[Cite as State v. Wilkie, 2017-Ohio-1487.]
IN THE COURT OF APPEALS OF OHIO
THIRD APPELLATE DISTRICT
AUGLAIZE COUNTY
STATE OF OHIO,
PLAINTIFF-APPELLEE, CASE NO. 2-17-01
v.
ERIC WILKIE, OPINION
DEFENDANT-APPELLANT
Appeal from Auglaize County Common Pleas Court
Trial Court No. 2015-CR-133
Judgment Affirmed
Date of Decision: April 24, 2017
APPEARANCES:
Nicole Rutter-Hirth for Appellant
R. Andrew Augsburger for Appellee
Case No. 2-17-01
SHAW, J.
{¶1} Defendant-appellant, Eric Wilkie (“Wilkie”), brings this appeal from
the December 20, 2016, judgment of the Auglaize County Common Pleas Court
sentencing Wilkie to an aggregate ten-year prison term after Wilkie pled no contest
to, and was found guilty of, two counts of Pandering Obscenity Involving a Minor
in violation of R.C. 2907.321(A)(2), both felonies of the second degree, three counts
of Pandering Obscenity Involving a Minor in violation of R.C. 2907.321(A)(5), all
felonies of the fourth degree, and sixteen counts of Pandering Sexually Oriented
Material Involving a Minor in violation of R.C. 2907.322(A)(1), all felonies of the
second degree. On appeal, Wilkie argues that the trial court erred by denying his
motion to compel the government’s software that was used to find Wilkie sharing
child pornography and he argues that the trial court erred by denying his amended
suppression motion, particularly without an additional hearing.
Relevant Facts and Procedural History
{¶2} On November 18, 2015, Wilkie was indicted in trial court case number
2015-CR-0133 for two counts of Pandering Obscenity Involving a Minor in
violation of R.C. 2907.321(A)(2), both felonies of the second degree (Counts 1 and
3), and three counts of Pandering Obscenity Involving a Minor in violation of R.C.
2907.321(A)(5), all felonies of the fourth degree (Counts 2, 4, 5). A second
indictment was filed against Wilkie on February 25, 2016, alleging sixteen counts
-2-
Case No. 2-17-01
of Pandering Sexually Oriented Material Involving a Minor in violation of R.C.
2907.322(A)(1), all felonies of the second degree. The second indictment was
originally assigned case number 2016-CR-0031; however, the two indictments
against Wilkie were consolidated without objection and all filings were thereafter
made in the 2015-CR-0133 file. Wilkie pled not guilty to the charges against him.
{¶3} The charges against Wilkie stemmed from allegations that Wilkie was
publicly sharing child pornography through an online peer-to-peer (“P2P”) file
sharing program called Shareaza.1 On multiple dates Detective Jeffrey Blackmore
of the Van Wert Police Department was able to download suspected child
pornography from an IP address linked to Wilkie and Detective Blackmore
1
A thorough discussion of P2P file sharing is contained in States v. Thomas, D. Vt, Nos. 5:12-cr-37, 5:12-
cr-44, 5:12-cr-97, 2013 WL 6000484, which was cited by the trial court in its entry denying Wilkie’s
suppression motion. It provides a general overview of P2P file sharing, which reads, in pertinent part:
Peer-to-peer file sharing is a popular means of obtaining and sharing files free of
charge directly from other computer users who are connected to the Internet and who
are also using peer-to-peer file sharing software. Peer-to-peer file sharing software is
publicly available for download free of charge from the Internet and operates on a
particular network which dictates to some extent how the file sharing will occur. * *
*
The file sharing software does not permit a user to access files that are not available
for sharing. * * *
File sharing occurs when one computer, identified by an Internet Protocol (“IP”)
address, initiates a search for a responsive file by indicating the term or terms that it
seeks to find in the file’s name. This is called a “query” and consists of key words such
as “child,” “pornography,” or “child pornography.” Law enforcement has identified
a number of search terms commonly associated with child pornography. Other
computers that are using the same file sharing software and connected to the Internet
at the time will respond to the query with a “query hit message.” A query hit message
identifies the file or files available for sharing which have a word in the file name that
matches the search word in the query. The query hit message will also contain
additional information such as the IP addresses of the computers offering to share
responsive files. * * *
-3-
Case No. 2-17-01
confirmed that the files he downloaded from Wilkie’s IP address did, in fact, contain
child pornography. Detective Blackmore passed this information onto Detective
Douglas Burke of the Auglaize County Sheriff’s Office. Detective Burke used this
information to obtain a search warrant to search Wilkie’s residence, where more
child pornography was discovered on an external hard drive, leading to further
charges against Wilkie. During the search of Wilkie’s residence, Wilkie spoke with
Detective Blackmore and Wilkie admitted to possessing child pornography.
