In the
United States Court of Appeals
For the Seventh Circuit
____________________
No. 17-1840
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
v.
NEIL C. KIENAST,
Defendant-Appellant.
____________________
Appeal from the United States District Court for the
Eastern District of Wisconsin.
No. 1:16-cr-00103-WCG-1 — William C. Griesbach, Chief Judge.
____________________
No. 17-1989
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
v.
MARCUS A. OWENS,
Defendant-Appellant.
____________________
Appeal from the United States District Court for the
Eastern District of Wisconsin.
No. 2:16-cr-00038-JPS-1 — J.P. Stadtmueller, Judge.
____________________
2 Nos. 17-1840, et al.
No. 17-2439
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
v.
BRAMAN B. BROY,
Defendant-Appellant.
____________________
Appeal from the United States District Court for the
Central District of Illinois
No. 1:16-cr-10030-MMM-JEH-1 — Michael M. Mihm, Judge.
___________________
ARGUED FEBRUARY 6, 2018 — DECIDED OCTOBER 23, 2018
____________________
Before RIPPLE, SYKES, and BARRETT, Circuit Judges.
BARRETT, Circuit Judge. In 2015, federal agents infiltrated a
child pornography website called Playpen and deployed a
computer program to identify Playpen’s users. This operation
resulted in the successful prosecution of defendants all
around the country, including Neil Kienast, Marcus Owens,
and Braman Broy, whose appeals are consolidated before us.
Kienast, Owens, and Broy, like many other defendants caught
in this sting, argue that the warrant authorizing the Playpen
searches was invalid and that the fruit of those searches—the
defendants’ identities—should therefore have been sup-
pressed. Every circuit that has considered the suppression ar-
gument has rejected it, and so do we. Even assuming that
these digital searches violated the Fourth Amendment, the
Nos. 17-1840, et al. 3
good-faith exception to the exclusionary rule applies. We af-
firm all three judgments.
I.
In 2014, the Federal Bureau of Investigation began investi-
gating a child pornography forum called Playpen. This site
created an anonymous space for its membership of over
150,000 people to discuss, consume, and share child pornog-
raphy.
Playpen exists solely on the dark web, so it can be accessed
only through a series of affirmative steps. First, the user must
download The Onion Router (Tor) software. The Tor software
makes user information untraceable by relaying it through a
series of interconnected computers. It also allows a user to ac-
cess the Tor network, where Playpen and other “hidden ser-
vices” websites are hosted. Once on this network, a user must
enter a specific sixteen-character web address to visit Playpen.
Finally, Playpen requires visitors to create a username and
password before granting them access to its contents.
In 2015, FBI agents gained access to Playpen’s servers and
relocated them to a government facility in the Eastern District
of Virginia. The FBI then operated the website for about two
weeks in order to observe Playpen users. But while the FBI
could observe Playpen traffic, Tor prevented it from identify-
ing any specific user information.
To unmask and apprehend the anonymous Playpen users,
the FBI sought a warrant in the Eastern District of Virginia to
use a Network Investigative Technique (NIT). The NIT de-
ployed computer code instructing computers that accessed
Playpen to send identifying information to the government.
4 Nos. 17-1840, et al.
In support of its warrant application to deploy the NIT, the
FBI submitted a 31-page affidavit from a special agent who
specialized in child pornography cases. The affidavit detailed
Playpen’s architecture and contents, explained the nature of
the Tor network, and described the numerous affirmative
steps a user had to take to locate Playpen and access its con-
tents. The affidavit further asserted that use of the NIT was
necessary to identify and locate the users and administrators
of Playpen, because other investigative procedures had either
failed or would likely fail.
The affidavit also provided details about the proposed
NIT. Special computer code would be added to the digital
content on the Playpen website. After a user entered a
username and password to access Playpen, the website would
cause the user’s computer to download that code. The code
would then instruct the user’s computer to send back the fol-
lowing information: (1) the computer’s IP address and the
date and time that it was determined; (2) a unique identifier
to distinguish data from that of other computers accessing
Playpen; (3) the computer’s operating system; (4) information
about whether the NIT had already been delivered to the
computer; (5) the computer’s host name; (6) the operating sys-
tem’s username; and (7) the computer’s media access control
address.
