MEMORANDUM OPINION
SLIGHTS, J.
I.
Defendant, Sean M. Sisson, was arrested on March 24, 2004, and subsequently indicted by the Grand Jury on ten counts of Sexual Exploitation of a Child, twenty-five counts of Unlawfully Dealing in Child Pornography, and twenty-five counts of Possession of Child Pornography. Pending before the Court is a motion to suppress evidence that has drawn the Court into the enigmatic world of “cyberspace.” The criminal charges in this case arise, in part, from allegations that Mr. Sisson was transmitting child pornography over the Internet. Law enforcement became aware of the activity after an Internet service provider intercepted an email that included an attachment containing child pornography. Based on account information linked to the Internet “screen name” that purportedly sent the email, the Internet service provider determined the identity of the subscriber to be Mr. Sisson, and turned his account information over to the police along with the image of child pornography. The police then used this information to form the basis of an application for a search warrant for Mr. Sisson’s residence, including any electronic devices that may contain child pornography. A search of Mr. Sisson’s computer revealed several
hundred images of prepubescent children engaged in sex acts with adult males.
Mr. Sisson has moved to suppress all evidence seized from his residence on the ground that the evidence was seized in violation of the Fourth Amendment of the United States Constitution, Article I, § 6 of the Delaware Constitution, and Delaware statutory law. Mr. Sisson contends that the warrant issued by the Magistrate was not supported by probable cause to link him or his residence to the offensive email. Specifically, he argues that a screen name alone is not sufficient to link a particular individual to information transmitted over the Internet. Additionally, he argues that the Internet service provider was not a rehable informant and, consequently, the information it supplied to law enforcement should have been further corroborated before a search warrant was issued.
For the reasons that follow, the Court concludes that a screen name alone may (and, in this case, did) support a finding of probable cause and that the information supplied by the Internet service provider was sufficiently rehable such that no further corroboration by law enforcement was necessary. Accordingly, the apphcation for search warrant articulated sufficient probable cause to justify the issuance of a search warrant for Mr. Sisson’s residence. The Motion to Suppress is DENIED.
II.
On January 2, 2004, America Online (“AOL”), an Internet service provider, discovered an email sent by an AOL subscriber with the screen name “letsrolearound” and an email address of letsrolearound@ aol.com.
Attached to the email was an image that AOL employees identified as child pornography.
The image, the original file name of which was “6year_blowbb.jpg,” depicted “a pre-pu-bescent, possibly Asian, female performing fellatio on an adult white male.”
AOL forwarded the image and the screen name of the subscriber to the Sheriffs Office in Hillsborough County, Florida (the “Sheriffs Office”).
Detective Grow of the Sheriffs Office caused a subpoena to be served upon AOL directing AOL to provide all account information relating to the AOL subscriber using the screen name “letsro-learound.”
AOL provided the Sheriffs Office with information indicating that the subscriber with username “letsrolearound” was Susan Sisson of Lutz, Florida and that Sean Sisson, the defendant, was also on the account.
Upon further investigation, Detective Grow determined that Susan and Sean Sisson had moved from Florida to Hockessin, Delaware.
After learning that the Sissons no longer lived in Florida, Detective Grow forwarded the fruits of his investigation to the National Center for Missing and Exploited Children.
The
NCMEC then forwarded the information to the Delaware State Police.
Detectives from the Delaware State Police verified that Susan and Sean Sisson obtained Delaware driver’s licenses with a Hockessin, Delaware address.
Detectives further determined that Sean Sisson was the owner of Netvantage Solutions, a business that offered intranet development, computer support, software integration and Internet services.
Detectives placed all of this information in an application and affidavit requesting a search warrant for Mr. Sisson’s residence. They also included general information about the use of computers for child pornography and the habits of collectors of child pornography.
The application was reviewed by a Magistrate judge who found probable cause and issued a search warrant for Mr. Sisson’s residence.
The warrant was executed on March 24, 2004. A number of items were seized from the Defendant’s residence, including Mr. Sisson’s business computer.
On this computer, detectives found several hundred pornographic images of prepubescent children engaged in various sex acts with adult males.
After being Mirandized, Mr. Sisson admitted that all of the child pornography on his business computer belonged to him.
He also admitted that he transmitted pornographic images of children to other individuals who collect and view these images via the Internet.
He further admitted that several of the images on his computer were of his thirteen year old daughter.