{¶4} On April 29, 2016, Wilkie filed an initial suppression motion, seeking
to suppress the results of the search of his home on November 5, 2015, and the
statements that he made on the day of the search.
{¶5} On June 30, 2016, a suppression hearing was held. At the hearing,
Detective Jeffrey Blackmore of the Van Wert Police Department testified that he
received training on how to use P2P file sharing programs and how to investigate
those file sharing programs for individuals sharing child pornography. Detective
Blackmore testified that utilizing a law enforcement-specific version of Shareaza
called Shareaza Law Enforcement (“ShareazaLE”), he identified an IP address in
St. Marys that had “child notable files shown in their file sharing database.”2 (June
30, 2016, Tr. at 16). Detective Blackmore testified that he initiated a “browse of
2
Detective Blackmore explained that the “law enforcement version of the software” utilizes a database of
known child pornography to search “the file sharing networks for any child sharing pornography” then it will
identify the IP address where it is coming from. (June 30, 2016, Tr. at 14). He also testified that the law
enforcement version will not allow file sharing; rather it only accepts downloads. (Id. at 31).
-4-
Case No. 2-17-01
that person’s file[s]” and that he then attempted to download the suspected child
pornography files.
{¶6} Detective Blackmore testified that he downloaded five files of
suspected child pornography between September 23rd and 24th of 2015 from the
same IP address in St. Marys. Detective Blackmore testified that the five
downloaded files did, in fact, contain child pornography. Detective Blackmore
testified that he obtained a subpoena for Time Warner Cable to learn who was the
subscriber attached to the IP address, and the address came back to 369 Northway
Drive in St. Marys, Ohio, under a “nickname” shown as “Eric.” The subscriber was
Wilkie and the address was Wilkie’s.
{¶7} Detective Blackmore testified that on October 18, 2015, he downloaded
thirteen more suspected child pornography files from Wilkie’s IP address.
Detective Blackmore testified that the additional files he downloaded also contained
child pornography.
{¶8} Detective Blackmore testified that he took his information to the
Auglaize County Police Department and was placed in contact with Detective
Donald Burke.3 Detective Blackmore testified that he explained to Detective Burke
what he had learned in his investigation, and that Detective Burke then used the
information to obtain a search warrant to search Wilkie’s residence.
3
As St. Marys was in Auglaize County, Detective Blackmore sought out officers who had proper jurisdiction
over the matter.
-5-
Case No. 2-17-01
{¶9} Detective Blackmore testified that he was present when the search
warrant was executed and that while he was at Wilkie’s residence, he spoke with
Wilkie. An audio recording of that conversation was played in open court.
{¶10} On the recording, Wilkie was explicitly informed that he was not
under arrest and that he could leave at any time. Wilkie then readily admitted to
having child pornography on his computer and that he had been convicted for
Pandering Obscenity Involving a Minor in the past. Wilkie stated that he had a
problem, that he viewed child pornography, and that he was a “collector,” which is
why he had all of the pornography. However, Wilkie stated that he had no desire to
actually have sex with children. Nevertheless, Wilkie testified that he had viewed
pornography with children as young as five or six.
{¶11} Detective Blackmore did testify that Wilkie told him that Wilkie
thought he had “the share button off” on his Shareaza software. (June 30, 2016, Tr.
at 31). However, Detective Blackmore emphasized when questioned by the trial
court that he would not have been able to access Wilkie’s files via ShareazaLE had
Wilkie not been publicly file sharing them, or if Wilkie was not online. (Id. at 58).
{¶12} Detective Burke was the next witness to testify at the suppression
hearing. He testified that Detective Blackmore came to him with the information
he had and Detective Burke used it to obtain a search warrant. The search warrant
itself was introduced into evidence, and it contained brief descriptions of five of the
-6-
Case No. 2-17-01
files that had been downloaded from Wilkie’s IP address. The warrant briefly
explained how Detective Blackmore’s investigation had proceeded and how it had
led to Wilkie. The State rested after Detective Burke testified.
