United States v. Harrell

530 F.3d 1051, 45 Communications Reg. (P&F) 604, 2008 U.S. App. LEXIS 13725, 2008 WL 2574474
CourtCourt of Appeals for the Ninth Circuit
DecidedJune 30, 2008
Docket07-10238
StatusPublished
Cited by13 cases

This text of 530 F.3d 1051 (United States v. Harrell) is published on Counsel Stack Legal Research, covering Court of Appeals for the Ninth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Harrell, 530 F.3d 1051, 45 Communications Reg. (P&F) 604, 2008 U.S. App. LEXIS 13725, 2008 WL 2574474 (9th Cir. 2008).

Opinion

BRUNETTI, Circuit Judge:

Peter Thomas Harrell (Harrell) appeals in part the district court’s partial denial of his motion for return of property filed pursuant to Federal Rule of Criminal Procedure 41(g). Acting pursuant to a warrant, officers seized the property at issue from Harrell’s residence in 2004. A federal indictment followed, but was dismissed after the district court granted Harrell’s suppression motion. Harrell now seeks the return of some property still in the government’s possession.

I. Facts and Proceedings

DISH Network and Direct TV are direct broadcast satellite services that broadcast encoded digital satellite television and audio signals throughout the United States. To obtain either service, subscribers must purchase or lease equipment, including receivers, which decode and convert the encoded satellite signal into a viewable television signal, and “smartcards,” which authorize the receiver to convert the signal. Each DISH Network receiver has a unique “boxkey” identification number which is electronically stored in the receiver and is used by DISH Network to identify the receiver and to obtain information about the receiver. While boxkey identification numbers are proprietary and are generally not made available to the public, they may be obtained using a receiver’s J-TAG port, which is the input/output port used to interface the receiver with a personal computer for reading and writing receiver software.

On October 27, 2004, acting pursuant to a warrant, officers of the Siskiyou County Sheriffs Department seized various items of personal property from Harrell’s residence. The property included satellite television receivers, smartcards, and other related electronics, compact discs, computers and hard drives. The sheriffs department turned the property over to the Signal Integrity Division of EchoStar Technologies Corporation (doing business as DISH Network) for inspection and analysis. Between November 2004 and February 2005, Michael J. Clifford (Clifford) inspected and analyzed the property to establish whether the seized receivers and smartcards were modified to receive unauthorized programming. Clifford concluded that fourteen of the twenty-seven seized receivers were “modified to receive unauthorized satellite programming.” Another twelve receivers were either unmodified, could not be used to pirate a signal, or were not analyzed. The one remaining receiver belonged to Richard Harding, not Harrell, and Harrell does not seek its return.

The fourteen receivers Clifford found to be “modified to receive unauthorized satellite programming” fall into four subcategories:

1. receivers with what appears to be their boxkey identification numbers written on their bottoms in black magic marker;
*1055 2. receivers with their boxkey identification numbers written on their bottoms in black magic marker, and scratches, marks and mars on their J-TAG ports, which is consistent with using a J-TAG interface device to extract a boxkey identification number;
3. receivers with their boxkey identification numbers written on their bottoms in black magic marker, and scratches, marks and mars on their J-TAG ports, and a history of unauthorized use; and
4. one receiver with only scratches, marks and mars on its J-TAG port.

Clifford also issued reports on the seized smartcards, computer hard drives, and other miscellaneous items. These miscellaneous items include:

1. digital locks (used to evade electronic countermeasures sent by satellite service providers to combat piracy);
2. satellite finders (used to identify locations with optimum signal reception);
3. J-TAG interface devices (used to transfer software between receivers and personal computers);
4. Sombreros (used to extract boxkey identification numbers from receivers);
5. memory erasers (used to erase smartcard memories);
6. ATMEGA 128 devices (used in lieu of smartcards to pirate satellite signals); and
7. audio-video replicator programmers (used to load piracy software onto various piracy devices).

Finally, Clifford issued reports on software downloads for piracy devices, instructions on how to use piracy devices, instructions on the piracy of DISH Network smartcards, instructions on the installation of digital locks, and instructions on the extraction of boxkey identification numbers.

The Siskiyou County Sheriffs Department assigned numbers to each item of seized property, which are reflected in its Department Evidence Report (e.g., 001CS, 001SW, 002CS, etc.). When an item number encompassed multiple items of property, Clifford then assigned items or groups of items different item numbers, which are reflected in his analysis reports (e.g., 24E, 24G, 241, etc.). Throughout the district court proceedings, the parties referred to items by the item numbers assigned to them in the Department Evidence Report, and when possible we do the same. However, because Harrell also refers to specific items by Clifford’s item numbers, we use those identifying numbers as well, when necessary.

After the Siskiyou County Sheriffs Department transferred Harrell’s property to the FBI, a grand jury returned a four-count indictment against Harrell, charging various violations of 18 U.S.C. § 1029 and seeking criminal forfeiture of the seized property. 1 After the district court granted *1056 Harrell’s motion to suppress the seized evidence, the court granted the government’s motion to dismiss the indictment without prejudice.

Harrell then filed the instant motion pursuant to Federal Rule of Criminal Procedure 41(g), seeking return of the property seized from his residence. 2 Harrell’s motion included as exhibits the Siskiyou Sheriffs Department Evidence Report and all of Clifford’s reports. In his motion, Harrell states that he does not seek the return of any property modified to permit the owner to illegally view encrypted television signals, nor does he seek the return of any discs with downloaded instructions explaining how to modify equipment to permit the illegal viewing of encrypted television signals.

In response, the government filed two declarations from Donald Toy (Toy), Clifford’s supervisor and the manager of the Signal Integrity Division, which inspected and analyzed the seized property. The government supported its response with Toy’s declarations because at the time Harrell filed his Rule 41(g) motion, Clifford was no longer employed by DISH Network.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Goobic v. County of El Dorado CA3
California Court of Appeal, 2022
United States v. Kaleb Basey
Ninth Circuit, 2021
Granny Purps, Inc. v. County of Santa Cruz
California Court of Appeal, 2020
United States v. Brian Entzminger
677 F. App'x 393 (Ninth Circuit, 2017)
United States v. Ivory Crow
651 F. App'x 686 (Ninth Circuit, 2016)
Little v. Gore
148 F. Supp. 3d 936 (S.D. California, 2015)
United States v. Justin Gladding
775 F.3d 1149 (Ninth Circuit, 2014)
United States v. Douglas Spink
524 F. App'x 352 (Ninth Circuit, 2013)
United States v. Peter Tran
472 F. App'x 629 (Ninth Circuit, 2012)
County of Butte v. Superior Court
175 Cal. App. 4th 729 (California Court of Appeal, 2009)

Cite This Page — Counsel Stack

Bluebook (online)
530 F.3d 1051, 45 Communications Reg. (P&F) 604, 2008 U.S. App. LEXIS 13725, 2008 WL 2574474, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-harrell-ca9-2008.