United States v. Alden Dickerman

954 F.3d 1060
CourtCourt of Appeals for the Eighth Circuit
DecidedMarch 30, 2020
Docket18-3150
StatusPublished
Cited by1 cases

This text of 954 F.3d 1060 (United States v. Alden Dickerman) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eighth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Alden Dickerman, 954 F.3d 1060 (8th Cir. 2020).

Opinion

United States Court of Appeals For the Eighth Circuit ___________________________

No. 18-3150 ___________________________

United States of America

lllllllllllllllllllllPlaintiff - Appellee

v.

Alden Dickerman

lllllllllllllllllllllDefendant - Appellant ____________

Appeal from United States District Court for the Eastern District of Missouri - St. Louis ____________

Submitted: September 24, 2019 Filed: March 30, 2020 ____________

Before KELLY, MELLOY, and STRAS, Circuit Judges. ____________

KELLY, Circuit Judge.

Alden Dickerman pleaded guilty to possession of child pornography after law enforcement executed a warrant at his home and found child pornography on his computer. Dickerman entered a plea agreement, reserving his right to appeal the district court’s1 denial of his motion to suppress. Because we agree with the district court that the good-faith exception to the exclusionary rule applies, we affirm.

I.

The government alleged Dickerman used “Freenet,” a decentralized, privacy-focused, peer-to-peer file sharing system, to access child pornography. Freenet is free to use and publicly available to anyone willing to dedicate a portion of their computer’s hard drive to the network. Unlike other file sharing systems, Freenet does not give a user immediate access to intact files for downloading. Rather, to allow for anonymous retrieval of files from the network, Freenet breaks down each uploaded file into “blocks.” These blocks, or portions of a file, are then distributed over numerous computers that are running Freenet (computers running Freenet are sometimes called “nodes”). No single node stores all of the blocks for a single file, and all blocks are encrypted—meaning that a user whose computer passively stores blocks does not know what the blocks contain.

Someone seeking a particular file on Freenet can use a publicly available “key” to retrieve the file. This “requester” uses the key to ask other Freenet nodes for the blocks he or she needs to make up the desired file. No user is connected to all of the nodes on Freenet. Rather, users are connected to just a subset of all Freenet nodes, called the user’s “peers.” Thus, a requester sends the blocks request to only his or her peers. When a peer receives the request, the peer’s computer provides any of the requested blocks in its possession and then passes, or “relays,” the request to its own peers on behalf of the original requester. A peer that relays a request is called a “relayer.”

1 The Honorable Henry E. Autrey, United States District Judge for the Eastern District of Missouri, adopting the report and recommendations of the Honorable Nannette A. Baker, Chief Magistrate Judge for the Eastern District of Missouri.

-2- As a result of this decentralized configuration, a computer running Freenet can receive two types of requests: (1) requests from the original requester—the user who located the key and is seeking to obtain all of the blocks for the desired file; and (2) requests from a relayer—another computer on Freenet that simply relays an original request for blocks on to its peers. For purposes of this case, there is an important difference between a requester and a relayer. Requesters know what file they are requesting; relayers do not know what blocks have been requested from their computers or what file those blocks are part of. Relayers do not even know whether their computers have relayed an original request for blocks to their peers.

A key feature of Freenet is that requesters and relayers are indistinguishable to an ordinary user of the network. A user who receives a request does not know whether it came from an original requester or a relayer. Law enforcement, however, can determine which Freenet users request which files by using a statistical algorithm developed and validated by Dr. Brian Levine, an expert in networks and security at the University of Massachusetts Amherst. The algorithm allows law enforcement to distinguish between requests sent from an original requester and requests forwarded by a relayer.

In this case, officers used Dr. Levine’s algorithm to determine that a computer associated with Dickerman’s Internet Protocol (IP) address had requested child pornography files through Freenet. St. Louis County Detective Michael Slaughter drafted a search warrant application and supporting affidavit to present to a state court judge. In his affidavit, Slaughter wrote that the information was based on his “personal knowledge or information provided by other law enforcement officers.” Slaughter outlined his professional background, including that he “received specialized training in the area of computer-based investigations.” He identified Special Investigator Wayne Becker as an officer who provided relevant information. He listed Becker’s qualifications and experience in “forensic analysis of computers

-3- used in criminal activity, including the use of peer-to-peer (P2P) and file sharing networks.”

Slaughter described Freenet’s basic functionality in his affidavit. He wrote that “someone requesting blocks of a file has taken substantial steps to install Freenet and locate” a publicly available key for the desired file. He explained that Freenet’s ability “to hide what a user is requesting from the network has attracted persons that wish to collect and/or share child pornography files.” Slaughter further averred that he “knows from training and experience that streams of requests for blocks of a particular file from an IP address can be evaluated to determine if the IP address is the likely requester of the file.” But Slaughter did not include any details about Dr. Levine, his algorithm, or how officers use the algorithm to determine which Freenet users requested which files.

The affidavit also recounted the investigation into Dickerman’s use of Freenet. Slaughter specified how Becker began an undercover operation to identify and collect keys and files shared on Freenet to build a database of keys associated with files that were known or suspected child pornography images. Becker then ran special copies of Freenet modified for law enforcement to track the IP address, key, and timing of requests sent to the law enforcement Freenet nodes. Becker compared this tracked information to the keys in the database he had created. During the investigation, Becker observed an IP address associated with Dickerman’s computer “routing and/or requesting suspected child pornography file blocks.” Specifically, between 11:08 and 11:10 pm on April 2, 2015, “a computer running Freenet software at IP address 172.12.235.62, requested from Freenet law enforcement nodes 69 parts, or blocks,” of a child pornography file. Slaughter described the contents of the “17 jpg images” in the file. He concluded, “The number and timing of the requests was significant enough to indicate that the IP address was the apparent original requester of the file.”

-4- The state court judge signed the warrant after reviewing Slaughter’s affidavit. Officers then searched Dickerman’s home and seized his computer, where they located child pornography. Dickerman was charged in federal court with possession of child pornography in violation of 18 U.S.C. § 2252A(a)(5)(B). He moved to suppress the seized evidence, arguing Slaughter’s affidavit was insufficient to establish probable cause and that the issuing judge, by signing the warrant, acted as a “rubber stamp” for law enforcement.

The federal magistrate judge held an evidentiary hearing on the suppression motion, at which Dr. Levine, Slaughter, Becker, and the state court judge testified.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Anthony Redman
39 F.4th 1030 (Eighth Circuit, 2022)

Cite This Page — Counsel Stack

Bluebook (online)
954 F.3d 1060, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-alden-dickerman-ca8-2020.