A federal magistrate judge in the Eastern District of Vir-
ginia issued the NIT Warrant in February 2015. The magis-
trate judge approved the use of the NIT to obtain information
from all “activating computers,” which the warrant described
as the computers “of any user or administrator who logs into
[Playpen] by entering a username and password.”
Nos. 17-1840, et al. 5
The three defendants on appeal were such users. At vari-
ous times during the nearly two weeks that the government
hosted the Playpen servers, Neil Kienast, Marcus Owens, and
Braman Broy accessed Playpen. By entering their usernames
and passwords, they unknowingly triggered the NIT, which
unmasked their identities. Once identified, FBI agents in the
Eastern District of Virginia notified FBI regional offices in the
defendants’ home districts. Local FBI agents then obtained
warrants to search the defendants’ computers and homes.
Each search unearthed child pornography.
On the basis of evidence recovered in these searches,
grand juries charged the defendants with receiving, pos-
sessing, or viewing child pornography in violation of 18
U.S.C. § 2252A. The defendants each moved to suppress the
evidence obtained as a result of the NIT Warrant, raising as-
sorted challenges to its validity. The respective district courts
denied their motions to suppress and the defendants entered
conditional guilty pleas, reserving the right to appeal the de-
nial of their suppression motions. These appeals followed.
II.
All three defendants assert that the searches performed by
the NIT violated the Fourth Amendment and that the evi-
dence obtained by them should have therefore been sup-
pressed. We need not decide, however, whether the searches
violated the Fourth Amendment. Even if they did, the district
courts did not err by declining to suppress the evidence, be-
cause the good-faith exception to the exclusionary rule ap-
plies.
Suppression of evidence is a “last resort.” Hudson v. Mich-
igan, 547 U.S. 586, 591 (2006). It is not a personal constitutional
6 Nos. 17-1840, et al.
right, nor is it intended to remedy the injury of having one’s
rights violated. Davis v. United States, 564 U.S. 229, 236 (2011).
Instead, it is a judge-made rule meant to deter future Fourth
Amendment violations. Id. at 236–37. And its application has
been strictly limited by the Supreme Court.
The Court has instructed that the exclusionary rule be lim-
ited to cases in which its deterrent effect on police conduct
will outweigh its “heavy costs.” Id. at 237. Strong cases for ex-
clusion involve “deliberate, reckless, or grossly negligent dis-
regard for Fourth Amendment rights” on the part of the po-
lice. Id. at 238 (internal quotation marks omitted). In such
cases, “the deterrent value of exclusion is strong and tends to
outweigh the resulting costs.” Id. But exclusion is not appro-
priate where “the police act with an objectively reasonable
good-faith belief that their conduct is lawful.” Id. (internal
quotation marks omitted). In that type of case, “the deterrence
rationale loses much of its force, and exclusion cannot pay its
way.” Id. (internal quotation marks and citations omitted).
The flagship case for this “good faith” principle is United
States v. Leon, 468 U.S. 897 (1984).
