United States v. Finley

612 F.3d 998, 2010 U.S. App. LEXIS 14579, 2010 WL 2790930
CourtCourt of Appeals for the Eighth Circuit
DecidedJuly 16, 2010
Docket09-3159
StatusPublished
Cited by25 cases

This text of 612 F.3d 998 (United States v. Finley) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eighth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Finley, 612 F.3d 998, 2010 U.S. App. LEXIS 14579, 2010 WL 2790930 (8th Cir. 2010).

Opinion

MELLOY, Circuit Judge.

Todd Randall Finley pleaded guilty to possession of child pornography and receipt and distribution of child pornography. He argues in this appeal that the *1000 district court 1 should have granted his motion to suppress evidence seized pursuant to a search warrant because an affidavit submitted in support of the search warrant contained a false statement. We affirm.

I.

The state of Wyoming maintains a database related to sharing of child pornography files on the internet. The Wyoming database contains several types of information, including Internet Protocol (IP) addresses that share child pornography files, the port numbers used for sharing such files, 2 and the Secure Hash Algorithm (SHA) value of known child pornography files. 3

In February 2008, a law enforcement officer in Wyoming contacted Special Agent Troy Boone of the South Dakota Division of Criminal Investigation with a tip that the IP address 24.230.167.215 might be associated with internet activity involving child pornography and might be registered to someone in South Dakota. Agent Boone searched the Wyoming database for activity involving the IP address 24.230.167.215, which revealed that known child pornography images were being shared on that IP address from February 2-14. Agent Boone then searched an online database that keeps track of which companies are issued which IP addresses. The IP address in question was registered to Midcontinent Communications in South Dakota. Agent Boone sent Midcontinent a subpoena on February 14 to determine who had access to the IP address 24.230.167.215 from February 2-14. Mid-continent responded four days later, stating that the only account that accessed the IP address on those dates was Finley’s account.

On February 16, 2008, Agent Boone accessed a file-sharing network and reviewed a publicly available list of 868 files located at the IP address 24.230.167.215. By comparing the SHA values of the file list with the database of known child pornography files, Agent Boone confirmed that several of the files offered from the IP address have previously been identified through their SHA values as depicting child pornography. Agent Boone also downloaded and viewed the files from the IP address, leading him to conclude that the files contained images consistent with child pornography. Agent Boone then contacted Agent Craig Scherer of U.S. Immigration and Customs Enforcement (ICE) regarding potential violations of federal child pornography laws.

On February 27, 2008, Agent Scherer requested a warrant to search Finley’s property and premises. In support, Agent Scherer submitted an affidavit detailing the investigation by Agent Boone, including the fact that Agent Boone had downloaded child pornography files from the IP address 24.230.167.215 on February 16, 2008. The affidavit further stated:

*1001 19. SA Boone conducted an Internet search on the origin of the IP address 24.230.167.215 and found it to be issued to a DSL modem subscriber with Mid-continent Communications. On February 18, 2008, SA Boone received the results of a subpoena request from Mid-continent Communications which indicated that one account had been accessing the IP address 24.230.167.215 on the date and time that SA Boone downloaded the files containing child pornography. The account contained the following information:
Name: Todd Finley

ICE executed the search warrant on February 28, 2008 at Finley’s residence in Vermillion, South Dakota. During the search, several items were seized, including a hard drive containing over two hundred video clips of child pornography. Finley was indicted for receipt and distribution of child pornography in violation of 18 U.S.C. § 2252A(a)(2)(A) and possession of child pornography in violation of 18 U.S.C. §§ 2252A(a)(5)(B) and 2256(8)(A).

Finley moved to suppress the evidence obtained as a result of the search warrant, claiming that the affidavit supporting the search warrant contained a false statement made deliberately or with reckless disregard for the truth. Specifically, Finley asserted that there is nothing to support the statement in ¶ 19 that Finley’s account accessed the IP address 24.230.167.215 on February 16, 2008 (i.e., “the date and time that SA Boone downloaded the files containing child pornography”). Agent Boone’s inquiry to Midcontinent was limited to the dates of February 2-14. Therefore, Finely argues, the statement in ¶ 19 was false to the extent it connected Finley to the IP address beyond that limited time period.

A magistrate judge 4 granted Finley’s request for a Franks 5 hearing. At the hearing, Agent Scherer testified that his affidavit was based on information relayed by Agent Boone and that Agent Boone reviewed and approved the affidavit. Agent Boone acknowledged that the information from Midcontinent was limited to the time period ending February 14. He also acknowledged that, on February 16, he did not know who was accessing the IP address when he downloaded files containing child pornography. Agent Boone explained that IP addresses are capable of belonging to different people throughout time. Nevertheless, he testified that there must have been only one subscriber to IP address 24.230.167.215 from February 2 through February 16 because the IP address, port number, and file list were consistent throughout that time period. These consistencies, according to Agent Boone, eliminated the possibility that another computer was responsible for sharing of the files containing child pornography.

The magistrate judge denied Finley’s motion to suppress, concluding that Finley “ultimately failed to prove that ¶ 19 contains a deliberate or reckless falsity.” The district court reached the same conclusion, finding that the false statement in ¶ 19 was neither a knowingly nor recklessly false statement. The district court relied on the good-faith-reliance doctrine from United States v. Leon, 468 U.S. 897, 104 S.Ct. 3405, 82 L.Ed.2d 677 (1984), and emphasized that there is no suggestion in the record that Agent Scherer misled the judge issuing the search warrant. Finley then pled guilty to both counts in the indictment. In this appeal, he alleges that the motion to suppress should have been *1002 granted because a Franks violation occurred and that Leon’s good faith exception to the exclusionary rule is inapplicable.

II.

To void a search warrant under Franks,

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
612 F.3d 998, 2010 U.S. App. LEXIS 14579, 2010 WL 2790930, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-finley-ca8-2010.