Mr. Sisson was arrested and subsequently indicted as noted above. He now moves to suppress the evidence seized pursuant to the search warrant.
III.
Mr. Sisson has presented three grounds for suppression of the evidence. First, he argues that the search warrant was defective because it did not include the date on which the pornographic image was sent and, therefore, the Magistrate could not evaluate the staleness of the information.
He also argues that the search warrant was defective under
Franks v.
Delaware
because the detectives failed to include information in the search warrant application that would allow the Magistrate to determine whether Mr. Sisson was a victim of “email spoofing.”
Mr.
Free access — add to your briefcase to read the full text and ask questions with AI
MEMORANDUM OPINION
SLIGHTS, J.
I.
Defendant, Sean M. Sisson, was arrested on March 24, 2004, and subsequently indicted by the Grand Jury on ten counts of Sexual Exploitation of a Child, twenty-five counts of Unlawfully Dealing in Child Pornography, and twenty-five counts of Possession of Child Pornography. Pending before the Court is a motion to suppress evidence that has drawn the Court into the enigmatic world of “cyberspace.” The criminal charges in this case arise, in part, from allegations that Mr. Sisson was transmitting child pornography over the Internet. Law enforcement became aware of the activity after an Internet service provider intercepted an email that included an attachment containing child pornography. Based on account information linked to the Internet “screen name” that purportedly sent the email, the Internet service provider determined the identity of the subscriber to be Mr. Sisson, and turned his account information over to the police along with the image of child pornography. The police then used this information to form the basis of an application for a search warrant for Mr. Sisson’s residence, including any electronic devices that may contain child pornography. A search of Mr. Sisson’s computer revealed several
hundred images of prepubescent children engaged in sex acts with adult males.
Mr. Sisson has moved to suppress all evidence seized from his residence on the ground that the evidence was seized in violation of the Fourth Amendment of the United States Constitution, Article I, § 6 of the Delaware Constitution, and Delaware statutory law. Mr. Sisson contends that the warrant issued by the Magistrate was not supported by probable cause to link him or his residence to the offensive email. Specifically, he argues that a screen name alone is not sufficient to link a particular individual to information transmitted over the Internet. Additionally, he argues that the Internet service provider was not a rehable informant and, consequently, the information it supplied to law enforcement should have been further corroborated before a search warrant was issued.
For the reasons that follow, the Court concludes that a screen name alone may (and, in this case, did) support a finding of probable cause and that the information supplied by the Internet service provider was sufficiently rehable such that no further corroboration by law enforcement was necessary. Accordingly, the apphcation for search warrant articulated sufficient probable cause to justify the issuance of a search warrant for Mr. Sisson’s residence. The Motion to Suppress is DENIED.
II.
On January 2, 2004, America Online (“AOL”), an Internet service provider, discovered an email sent by an AOL subscriber with the screen name “letsrolearound” and an email address of letsrolearound@ aol.com.
Attached to the email was an image that AOL employees identified as child pornography.
The image, the original file name of which was “6year_blowbb.jpg,” depicted “a pre-pu-bescent, possibly Asian, female performing fellatio on an adult white male.”
AOL forwarded the image and the screen name of the subscriber to the Sheriffs Office in Hillsborough County, Florida (the “Sheriffs Office”).
Detective Grow of the Sheriffs Office caused a subpoena to be served upon AOL directing AOL to provide all account information relating to the AOL subscriber using the screen name “letsro-learound.”
AOL provided the Sheriffs Office with information indicating that the subscriber with username “letsrolearound” was Susan Sisson of Lutz, Florida and that Sean Sisson, the defendant, was also on the account.
Upon further investigation, Detective Grow determined that Susan and Sean Sisson had moved from Florida to Hockessin, Delaware.
After learning that the Sissons no longer lived in Florida, Detective Grow forwarded the fruits of his investigation to the National Center for Missing and Exploited Children.
The
NCMEC then forwarded the information to the Delaware State Police.
Detectives from the Delaware State Police verified that Susan and Sean Sisson obtained Delaware driver’s licenses with a Hockessin, Delaware address.
Detectives further determined that Sean Sisson was the owner of Netvantage Solutions, a business that offered intranet development, computer support, software integration and Internet services.
Detectives placed all of this information in an application and affidavit requesting a search warrant for Mr. Sisson’s residence. They also included general information about the use of computers for child pornography and the habits of collectors of child pornography.