{¶13} Wilkie then testified on his own behalf. Wilkie testified that despite
what was played on the audio of his interview he did not feel he was free to leave
on the day of the search when he spoke with Detective Blackmore; however, Wilkie
did admit that he was told he was free to leave. The hearing then concluded and the
matter was submitted to the trial court.
{¶14} On July 12, 2016, another hearing was held wherein Wilkie notified
the trial court that he had hired private counsel and wanted to replace his current
court-appointed counsel. The trial court allowed Wilkie to substitute his counsel.
Wilkie’s new counsel then indicated that he wanted to supplement the original
suppression motion. Specifically, Wilkie’s new counsel indicated that he wanted to
obtain an expert to show how the software the government was using to detect
Wilkie purportedly sharing child pornography operated differently than it was
portrayed by the government at the prior suppression hearing. Wilkie’s new counsel
also indicated that he may make an argument challenging the warrant itself under
Franks v. Delaware, 438 U.S. 154, 155-156 (1978) (if a “substantial preliminary
showing that a false statement knowingly and intentionally, or with reckless
disregard for the truth, was included by the affiant in the warrant affidavit, and if
-7-
Case No. 2-17-01
the allegedly false statement is necessary to the finding of probable cause, the Fourth
Amendment requires that a hearing be held at the defendant’s request.”). The trial
court gave Wilkie time to secure an expert and set the matter for further hearing.
{¶15} On July 29, 2016, the trial court held further hearing on the
suppression motion. At the hearing, the trial court heard arguments from the parties,
but took no new evidence. The defense indicated that it had secured an expert but
it needed access to a “mirror image” of Wilkie’s computer for its expert to analyze
in order to attempt to show that the government’s software initially searched beyond
what Wilkie had shared publicly in Shareaza. The defense indicated that if the
government had searched Wilkie’s private files, the initial search locating Wilkie
would be illegal. The defense also indicated that it wanted to challenge the affidavit
for the search warrant pursuant to Franks v. Delaware.
{¶16} The trial court ordered the State to provide the defense with a mirror
image of Wilkie’s computer for the defense’s expert to analyze, and the trial court
also ordered Wilkie’s counsel to amend his motion to suppress to reflect the new
suppression arguments that were being raised, particularly once his expert had
analyzed Wilkie’s mirrored computer.
{¶17} Consistent with the trial court’s order, on September 12, 2016, Wilkie
filed his supplemental motion to suppress and a motion for access to the
government’s ShareazaLE software. In his motion, which was filed after his expert
-8-
Case No. 2-17-01
had analyzed the mirror image of Wilkie’s computer, Wilkie argued that he now
needed access to the ShareazaLE software program to establish that the government
searched the non-shared files on his computer and that the government thus
conducted an illegal search of his computer. Wilkie argued that while the State’s
officers had testified that the ShareazaLE software only searched his publicly shared
files, the officers were not qualified to render such opinions.
{¶18} Further, Wilkie argued that the affidavit for the search warrant was
insufficient because it did not contain a sufficient explanation of the software the
government used to detect Wilkie, and that because law enforcement did not own
the software, the State could not meet its burden to demonstrate that the files
obtained from Wilkie’s IP address were in a shared space. As a separate argument,
Wilkie argued that the affidavit did not specify what software was used by law
enforcement.
{¶19} Attached to Wilkie’s supplemental suppression motion, and what was
essentially a motion to compel access to the government’s software, was a copy of
Wilkie’s expert’s report. The report, from Tami Loehrs, indicated that Loehrs had
analyzed the mirrored copy of Wilkie’s computer, but not the external hard drive
due to time constraints. The report contained the following executive summary.
None of the files identified during the undercover investigation
were found on the computer. Although text fragments were
recovered from unallocated space indicating the files or portions
of the files existed at one time, I am unable to determine the
-9-
Case No. 2-17-01
content of the files, the state the files were in (completed, partial,
corrupted) or whether the files were publicly available. As such,
I am unable to corroborate the details set forth in Det.
Blackmore’s Affidavit with the forensic evidence from Mr.
Wilkie’s computer and the issues regarding law enforcement’s
proprietary software remain unanswered.
