United States v. Carlson

214 F. Supp. 2d 718, 2002 U.S. Dist. LEXIS 28649
CourtDistrict Court, S.D. Texas
DecidedJune 28, 2002
DocketCriminal Case H-99-178
StatusPublished

This text of 214 F. Supp. 2d 718 (United States v. Carlson) is published on Counsel Stack Legal Research, covering District Court, S.D. Texas primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Carlson, 214 F. Supp. 2d 718, 2002 U.S. Dist. LEXIS 28649 (S.D. Tex. 2002).

Opinion

Opinion on Suppression

LYNN N. HUGHES, District Judge.

1. Introduction.

This case co-mingles the novel' — the Internet, chatrooms, user names — with the venerable — freedom from random government searches. When a federal agent bases his affirmation on dubious information from an unreliable source, the ensuing warrant is invalid, and so is the search.

2. Search Warrants.

Before a magistrate may issue a search warrant, the officer must supply her with facts under oath. These facts must be a of weight and reliability that would lead a reasonable person learned in the law to conclude that the law has probably been violated. Next, the facts must support the conclusion that the specific items relate to the commission of that crime and are to be found in the place to be searched .idata on probable cause, supported by sworn facts *719 and particularly describing the place to be searched and the person or things to be seized. U.S. Const, amend. IV. The government must show that the search will probably reveal evidence of a crime. See Beck v. Ohio, 379 U.S. 89, 85 S.Ct. 223, 13 L.Ed.2d 142 (1964). Further, the warrant must particularly describe the evidence to be seized that correlates to the facts of the probable cause. See United States v. Shugart, 117 F.3d 838 (5th Cir.1997). False representations in an affidavit supporting an application for a search warrant are struck; what remains must support a finding of probable cause. See Franks v. Delaware, 438 U.S. 154, 98 S.Ct. 2674, 57 L.Ed.2d 667 (1978).

3. Affidavit for the Search Warrant.

Special Agent Robert M. Sherman of the United States Customs Service filed an affidavit on March 12, 1998, supporting an application for a search warrant for Don M. Carlson’s home.

A. Probable Cause.

Based on information Harry Conners, an informant, sent to Customs on October 29, 1997, Sherman swore that Carlson sent two pornographic images of children through the Internet on October 4, 1997, and received two more images through the Internet on October 28, 1997. Sherman did not specify from whom Carlson received the images or to whom he sent them. Further, Sherman made no statement about the informant’s veracity, reliability, or the basis of his knowledge.
Sherman corroborated that the screen names used to receive and send the images were Carlson’s, concluding that the fictitious names concealed his identity so he could communicate anonymously with young boys. Sherman then verified that the children in the images were minors and that their poses were pornographic.
Last, Sherman said that he monitored Carlson in an Internet chatroom at 11:00 p.m. on February 28, 1998, baldly asserting that the chatroom was frequented by homosexual males interested in young boys. Sherman said he arrived at Carlson’s home at 11:45 p.m. and saw lights on inside the house and Carlson’s car parked in the driveway. He stated that Carlson disconnected from the Internet at 11:50 p.m. Forty minutes later, Sherman knocked on Carlson’s door. Sherman said that Carlson answered the door, a statement Carlson disputes.
Sherman then wrote a six-page tract about pedophiles, child pornographers, and preferential child molesters. He included details of how pedophiles seduce and molest children. He said that computers were a fast-growing medium for pedophiles. None of this — none—was case-specific. Sherman never explained how these profiles were connected to Carlson or the information Conners provided.

B. Particularity.

Sherman then catalogued the items he wanted to seize. Beyond computerized images, he included films, videotapes, books, and magazines containing child pornography. He listed items like envelopes, letters, and address books used to send and receive child pornography through the mail, plus “[a]ny and all computer systems,” including scanners, operating manuals, monitors, and printers.
Sherman continued, wanting to seize motion picture cameras, production equipment, still cameras, camera film, and video cassette recorders and players. He also listed receipts, checks, money orders, contracts, and invoices *720 that could be used to distribute pornography. He wanted to seize advertisements, posters, pamphlets, lists, or notebooks that contained a reference to child pornography. He also wanted to seize all records showing that Carlson owned the home or the seized items.
Sherman said he wanted to seize child erotica, even legal, that demonstrated Carlson’s disposition toward pedophilia. This included items Carlson could use to entice children to visit or trust him— books about children or pedophiles, toys, dolls, games, children’s books, and video games.
Out of eleven paragraphs, Sherman addressed the issue at hand — computer images sent over the Internet — in only one. With some particularity in paragraph six, Sherman said he wanted to seize computer files with images of child pornography. None of the other items had been shown to be part of anything Sherman “knew” about Carlson or Ms home.

4. No Probable Cause.

A. Unreliability of the Confidential Informant.

When probable cause for a search warrant is based on information from a confidential informant, the informant’s reliability must be assessed. Otherwise, the government could search the home of whomever it wanted with fictitious or unreliable information. One lying citizen could unleash the full force of the state and its abihty to disrupt someone’s home. Reliability can be assessed by considering the informant’s record in other cases and considering additional evidence that corroborates the reliability of the informant’s material. See Illinois v. Gates, 462 U.S. 213, 103 S.Ct. 2317, 76 L.Ed.2d 527 (1983).
Although it is clear that no one could have asserted anything useful about Conners, Sherman never averred that Conners was truthful or that his information was reliable. Even though Sherman had the government’s resources at his disposal, he never furnished evidence that would have indicated Conners’s character or corroborated his information, the veracity of which is suspect at best.
Sherman says that Carlson’s activity in the chatroom corroborates Conners’s story, making the information reliable. The chatroom Carlson frequented was legal, so his presence there corroborates no illegal activity. Second, the bold leap of faith that people who use the chat-room are homosexual pedophiles seeking to molest young boys is wholly speculative.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Shugart
117 F.3d 838 (Fifth Circuit, 1997)
Beck v. Ohio
379 U.S. 89 (Supreme Court, 1964)
Franks v. Delaware
438 U.S. 154 (Supreme Court, 1978)
Illinois v. Gates
462 U.S. 213 (Supreme Court, 1983)

Cite This Page — Counsel Stack

Bluebook (online)
214 F. Supp. 2d 718, 2002 U.S. Dist. LEXIS 28649, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-carlson-txsd-2002.