FILED
NOT FOR PUBLICATION
JAN 21 2020
UNITED STATES COURT OF APPEALS MOLLY C. DWYER, CLERK
U.S. COURT OF APPEALS
FOR THE NINTH CIRCUIT
UNITED STATES OF AMERICA, No. 18-10038
Plaintiff-Appellee, D.C. No. 3:16-cr-00210-WHA-1
v.
MEMORANDUM*
GEORGE VORTMAN,
Defendant-Appellant.
Appeal from the United States District Court
for the Northern District of California
William Alsup, District Judge, Presiding
Submitted January 8, 2020**
San Francisco, California
Before: W. FLETCHER and FRIEDLAND, Circuit Judges, and HILLMAN,***
District Judge.
*
This disposition is not appropriate for publication and is not precedent
except as provided by Ninth Circuit Rule 36-3.
**
The panel unanimously concludes this case is suitable for decision
without oral argument. See Fed. R. App. P. 34(a)(2).
***
The Honorable Timothy Hillman, United States District Judge for the
District of Massachusetts, sitting by designation.
Defendant-Appellant George Vortman appeals the district court’s orders
denying his motion to suppress evidence and motion to dismiss his indictment.
Vortman argues that the government obtained evidence against him pursuant to a
warrant that was issued in violation of Federal Rule of Criminal Procedure 41, and
that was overbroad and not supported by probable cause. He further claims that
the government’s outrageous conduct warrants dismissal of his indictment. We
review both of the district court’s denials de novo, see United States v. Ruckes, 586
F.3d 713, 716 (9th Cir. 2009); United States v. Black, 733 F.3d 294, 301 (9th Cir.
2013), and affirm both orders.
This court has already examined the precise warrant at issue in the context of
another case. See United States v. Henderson, 906 F.3d 1109 (9th Cir. 2018). We
thus review the warrant and the related technology only briefly here.
In 2014, the Federal Bureau of Investigation (“FBI”) began investigating
“Playpen,” an online forum for sending and receiving child pornography. In
January 2015, the FBI seized Playpen’s servers and later began to operate the
Playpen website from FBI facilities in Virginia. In February 2015, the FBI
obtained a warrant from a magistrate judge in the Eastern District of Virginia
authorizing use of a Network Investigative Technique (“NIT”), in order to identify
Playpen users (“the NIT warrant”).
2
The NIT warrant authorized search of all “activating computers,” or the
computers “of any user or administrator who logs into [Playpen] by entering a
username and password,” “wherever [that computer was] located.” When a person
logged into, or “activated,” Playpen with a username and password, the NIT
technology would cause the user’s computer to send seven pieces of identifying
information to the government server, such as the computer’s internet protocol
address. Id. at 1112. This technology was allegedly necessary because Playpen
was hosted on an anonymous network that allowed users to access websites
without otherwise revealing identifying information. See id.
Using the NIT, the FBI found that the user “childpornstar” had registered
with Playpen on January 3, 2015, a month before the FBI’s takeover of Playpen,
had accessed child pornography videos, and had actively logged onto Playpen for
approximately 18 hours between January 3, 2015 and March 4, 2015. The FBI
traced the user’s IP address to a residence in San Francisco, which it searched
pursuant to a separate warrant. The FBI seized a number of digital devices
belonging to Vortman with more than 1,000 photographs and 150 videos of child
pornography. Vortman was later charged with violating 18 U.S.C. § 2252(a)(2),
(b)(1), “Receipt of Child Pornography” and 18 U.S.C. § 2252(a)(4)(B), (b)(2),
“Possession of Child Pornography.”
3
Vortman challenges the NIT warrant on two grounds. First, he argues that
because the warrant was issued in violation of Federal Rule of Civil Procedure 41,
evidence seized pursuant to it should be suppressed. In Henderson, we held that
the NIT warrant violated Rule 41, but held that the good-faith exception
nevertheless excused the violation. See id. at 1119–20. Vortman offers no reason
to depart from that holding here, and we thus hold that the good-faith exception
excused the violation here.