(Doc. No. 96, Ex. 1, p. 3).
{¶20} The defense also filed a document titled “Affidavit of Tami Loehrs,”
in an attempt to support its motion to compel, though the “affidavit” was unsworn.
The “affidavit” indicated that by the time Wilkie’s computer had been seized from
his residence, the operating system had been reinstalled and the files of child
pornography identified during the undercover investigation were not found. (Doc.
No. 100). Loehrs’ “affidavit” indicated that she wanted to recreate Wilkie’s
computer as closely as possible to what it would have been at the time of Detective
Blackmore’s undercover investigation, and then use the government’s software to
see if it was searching beyond what Wilkie was publicly sharing—or at least had
the capability to do so.
{¶21} The State opposed Wilkie’s supplemental suppression motion and his
motion to compel the government’s software, arguing that the trial court had already
heard evidence that Detective Blackmore used the law enforcement software to
download child pornography files from Wilkie’s shared space on Shareaza and that
Wilkie’s expert indicated in her own report that she could not contradict that
testimony. Further, the State argued that Wilkie was attempting a “fishing
-10-
Case No. 2-17-01
expedition,” and that under United States v. Pirosko, 787 F.3d 358 (6th Cir.2015),
it was not an abuse of discretion to deny such a request. Pirosko at 367 (“allowing
Pirosko access [to the government’s software] without any evidence of error would
needlessly expose the government’s enforcement tools to examination and
pointlessly drag out the course of litigation.”).
{¶22} In his reply, Wilkie argued it was the government’s burden to show
that the child pornography files were downloaded from his shared space, and the
government had not met that burden simply through the testimony of Detective
Blackmore. Wilkie maintained that Detective Blackmore was not even qualified to
render an opinion that the software only searched Wilkie’s shared space, despite his
training.
{¶23} On October 26, 2016, the trial court filed its entry on the matter. The
trial court denied Wilkie’s original suppression motion, his renewed suppression
motion, and his request to compel the government’s software. The trial court made
findings of fact, including that the defense expert’s statement was unsworn and it
did not qualify as an affidavit. Nevertheless, the trial court stated that there was
sufficient evidence before it to determine the issues without allowing the defense
expert to have access to the government’s software program or have a further
hearing on the matter.
-11-
Case No. 2-17-01
{¶24} Based on the evidence presented at the suppression hearing, the trial
court found that the search warrant was supported by probable cause and that there
was no intentional or reckless misstatement in it that was false or misleading
pursuant to Franks. Thus the trial court found that the search warrant was valid;
however, the trial court added that even if the warrant was not valid the police
conduct was still supported under the good-faith exception to the exclusionary rule
pursuant to United States v. Leon, 468 U.S. 897, which held that, “The Fourth
Amendment exclusionary rule should not be applied so as to bar the use * * * of
evidence obtained by officers acting in reasonable reliance on a search warrant
issued by a detached and neutral magistrate but ultimately found to be invalid.”
Leon at syllabus. The trial court further found that additional discovery would not
change the existence of good-faith in this case or the applicability of the good-faith
exception.
{¶25} Following the trial court’s denial of Wilkie’s motion to compel and his
suppression motion, Wilkie entered no contest pleas to all counts against him. After
a factual narrative related to the charges was presented to the trial court, Wilkie was
found guilty of all counts against him and he was sentenced to aggregate ten-year
prison term. A judgment entry memorializing Wilkie’s sentence was filed on
December 20, 2016. It is from this judgment that Wilkie appeals, asserting the
following assignments of error for our review.
-12-
Case No. 2-17-01
Assignment of Error No. 1
The trial court erred in denying the Motions to Suppress.
Assignment of Error No. 2
The trial court erred in denying the request for access to the
government software.
{¶26} For ease of discussion, we elect to address the assignments of error out
of the order in which they were raised.
Second Assignment of Error
{¶27} In Wilkie’s second assignment of error, he argues that the trial court
erred in denying his motion to compel access to the government’s ShareazaLE
software. Specifically, Wilkie argues that an analysis of the software was relevant
to the motion to suppress and to the trial, that defense had shown good cause to
request access to the software as the software could potentially show that an illegal
search occurred, and that the trial court improperly found that Detective
Blackmore’s testimony and the defense expert’s report were consistent.
