United States v. Caraher

973 F.3d 57
CourtCourt of Appeals for the Second Circuit
DecidedAugust 25, 2020
Docket18-511
StatusPublished
Cited by7 cases

This text of 973 F.3d 57 (United States v. Caraher) is published on Counsel Stack Legal Research, covering Court of Appeals for the Second Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Caraher, 973 F.3d 57 (2d Cir. 2020).

Opinion

18-511 United States v. Caraher

In the United States Court of Appeals for the Second Circuit August Term, 2019

Submitted: March 5, 2020 Decided: August 25, 2020

Docket No. 18-511

UNITED STATES OF AMERICA,

Appellee,

v.

MICHAEL CARAHER,

Defendant-Appellant.

Before: HALL, LYNCH, MENASHI, Circuit Judges.

Defendant-Appellant Michael Caraher appeals from a judgment of conviction in the United States District Court for the Northern District of New York (Suddaby, C.J.) following his conditional guilty plea to all eight counts of an indictment related to his possession and distribution of child pornography. Caraher appeals the district court’s denial of his pretrial motion to suppress evidence obtained pursuant to a search warrant, its failure to dismiss the indictment, and the reasonableness of the sentence imposed. We hold that the district court properly denied Caraher’s motion to suppress evidence and his motion to dismiss the indictment, and that the sentence imposed was not unreasonable. For the reasons stated below, the judgment of the district court is AFFIRMED.

CARINA H. SCHOENBERGER, Assistant United States Attorney, for Grant C. Jaquith, United States Attorney for the Northern District of New York for Appellee.

JAMES P. EGAN, Assistant Federal Public Defender, for Lisa A. Peebles, Federal Public Defender, Syracuse, NY, for Defendant- Appellant.

HALL, Circuit Judge:

Like many before it, this case arises from an investigation by the Federal

Bureau of Investigation (FBI) into a website known as Playpen. See, e.g., United

States v. Eldred, 933 F.3d 110, 111 (2d Cir. 2019); United States v. Safford, ---

F. App’x ---, 2020 WL 2769092 (2d Cir. May 28, 2020). Defendant-Appellant

Michael Caraher appeals from a judgment of conviction in the United States

District Court for the Northern District of New York (Glenn T. Suddaby, Chief

Judge) following his conditional guilty plea to charges related to his use of the

2 website. Caraher pled guilty to all eight counts of an indictment related to his

possession and distribution of child pornography. The district court sentenced

Caraher, on each count, principally to a 90-month term of imprisonment, followed

by a 20-year term of supervised release, to run concurrently. Caraher appeals

from a judgment of conviction, challenging the district court’s denial of his pretrial

motion to suppress evidence obtained pursuant to a search warrant, its denial of

his motion to dismiss the indictment, and the sentence it imposed, which he asserts

is unreasonable. We hold that the district court properly denied the two motions

and that the sentence imposed was not unreasonable. The judgment of the

district court, therefore, is AFFIRMED.

BACKGROUND

The facts of this case run largely parallel to those in Eldred. 933 F.3d at 112-

13. Playpen operated on an “anonymizing network,” “The Onion Router” or

“Tor,” that allows users who have downloaded the Tor software to access websites

without revealing their internet protocol (IP) addresses. Id. at 112. The FBI,

using a search program called the Network Investigative Technique (NIT),

infiltrated the website and collected computer-related identifying information,

including IP addresses, from the computers of Playpen users. Id. at 111. This

3 software was deployed pursuant to a warrant, the “NIT warrant,” issued by

Magistrate Judge Theresa Carroll Buchanan of the Eastern District of Virginia. Id.

at 113. “An attachment to the warrant listed the ‘place to be searched’ as

‘activating computers,’ i.e. ‘those of any user or administrator who logs into the

Playpen website by entering a username and password.’” Id. (citation and

alterations omitted). Caraher was one such user. While the NIT was deployed,

it did not “deny the users any functionality on their computers, or collect any

additional, unrelated information,” so users accessed the website without any

knowledge that law enforcement had assumed control of the site. Id.

The FBI operated Playpen from a server in the Eastern District of Virginia

for a period of about two weeks. Id. The information obtained under the NIT

warrant allowed law enforcement to identify Playpen users’ true identities and

locations. Id. Information obtained pursuant to the NIT warrant established

that a Playpen visitor with the username “Phillip J. Fry” logged in from an

identified IP address in Morrisville, New York, a computer hostname “Mike-PC,”

and a computer logon name “Mike.” A188. Law enforcement determined that

the visitor with the username “Phillip J. Fry” had been actively logged into

Playpen for more than six hours over the course of several months and had

4 accessed posts relating to bondage and sadistic conduct, including depictions of a

prepubescent girl. A186-88. The IP address was traced to Caraher’s address.

On January 19, 2016, the government obtained a warrant to search Caraher’s

residence, vehicles, and computers for evidence related to the distribution, receipt,

and possession of child pornography. FBI agents executed the search warrant

and seized several computers, hard drives, cellular devices, electronic media, and

pages of printed materials.

Upon being interviewed by law enforcement, Caraher admitted that he

downloaded and stored child pornography and confessed to using Playpen to

distribute child pornography to other users. Forensic analysis subsequently

revealed child pornography and child erotica on six of Caraher’s electronic

devices. The search revealed that Caraher possessed 974 still images and 118

videos depicting child pornography, including some of adults raping children

bound with rope.

A grand jury returned an eight count indictment, charging Caraher with one

count of distribution and attempted distribution of child pornography, in violation

of 18 U.S.C. § 2252A(a)(2)(a) and 2252A(b)(1); three counts of receipt of child

pornography, in violation of 18 U.S.C. § 2252A(a)(2)(A) and 2252A(b)(1); and four

5 counts of possession of child pornography, in violation of 18 U.S.C. §§

2252A(a)(5)(B), 2252A(b)(2), and 2256(8)(A). Caraher filed multiple pretrial

motions including, as relevant here, a motion to suppress evidence derived from

the execution of the NIT warrant and for a hearing pursuant to Franks v. Delaware,

438 U.S. 154 (1978), as well as a motion to dismiss the indictment against him based

on outrageous government conduct.

The district court denied both motions after a suppression hearing. As to

the suppression motion, the district court concluded that the NIT warrant was

supported by probable cause, sufficiently particularized, and satisfied the Fourth

Amendment. Although the district court determined that the NIT warrant

violated Fed. R. Crim. P. 41(b) and 28 U.S.C. 636(a), it found that the evidence

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Lawrence
139 F.4th 115 (Second Circuit, 2025)
United States v. Burnash
Second Circuit, 2024
United States v. Franklin
Second Circuit, 2024
United States v. Gladle
Second Circuit, 2024
United States v. Morales
Second Circuit, 2022
United States v. Dumas
Second Circuit, 2022

Cite This Page — Counsel Stack

Bluebook (online)
973 F.3d 57, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-caraher-ca2-2020.