United States v. Richard Stanley

753 F.3d 114, 2014 WL 2596012
CourtCourt of Appeals for the Third Circuit
DecidedJune 11, 2014
Docket13-1910
StatusPublished
Cited by14 cases

This text of 753 F.3d 114 (United States v. Richard Stanley) is published on Counsel Stack Legal Research, covering Court of Appeals for the Third Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Richard Stanley, 753 F.3d 114, 2014 WL 2596012 (3d Cir. 2014).

Opinion

OPINION

SMITH, Circuit Judge.

Richard Stanley appeals from an order of the United States District Court for the Western District of Pennsylvania denying his motion to suppress evidence that he was in possession of child pornography. Specifically, Stanley argues that a Pennsylvania State Police officer conducted a warrantless search when he used a device called the “MoocherHunter” to trace Stanley’s wireless signal from a neighbor’s unsecured wireless router to its source inside Stanley’s home. For the reasons that follow, we conclude that the use of the MoocherHunter was not a search within the meaning of the Fourth Amendment. Accordingly, we will affirm the judgment of the District Court. 1

I.

On November 11, 2010, Corporal Robert Erdely (“Erdely”), the head of the computer crime unit of the Pennsylvania State Police (“PSP”), was investigating the online distribution of child pornography when he discovered a computer on the Gnutella peer-to-peer network 2 sharing 77 files that he suspected contained child pornography. Based on information available to any Gnu-tella user, Erdely determined that this computer was using file-sharing software with a globally unique identification number of

“8754E6525772BA0134C4C6CACF12E300” (“300 GUID”) and was connected to the Internet via an Internet protocol address (“IP address”) of “98.236.6.174” (“174 IP Address”).

Through a search of publicly available records, Erdely determined that the 174 IP Address was registered to a Comcast Cable (“Comcast”) subscriber, and he obtained a court order requiring Comcast to disclose this individual’s subscription information. In response, Comcast informed Erdely of the subscriber’s name (“the *116 Neighbor”) and his home address in Pittsburgh, Pennsylvania.

On November 18, 2010, Erdely executed a search warrant for the Neighbor’s home. The search revealed that none of the Neighbor’s computers contained either child pornography or the file-sharing software with the 300 GUID. The search also revealed that the Neighbor’s wireless Internet router was not password-protected. From this information, Erdely deduced that the computer sharing child pornography was connecting wirelessly to the Neighbor’s router from a nearby location without the Neighbor’s knowledge or permission. 3 In other words, Erdely determined that the computer in question was “mooching” off the Neighbor’s Internet connection.

With the Neighbor’s permission, Erdely connected a police computer to the router in order to determine the media access control address (“MAC address”) and private IP address of any other devices that were connected wirelessly at the time. 4 From this data, Erdely determined that the mooching computer was not connected at that time. With the Neighbor’s permission, Erdely left the police computer attached to the router so it could be accessed remotely from Erdely’s office in Harrisburg, Pennsylvania.

On January 19, 2011, while working in Harrisburg, Erdely learned that the computer associated with the 300 GUID was again sharing child pornography on the IP address assigned to the Neighbor. By remotely accessing the police computer he had left in the Neighbor’s home, Erdely determined that the mooching computer had a private IP address of “192.168.2.114” (the “114 Private IP Address”) and a MAC address of “mac=00-1C-B3-B4-48-95” (the “95 MAC Address”). Erdely searched online for the “mac” prefix in the 95 MAC address and discovered that it belonged to an Apple wireless card. Because Erdely had not discovered any Apple wireless devices in the Neighbor’s home, this information reinforced his conclusion that the 95 MAC Address and the 114 Private IP Address belonged to the mooching computer. Erdely decided to travel to Pittsburgh so that he could use a “MoocherHunter” device to attempt to determine this computer’s location.

The aptly-vemacularized MoocherHun-ter is a mobile tracking software tool that can be downloaded for free from the manufacturer’s website and used by anyone with a laptop computer and a directional antenna. 5 This device can be used in either “active mode” or “passive mode.” In “passive mode,” the user enters the MAC address of the wireless card he wishes to locate and the program measures the signal strength of the radio waves emitted from this card. 6 These signal strength readings increase as the user aims the antenna in the direction of the mooching computer and moves closer to its location.

*117 Before using the MoocherHunter, Erdely contacted an Assistant United States Attorney in the Western District of Pennsylvania to discuss the propriety of obtaining a search warrant. 7 Erdely and the AUSA had a “lengthy discussion” in which they decided that the MoocherHunter was “completely different” from the infrared technology used in Kyllo v. United States, 533 U.S. 27, 121 S.Ct. 2038, 150 L.Ed.2d 94 (2001). J.A. 271. They also discussed the practical impossibility of obtaining a search warrant without knowing which one of the many nearby residences the signal was being transmitted from. Ultimately, Erdely determined that he needed to proceed without a warrant.

On the evening of January 19, 2011, Erdely arrived at the Neighbor’s home and entered the 95 MAC Address into the MoocherHunter. From the residence, he found that the MoocherHunter’s readings were strongest (67) when he aimed the antenna at a six-unit apartment complex across the street. From the public sidewalk in front of this building, the Moocher-Hunter’s readings were strongest (100) when Erdely aimed the antenna directly at Stanley’s apartment.

That night, Erdely used this information to obtain a search warrant for Stanley’s home. Shortly thereafter, Erdely and other PSP officers executed this warrant. When these officers arrived, Stanley initially fled through a back door. He soon returned, however, and confessed that he had connected to the Neighbor’s router to download child pornography. Erdely seized Stanley’s Apple laptop and later recovered 144 images and video files depicting child pornography.

II.

As a result of Erdely’s meticulous investigation, a federal grand jury in the Western District of Pennsylvania returned a one-count indictment charging Stanley with possession of child pornography in violation of 18 U.S.C. § 2252(a)(4)(B). Stanley was arrested and initially pled not guilty.

On April 13, 2012, Stanley filed a motion to suppress his statements to Erdely and the evidence obtained from his home and computer. His primary argument was that Erdely conducted a warrantless search under Kyllo v. United States, 533 U.S. 27, 121 S.Ct.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Alexander Norris
942 F.3d 902 (Ninth Circuit, 2019)
DARYL J. MC CLELLAND v. STATE OF FLORIDA
255 So. 3d 929 (District Court of Appeal of Florida, 2018)
United States v. Binyamin Stimler
864 F.3d 253 (Third Circuit, 2017)
United States v. Taylor
250 F. Supp. 3d 1215 (N.D. Alabama, 2017)
Commonwealth v. Martinez
71 N.E.3d 105 (Massachusetts Supreme Judicial Court, 2017)
United States v. Wilson
216 F. Supp. 3d 566 (E.D. Pennsylvania, 2016)
United States v. Matish
193 F. Supp. 3d 585 (E.D. Virginia, 2016)
United States v. Werdene
188 F. Supp. 3d 431 (E.D. Pennsylvania, 2016)
United States v. Elvin Dempsey, Jr.
629 F. App'x 223 (Third Circuit, 2015)
White v. Irwin
114 F. Supp. 3d 174 (D. Delaware, 2015)
United States v. Che Rose
613 F. App'x 125 (Third Circuit, 2015)
United States v. James Johnson
578 F. App'x 150 (Third Circuit, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
753 F.3d 114, 2014 WL 2596012, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-richard-stanley-ca3-2014.