Next, Vortman argues that the NIT warrant was overbroad and was not
supported by probable cause. We review the specificity of a warrant de novo,
United States v. Wong, 334 F.3d 831, 836 (9th Cir. 2003), and a finding of
probable cause for clear error, United States v. Meek, 366 F.3d 705, 712 (9th Cir.
2004).
The NIT warrant was not overbroad. See Henderson, 906 F.3d at 1119. It
described the place to be searched (activating computers) and the information to be
seized (seven pieces of identifying information) with particularity. See United
States v. Smith, 424 F.3d 992, 1004 (9th Cir. 2005).
Furthermore, the NIT warrant authorized only search of “activating”
computers—i.e., those that logged into Playpen during the time the government
operated the website with a username and password. In order to use an “activating
4
computer,” a user had to first download and install software to use the
anonymizing network on which Playpen operated. Next, a user could not access
Playpen through the open internet, but would instead have to find and input
Playpen’s exact algorithmic address (which we decline to provide here).
Henderson, 906 F.3d at 1111. In order to access Playpen’s contents, the user
would have to navigate past Playpen’s homepage, which depicted two minor
females with their legs spread apart, and register with a username and password.
Because there were multiple affirmative steps required to be an “activating
computer,” the warrant applied to those actively attempting to access child
pornography. It did not sweep too broadly.
Vortman next argues that the NIT warrant lacked probable cause because
Playpen users could be attempting to access the legal content on Playpen, such as
its fiction stories. The district court’s finding of probable cause was not clear
error. See United States v. Vortman, 2016 WL 7324987, at *7–*9 (N.D. Cal. Dec.
16, 2016). First, as the district court pointed out, we rejected a similar argument in
United States v. Gourde, 440 F.3d 1065, 1070 (9th Cir. 2006). Second, the
multiple affirmative steps a user had to take in order to access any Playpen content
establish a “fair probability” that registered users were accessing illegal content.
Meek, 366 F.3d at 712. That “fair probability” becomes considerable when
5
factoring in that the overwhelming majority of Playpen’s content was patently
illegal depictions of child pornography.
Finally, Vortman argues that the government acted so outrageously by
operating Playpen as to warrant dismissal of his indictment. To prevail on a
governmental misconduct claim, Vortman must meet the “extremely high
standard” of showing that the facts underlying his arrest and prosecution “violate[]
fundamental fairness” or are “so grossly shocking . . . as to violate the universal
sense of justice.” Black, 733 F.3d at 298; see also United States v. Russell, 411
U.S. 423, 431–32 (1973). Vortman fails to meet this high standard.
To determine whether government conduct was outrageous, a court
generally considers the six Black factors. See Black, 733 F.3d at 303. The district
court appropriately concluded that all six factors weighed against dismissal. See
Vortman, 2016 WL 7324987, at *5–*6. The first two factors, (1) known criminal
characteristics of the defendant and (2) individualized suspicion of the defendant,
weigh against dismissal because the government reasonably believed that
registered Playpen users were viewing and sharing child pornography. The next
two factors, (3) the government’s role in creating the crime of conviction and (4)
the government’s encouragement of the defendants to commit the offense, weigh
against dismissal because Vortman voluntarily accessed Playpen before
6
government seizure and then again without any government prompting. Next, (5)
the nature of the government’s participation in the offense, weighs against
dismissal because the government operated Playpen for only two weeks, acted as a
mere observer, and began the enterprise only after Vortman had already accessed
Playpen. Finally, (6) the nature of the crime being pursued and necessity for the
actions taken, weighs against dismissal because due to the anonymous network on
which Playpen operated, other investigative procedures were likely to fail.
Moreover, we have rejected the outrageous conduct argument in comparable
governmental stings involving arguably more outrageous conduct. See, e.g.,
United States v. Mayer, 503 F.3d 740, 754–55 (9th Cir. 2007); United States v.
Mitchell, 915 F.2d 521, 525–26 (9th Cir. 1990). The government’s conduct does
not warrant dismissal of Vortman’s indictment.
AFFIRMED.
7