State v. Roberts

2015 UT 24, 345 P.3d 1226, 2015 Utah LEXIS 69, 779 Utah Adv. Rep. 139, 2015 WL 404627
CourtUtah Supreme Court
DecidedJanuary 30, 2015
Docket20120884
StatusPublished
Cited by41 cases

This text of 2015 UT 24 (State v. Roberts) is published on Counsel Stack Legal Research, covering Utah Supreme Court primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
State v. Roberts, 2015 UT 24, 345 P.3d 1226, 2015 Utah LEXIS 69, 779 Utah Adv. Rep. 139, 2015 WL 404627 (Utah 2015).

Opinion

Justice PARRISH,

opinion of the Court:

INTRODUCTION

{1 Daniel Roberts entered a conditional guilty plea to five charges of sexual exploitation of a minor arising from child pornography on his laptop computer. On appeal, Mr. Roberts challenges four of the district court's pretrial rulings. He first challenges the propriety of law enforcement's use of the Wyoming Toolkit, a computer program and database used to identify child pornography shared over the Internet through peer-to-peer file sharing networks. Mr. Roberts next challenges the district court's ruling that denied him discovery of the Wyoming Toolkit. He also brings a constitutional challenge to Utah's sexual exploitation of a minor statute (Sexual Exploitation Statute) under which he was charged, Utah Code section 76-52-8 (2009) (renumbered as Utah Code seetion 76-5b-201). Finally, Mr. Roberts challenges the district court's denial of his motion in limine to exclude all evidence obtained by or related to the Wyoming Toolkit. We affirm the district court on all issues.

BACKGROUND

T2 Utah's Internet Crimes Against Children task force (ICAC) works to prevent the online distribution of child pornography. The ICAC searches peer-to-peer (P2P) file sharing networks for child pornography being shared among P2P users. Gnutella, one such P2P network, allows its users to share digital files directly over the Internet. 1 Gnu-tella uses what is called the secure hash algorithm (SHA-1) eneryption method to assign a unique digital signature to each file shared over its network. Because each digital file has a different SHA-1 value, those values can be used to identify a file. *1231 Through prior investigations, law enforcement has compiled a database of thousands of SHA-1 values that correspond to files, containing child pornography. This database, along with software that searches Gnu-tella for the identified SHA-1 values, is known as the Wyoming Toolkit.

3 The ICAC uses the Wyoming Toolkit to monitor Gnutella for IP addresses sharing files with suspect SHA-1 values. Once the Toolkit flags an IP address sharing a file with an SHA-1 value that matches known child pornography files, officers confirm that the suspect file is indeed child pornography either by downloading and viewing the file directly or by comparing the identified file's SHA-1 value with SHA-1 values of known child pornography contained in databases like the National Child Victim Identification Program. Upon confirming that the identified file is child pornography, officers send an administrative subpoena to the applicable internet service provider to obtain the subscription information associated with the identified IP address.

T 4 During a 2009 investigation, the ICAC determined that an IP address in Emery County, Utah, had used Gnutella to share hundreds of "files with SHA-1 digital signatures identical to images of suspected child pornography" during a five month period. The ICAC submitted these findings to FBI Agent Sonja Nordstrom. Upon confirming the files contained child pornography, 2 Agent Nordstrom served a subpoena on Emery Telecom, the local internet service provider, which was able to identify Mr. Roberts as the owner of the suspect IP address. Based on this information, Agent Nordstrom obtained a search warrant for Mr. Roberts' home and computers.

15 Mr. Roberts was not home the day police officers executed the search warrant. Agent Nordstrom called Mr. Roberts on his cell phone to inform him of the search, but did not discuss the purpose of the investigation. Mr. Roberts told Agent Nordstrom that he was in Ogden, Utah, where his wife was in the hospital. Agent Nordstrom later spoke with Mr. Roberts' wife, who indicated that Mr. Roberts had his laptop computer with him in Ogden.

T 6 Agent Nordstrom traveled to Ogden to meet with Mr. Roberts. Mr. Roberts brought his laptop to the meeting, and Agent Nordstrom explained to Mr. Roberts that he was being investigated for possession of child pornography. After some questioning, Mr. Roberts admitted that he had been downloading child pornography for approximately a year and that he had been in the process of deleting the child pornography from his computer since Agent Nordstrom had called him. After Mr. Roberts made this admission, Agent Nordstrom asked if she could see his laptop. Mr. Roberts consented. Agent Nordstrom subsequently obtained a search warrant specifically for Mr. Roberts' laptop.