The defendants offer two major arguments against apply-
ing the good-faith exception in this case. The first is that the
good-faith exception is categorically inapplicable when the
warrant is void ab initio (or “from the beginning”). According
to the defendants, this warrant is void because the magistrate
judge lacked the authority to issue it. Federal Rule of Criminal
Procedure 41(b)(1) authorizes a magistrate judge “to issue a
warrant to search for and seize a person or property located
within the [magistrate judge’s] district.” This warrant, they
say, extended to people and property located outside the
magistrate’s district. Defendants contend that a void warrant
Nos. 17-1840, et al. 7
is tantamount to no warrant at all, nullifying the good-faith
exception. 1
We disagree. Even if the warrant were void ab initio, we
would treat this like any other constitutional violation. We see
no reason to make the good-faith exception unavailable in
such cases. The deterrence rationale for the exclusionary rule
aims at the conduct of the police, not the conduct of the mag-
istrate judge. See Davis, 564 U.S. at 238 (focusing the cost-ben-
efit analysis in exclusion cases on the “flagrancy of the police
misconduct” at issue). Thus, whether the magistrate judge
lacked authority has no impact on the rule. As Leon explains,
“[p]enalizing the officer for the magistrate’s error, rather than
his own, cannot logically contribute to the deterrence of
Fourth Amendment violations.” 468 U.S. at 921; see also Her-
ring v. United States, 555 U.S. 135, 136–37 (2009) (invoking the
good-faith exception where an officer reasonably but wrongly
believed that there was an outstanding arrest warrant for the
defendant); cf. United States v. Cazares-Olivas, 515 F.3d 726, 730
(7th Cir. 2008) (concluding that even though the violation of
Rule 41 was “regrettable,” allowing the defendants to go free
on that basis “would be a remedy wildly out of proportion to
the wrong”). Other circuits have similarly held that the good-
faith exception can apply to warrants that are void ab initio.
See United States v. Levin, 874 F.3d 316, 323–24 (1st Cir. 2017);
United States v. Werdene, 883 F.3d 204, 216–17 (3d Cir. 2018);
United States v. McLamb, 880 F.3d 685, 691 (4th Cir. 2018);
United States v. Horton, 863 F.3d 1041, 1050 (8th Cir. 2017);
United States v. Workman, 863 F.3d 1313, 1319 (10th Cir. 2017);
1
We note that Rule 41 was amended in 2016 to expressly permit mag-
istrate judges to issue warrants such as the NIT Warrant here. See Fed. R.
Crim. P. 41(b)(6)(A).
8 Nos. 17-1840, et al.
see also United States v. Master, 614 F.3d 236, 242–43 (6th Cir.
2010) (repudiating a prior pronouncement that ab initio war-
rants preclude application of the good-faith exception in light
of intervening Supreme Court precedent).
The defendants’ second argument is that the good-faith
exception fails on its own terms because the agents did not
execute this search in good faith. 2 Leon states that the good-
faith exception might not apply in cases where: (1) “the issu-
ing magistrate wholly abandoned his judicial role”; (2) the
warrant was “so lacking in indicia of probable cause as to ren-
der official belief in its existence entirely unreasonable”; or (3)
“a warrant [was] so facially deficient” that the “executing of-
ficers [could not] reasonably presume it to be valid.” Leon, 468
U.S. at 923.
The defendants focus on the third scenario, arguing that
the officers should have recognized this warrant as facially in-
valid. They maintain that a well-trained officer, familiar with
computer investigations and associated warrants, knows that
a magistrate judge lacks the authority to authorize a warrant
outside his or her own district. This warrant permitted the of-
ficers to access information originating from computers
around the country. Thus, the defendants say, the officers
should have known that the magistrate judge lacked author-
ity to issue it.
The defendants are wrong—the officers could have rea-
sonably relied on the magistrate judge’s conclusion that this
Sometimes, the defendants’ arguments seem centered on the agents
2
located in the Eastern District of Virginia; other times, their arguments
drift to attack the local agents who executed the search warrants. Our anal-
ysis does not depend on which agents were allegedly at fault.
Nos. 17-1840, et al. 9
warrant was consistent with Rule 41. This warrant poses dif-
ficult conceptual questions about what occurred. Perhaps the
warrant impermissibly allowed the search of computers out-
side the magistrate judge’s district, as the defendants suggest.
But the government suggests another theory. It notes that un-
der Rule 41(b)(4), a magistrate judge can issue a warrant for
the installation of a “tracking device” within the district that
can track movement outside the district. Fed. R. Crim. P.
