United States v. Bret Dunning

857 F.3d 342, 2017 FED App. 0106P, 2017 WL 2178089, 2017 U.S. App. LEXIS 8726
CourtCourt of Appeals for the Sixth Circuit
DecidedMay 18, 2017
Docket16-5164
StatusPublished
Cited by15 cases

This text of 857 F.3d 342 (United States v. Bret Dunning) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Bret Dunning, 857 F.3d 342, 2017 FED App. 0106P, 2017 WL 2178089, 2017 U.S. App. LEXIS 8726 (6th Cir. 2017).

Opinions

BATCHELDER, J., delivered the opinion of the court in which ROGERS, J., joined. MERRITT, J. (pp. 851-53), delivered a separate dissenting opinion.

OPINION

ALICE M. BATCHELDER, Circuit Judge.

Bret Dunning was indicted for knowingly receiving and possessing child pornography in violation of 18 U.S.C. § 2252(a)(2) and (a)(4)(B). He moved to compel discovery and to suppress evidence that the police seized from his home. After the district court denied his motions and his request for an evidentiary hearing, Dunning entered into a conditional plea agreement, preserving his right to appeal and pleading guilty to one count of knowingly receiving material involving the sexual exploitation of minors in violation of 18 U.S.C. § 2252(a)(2). The district court sentenced him to 165 months’ imprisonment.

Dunning argues on appeal that the district court erred by denying his motion to suppress evidence, that 18 U.S.C. § 2252 is unconstitutionally vague because it provides a stiffer penalty for receipt than for possession of child pornography, and that his sentence is procedurally and substantively unreasonable. We AFFIRM his conviction and sentence.

I. Facts

A Kentucky State Police Detective twice used Nordic Mule, a program that is part of a law enforcement software package known as the Child Protection System (CPS), to search for IP addresses that had recently shared child pornography on the peer-to-peer file-sharing network eDonkey (a.k.a. eMule). The software locates specified files on public peer-to-peer networks and records the IP addresses that have downloaded and made available for sharing files containing child sexual exploitation. When the software finds shared materials on these public networks, it logs the “date, time, hash values, filename, and IP address.” After the second CPS inquiry and report, the detective obtained a search warrant for Dunning’s residence.

During the execution of the search warrant, the police seized numerous electronic devices, including computers, iPhones, and iPads, which contained over 22,000 images and videos depicting the sexual exploitation of minors. Some images showed prepubescent children engaged in sexually explicit conduct with adults.

[346]*346After his indictment, Dunning moved for discovery, seeking, among other things, the source code for the software that the detective relied on for the search warrant. The court ordered a response to Dunning’s motion and the government responded, stating with regard to the software that:

The program [the] Detective [] used when conducting his search for CP images is part of the Child Rescue Coalition, which is a private non-profit organization. The source code and program are proprietary and are not in the possession of the United States. The data base [sic] used in this case evolved from the program formerly known as the Wyoming tool.

The court then denied without prejudice Dunning’s motion for discovery. Dunning also moved to suppress evidence that the police seized from his home, arguing that the warrant application was not supported by probable cause because the detective used software of uncertain reliability and accuracy to obtain the warrant, and that he had a reasonable expectation of privacy in the files stored on his computer. The district court denied Dunning’s motion to suppress.

Dunning then pled guilty to a violation of 18 U.S.C. § 2252(a)(2) for knowingly receiving material involving the sexual exploitation of minors, and the district court sentenced him to 165 months’ imprisonment. This appeal followed.

II. Motion to Suppress

“The Fourth Amendment requires that search warrants be issued only ‘upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.’ ” Dalia v. United States, 441 U.S. 238, 255, 99 S.Ct. 1682, 60 L.Ed.2d 177 (1979). To establish probable cause, the issuing judge must “make a practical, common-sense decision whether, given all the circumstances set forth in the affidavit before him, ... there is a fair probability that contraband or evidence of a crime will be found in a particular place.” Illinois v. Gates, 462 U.S. 213, 238, 103 S.Ct. 2317, 76 L.Ed.2d 527 (1983).

“In reviewing a ruling on a motion to suppress, we will uphold a district court’s factual findings unless they are clearly erroneous, but will conduct a de novo review of a district court’s legal determinations.” United States v. Navarro-Diaz, 420 F.3d 581, 584 (6th Cir. 2005). “When reviewing the denial of a motion to suppress evidence, the appellate court must consider the evidence in the light most favorable to the government.” Id. We review the totality of the circumstances to determine whether probable cause supported a search warrant, Gates, 462 U.S. at 230-31, 103 S.Ct. 2317, and we afford great deference to the issuing judge’s determination of probable cause, United States v. Greene, 250 F.3d 471, 478 (6th Cir. 2001) (citing United States v. Allen, 211 F.3d 970, 973 (6th Cir.), cert. denied, 531 U.S. 907, 121 S.Ct. 251, 148 L.Ed.2d 181 (2000)).

Dunning argues that because probable cause did not support the search warrant the district court erred by denying his motion to suppress. He claims that conclusions in the detective’s affidavit were wholly conclusory because the detective had relied on computer software results to identify child pornography files. Although wholly conclusory statements would fail to meet the probable cause requirement, see Gates, 462 U.S. at 239, 103 S.Ct. 2317, the detective’s statements in this case were not wholly conclusory:

The detective in this case submitted an affidavit to a state circuit judge in support of his application for a warrant to search [347]*347Dunning’s home. In the affidavit, the detective set out his training and experience as well as his use of “law enforcement systems to query IP addresses in Kentucky that had been seen sharing child sexual exploitation files.” Dunning claims that because the detective did not have the source code for the computer program, “it [was] not possible to authenticate the function of the application or validate its ‘calibration’ ” and that “statements contained within his search warrant affidavit [were] therefore “wholly conelusory,’ because he did not have enough information to substantiate his claims without the source code.”

A defendant who challenges the factual assertions in an affidavit supporting a search warrant is entitled to an evidentiary hearing if

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Michael Clark
24 F.4th 565 (Sixth Circuit, 2022)
Royal Truck & Trailer Sales v. Mike Kraft
974 F.3d 756 (Sixth Circuit, 2020)
United States v. Joe Ross
948 F.3d 243 (Fifth Circuit, 2020)
United States v. Burrows
905 F.3d 1061 (Seventh Circuit, 2018)
United States v. William Hines
885 F.3d 919 (Sixth Circuit, 2018)

Cite This Page — Counsel Stack

Bluebook (online)
857 F.3d 342, 2017 FED App. 0106P, 2017 WL 2178089, 2017 U.S. App. LEXIS 8726, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-bret-dunning-ca6-2017.