{¶28} We review a trial court’s decision on a motion to compel discovery
under an abuse of discretion standard. See State v. Victor, 6th Dist. Sandusky No.
S-12-009, 2013-Ohio-2255, ¶ 5; see also State ex rel. The V Companies et al., v.
Marshall, 81 Ohio St.3d 467, 469, 1998-Ohio-329. An abuse of discretion
constitutes a decision that is arbitrary, unreasonable, or unconscionable. Blakemore
v. Blakemore, 5 Ohio St.3d 217, 219 (1983).
-13-
Case No. 2-17-01
{¶29} In this case, Wilkie’s original counsel filed a suppression motion and
a full hearing was held on it. At that hearing, Detective Blackmore testified that he
used a law enforcement specific version of Shareaza, called ShareazaLE, to identify
users sharing suspected child pornography. Detective Blackmore clearly testified
as to how the ShareazaLE software worked, how it identified Wilkie’s IP address as
having possible child pornography that was publicly shared, and how Detective
Blackmore downloaded the suspected child pornography from what he later learned
was Wilkie’s IP address. Detective Blackmore testified that the ShareazaLE
software did not search the private spaces of Wilkie’s computer, only the publicly
shared files.
{¶30} After the hearing, Wilkie obtained new counsel and his new attorney
indicated that he wanted to obtain an expert to dispute Detective Blackmore’s claims
that ShareazaLE only searched Wilkie’s publicly shared files. To do this, the expert
initially needed access to a mirrored copy of Wilkie’s computer to analyze it. The
trial court granted Wilkie’s request for access to the mirrored copy of Wilkie’s
computer for analysis and when the analysis of Wilkie’s computer was not able to
corroborate or discount Detective Blackmore’s testimony, Wilkie requested access
to the ShareazaLE software in an attempt to show that it did not operate as Detective
Blackmore claimed at the suppression hearing. The trial court denied Wilkie’s
request.
-14-
Case No. 2-17-01
{¶31} In our review of the trial court’s decision, we note at the outset that
Wilkie has never produced any evidence at all that the ShareazaLE software used to
detect Wilkie sharing suspected child pornography operated in any fashion other
than what Detective Blackmore testified to. The best Wilkie could suggest to
undermine Detective Blackmore’s testimony was that Wilkie “thought” he had
turned sharing off on his computer. Otherwise, Wilkie is only able to offer the
unsworn statement of his expert that it was possible that if she examined the
government’s software it may operate differently than Detective Blackmore’s
testimony.
{¶32} An argument similar to Wilkie’s was made to the Sixth Circuit Court
of Appeals in United States v. Pirosko, 787 F.3d 358 (6th Cir.2015). Pirosko was
another case that dealt with child pornography being shared via P2P software, and
the Sixth Circuit affirmed a trial court’s decision denying a defendant’s motion to
compel access to the government’s software, ShareazaLE. The Pirosko court
reasoned, inter alia, that although the government should not be given “a blank
check to operate its file-sharing detection software sans scrutiny,” it was “important
for the defendant to produce some evidence of government wrongdoing” before
going to the lengths to turn over the software. Pirosko at 366. The Pirosko court
reasoned that “allowing [a defendant] access without any evidence of error would
needlessly expose the government’s enforcement tools to examination and
-15-
Case No. 2-17-01
pointlessly drag out the course of litigation.”4 Id. at 367. But see U.S. v. Budziak,
697 F.3d 1105 (9th Cir.2012) (remanding a case to the trial court, under
distinguishable facts, to determine whether disclosure of the government’s software
would have led to a different outcome in the case).
{¶33} Here, Wilkie produced no actual evidence that the government’s
software operated in any manner other than what was testified to by Detective
Blackmore. The trial court granted Wilkie some leeway in an attempt to establish a
defense by allowing him to have an expert analyze the mirrored copy of his
computer. Wilkie’s expert was ultimately unable to dispute Detective Blackmore’s
claims, and we cannot find that the trial court abused its discretion in denying a
motion to compel further discovery on the matter. Therefore, Wilkie’s second
assignment of error is overruled.
First Assignment of Error
{¶34} In Wilkie’s first assignment of error, he argues that the trial court erred
in denying his motion for a Franks hearing, and that the trial court erred in denying
his motion to suppress, particularly without holding an additional hearing on the
matter. We will address each issue in turn.