41(b)(4). The government characterizes the NIT as such a de-
vice, maintaining that its installation occurred in-district be-
cause the defendants were accessing servers located in that
district. Choosing between these frameworks has split district
courts across the country, which underscores the difficulty of
the question. 3 See United States v. Taylor, 250 F. Supp. 3d 1215,
1222–23 (N.D. Ala. 2017) (collecting cases). We do not decide
this question today because we hold that the good-faith ex-
ception applies in any event. But the fact that so many district
judges have differed on this question is strong evidence that
any error on the part of the magistrate judge would not nec-
essarily have been obvious to the officers.
The defendants raise other theories of bad faith. They note
that “where the officer seeking the warrant was dishonest or
reckless in preparing the affidavit,” the good-faith exception
does not apply. United States v. Harris, 464 F.3d 733, 740 (7th
Cir. 2006). Owens maintains that the affidavit accompanying
the NIT Warrant contained dishonest statements that omitted
material information. The affidavit, for example, describes the
Playpen homepage as featuring “two images depicting
3Two courts of appeals have held that the NIT Warrant violated Rule
41 but that the good-faith exception applied. See Werdene, 883 F.3d at 217;
Horton, 863 F.3d at 1052.
10 Nos. 17-1840, et al.
partially clothed prepubescent females with their legs spread
apart,” which was true as of February 18, 2015. But on Febru-
ary 19, the site administrator changed the homepage to in-
stead depict a prepubescent girl wearing a short dress. Owens
makes much of the fact that the affidavit had not been up-
dated to reflect this change when the magistrate judge signed
the warrant on February 20. This change is immaterial. And
even if it were not, the failure to update the affidavit in real
time would not begin to approach the dishonesty that Harris
describes.
Nor do we think that the police behavior here was reck-
less. The defendants believe that the warrant was reckless be-
cause it was overinclusive. They insist that it sweeps up inno-
cent actors that stumble upon Playpen but don’t engage in
any illegal activity. But by the time such actors have down-
loaded the software needed to access the dark web, entered
the specific, sixteen-digit character jumble that is Playpen’s
web address, and logged into the site featuring at least one
sexually suggestive image of a child, we are very skeptical
that they are surprised to find themselves on a website offer-
ing child pornography.
The record establishes that the FBI acted reasonably both
when it prepared its affidavit and when it executed the search
warrants. Faced with the daunting task of apprehending tens
of thousands of individuals engaged in perverse crimes but
cloaked in anonymity through their use of Tor, the FBI devel-
oped a sophisticated tool to unmask and locate those sus-
pected criminals. The agency fully and accurately described
the NIT to the neutral and detached magistrate judge who
signed the warrant. We join the five circuits who have held the
good-faith exception applicable to this NIT Warrant. See Levin,
Nos. 17-1840, et al. 11
874 F.3d at 324, Werdene, 883 F.3d at 217–19; McLamb, 880 F.3d
at 689–90; Horton, 863 F.3d at 1052; Workman, 863 F.3d at 1321.
In the absence of culpable police conduct, the exclusionary
rule cannot “pay its way.” Davis, 564 U.S. at 238.
III.
Kienast and Owens individually raise additional chal-
lenges to their convictions. We address these in turn.
Kienast asserts that the district court erred by denying his
motion to compel the government to allow him to review the
NIT source code and cross-examine the FBI special agent who
created the affidavit. According to Kienast, he needs this in-
formation to establish the scope of the Fourth Amendment vi-
olation. The district court rejected his motion, holding that the
information Kienast sought was immaterial to the good-faith
determination. We review a district court’s ruling on a motion
to compel discovery for abuse of discretion. Thermal Design,
Inc. v. Am. Soc'y of Heating, Refrigerating & Air-Conditioning
Eng’rs, Inc., 755 F.3d 832, 838 (7th Cir. 2014). The district court
did not abuse its discretion in holding that the discovery
sought was immaterial and “essentially a fishing trip.” Testi-
mony from the FBI agent and access to the source code would
not have affected the good-faith determination.
