 38 (explaining that an appellate court “will not reverse a ruling of the trial court that rests on independent alternative 14 Cite as: 2015 UT 24 Opinion of the Court grounds where the appellant challenges only one of those grounds”). As the district court reasoned, discovery of all of the Toolkit’s SHA-1 values would not have been helpful to Mr. Roberts because the government relied on Agent Nordstrom’s review of the files, rather than on the Toolkit’s SHA-1 values, to verify that those files contained child pornography. Discovery of the Toolkit and its methodologies was therefore not material to Mr. Roberts’ case. See State v. Spry, 2001 UT App 75, ¶ 21, 21 P.3d 675 (explaining that under the “good cause” standard in Utah Rule of Criminal Procedure 16(a)(5), a defendant must “establish the materiality of the requested records to the case” (internal quotation marks omitted)). Mr. Roberts has made no attempt to refute this basis for denying his motion. ¶39 In summary, Mr. Roberts has failed to meet his burden of persuasion on appeal. And where the district court permitted discovery of those aspects of the Wyoming Toolkit that were most relevant to Mr. Roberts’ case, it did not abuse its discretion in denying discovery of the entire Toolkit database, its methodologies, and all of its SHA-1 values. We therefore affirm the district court’s discovery ruling. IV. MR ROBERTS’ CONSTITUTIONAL CHALLENGE TO THE SEXUAL EXPLOITATION STATUTE FAILS ¶40 Mr. Roberts challenges the Sexual Exploitation Statute under the Uniform Operation of Laws Provision of the Utah Constitution. UTAH CONST . art. I, § 24 (“All laws of a general nature shall have uniform operation.”). He argues that the statute creates at least two unconstitutional classifications. First, he claims that the statute unconstitutionally distinguishes between individuals who can legally view child pornography (i.e., law enforcement officers acting to further a criminal investigation and employees of designated entities acting in good faith to report or prevent child pornography) and those who may not. See UTAH CODE § 76-5a-3 (2009). Second, he argues that the statute unconstitutionally distinguishes between prosecuting attorneys who encounter child pornography as part of their work and similarly situated criminal defense attorneys. We reject both arguments—the first on its merits and the second due to a lack of standing.6 6 Mr. Roberts clearly has standing to raise his first challenge to the Sexual Exploitation Statute because (1) he has suffered an injury (i.e., (continued...) 15 STATE v. ROBERTS Opinion of the Court A. The Classifications Created by the Sexual Exploitation Statute Are Constitutional ¶41 For a statute to comply with the Uniform Operation of Laws Provision of the Utah Constitution, “it is not enough that it be uniform on its face. What is critical is that the operation of the law be uniform.” Gallivan v. Walker, 2002 UT 89, ¶ 37, 54 P.3d 1069 (internal quotation marks omitted). A statute is not uniform in its operation, and is thus unconstitutional, if (1) “the statute creates any classifications,” (2) those classifications “impose any disparate treatment on persons similarly situated,” and (3) “the legislature had [no] reasonable objective that warrants the disparity.” State v. Robinson, 2011 UT 30, ¶ 17, 254 P.3d 183 (internal quotation marks omitted). ¶42 Looking to the first Robinson requirement, Mr. Roberts correctly argues that the Sexual Exploitation Statute creates certain classifications. Most notably, it imposes criminal and civil liability on individuals who “knowingly produce[], possess[], or possess[] with intent to distribute” or “intentionally distribute[] or view[] child pornography”; but the statute exempts from liability law enforcement officers who encounter child pornography as part of a criminal investigation and employees of certain organizations acting in good faith and within the scope of their employment to report or prevent child pornography. UTAH CODE § 76-5a-3 (2009). ¶43 Under the second Robinson requirement, however, these classifications are not unconstitutional because they do not discriminate between similarly situated individuals. The key distinction between the individuals in each classification is the context within which they view, possess, or distribute child pornography. The statute exempts only those law enforcement officers “acting within the scope of a criminal investigation” and only employees of specific entities who are “acting within the scope of employment” and “for the good faith performance of” reporting or preventing child pornography. Id. Any law enforcement officer or 6 (...continued) criminal prosecution and conviction), (2) that injury was caused by the statute’s alleged unconstitutionality, and (3) we have the authority to redress his injury if we determine the statute is unconstitutional. See Carlton v. Brown, 2014 UT 6, ¶ 31, 323 P.3d 571 (explaining that to have standing, a party must show injury, causation, and redressability). 