The application was reviewed by a Magistrate judge who found probable cause and issued a search warrant for Mr. Sisson’s residence.
The warrant was executed on March 24, 2004. A number of items were seized from the Defendant’s residence, including Mr. Sisson’s business computer.
On this computer, detectives found several hundred pornographic images of prepubescent children engaged in various sex acts with adult males.
After being Mirandized, Mr. Sisson admitted that all of the child pornography on his business computer belonged to him.
He also admitted that he transmitted pornographic images of children to other individuals who collect and view these images via the Internet.
He further admitted that several of the images on his computer were of his thirteen year old daughter.
Mr. Sisson was arrested and subsequently indicted as noted above. He now moves to suppress the evidence seized pursuant to the search warrant.
III.
Mr. Sisson has presented three grounds for suppression of the evidence. First, he argues that the search warrant was defective because it did not include the date on which the pornographic image was sent and, therefore, the Magistrate could not evaluate the staleness of the information.
He also argues that the search warrant was defective under
Franks v.
Delaware
because the detectives failed to include information in the search warrant application that would allow the Magistrate to determine whether Mr. Sisson was a victim of “email spoofing.”
Mr. Sisson’s final ground for suppression is that the information contained in the warrant was insufficient to support a finding of probable cause by the Magistrate. Specifically, he alleges that a screen name alone is not enough to link a particular individual to information transmitted over the Internet. Additionally, he contends that the Delaware State Police should have conducted their own independent investigation to corroborate the information provided to them because neither AOL nor the NCMEC are sufficiently reliable sources upon which to base a finding of probable cause. Mr. Sisson argues that the Delaware State Police improperly relied solely upon the information supplied to them by the NCMEC through the Sheriffs office which, in turn, relied upon information given to them by AOL, without any independent corroboration.
At an evidentiary hearing, the Court heard testimony and denied the suppression motion to the extent it argued that the application for a search warrant was submitted in violation of
Franks
and that it failed to set forth fresh evidence of criminal activity. As to the latter point, the Court relied upon
State v. Smith
to reject Mr. Sisson’s argument that the information in the warrant was stale based on the nature of the evidence and the recognized behaviors of child pornography collectors.
As to the
Franks
issue, the Court denied suppression because Mr. Sis-son failed to carry his burden of proving that the detectives omitted information regarding “spoofing” with reckless disregard for the truth.
At the conclusion of the evidentiary hearing, the Court reserved decision on Mr. Sisson’s final basis for suppression, lack of probable cause, and requested that the State and Mr. Sisson provide the Court with authority on the issue of whether a screen name alone is
enough to support a finding of probable cause.
Having now received the parties’ submissions, the Court addresses two issues implicated by Mr. Sisson’s probable cause argument: (i) whether the Magistrate reasonably could conclude that an image transmitted over the Internet and identified with a particular screen name was sent by the individual whose Internet account is linked to the screen name; and (ii) whether AOL and NCMEC were reliable sources.
IV.
On a motion to suppress challenging the validity of a search warrant, the defendant bears the burden of establishing that the challenged search or seizure was unlawful.
Mr. Sisson has argued that the warrant authorizing the search of his residence was not supported by probable cause. It is his burden to establish by a preponderance of the evidence that he is entitled to relief on that basis.
V.
The Delaware Constitution provides that a search warrant may be issued only upon a showing of probable cause.
The constitutional requirements for search warrants are codified in Sections 2306 and 2307 of Title 11 of the Delaware Code. Section 2306 provides that an application for a search warrant must “state that the complainant suspects that such persons or things are concealed in the house, place, conveyance or person designated [in the search warrant application] and shall recite the facts upon which such suspicion is founded.”
Section 2307 provides that a warrant may issue only upon a judicial determination of probable cause.
It is well-settled that the Court must employ a “four-corners” test to determine whether an application for a warrant demonstrates probable cause.
Under this test, sufficient facts must appear on the face of the affidavit so that a reviewing court can glean from that document alone the factual basis for a determination that probable cause exists.
Stated differently, the supporting affidavit must set forth sufficient facts on its face “for a judicial officer to form a reasonable belief that an offense has been committed and that seizable property would be found in a particular place to support a finding of probable cause.”
Additionally, the “test for probable cause [in support of a search warrant] is much less rigorous than that governing the admission of evidence at trial and requires only that a probability, and not a
prima facie
showing, of criminal activity be established.”
