United States v. George Vortman

CourtCourt of Appeals for the Ninth Circuit
DecidedJanuary 21, 2020
Docket18-10038
StatusUnpublished

This text of United States v. George Vortman (United States v. George Vortman) is published on Counsel Stack Legal Research, covering Court of Appeals for the Ninth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. George Vortman, (9th Cir. 2020).

Opinion

FILED NOT FOR PUBLICATION JAN 21 2020 UNITED STATES COURT OF APPEALS MOLLY C. DWYER, CLERK U.S. COURT OF APPEALS

FOR THE NINTH CIRCUIT

UNITED STATES OF AMERICA, No. 18-10038

Plaintiff-Appellee, D.C. No. 3:16-cr-00210-WHA-1

v. MEMORANDUM* GEORGE VORTMAN,

Defendant-Appellant.

Appeal from the United States District Court for the Northern District of California William Alsup, District Judge, Presiding

Submitted January 8, 2020** San Francisco, California

Before: W. FLETCHER and FRIEDLAND, Circuit Judges, and HILLMAN,*** District Judge.

* This disposition is not appropriate for publication and is not precedent except as provided by Ninth Circuit Rule 36-3. ** The panel unanimously concludes this case is suitable for decision without oral argument. See Fed. R. App. P. 34(a)(2). *** The Honorable Timothy Hillman, United States District Judge for the District of Massachusetts, sitting by designation. Defendant-Appellant George Vortman appeals the district court’s orders

denying his motion to suppress evidence and motion to dismiss his indictment.

Vortman argues that the government obtained evidence against him pursuant to a

warrant that was issued in violation of Federal Rule of Criminal Procedure 41, and

that was overbroad and not supported by probable cause. He further claims that

the government’s outrageous conduct warrants dismissal of his indictment. We

review both of the district court’s denials de novo, see United States v. Ruckes, 586

F.3d 713, 716 (9th Cir. 2009); United States v. Black, 733 F.3d 294, 301 (9th Cir.

2013), and affirm both orders.

This court has already examined the precise warrant at issue in the context of

another case. See United States v. Henderson, 906 F.3d 1109 (9th Cir. 2018). We

thus review the warrant and the related technology only briefly here.

In 2014, the Federal Bureau of Investigation (“FBI”) began investigating

“Playpen,” an online forum for sending and receiving child pornography. In

January 2015, the FBI seized Playpen’s servers and later began to operate the

Playpen website from FBI facilities in Virginia. In February 2015, the FBI

obtained a warrant from a magistrate judge in the Eastern District of Virginia

authorizing use of a Network Investigative Technique (“NIT”), in order to identify

Playpen users (“the NIT warrant”).

2 The NIT warrant authorized search of all “activating computers,” or the

computers “of any user or administrator who logs into [Playpen] by entering a

username and password,” “wherever [that computer was] located.” When a person

logged into, or “activated,” Playpen with a username and password, the NIT

technology would cause the user’s computer to send seven pieces of identifying

information to the government server, such as the computer’s internet protocol

address. Id. at 1112. This technology was allegedly necessary because Playpen

was hosted on an anonymous network that allowed users to access websites

without otherwise revealing identifying information. See id.

Using the NIT, the FBI found that the user “childpornstar” had registered

with Playpen on January 3, 2015, a month before the FBI’s takeover of Playpen,

had accessed child pornography videos, and had actively logged onto Playpen for

approximately 18 hours between January 3, 2015 and March 4, 2015. The FBI

traced the user’s IP address to a residence in San Francisco, which it searched

pursuant to a separate warrant. The FBI seized a number of digital devices

belonging to Vortman with more than 1,000 photographs and 150 videos of child

pornography. Vortman was later charged with violating 18 U.S.C. § 2252(a)(2),

(b)(1), “Receipt of Child Pornography” and 18 U.S.C. § 2252(a)(4)(B), (b)(2),

“Possession of Child Pornography.”

3 Vortman challenges the NIT warrant on two grounds. First, he argues that

because the warrant was issued in violation of Federal Rule of Civil Procedure 41,

evidence seized pursuant to it should be suppressed. In Henderson, we held that

the NIT warrant violated Rule 41, but held that the good-faith exception

nevertheless excused the violation. See id. at 1119–20. Vortman offers no reason

to depart from that holding here, and we thus hold that the good-faith exception

excused the violation here.

Next, Vortman argues that the NIT warrant was overbroad and was not

supported by probable cause. We review the specificity of a warrant de novo,

United States v. Wong, 334 F.3d 831, 836 (9th Cir. 2003), and a finding of

probable cause for clear error, United States v. Meek, 366 F.3d 705, 712 (9th Cir.

2004).

The NIT warrant was not overbroad. See Henderson, 906 F.3d at 1119. It

described the place to be searched (activating computers) and the information to be

seized (seven pieces of identifying information) with particularity. See United

States v. Smith, 424 F.3d 992, 1004 (9th Cir. 2005).

Furthermore, the NIT warrant authorized only search of “activating”

computers—i.e., those that logged into Playpen during the time the government

operated the website with a username and password. In order to use an “activating

4 computer,” a user had to first download and install software to use the

anonymizing network on which Playpen operated. Next, a user could not access

Playpen through the open internet, but would instead have to find and input

Playpen’s exact algorithmic address (which we decline to provide here).

Henderson, 906 F.3d at 1111. In order to access Playpen’s contents, the user

would have to navigate past Playpen’s homepage, which depicted two minor

females with their legs spread apart, and register with a username and password.

Because there were multiple affirmative steps required to be an “activating

computer,” the warrant applied to those actively attempting to access child

pornography. It did not sweep too broadly.

Vortman next argues that the NIT warrant lacked probable cause because

Playpen users could be attempting to access the legal content on Playpen, such as

its fiction stories. The district court’s finding of probable cause was not clear

error. See United States v. Vortman, 2016 WL 7324987, at *7–*9 (N.D. Cal. Dec.

16, 2016). First, as the district court pointed out, we rejected a similar argument in

United States v. Gourde, 440 F.3d 1065, 1070 (9th Cir. 2006). Second, the

multiple affirmative steps a user had to take in order to access any Playpen content

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Russell
411 U.S. 423 (Supreme Court, 1973)
United States v. James Mitchell, Aka/jim Mitchell
915 F.2d 521 (Ninth Circuit, 1990)
United States v. Raymond Wong
334 F.3d 831 (Ninth Circuit, 2003)
United States v. Jeffrey Meek
366 F.3d 705 (Ninth Circuit, 2004)
United States v. Micah J. Gourde
440 F.3d 1065 (Ninth Circuit, 2006)
United States v. Cordae Black
733 F.3d 294 (Ninth Circuit, 2013)
United States v. Mayer
503 F.3d 740 (Ninth Circuit, 2007)
United States v. Ruckes
586 F.3d 713 (Ninth Circuit, 2009)
United States v. Bryan Henderson
906 F.3d 1109 (Ninth Circuit, 2018)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. George Vortman, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-george-vortman-ca9-2020.