People v. Evensen

4 Cal. App. 5th 1020, 16 Cal. Daily Op. Serv. 11, 208 Cal. Rptr. 3d 784, 2016 Cal. App. LEXIS 917
CourtCalifornia Court of Appeal
DecidedOctober 27, 2016
DocketA145162
StatusPublished
Cited by1 cases

This text of 4 Cal. App. 5th 1020 (People v. Evensen) is published on Counsel Stack Legal Research, covering California Court of Appeal primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
People v. Evensen, 4 Cal. App. 5th 1020, 16 Cal. Daily Op. Serv. 11, 208 Cal. Rptr. 3d 784, 2016 Cal. App. LEXIS 917 (Cal. Ct. App. 2016).

Opinion

*1022 Opinion

HUMES, P. J.

—Defendant Richard Patrick Evensen pleaded guilty to various sex crimes after the trial court denied his motion to suppress evidence. The evidence leading to his arrest was obtained when police used software that targets peer-to-peer file-sharing networks to identify Internet Protocol (IP) addresses associated with known digital files of child pornography. A public website revealed one such identified IP address to be registered with Comcast, and the execution of a search warrant on Comcast showed the subscriber of the IP address to be Evensen’s mother. A second search warrant was then executed on the mother’s home, where Evensen lived, and further inculpatory evidence was found. After Evensen was arrested, more evidence of wrongdoing, some involving different victims, came to light.

Evensen argues that the trial court wrongly denied his motion to suppress because all of the evidence against him emanated from the police’s use of the software that targets peer-to-peer networks. According to him, the use of this software violated his Fourth Amendment rights by infringing on his reasonable expectation of privacy in his computer. We reject the argument and affirm.

I.

Background

By using a set of software tools known as RoundUp, police learned that an IP address, 1 later determined to be assigned to Evensen’s mother, had downloaded child pornography. RoundUp enables law enforcement officials to detect child pornography on peer-to-peer file-sharing networks. Peer-to-peer networks allow users to share digital files over the Internet. To access these networks, users need only download onto their computers a free software program. The program allows a network user to upload a file onto his or her computer, and it then allows other users to access and download the file onto their own devices. A user who buys a music CD, for example, can convert it into a digital file and upload it onto the peer-to-peer network, thereby allowing other users to access and download the file.

When a network user uploads a file, it is placed in a “shared folder” on the user’s computer. Other users can find files in shared folders by using a *1023 keyword search. When a user finds a desired file, the user can download it from one or multiple hosts. Using multiple hosts accelerates the download. A user could, for example, take the beginning of a video file from a computer in San Francisco, the middle from a computer in Berlin, and the end from a computer in Sydney. The peer-to-peer software reassembles the pieces into a single file.

In this case, Evensen used a peer-to-peer network called eDonkey, which he accessed through a program called eMule. The program creates a shared folder on each user’s computer, and downloaded files are automatically placed in it. The shared folder is accessible to all other users unless the downloading user changes the default setting by selecting an option called “Nobody.” Another way a downloading user can prevent others from accessing a file is to transfer it elsewhere on his or her computer and delete the copy in the shared folder.

Evensen used eMule between September 9, 2011, and December 16, 2012. At the hearing on his motion to suppress, Evensen testified that he took several measures to prevent other users from accessing his files. To begin with, he modified eMule’s default settings by selecting the “Nobody” option. But, as Evensen acknowledged, the feature did not always work or he did not always activate it. One time, he saw another user downloading a pornographic file from his computer, and he canceled the download.

Evensen testified that he also transferred files from his shared folder to other places on his computer that were inaccessible to other network users. He admitted, however, that he did not always transfer them immediately. He testified: “At times when I was downloading I would usually move all of them, but sometimes I wouldn’t move all of ’em due to the file progress. The files not actually being what they say they would be. They would be either viruses or zip folders .... So when I used that I didn’t have time or I didn’t want to take the time to unzip those folders that I downloaded of those files and so they’d sit in my shared folder.”

Finally, Evensen testified that he “max[ed] out” his download speed at 999 downloads, meaning he could download material from 999 sources at once, and reduced to “one” the speed by which another user could download his files. These settings apparently accelerated the speed by which Evensen could download a file, and they restricted other users to downloading only one file at a time from his shared folder. The full extent to which these settings impeded other users’ ability to access his files is unclear from the record.

*1024 At the suppression hearing, Officer Daniel Ichige 2 also testified, and he explained how RoundUp works. He described how it retrieves information from peer-to-peer networks, uploads the information onto a server, and makes the information available to law enforcement officials. Officer Ichige explained that RoundUp is specifically used to search for known and verified digital files of child pornography. Each digital photograph has a “hash,” a digital fingerprint or serial number, which, according to Officer Ichige, is more distinctive than DNA. Law enforcement officers feed RoundUp a set of hashes of known child pornography files, and RoundUp then searches peer-to-peer networks for them. Officer Ichige explained that RoundUp compiles information from files stored in network users’ shared folders but not from files stored elsewhere on users’ computers. Apparently, RoundUp runs unattended and constantly searches peer-to-peer networks for files with hashes matching known child pornography. By using the program, law enforcement officers avoid the need to search networks with keywords, identify suspicious files, download those files, and confirm whether they depict child pornography.

The RoundUp website reports IP addresses of computers that have downloaded files with hashes of known child pornography. Law enforcement officers can focus their RoundUp searches on IP addresses that are likely to be associated with computers physically located in the officers’ jurisdiction. Officer Ichige explained that RoundUp can show the “history” of an IP address, starting “[fjrom the time that the first child pornography file was made apparent” to the program.

In this case, Officer Darlene Elia of the Napa Police Department used the RoundUp website in February 2013 to look for Napa County IP addresses used to download or share child pornography. She searched all available peer-to-peer networks. The search returned an IP address, eventually determined to be Evensen’s mother’s, that was first seen using eMule on September 9, 2011, and last seen on December 16, 2012. RoundUp flags files known to be child pornography by coding them in red. Looking at RoundUp’s historical list for this particular IP address, Officer Elia saw over 200 red flags.

Using a public website, Officer Elia determined that the IP address was registered to Comcast.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

People v. Hartman CA4/3
California Court of Appeal, 2026
People v. Rowland
California Court of Appeal, 2022

Cite This Page — Counsel Stack

Bluebook (online)
4 Cal. App. 5th 1020, 16 Cal. Daily Op. Serv. 11, 208 Cal. Rptr. 3d 784, 2016 Cal. App. LEXIS 917, Counsel Stack Legal Research, https://law.counselstack.com/opinion/people-v-evensen-calctapp-2016.