4
In Pirosoko, the government argued strongly for “privilege” and the Sixth Circuit applied a “balancing
approach, weighing the government’s concerns against the needs articulated by Pirosko.” Pirosko at 365.
-16-
Case No. 2-17-01
Franks Hearing
{¶35} Wilkie first argues that the trial court erred by failing to hold a hearing
pursuant to Franks v. Delaware, 438 U.S. 154 (1978), after he alleged in his
supplemental suppression motion that the affidavit used to secure a search warrant
was insufficient and that the affidavit contained at least one misstatement.
{¶36} In order to secure a Franks hearing, courts have held that a defendant
must make a “ ‘substantial preliminary showing’ that a deliberate falsehood or
statement made with reckless disregard for the truth was included in the warrant
affidavit and the statement was necessary to the judge’s finding of probable cause.”
United States v. Falso, 544 F.3d 110, 125 (2d Cir.2008), quoting Franks, 438 U.S.
154, 155–56, 170–71. A search warrant affiant “does not necessarily act with
‘reckless disregard for the truth’ simply because he or she omits certain evidence
that a reviewing court, in its judgment, considers to be ‘clearly critical.’ ” (Emphasis
sic) United States v. Rajaratnam, 719 F.3d 139, 154 (2d Cir.2013). “Rather, the
reviewing court must be presented with credible and probative evidence that the
omission of information” in a search warrant application “was ‘designed to mislead’
or was ‘made in reckless disregard of whether [it] would mislead.’ ” Id. quoting
United States v. Awadallah, 349 F.3d 42, 68-69 (2d Cir.2003).
{¶37} To prove reckless disregard for the truth, a defendant must show that
the affiant entertained serious doubts as to the truth of his allegations. Because
-17-
Case No. 2-17-01
states of mind must be proved circumstantially, a factfinder may infer reckless
disregard from circumstances evincing obvious reasons to doubt the veracity of the
allegations. United States v. Whitley, 249 F.3d 614, 621 (7th Cir.2001); States v.
Thomas, D. Vermont, Nos. 5:12-cr-37, 5:12-cr-44, 5:12-cr-97, 2013 WL 6000484.
{¶38} In this case, the affidavit presented to obtain the search warrant stated,
in pertinent part, as follows.
Affiant states he is a Detective with the Auglaize County Sheriff’s
Office * * *[.] Affiant states he has become familiar with the
investigation of Det. Jeffrey Blackmore of the Van Wert Police
Department.
Det. Blackmore states that he is part of [a] task force that
is involved in the [sic] investigating the trading and file sharing of
child porn. During one investigation Det. Blackmore was
contacted by an individual out of St. Marys, Auglaize County,
Ohio. The first occurrence occurred on September 24, 2015. At
that time, Det. Blackmore received five video files. The file name
[sic] has a name “Webcam Omegle PTHC 2015 Sister Brother lick
suck + dog GREAT!!!.avi.” Within this the [sic] first video shows
a pre-pubescent girl who removes her pants and is naked from the
waist down, and an adult male who is wearing a mask. The girl
then removes the male’s pants. The male has an erection and
attempts to penetrate the girl’s vagina from behind and then from
the front.
* * * [The affidavit then similarly describes four of the other
downloaded videos containing “pre-pubescent” or “young” girls
engaging in sexual acts.] * * *
On October 14, 2015, Det. Blackmore prepared a subpoena
for Time Warner Cable requesting subscriber information for the
IP address associated with the files that were sent to him on
September 24, 2015. The IP address 184.58.67.84 came back to
Eric Wilkie who resides at 369 Northway Dr., St. Marys, Auglaize
-18-
Case No. 2-17-01
County, Ohio[.] * * * Affiant states Eric Wilkie was convicted of
Pandering Obscenity Involving a Minor in 1993.
Det. Blackmore than [sic] used software available to law
enforcement to track “Child Notable” computer files. These
Child Notable computer files include known files that have been
traded or shared on the internet that involve cases of child
pornography. In searching the IP address for Eric Wilkie there
are at least 67 incidents of that IP address accessing Child Notable
files. He also accessed 3 child erotic files, 6 age difficult files, and
3 beastiality. These Child Notable files all have unique filed [sic]
numbers that are unique just to that file. The files being shared
with Det. Blackmore have the individual’s nickname as “Eric”.
