United States v. Kirk Cottom

679 F. App'x 518
CourtCourt of Appeals for the Eighth Circuit
DecidedFebruary 17, 2017
Docket16-1050
StatusUnpublished
Cited by2 cases

This text of 679 F. App'x 518 (United States v. Kirk Cottom) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eighth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Kirk Cottom, 679 F. App'x 518 (8th Cir. 2017).

Opinion

PER CURIAM.

Kirk Cottom pled guilty to accessing with intent to view child pornography, in violation of 18 U.S.C. § 2252A(a)(5)(B), and receipt of child pornography, in violation of 18 U.S.C. § 2252A(a)(2)(A), On appeal, Cottom challenges the district court’s 1 denials of his motion to suppress and motion in limine. We affirm.

I. BACKGROUND

This case involves charges stemming from a 2012 FBI investigation into a computer server in Bellevue, Nebraska, that was hosting child-pornography websites. See also United States v. Welch, 811 F.3d 275 (8th Cir.), cert. denied, — U.S. -, 136 S.Ct. 2476, 195 L.Ed.2d 811 (2016). Cottom is one of multiple defendants charged as a result of the investigation. Welch described the investigation in detail:

[The investigated websites] operate[d] on a clandestine network, accessible only with special software and designed to obscure a user’s identity. This prevented FBI agents from discovering the Internet Protocol (IP) addresses of [the websites’] users, An Internet Service Provider (ISP) assigns an IP address to an individual computer using its Internet service and associates the IP address with the physical address to which that service is being provided. If investigators know an Internet user’s IP address, they can subpoena that user’s ISP to provide the associated physical address.
Rather than shut the server down, the FBI sought to install software on the server that would circumvent this [clandestine] network, providing agents with information about any user who accessed certain content on [the targeted websites] (the “Network Investigative Technique” or NIT). This information included the user’s IP address, the date and time the user accessed the content, and his or her computer’s operating system. The FBI obtained a warrant (the NIT warrant) to install the software in November 2012 and kept the website[s] in operation for approximately three weeks, collecting information on several ... users. Based on this information, the FBI obtained [Cottom’s] IP address.

Id. at 277-78. Once the FBI obtained Cot-tom’s IP address through the use of the NIT, it issued an administrative subpoena to the corresponding ISP to identify Cot-tom’s physical address. In April 2013, officers executed a search warrant at Cot-tom’s Rochester, New York, residence, seized evidence containing images of child pornography, and arrested him. The search and subsequent arrest of Cottom took place as part of a coordinated, synchronized search effort by the FBI and government lawyers designed to conduct searches in temporal proximity with each other so as to reduce communication between the alleged would-be codefendants and to ultimately preserve evidence.

Before the district court, Cottom, along with other codefendants, challenged the *520 delayed notice they received following the execution of the NIT warrant and objected to the introduction of evidence obtained as a result of the search. In Cottom’s case, for example, although the warrant was executed and the NIT installed in November 2012, the search of his residence, and his subsequent arrest, occurred in April 2013. Cottom argued that this delay violated Federal Rule of Criminal Procedure 41, which requires that a copy of an executed search warrant be provided to the owner of the property seized. Fed. R. Crim. P. 41(f). By statute, this Rule 41 provision may be delayed under circumstances for thirty days or to a later date certain and officers may seek extensions. 18 U.S.C. § 3103a(b). 2 The warrant at issue here did contain a request for such a delay. The various defendants challenged the warrant and the delay requested therein, arguing that the relevant language in the warrant required notice within thirty days of execution of the warrant, not thirty days after the user was identified, as the delay request was interpreted and applied by the government. The district court rejected the argument, holding “that the [NIT] warrant intended the thirty-day notice period to begin running when the FBI identified an individual ’behind the keyboard[,]’ ... [which] occurred in April 2013 when officers executed the residential search warrant[s.]” Welch, 811 F.3d at 279 (reviewing the NIT wax-rant at issue in Cot-tom’s case). Thus, the district court held that the government's request for a delay was valid and denied the motions to suppress filed by the defendants.

Regarding Cottom’s motion in limine, during discovery Cottom moved for additional discovery, including a request for the original source code that was used to create and deploy the NIT; a code Cottom claimed was needed to determine how the NIT was configured. The government conceded that the original source code was not preserved and Cottom sought exclusion of the expert testimony of FBI Special Agent Smith and Supervisory Special Agent Gordon under Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579, 113 S.Ct. 2786, 125 L.Ed.2d 469 (1993). Because the original source code was not preserved, Cottom argued that these experts’ opinions regarding the NIT employed in this case lacked proper foundation and were based on insufficient data. The district court denied the motion following a hearing on the matter. Cottom additionally challenges this ruling on appeal.

II. DISCUSSION

A. Motion to Suppress

“When reviewing a district court’s denial of a suppression motion, we review for clear error the district court’s factual findings and review de novo whether the *521 Fourth Amendment was violated.” Welch, 811 F.3d at 279 (quoting United States v. Bell, 480 F.3d 860, 863 (8th Cir. 2007)). On these facts, “a Rule 41 violation amounts to a violation of the Fourth Amendment warranting exclusion ’only if [Cottom] is prejudiced or if reckless disregard of proper procedure is evident.’” Id. (quoting United States v. Spencer, 439 F.3d 905, 913 (8th Cir. 2006)).

The NIT warrant at issue included a section- entitled “Request for Delayed Notice” that cited the provisions of Rule 41(f)(3) and § 3103a(b)(l) and (3), and included factual support for the requested delay.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
679 F. App'x 518, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-kirk-cottom-ca8-2017.