Great deference must be paid by a reviewing court to the determination of a judge who has made a finding of probable cause to issue a search warrant.
Indeed, a finding of probable cause “will not be invalidated by a hyperteehnical, rather than common sense, interpretation of a warrant affidavit.”
And, when considering the sufficiency of the application for a search warrant, the reviewing court must consider the application “as a whole and not on the basis of separate allegations.”
A. The Screen Name Adequately Linked The Defendant To The Crime
In this case, the first prong of the probable cause test — that an offense has been committed — is clearly satisfied on the face of the affidavit. The affidavit indicates that the police were in possession of a pornographic image of a child that had been transmitted over the Internet.
The image alone was the evidence of criminal activity; nothing more was required.
In order to determine that probable cause existed to authorize a search of Mr. Sisson’s residence, however, the Magistrate was also obliged to consider whether the affidavit set forth facts that would permit him reasonably to conclude that child pornography would be found within the Sisson residence.
In this regard, the
application for a warrant must demonstrate a logical nexus between the items sought and the place to be searched.
Accordingly, when the Court reviews the affidavit to determine if probable cause existed to search Mr. Sisson’s residence for child pornography, the information set forth within the affidavit’s four corners, and any logical inferences from the specific facts alleged, must demonstrate that it was objectively reasonable for the police to expect to find child pornography within the residence.
Mr. Sisson argues that an Internet screen name, without independent corroboration of the identity of the sender of the child pornography, is insufficient to establish probable cause to issue a search warrant. The State disagrees. Both Mr. Sis-son and the State have provided authority in support of their respective positions.
Of the authority submitted, the Court finds
State v. Evers
most factually and legally on point. In
Evers,
a detective entered a child Internet pornography “chat room.”
The detective then received an email containing two pictures of a naked child from a sender with a particular screen name.
The billing account information for the screen name that sent the image was obtained from AOL, which led police to the defendant’s residence.
With this information in hand, along with a description of how child pornographers rarely destroy the photographs and images in which they trade, detectives applied for a search warrant of the residence of the individual whose Internet account was linked to the screen name. A magistrate judges found probable cause and issued a warrant for the search of the defendant’s residence.
The New Jersey Supreme Court upheld the magistrate’s finding of probable
cause.
First, the court found that there was probable cause that the computer would be found within the defendant’s residence.
The court reasoned that “[t]he billing address of an account tied to a computer screen name may not be an absolute guarantee that the holder of the computer screen name used the computer at the billing address to commit criminal activity, but there is a fair and logical inference that the computer will
probably
be found at the address and, if not, at least evidence of the identity of the screen name will be found there.”
Next, the court concluded that there was probable cause to find that child pornography would be found on the computer used by the person with that particular screen name.
In making this conclusion, the court relied upon the detective’s general description of the tendencies of child pornographers along with the legal authority supporting his assertions.
Mr. Sisson attempts to distinguish
Evers
on the basis that, in
Evers,
the defendant had sent images to fifty other screen names. Here, only one image was transmitted to only one screen name. Like blue on black, the distinction proffered by Mr. Sisson does not alter the analytical picture. Possession or transmission of one image of child pornography is sufficient to violate Delaware’s child pornography statute. Thus, whether Mr. Sisson sent one image or fifty images makes no difference in the analysis of whether the application sets forth evidence of a crime or information linking a particular residence or location to the crime.
Applying the reasoning of
Evers,
the Court finds that an Internet screen name alone can be sufficient to link the Internet subscriber associated with that screen name to criminal activity for purposes of establishing probable cause. While it may well be that the screen name will not provide
prima facie
evidence of identity, it is certainly adequate in most cases “to warrant a reasonable [person] in the belief that seizable property would be found” at the address of the Internet subscriber with whom the screen name is registered.
In this ease, the defendant has failed in his burden of supplying any evidence or other basis to cause the Court to question the Magistrate’s determination that the address linked to the screen name that sent the pornographic image would yield evidence of the criminal activity.
Although the Court has concluded that
Evers
is persuasive authority, there is one factual distinction between this case and
Evers
that the Court must examine further. In
Evers,
and other cases where courts have found probable cause based upon the defendant’s screen name, the image of child pornography was intercepted or received directly by law enforcement.