On October 18, 2015, Det. Blackmore received 13 more
files from “Eric” from the IP address that is associated with * * *
[Wilkie’s residence]. All 13 videos show either pre-pubescent
girls or girls between the age of 12 to 14 years of age in different
states of nudity and having different forms of sexual contact or
conduct.
(June 30, 2016, Suppression Hrg., State’s Ex. 1).
{¶39} On appeal Wilkie argues that the affidavit contained materially false
statements and that it was insufficient. In support of his position, Wilkie contends
that his expert, Tami Loehrs, presented an “affidavit” that stated that the law
enforcement software actually searched the private areas of Wilkie’s computer
rather than the public areas, that Wilkie never “contacted” Detective Blackmore as
the warrant affidavit stated, making the word “contacted” a material misstatement,
and that the affidavit did not adequately describe the software used by the
government.
-19-
Case No. 2-17-01
{¶40} First, Wilkie’s expert’s unsworn affidavit does not go so far as to claim
that the law enforcement software actually searched the private areas of Wilkie’s
computer to download the suspected child pornography in this case. Rather, the
expert merely stated that it was theoretically possible that upon examining the
government’s software she could find that the government’s software had such a
capability. This is far from the definite statement Wilkie claims exists in the
unsworn affidavit of his expert. To the contrary, the only evidence in the record,
presented by Detective Blackmore, was that Wilkie’s public files were searched
using ShareazaLE.
{¶41} Second, as to Wilkie’s claims that there was misleading information
in the search warrant affidavit, we note that while the word “contacted” in the
affidavit is perhaps inexact, it is not wholly inaccurate given that the law
enforcement software searches for people who are actively sharing “child notable”
files and the software informs the police officer when a user has been identified as
sharing those files. Thus it may be inexact to state that Wilkie “contacted” Detective
Blackmore when really the software was notifying Detective Blackmore that
Wilkie’s IP address was sharing suspect files, but being inexact does not remotely
rise to the level of a Franks issue, and it would not defeat probable cause here.
{¶42} Third, although Wilkie argues that the affidavit was insufficient
because it did not thoroughly describe the software used in this case, Wilkie ignores
-20-
Case No. 2-17-01
the fact that a search warrant only needs to establish probable cause. The Sixth
Circuit Court of Appeals considered essentially the exact same issue raised by
Wilkie in this assignment of error and rejected it in United States v. Schumacher,
611 Fed.Appx. 337, 341 (2015), cert. denied, 136 S.Ct. 434 (2015). In Schumacher,
the Sixth Circuit cited language that “probable cause [for a warrant] does not require
scientific certainty.” Schumacher quoting United States v. Chiaradio, 684 F.3d 265,
278-79 (1st Cir.2012). The Sixth Circuit was persuaded by the argument that the
defendant “provide[d] no precedent holding that a court must assess the reliability
of investigative software used to support a search warrant’s affidavit before finding
that probable cause for the warrant exists.” Id. at 341. Ultimately the Sixth Circuit
affirmed the trial court’s refusal to hold a Franks hearing where the defendant was
claiming that the warrant lacked probable cause because it failed to establish the
scientific reliability of the government’s software. We find Schumacher persuasive
here.
{¶43} In sum, Wilkie has shown no indication that the officers provided
material false statements or that they were reckless in that regard. Based on the
record before us we cannot find that the trial court erred in declining to hold a Franks
hearing. Wilkie’s arguments related to Franks are thus not well-taken.
-21-
Case No. 2-17-01
Suppression
{¶44} Appellate review of a motion to suppress presents a mixed question of
law and fact. State v. Burnside, 100 Ohio St.3d 152, 2003-Ohio-5372, ¶ 8 (2003).
When considering a motion to suppress, the trial court assumes the role of trier of
fact and is therefore in the best position to resolve factual questions and evaluate the
credibility of witnesses. Id. citing State v. Mills, 62 Ohio St.3d 357, 366 (1992).
Consequently, an appellate court must accept the trial court’s findings of fact if they
are supported by competent, credible evidence. Burnside at ¶ 8 citing State v.
Fanning, 1 Ohio St.3d 19 (1982). Accepting these facts as true, the appellate court
must then independently determine, without deference to the conclusion of the trial
court, whether the facts satisfy the applicable legal standard. Burnside at ¶ 8.