T7 Mr. Roberts' laptop was taken to a computer forensic lab, where an examiner found video and still images of child pornography. Mr. Roberts was charged with thirty counts of sexual exploitation of a minor, a second degree felony. Urax Cong § 76-5a-8 (2009). 3 Before trial, Mr. Roberts made four motions that are the subject of this appeal. First, he moved to suppress the evidence of child pornography found on his laptop. Relying on the United States Supreme Court case Kyllo v. United States, 533 U.S. 27, 121 S.Ct. 2038, 150 L.Ed.2d 94 (2001), Mr. Roberts argued that the Wyoming Toolkit, like the thermal image seanning at issue in Kyllo, constituted a search, and therefore use of the Toolkit without a warrant violated the Fourth Amendment to the United States Constitution. Mr. Roberts further argued that he had an expectation of privacy in the contents of his computer and that by accessing those contents through the Wyoming Toolkit, the State violated his expectation of privacy through an unlawful search. The district court denied Mr. Roberts' motion, *1232 reasoning that the Wyoming Toolkit did not have "the same intrusiveness as thermal imaging" and that "peer-to-peer file sharing is not entitled to a reasonable expectation of privacy."

8 Second, Mr. Roberts moved to compel discovery of the Wyoming Toolkit and its methodologies. He also moved to compel discovery of "any and all associated program documentation, instruction manuals, technical support materials, training materials, and purchase documents ... to verify that the images [he] is alleged to have possessed are in fact[ ] illegal images." The district court granted the motion in part and denied it in part. It held that Mr. Roberts was entitled to discovery of "whatever information the State has in regards to this case," including "any information the State has" regarding the SHA-1 values associated with the files found on Mr. Roberts' laptop. But it denied Mr. Roberts' motion to compel discovery of every SHA-1 value in the Wyoming Toolkit database and "the search algorithm process and methodology utilized" in the Toolkit. It reasoned that discovery of the Toolkit was unnecessary for the purpose Mr. Roberts alleged because Agent Nordstrom had personally verified that the files Mr. Roberts had shared on Gnutella were indeed child pornography and because "disclosure of investigative techniques and procedures would interfere with law enforcement efforts."

T9 Third, Mr. Roberts moved to dismiss the case on the ground that Utah's Sexual Exploitation Statute is unconstitutional. Mr.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Gaines
2026 UT App 44 (Court of Appeals of Utah, 2026)
Tesch v. Bonneville
2025 UT 58 (Utah Supreme Court, 2025)
State v. Draper
2024 UT App 152 (Court of Appeals of Utah, 2024)
Erda Community Assn v. Grantsville
2024 UT App 126 (Court of Appeals of Utah, 2024)
State v. Florreich
2024 UT App 9 (Court of Appeals of Utah, 2024)
State v. Salakielu
2024 UT App 5 (Court of Appeals of Utah, 2024)
M.T. v. PSP
Commonwealth Court of Pennsylvania, 2023
Smith v. Volkswagen Southtowne
2022 UT 29 (Utah Supreme Court, 2022)
State v. Rashid
2021 UT App 17 (Court of Appeals of Utah, 2021)
State v. Sanchez
2020 UT App 158 (Court of Appeals of Utah, 2020)
Ramos v. Cobblestone Centre
2020 UT 55 (Utah Supreme Court, 2020)
State v. Lopez
2020 UT App 101 (Court of Appeals of Utah, 2020)
State v. Boyer
2020 UT App 23 (Court of Appeals of Utah, 2020)
State v. Baric
2018 WI App 63 (Court of Appeals of Wisconsin, 2018)
True v. Utah Department of Transportation
2018 UT App 86 (Court of Appeals of Utah, 2018)
State v. Simmons
2017 UT App 224 (Court of Appeals of Utah, 2017)
State v. Paredez
2017 UT App 220 (Court of Appeals of Utah, 2017)
Snyder v. Labor Commission
2017 UT App 187 (Court of Appeals of Utah, 2017)
C.S. v. State
2017 UT App 153 (Court of Appeals of Utah, 2017)
In re A.R.
2017 UT App 153 (Court of Appeals of Utah, 2017)

Cite This Page — Counsel Stack

Bluebook (online)
2015 UT 24, 345 P.3d 1226, 2015 Utah LEXIS 69, 779 Utah Adv. Rep. 139, 2015 WL 404627, Counsel Stack Legal Research, https://law.counselstack.com/opinion/state-v-roberts-utah-2015.