In this case, AOL intercepted the image and forward it along with the screen name to law enforcement. Then, pursuant to a subpoena, AOL provided law enforcement with the subscriber information for the screen name that transmitted the image. Detectives from the Delaware State Police subsequently used that information to request a search warrant for Mr. Sisson’s residence. Under these circumstances, the Court must determine whether the civilian sources that provided the information to law enforcement were reliable.
B. The Reliability of AOL and The NCMEC
Mr. Sisson argues that neither AOL nor NCMEC are reliable sources and that any finding of probable cause based on information from these sources is flawed as a matter of law. According to Mr. Sisson, before officers could seek a search warrant for the Sisson residence, they first needed to corroborate the information that both AOL and the NCMEC had provided.
Affidavits in support of search warrants can establish probable cause either by setting forth the personal observations of criminal activity made by a law enforcement affiant or by recounting the incriminating reports of an informer or third-party witness, i.e., hearsay.
If based on hearsay, “the affidavit must contain reasonable corroboration of the hearsay report, meaning: (1) that the magistrate must be satisfied that the affidavit reveals the underlying circumstances from which the informant drew the conclusion that criminal activity occurred; and (2) that there are sufficient reasons for believing that the informant’s information is reliable.”
When information is supplied to law enforcement through a tip, the reliability of the so-called “tipster” determines how much corroboration, if any, is necessary to meet the probable cause standard for a search warrant to issue. Information supplied by informants who are not presumed reliable by the court will require additional corroboration before the information will be deemed rehable. For example, a tip supplied by an anonymous informant does not, by itself, provide probable cause for law enforcement.
Additionally, information supplied to law enforcement by other criminals is generally suspect, and will require corroboration or other indicia of reliability before law enforcement can establish probable cause.
When the source of the tip is a named citizen informant, however, no corroboration is necessary to establish the reliability
of the information.
The information is presumed to be reliable because citizens have no reason to fabricate criminal activity; they are presumed to have no interest in the matter.
Here, AOL provided law enforcement with two pieces of information, the image of child pornography sent by user name “letsrolearound” and the subscriber information for “letsrolearound.” The affidavit of probable cause clearly reveals the circumstances that led AOL to conclude that criminal activity had occurred. AOL discovered the pornographic image of a child that was an attachment to an email sent by an AOL subscriber using a particular screen name.
AOL was in possession of the image — the
corpus delicti
of the criminal activity. AOL then forwarded the image and screen name to the Sheriffs Office.
This information did not come from an anonymous source; it came from a recognized, well-established Internet provider.
Again, it is important to emphasize the deference afforded to the magistrate’s determination of probable cause as well as the standard of review.
The burden is on Mr. Sisson to demonstrate that the warrant lacked probable cause and, more specifically, that AOL and the information it provided to law enforcement were unreliable.
Yet he has offered no basis for the Court to conclude that AOL lacked reliability. To the contrary, the record reveals that AOL discovered the image, identified it as child pornography, and forwarded it to the police along with the screen name of the person who sent the image. AOL was essentially a citizen witness to a crime and, as such, is presumed to be reliable.
Accordingly, the Court finds that, under the circumstances, AOL was a reliable informant and no independent corroboration of the information provided by AOL was required.
Mr. Sisson also argues that the NCMEC is not reliable. A review of the application for search warrant indicates that the extent of NCMEC’s involvement in this case was to forward the information it received from the Sheriffs Office on to the Delaware State Police. The NCMEC did not provide the Delaware State Police with any additional information; it simply performed its statutorily prescribed role as a “clearinghouse” of information regarding potential child pornography or exploitation.
Hence, the NCMEC was not an
informant and its reliability is not relevant to a determination of whether there was sufficient probable cause to issue the search warrant in this case.
VI.
In conclusion, the Court finds that the warrant to search the Sisson residence was supported by probable cause. Mr. Sis-son’s screen name was sufficient to link Mr. Sisson to the image of child pornography transmitted over the Internet and discovered by AOL. Additionally, AOL was a reliable informant in this case. In discovering the image of child pornography sent by Mr. Sisson, AOL was the equivalent of a citizen witness to a crime. As such, AOL and the information it provided to law enforcement are presumed reliable and Mr. Sisson has not overcome this presumption of reliability. Finally, the Court finds that NCMEC was not an informant because it did not provide law enforcement with any additional information. The issuance of the search warrant for Mr. Sisson’s residence was proper because it was supported by probable cause.
Based on the foregoing, Defendant’s Motion to Suppress Evidence is DENIED.
IT IS SO ORDERED.