{¶45} Wilkie next argues that the trial court erred in failing to suppress the
evidence against him and, at the very least, that the trial court erred by failing to
hold an additional hearing on his supplemental suppression motion. More
specifically, Wilkie argues that a warrantless search took place when Detective
Blackmore downloaded the suspected child pornography from Wilkie. He contends
that the government did not establish that the files were downloaded from the shared
-22-
Case No. 2-17-01
space on his computer.5
{¶46} Contrary to Wilkie’s arguments, Detective Blackmore testified that the
software he used only searched shared files and that Wilkie was, in fact, sharing
suspected child pornography. The trial court found that Detective Blackmore’s
testimony was not disputed as Wilkie’s expert could not actually discount Detective
Blackmore’s testimony; rather, she could only state that text fragments of the files
that Detective Blackmore downloaded from Wilkie were recovered on Wilkie’s
computer, but she could not determine whether they were in a shared space. The
trial court’s conclusion that the only actual evidence in the record was that Detective
Blackmore downloaded the files from Wilkie’s shared space was correct, and thus
we cannot find that the trial court erred in denying Wilkie’s suppression motion.
{¶47} Finally, we note that Wilkie seems to place a lot of emphasis on the
fact that when his computer was searched in November of 2015, the files Detective
Blackmore downloaded from it in September and October of 2015 were no longer
5
It is fairly well-settled that there is no expectation of privacy in files shared over a P2P network. Various
state and federal courts have held that “a defendant’s utilization of a peer-to-peer file-sharing program [such
as Shareaza] that allows other public users of such software to access the shared files on that defendant’s
computer negates any reasonable expectation of privacy in those shared files.” United States v. Dennis, N.D.
Georgia No. 3:13-cr-10-TCB, 2014 WL 1908734, *7, citing United States v. Norman, 448 F. App’x 895, 897
(11th Cir.2011); see also Louisiana v. Daigle, 93 So.3d 657, 665 (La. App.2012) citing, inter alia, United
States v. Gabel, 2010 WL 3927697 (S.D.Fla.2010); Oregon v. Holland, 355 P.3d 194 (Or.App.2015). “This
is equally true if the investigating law enforcement officer uses software specially modified to screen for
child pornography, such as ShareazaLE * * * provided that the software has no greater access to the
defendants’ computer files than that available to any other Gnutella client.” Daigle, citing Gabel and United
States v. Borowy, 595 F.3d 1045 (9th Cir.2010).
Notably, some courts have extended this to “situations where a defendant may not have knowingly
enabled the sharing feature, or even where he affirmatively attempted to opt out.” Dennis, supra, citing
United States v. Borowy, 595 F.3d 1045, 1048 (9th Cir.2010).
-23-
Case No. 2-17-01
on the computer. However, it was weeks after Detective Blackmore’s initial
download from Wilkie’s computer that Wilkie’s computer was searched, so the files
simply could have been deleted. This seems particularly true given that Wilkie
recorded most of his pornography onto the external hard drive—an external hard
drive that his expert did not analyze according to her report. Notwithstanding that
point, Wilkie’s expert indicated that Wilkie’s operating system had been reinstalled
on his computer and the prior files were essentially gone, but even with the entire
operating system reinstalled, Wilkie’s expert was still able to find traces of some of
the files Detective Blackmore purportedly downloaded from Wilkie, meaning that
they likely had been present, at least in some capacity.6
{¶48} Based on the evidence presented, we cannot find that the trial court
erred in denying Wilkie’s suppression motion. Similarly, we cannot find that there
was any necessity for an additional hearing, particularly given that we previously
determined that the trial court did not abuse its discretion in denying Wilkie’s
motion to compel. Therefore, Wilkie’s first assignment of error is overruled.
6
Many of Wilkie’s arguments in his brief to this court and at the trial court level seem to focus more on the
weight and credibility that should be given to the officers and the evidence against Wilkie, not the
admissibility.
-24-
Case No. 2-17-01
Conclusion
{¶49} For the foregoing reasons Wilkie’s assignments of error are overruled
and the judgment of the Auglaize County Common Pleas Court is affirmed.
Judgment Affirmed
PRESTON, P.J. and ZIMMERMAN, J., concur.
/jlr
-25-