Owens argues that the fruit of the NIT search should be
suppressed because the government’s conduct was so “outra-
geous” that it violated his right to due process. He cites Rochin
v. California, which holds that certain conduct that “shocks the
conscience” can constitute a due process violation. 342 U.S.
165, 172 (1952) (police pumping the stomach of a suspect to
obtain evidence violated due process). Owens asserts that by
operating the Playpen website after seizing it, the
12 Nos. 17-1840, et al.
“government distributed over a million images of child por-
nography,” which he believes qualifies as “outrageous con-
duct” that shocks the conscience. His theory is that this un-
constitutional behavior “absolutely bar[s] the government
from invoking judicial processes,” which he thinks justifies
suppression. United States v. Russell, 411 U.S. 423, 431–32
(1973). The district court denied relief on this ground, but it
noted a “tension” between our circuit and the Supreme Court
concerning the availability of this defense. United States v. Ow-
ens, 2016 WL 7079617, at *4 (E.D. Wis. Dec. 5, 2016).
There is no conflict between our cases and the Supreme
Court’s. In United States v. Russell, the Court left open the pos-
sibility that the government’s engagement in illegal activity
might violate due process if it is “shocking to the universal
sense of justice.” 411 U.S. at 431–32. In that case, an under-
cover agent supplied the defendant with an essential ingredi-
ent for the manufacture of methamphetamine as part of an
operation to gather evidence against him. While the Court de-
termined that this conduct did not shock the conscience, it
said that it “may some day be presented with a situation in
which the conduct of law enforcement agents is so outrageous
that due process principles would absolutely bar the govern-
ment from invoking judicial processes to obtain a conviction.”
Id.
Thus, the Supreme Court did not foreclose the “outra-
geous conduct” defense—but it did not mandate its applica-
tion either. And “[w]e repeatedly have reaffirmed our deci-
sion not to recognize the defense.” United States v. Smith, 792
F.3d 760, 765 (7th Cir. 2015); see also United States v. Stallworth,
656 F.3d 721, 730 (7th Cir. 2011) (“Outrageous government
conduct is not a defense in this circuit.”). Our cases are
Nos. 17-1840, et al. 13
consistent with those of the Court and they control here. And
in any event, the defense would do Owens no good even if it
were available. In Russell, the defendant was the victim of the
government’s allegedly outrageous conduct. Russell, 411 U.S.
at 431–32. Here, Owens does not charge the government with
harming him; he complains that the government’s allegedly
outrageous conduct harmed the children whose images were
distributed while the government operated the server. Ow-
ens’s argument is itself more than a little outrageous: he seeks
to shield himself from prosecution because the children he
victimized were allegedly victimized by someone else too.
Owens makes one last pitch: he asks us to remand his case
for a Franks hearing. In Franks v. Delaware, the Court held that
the Fourth Amendment entitles a defendant to an evidentiary
hearing when a defendant makes a substantial preliminary
showing that the police procured a warrant to search his
property with intentional or reckless misrepresentations in
the warrant affidavit and such statements were necessary to a
finding of probable cause. 438 U.S. 154, 171–72 (1978). The dis-
trict court rejected Owens’s argument because it found that
Owens failed to make the requisite “substantial preliminary
showing” to justify a hearing. Owens, 2016 WL 7079609, at *7.
We agree with the district court. As we explained, law en-
forcement made no reckless misrepresentations. Owens fur-
ther gives us no “firm and definite” reasons, under the requi-
site clear error review, why the district court erred. United
States v. Pace, 898 F.2d 1218, 1226–27 (7th Cir. 1990). The dis-
trict court, armed with all the information that we reviewed,
made a reasoned determination to deny Owens a Franks
14 Nos. 17-1840, et al.
hearing.
IV.
The arguments that the defendants raise on appeal con-
cerning the constitutionality of the NIT Warrant all lead to the
same outcome: the agents acted in good-faith reliance on the
NIT Warrant, and there is nothing to deter by applying the
exclusionary rule. The defendants’ distinct arguments are
without merit. Each defendant’s judgment of conviction is ac-
cordingly AFFIRMED.