United States v. Coyne

387 F. Supp. 3d 387
CourtDistrict Court, D. Vermont
DecidedApril 10, 2018
DocketCase No. 5:16-cr-154-01; Case No. 5:17-cr-21-01
StatusPublished
Cited by2 cases

This text of 387 F. Supp. 3d 387 (United States v. Coyne) is published on Counsel Stack Legal Research, covering District Court, D. Vermont primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Coyne, 387 F. Supp. 3d 387 (D. Vt. 2018).

Opinion

Geoffrey W. Crawford, Chief Judge

The warrantless review of electronically-transmitted images by electronic service providers ("ESPs") in partnership with law enforcement raises significant constitutional issues. In these two cases, defendants charged with possession of child pornography have moved to suppress evidence obtained through searches of their homes. Both defendants argue that the review of their private electronic communications which later formed the basis for search warrant applications violated their rights under the Fourth Amendment. In addition, Defendant Denault-Reynolds contends that he was subjected to interrogation after his arrest in violation of Miranda v. Arizona , 384 U.S. 436, 86 S.Ct. 1602, 16 L.Ed.2d 694 (1966) and the due process clause.

*390The court held two days of evidentiary hearings in both cases on November 30, 2017 and January 16, 2018.1 The cases are not consolidated since the offense conduct is unrelated and there is no connection between the actions of the defendants. The evidence concerning the review of images and the generation of tips to law enforcement is substantially similar. For this reason, the court permitted the Government to call the witnesses related to the process of electronic review at a common evidentiary hearing. Both defendants were represented by their own counsel and each received a full opportunity to cross-examine the prosecution's witnesses.

Findings of Fact

I. Electronic Review of Images

The transmission of electronic images is commonplace. With the development of email, text messages, peer-to-peer file sharing, electronic bulletin boards and chat rooms, social media, and other forms of communication, there are innumerable opportunities to exchange still and video images. The attachment of images to emails, texts, and social media has become routine for millions of ESP customers.

The flow of images over the Internet has had at least one severely negative consequence. It has revitalized the illicit trade in child pornography. The increase in public access to the internet between the 1980s and 2000 resulted in a dramatic increase in the exchange of child pornography. For the first time, images could be transferred from one viewer to the next easily and with relative anonymity. Internet sites of many kinds enabled people interested in child pornography to contact one another with little apparent risk of detection.

Congress has responded to this serious social ill through multiple statutes criminalizing possession and distribution of child pornography. Since 1988, federal legislation has focused on the role of the Internet in fostering the exchange of child pornography.2 Criminal penalties were increased *391through enactment by Congress of strict federal sentencing guidelines for child pornography offenses. The number of prosecutions increased greatly. See United States Sentencing Comm'n, Federal Pornography Offenses 3-16 (2012) (describing increases in convictions between 2004 and 2011).

Law enforcement's ability to detect child pornography increased through development of the "PhotoDNA" program in 2010 by Dartmouth College professor Hany Farid and the Microsoft Corporation. See Hany Farid, Reining In Online Abuses , 19 Tech. & Innovation 593, 596 (2018). This program permits an ESP to compare all of the images passing through its servers with a known group of contraband images. For the first time, it became practical to monitor Internet traffic on American ESP networks for images previously identified as child pornography. Microsoft made PhotoDNA available to all ESPs at no cost. It is now widely used to screen most communications passing through an American ESP for child pornography.

II. Role of NCMEC

To understand the implementation of the PhotoDNA program, it is necessary to consider the role of the National Center for Missing and Exploited Children ("NCMEC"). NCMEC functions as a national clearinghouse for information about child abuse. (Shehan Test., Hr'g Tr. 30, Nov. 30, 2017, Doc. 39). NCMEC was established in 1984 by the parents of Adam Walsh who was abducted and murdered in Florida in 1981. (Id. at 17.) His parents formed a non-profit corporation to prevent similar tragedies. Since its formation, NCMEC has grown to an organization of 340 employees serving in five general areas. These are the location of missing children, the prevention of child sexual exploitation, training and education, safety and prevention, and child victim and family services. (Id. )

NCMEC receives substantial grant money from federal and private sources. (Id. at 20.) Sixty-five percent of its current funding is from the federal government. (Id. at 22.) ESPs and other technology companies provide substantial in-kind assistance. (Id. ) NCMEC is governed by a board of directors from a variety of backgrounds, including parents of missing or murdered children. (Id. at 24.) Representatives of law enforcement serve on the board in a limited "non-fiduciary" role in which they lack a vote on most decisions concerning the operation of NCMEC.

III. The Cyber Tipline

From its beginnings in 1984, NCMEC has served as a clearinghouse for tips and information from the public and law enforcement about possible child sexual abuse and trafficking, including child pornography. (Id. at 19-20.) In 1998, NCMEC formed a Cyber Tipline ("Tipline") to collect *392and evaluate tips about child sexual exploitation on the Internet. (Id. at 31.) In addition, NCMEC added a Child Victim Identification program in 2002 and a "Net Smarts 411" program in 2007. (Id. at 29-30.) The Nets Smarts program provides information to members of the public about computer and internet safety. The Cyber Tipline and Child Victim Identification programs are directed at the detection and prevention of child exploitation in individual cases.

Since 1998, the Tipline has received more than 25 million reports. (Id. at 31.) Before 2010, the detection and reporting of child pornography images typically required a tip from a human being who had seen potential contraband on a computer or a video player or in a publication. (Id. at 35.) The Tipline was not formed by federal legislative mandate. (Id. at 32-33.) In 2008, Congress enacted 18 U.S.C. § 2258A. This measure required ESPs to forward information about possible child pornography to the Tipline. In addition, 18 U.S.C. § 2258D allowed NCMEC to view and catalog child pornography as part of its effort to combat the exchange of these images.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State Of Washington, V. Stephen Rian Price
Court of Appeals of Washington, 2025
State v. Michael Joseph Gasper
Court of Appeals of Wisconsin, 2024

Cite This Page — Counsel Stack

Bluebook (online)
387 F. Supp. 3d 387, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-coyne-vtd-2018.