16 Cite as: 2015 UT 24 Opinion of the Court employee of an exempt entity who knowingly or intentionally produces, possesses, views, or distributes child pornography for any other reason will be subject to the same criminal liability as other individuals. Because this classification does not distinguish between similarly situated individuals, it fails the second requirement of the Robinson test. The Sexual Exploitation Statute therefore does not violate the Uniform Operation of Laws Provision of the Utah Constitution based on this classification. B. Mr. Roberts Lacks Standing to Challenge the Constitutionality of the Sexual Exploitation Statute’s Disparate Treatment of Prosecutors and Criminal Defense Attorneys ¶44 Mr. Roberts also contends that the Sexual Exploitation Statute unconstitutionally distinguishes between prosecuting attorneys and defense attorneys.7 Specifically, he argues that prosecuting attorneys, are exempt under the Sexual Exploitation Statute when viewing, possessing, or distributing child pornography within the scope of a criminal investigation. Defense attorneys, on the other hand, are granted no such exemption, and thus would be in violation of the statute by possessing, viewing, or distributing child pornography as part of their legal representation of a criminal defendant. ¶45 On its face, the Sexual Exploitation Statute provides no exemption for criminal defense attorneys who must view evidence that may include child pornography in order to zealously advocate for their clients. Before addressing the constitutionality of this apparent oversight, however, we must first determine whether Mr. Roberts has standing to bring this challenge. See Gregory v. Shurtleff, 2013 UT 18, ¶ 9, 299 P.3d 1098 (“Since standing is a jurisdictional requirement, we first must determine whether 7 In 2009, the Legislature amended the Sexual Exploitation Statute to expressly exclude liability for law enforcement officers and employees of exempt organizations. See UTAH CODE § 76-5b-201(6). It did not, however, include an exemption for others involved in the judicial process who may be required to view child pornography during the course and within the scope of their employment. As a practical matter, those involved in the judicial process, including judges, court staff, jurors, and lawyers—both prosecuting and defense—are unlikely to be prosecuted under this statute. Nevertheless, the Legislature may wish to consider broadening the exclusion to include such participants in the judicial process. 17 STATE v. ROBERTS Opinion of the Court Appellants have standing to bring any of their claims.”); see also State v. Tuttle, 780 P.2d 1203, 1207 (Utah 1989) (explaining that this court may raise the issue of standing “sua sponte at any time”). ¶46 Standing requires that we view the constitutionality of a statute from the perspective of the party raising the challenge. See State v. Hoffman, 733 P.2d 502, 505 (Utah 1987) (“The constitutionality of a statute is considered in light of the standing of the [party] who raises the question and of its particular application in his case.”). To establish standing under our traditional test, the party bringing a constitutional challenge must show three things: (1) ”that [the party] has been or will be adversely affected by the [challenged] actions,” (2) that a “causal relationship [exists] between the injury to the party, the [challenged] actions and the relief requested,” and (3) that the relief requested is “substantially likely to redress the injury claimed.” Utah Chapter of the Sierra Club v. Utah Air Quality Bd., 2006 UT 74, ¶ 19, 148 P.3d 960 (second and fourth alterations in original) (internal quotation marks omitted). ¶47 Under the first requirement, a party may only challenge a statute “to the extent the alleged basis of its infirmity is, or will be, applied to his detriment.” Hoffman, 733 P.2d at 505. In other words, to obtain standing, a party challenging a statute must suffer an injury as a result of the statute’s alleged unconstitutionality. In this case, Mr. Roberts has not shown that he has been or will be injured by the alleged unconstitutionality of the Sexual Exploitation Statute. Instead, he raises only a hypothetical injury. He argues that because defense attorneys could be subject to criminal and civil liability for viewing evidence containing child pornography, their representation