United States v. Perdue

237 F. Supp. 3d 471, 2017 WL 661378, 2017 U.S. Dist. LEXIS 23098
CourtDistrict Court, N.D. Texas
DecidedFebruary 17, 2017
DocketCriminal No. 3:16-CR-305-D(1)
StatusPublished
Cited by1 cases

This text of 237 F. Supp. 3d 471 (United States v. Perdue) is published on Counsel Stack Legal Research, covering District Court, N.D. Texas primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Perdue, 237 F. Supp. 3d 471, 2017 WL 661378, 2017 U.S. Dist. LEXIS 23098 (N.D. Tex. 2017).

Opinion

MEMORANDUM OPINION ■ • AND ORDER

SIDNEY A. FITZWATER, UNITED STATES DISTRICT JUDGE

The instant motions to suppress and dismiss the indictment challenge' the Federal Bureau of Investigation’s (“FBI’s”) seizure of a computer server that hosted a child pornography website called “Playpen,” and the FBI’s ensuing operation of the website [474]*474on a government server. Following a hearing, and for the reasons that follow, the court denies defendant Paul Terry Perdue (“Perdue’s”) motions.1

I

The facts of this case that are material to the court’s decision are undisputed. In early 2015, acting on a tip from a foreign law enforcement agency, the FBI located and seized a computer server that contained a child pornography website called Playpen. Playpen existed as a hidden website on the Tor Network,2 also known as the dark web. Through sophisticated encryption, the Tor Network anonymizes and actively conceals identifying information about website users, including a user’s true Internet Protocol (“IP”) address. To access Playpen, it was necessary for users to know the website’s address on the Tor Network. Users could not, for example, stumble upon Playpen while browsing the Internet. Once on the Playpen website, users logged in with dedicated usernames and passwords. Playpen offered users various forums for different child pornography topics, including “Incest” and “Toddlers.” Inside each forum were discussion posts, images, and videos related to the particular topic.

Because the Tor Network anonymizes its users, the FBI could not uncover who was operating or accessing the Playpen website through normal investigative techniques. The FBI devised a plan to investigate Playpen’s users, who would normally be untraceable. The plan called for the FBI to copy the Playpen server and continue to operate the Playpen website on the FBI server. While operating the website, the FBI would use a network investigative technique (“NIT”) that allowed it to retrieve information from the computers of the persons who logged in to the Playpen website. The NIT—computer code developed by the FBI—would be attached to various files uploaded to Playpen. When the website user downloaded a file, the NIT would force the user’s computer to send to the FBI the user’s actual IP address and other identifying information. With the actual IP address, the FBI could identify and locate the user.

Acting according to the plan, the FBI copied the Playpen server and brought it to a government facility located in the Eastern District of Virginia. On February 20, 2015 the FBI applied for and obtained from a United States Magistrate Judge of the Eastern District of Virginia a search warrant (the “NIT Warrant”) authorizing the FBI to deploy the NIT program for a period of up to 30 days.

On or about February 23, 2015, Perdue accessed the Internet from his residence using a personal computer. Using the Tor Network, he logged in to the Playpen website and clicked on a post entitled, “8 Year Old Blonde,” which contained child pornography. As the content from this post downloaded onto the computer, the NIT computer code was sent automatically. The NIT relayed Perdue’s IP address and other information back to the FBI in the Eastern District of Virginia..

Based on this information, the FBI issued a subpoena to AT & T, the Internet service provider connected with Perdue’s IP address, and learned that Perdue was the account holder associated with the address. The FBI obtained a warrant to search Perdue’s residence, and it found (1) a computer containing child pornography, [475]*475and (2) a flash drive containing an 80-page Microsoft Word document containing links to child pornography websites. Perdue subsequently confessed to accessing Playpen and using the Tor Network to obtain child pornography.

The grand jury later indicted Perdue for the offenses of receipt of child pornography, in violation of 18 U.S.C. § 2252A(a)(2)(A), and possession of child pornography involving a prepubescent minor, in violation of 18 U.S.C. § 2252A(a)(5)(B). Perdue moves to suppress all evidence obtained from the NIT, alleging that the authorizing warrant was made without jurisdiction under 28 U.S.C. § 636(a) and Fed. R. Crim. P. 41. He also moves to dismiss the indictment. The government opposes both motions.

H-

The court first considers Perdue’s motion to suppress evidence that he alleges was collected in- violation of the Fourth Amendment.3

A

The general rule under the Fourth Amendment is that searches of private property are reasonable if conducted pursuant to a valid warrant issued upon probable cause: See, e.g., Katz v. United States, 389 U.S. 347, 367, 88 S.Ct. 507, 19 L.Ed.2d 676 (1967). “A defendant normally bears the burden of proving by a preponderance of the evidence that the challenged search or seizure was unconstitutional.” United States v. Waldrop, 404 F.3d 365, 368 (5th Cir. 2005) (citing United States v. Guerrero-Barajas, 240 F.3d 428, 432 (5th Cir. 2001)). “The exclusionary rule prohibits introduction at trial of evidence obtained as the result of an illegal search or seizure.” United States v. Runyan, 275 F.3d 449, 466 (5th Cir. 2001). The exclusionary rule also “encompass[es] evidence that is the indirect product or ‘fruit’ of unlawful police conduct.” Id. (citing Wong Sun v. United States, 371 U.S. 471, 488, 83 S.Ct. 407, 9 L.Ed.2d 441 (1963)).

B

Perdue contends that the magistrate judge in the Eastern District of Virginia who issued the NIT Warrant lacked authority under both Fed. R. Crim. P. 41(b) (2015)4 and § 636(a) of the Federal Magistrate Judges Act, 28 U.S.C. § 636(a),5 to authorize the search of a computer in Texas. The government responds that the NIT is functionally a tracking [476]*476device that “was used to track the movement of [information] both'within and outside of Virginia.” Gov’t Br. 10. According to the government,. “[t]he NIT program, by way,of operation, used [a communication stream between the government’s server in Virginia and Perdue’s computer in Texas] to track from where Perdue’s computer signal emanated.” Id.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Taylor
250 F. Supp. 3d 1215 (N.D. Alabama, 2017)

Cite This Page — Counsel Stack

Bluebook (online)
237 F. Supp. 3d 471, 2017 WL 661378, 2017 U.S. Dist. LEXIS 23098, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-perdue-txnd-2017.