United States v. Collins

753 F. Supp. 2d 804, 2009 WL 7169546
CourtDistrict Court, S.D. Iowa
DecidedNovember 24, 2009
Docket4:09-cv-00010
StatusPublished
Cited by1 cases

This text of 753 F. Supp. 2d 804 (United States v. Collins) is published on Counsel Stack Legal Research, covering District Court, S.D. Iowa primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Collins, 753 F. Supp. 2d 804, 2009 WL 7169546 (S.D. Iowa 2009).

Opinion

*806 ORDER

JAMES E. GRITZNER, District Judge.

This matter is before the Court on a Motion to Suppress brought by Defendant Matthew Collins (Collins), which the Government resisted. A joint evidentiary hearing was held on the matter in conjunction with factually and legally similar motions to suppress in case numbers 4:09-cr-00031-JEG and 4:09-cr-00032-RP on Monday, November 16, 2009. Defendant was represented by Federal Public Defender John Burns 1 . The Government was represented by Assistant United States Attorney John Courter. The matter is fully submitted and ready for review.

I. BACKGROUND

Iowa Division of Criminal Investigation (DCI) Special Agent Robert Larsen (Special Agent Larsen) participated in Operation Wirebreaker, a coordinated law enforcement effort within the jurisdiction of the Southern District of Iowa to locate individuals downloading and making available for download visual depictions of minors engaging in sexually explicit conduct on peer-to-peer (P2P) networks. As part of his investigation, Special Agent Larsen utilized Peer Spectre, an automated software program designed for and used by law enforcement to help locate Internet Protocol (IP) addresses likely to be download candidates for these contraband files. Peer Spectre essentially automates the search process that officers could otherwise complete through a less efficient manual process. Special Agent Larsen entered search terms into the Peer Spectre program consistent with what he knew to be contraband files. In turn, Peer Spectre used ultrapeers 2 to locate public advertisements from computers making child sexual abuse files available for download on a P2P network. Peer Spectre captures the date, time, file name, and Secure Hash Algorithm Version 1 (SHA-1) 3 values of files that match the requested search term. Special Agent Larsen testified that, in his experience, an ultrapeer had never sent him false information. As part of his investigation, Special Agent Larsen documented that IP address 70.187.16.156 was identified as a likely download candidate thirteen times from September 5, 2008, through September 18, 2008.

Special Agent Larsen directly connected 4 to IP address 70.187.16.156 by utiliz *807 ing the P2P software and, after receiving a list of files available for download from that address, noted that the file names were consistent with the names of files likely to contain visual depictions of minors engaging in sexually explicit conduct. Because file names are not always completely accurate, Special Agent Larsen next compared the SHA-1 values of files from IP address 70.187.16.156 to the SHA-1 values of files in DCI’s collection of contraband images, which had been obtained through prior investigations, in order to further verify the content of the files available for download. Special Agent Larsen found that three of the files made available for distribution by IP address 70.187.16.156 matched files from the DCI’s collection that' Special Agent Larsen knew to be contraband.

On September 29, 2008, Immigration and Customs Enforcement (ICE) Special Agent Shane Nestor (Special Agent Nestor) sent a subpoena to Cox Communications (Cox), the Internet Service Provider for IP address 70.187.16.156, seeking identifying information connected to the IP address. Cox identified Defendant as the account holder and provided law enforcement with Defendant’s name and address. On October 17, 2008, Special Agent Larsen completed a records check through Iowa State Patrol Communications and found that Defendant had a suspended Iowa driver’s license. Special Agent Larsen conducted an additional records check and found that one vehicle had been registered to Defendant but that the registration had expired. Agent Nestor also completed a records check with the United States Postal Inspection Service, which confirmed that Defendant was receiving mail at the same residential address provided by Cox. On October 27, 2008, Special Agent Larsen conducted surveillance and took photos of Defendant’s residence.

Special Agent Larsen was involved in preparing an affidavit and application for a search warrant authorizing the search of Defendant’s residence. Relevant to this motion, the affidavit explained how P2P networks operate, how ultrapeers assist users in the search process, how Peer Spectre works, and why SHA-1 values are a useful and reliable means of confirming the presence of contraband content. The affidavit then specifically detailed the steps that Special Agents Larsen and Nestor took in gathering evidence in this case. The affidavit summarized the investigation by explaining how Special Agent Larsen used Peer Spectre to help identify IP address 70.187.16.156 as a download candidate; retrieved the file list associated with that IP address and noted that some of the file names were indicative of images depicting minors engaged in sexual conduct; compared and matched three images associated with IP address 70.187.16.156 to known contraband images in the DCI’s own library; sent a subpoena to Cox to gain the account holder information for IP address 70.187.16.156; conducted a records check to learn who lived at the residence associated with the IP address; and conducted surveillance of the residence.

Special Agent Larsen also indicated that before signing the warrant, U.S. Magistrate Judge Ross Walters asked many questions regarding the investigation and the P2P operations in this case. He further noted that Judge Walters is always diligent in asking questions, and if there is something that is initially complex, Judge Walters ensures that law enforcement can explain the issue at hand before signing the warrant. On November 12, 2008, Judge Walters signed a warrant authorizing the search of Defendant’s residence.

*808 On February 24, 2009, following a search of Defendant’s residence that uncovered contraband, the grand jury returned a four-count indictment charging Defendant with one count of distribution of visual depictions of minors engaging in sexually explicit conduct, in violation of 18 U.S.C. § 2252(a)(2) (Count One); one count of receipt of visual depictions of minors engaging in sexually explicit conduct, in violation of 18 U.S.C. § 2252(a)(2) (Count Two); one count of possession of visual depictions of minors engaging in sexually explicit conduct, in violation of 18 U.S.C. § 2252(a)(4)(B) (Count Three); and one count of forfeiture (Count Four).

On October 29, 2009, Defendant filed this Motion to Suppress, arguing that the warrant was facially deficient of probable cause. At hearing, counsel for the Defendant clarified that he was seeking a Franks 5 hearing and that all evidence against him should be suppressed because the officers preparing the warrant application failed to include necessary information.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

People v. Lund
California Court of Appeal, 2021

Cite This Page — Counsel Stack

Bluebook (online)
753 F. Supp. 2d 804, 2009 WL 7169546, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-collins-iasd-2009.