of criminal defendants charged under the Sexual Exploitation Statute will be hindered, thereby depriving criminal defendants of their right to effective assistance of counsel. But Mr. Roberts cannot establish an actual injury. First, Mr. Roberts bases his alleged injury on defense counsel’s fear of prosecution—not his own. But a party generally lacks standing “to contest the policies of the prosecuting authority when he himself is neither prosecuted nor threatened with prosecution.” Linda R.S. v. Richard D., 410 U.S. 614, 619 (1973). ¶48 And although Mr. Roberts alleges an indirect harm to criminal defendants based on defense counsel’s fear of prosecution, he has not shown that his counsel genuinely feared prosecution so as to render his counsel’s representation ineffective. While Mr. Roberts baldly asserts that his counsel was “unable to challenge the provenance and character of the evidence against him” because counsel was “at jeopardy of criminal prosecution” under the statute, 18 Cite as: 2015 UT 24 Opinion of the Court he wholly fails to substantiate this assertion. In fact, defense counsel was given government-sanctioned access to the child-pornography evidence at the RCLF without threat of prosecution. As the district court noted in ruling on this issue, “[d]efense counsel has not alleged that its access to the evidence was in any way inadequate under the facts of this case.” ¶49 Defense counsel’s purported fear of prosecution and the impact of that fear on counsel’s representation of Mr. Roberts are speculative at best, and therefore are insufficient to demonstrate an injury for purposes of standing. See Midvale City Corp. v. Haltom, 2003 UT 26, ¶ 22, 73 P.3d 334 (citing to United States Supreme Court precedent for the proposition that “standing exists when fear of criminal prosecution under allegedly unconstitutional statute is not imaginary or wholly speculative”); Younger v. Harris, 401 U.S. 37, 42 (1971) (“[P]ersons having no fears of state prosecution except those that are imaginary or speculative, are not to be accepted as appropriate [parties] in such cases.”). Because Mr. Roberts cannot demonstrate that he has or will suffer an actual injury based on the Sexual Exploitation Statute’s disparate treatment of prosecutors and criminal defense attorneys, he lacks traditional standing to challenge the statute’s constitutionality. ¶50 We next consider whether Mr. Roberts has standing under our alternative, public-interest test. See Gregory, 2013 UT 18, ¶ 25. Parties who fail to gain standing under the traditional test may nevertheless have standing “if they can show that they are an appropriate party raising issues of significant public importance.” Cedar Mountain Envtl., Inc. v. Tooele Cnty. ex rel. Tooele Cnty. Comm’n, 2009 UT 48, ¶ 8, 214 P.3d 95. But the party arguing alternative standing has the burden of showing it satisfies the requirements of this test. See Sierra Club, 2006 UT 74, ¶ 36. ¶51 Mr. Roberts has not presented any argument as to why he should be granted standing under our alternative test. By not presenting any argument, Mr. Roberts fails to satisfy his burden of showing that he is entitled to public-interest standing. ¶52 In summary, we conclude that Utah’s Sexual Exploitation Statute does not violate the Uniform Operation of Laws Provision of the Utah Constitution because it does not treat similarly situated individuals differently. And Mr. Roberts lacks standing to challenge the constitutionality of the Sexual Exploitation Statute’s purported disparate treatment of prosecuting and defense attorneys. 19 STATE v. ROBERTS Opinion of the Court V. THE DISTRICT COURT DID NOT ABUSE ITS DISCRETION IN DENYING MR. ROBERTS’ MOTION TO PRECLUDE EXPERT TESTIMONY ON THE WYOMING TOOLKIT ¶53 Mr. Roberts’ final argument is that the district court erred in denying his motion in limine to preclude expert testimony on the Wyoming Toolkit. He contends that the Wyoming Toolkit does not satisfy the reliability test for expert testimony required by rule 702 of the Utah Rules of Evidence. Mr. Roberts carries a heavy burden in seeking reversal of this ruling because we grant district courts broad discretion in determining the admissibility of expert testimony. State v. Hollen, 2002 UT 35, ¶ 66, 44 P.3d 794. We will therefore reverse the district court only if its decision “exceeds the limits of reasonability.” Id. (internal quotation marks omitted). In this case, the district court was well within its discretion in denying Mr. Roberts’ motion. We therefore affirm. ¶54 Rule 702 of the Utah Rules of Evidence governs the admissibility of expert witness testimony. It requires first that the testimony of an expert witness “help the trier of fact to understand the evidence or to determine a fact at issue.” UTAH R. EVID . 702(a). Second, a party seeking to rely on expert scientific or technical testimony may do so only “if there is a threshold showing that the principles or methods that are underlying in the testimony (1) are reliable, (2) are based upon sufficient facts or data, and (3) have been reliably applied to the facts.” Id. 702(b). The advisory committee notes to rule 702 emphasize that a party seeking to admit expert testimony “is required to make only a ‘threshold’ showing . . . [, which] requires only a basic foundational showing of indicia of reliability for the testimony to be admissible, not that the opinion is indisputably correct.” Id. 702 advisory committee note. This low threshold permits district court judges, as the gatekeepers of evidence, to err on the side of admission as long as there is some minimal indication that the evidence is reliable. We note, however, that the rigor of rule 702 “will vary depending on the complexity of the particular case.” Eskelson ex rel. Eskelson v. Davis Hosp. & Med. Ctr., 2010 UT 59, ¶ 15, 242 P.3d 762. ¶55 In this case, the district court held that expert testimony on the Wyoming Toolkit satisfied rule 702's threshold of reliability. The court found that the Toolkit’s use of SHA-1 values to identify child pornography files was based on a reliable “mathematical formula” that results in “an extraordinarily high degree of correlation between the SHA-1 value and the actual image.” The court also found that the Wyoming Toolkit uses software that is “readily available” and 20 Cite as: 2015 UT 24 Opinion of the Court “fairly common,” thereby refuting Mr. Roberts’ claim that the Toolkit relies on undefined scientific methods. The court further found that the officers using the Toolkit were well trained and that adequate safeguards were in place to assure that a file identified by the Toolkit was indeed child pornography. The court thus found that the Wyoming Toolkit was reliable, was based upon sufficient facts or data, and was reliably applied to the facts of Mr. Roberts’ case. ¶56 On appeal, Mr. Roberts argues that the expert testimony on the Wyoming Toolkit did not satisfy the reliability requirements of rule 702, but he provides no authoritative support for his claim. He offers no evidence to refute the district court’s reliability determination,8 cites to no legal or other authority that might undermine the reliability of the Wyoming Toolkit, and points to nothing in the record to support his position. Instead, he simply asserts without any supporting authority that the Toolkit is not as reliable as the district court found it to be. In short, Mr. Roberts has failed to provide any evidence that the district court abused its discretion in admitting the expert testimony on the Wyoming Toolkit. Contrary to Mr. Roberts’ unsupported claims, the State provided substantial evidence of the Toolkit’s accuracy and the validity of its methodologies. Based on this evidence, the district court’s finding that the Toolkit was reliable was supported by the evidence and therefore met rule 702's threshold reliability requirement. ¶57 In summary, we affirm the district court’s denial of Mr. Roberts’ motion in limine because Mr. Roberts has not provided any evidence that the district court abused its discretion under rule 702 of the Utah Rules of Evidence by admitting expert testimony about the Wyoming Toolkit. CONCLUSION ¶58 We affirm each of the district court’s pretrial rulings in this case. First, the district court correctly found that the State’s use of the Wyoming Toolkit did not constitute a search under the Fourth Amendment because Mr. Roberts had no reasonable expectation of privacy in files he publicly shared on a P2P network. Nor did an 8 Mr. Roberts could have argued that he was unable to present evidence about the Toolkit because he was denied discovery. But he has neither raised nor briefed that argument here, so we decline to address it. See Diversified Holdings, L.C. v. Turner, 2002 UT 129, ¶ 10 n.4, 63 P.3d 686. 21 STATE v. ROBERTS Opinion of the Court unlawful search take place when law enforcement obtained Mr. Roberts’ subscription information from Emery Telecom. Second, the district court did not abuse its discretion in limiting Mr. Roberts’ discovery of the Wyoming Toolkit database and its methodologies. Third, the district court correctly dismissed Mr. Roberts’ constitutional challenges to the Sexual Exploitation Statute. Finally, the district court did not abuse its discretion in admitting expert testimony on the Wyoming Toolkit. We therefore affirm Mr. Roberts’ conviction for violation of the Sexual Exploitation Statute. 22