United States v. Schesso

842 F. Supp. 2d 1292, 2011 WL 6989822, 2011 U.S. Dist. LEXIS 129993
CourtDistrict Court, W.D. Washington
DecidedNovember 9, 2011
DocketCase No. CR11-5285 RJB
StatusPublished

This text of 842 F. Supp. 2d 1292 (United States v. Schesso) is published on Counsel Stack Legal Research, covering District Court, W.D. Washington primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Schesso, 842 F. Supp. 2d 1292, 2011 WL 6989822, 2011 U.S. Dist. LEXIS 129993 (W.D. Wash. 2011).

Opinion

MEMORANDUM OPINION RE MOTION TO SUPPRESS EVIDENCE

ROBERT J. BRYAN, District Judge.

This matter comes before the Court on Defendant Joseph T. Schesso’s Motion to Suppress Evidence seized from his home pursuant to a search warrant issued and executed on June 30, 2010. Dkt. 64. The Court has considered the motion, the government’s response (Dkt. 74), reply (Dkt. 78), the warrant (Dkt. 64-1 pp. 36-39), the application for warrant (Dkt. 64-1 pp. 4-35), and the representations and arguments of counsel at a hearing conducted October 21, 2011.

At the conclusion of the hearing, the Court entered an oral ruling granting the motion to suppress. Dkt. 79. The transcript of the Court’s oral ruling (Dkt. 88) is attached as Exhibit 1, and is incorporated herein by this reference. The Court also entered an Order Granting Motion to Suppress Evidence. Dkt. 82. This memorandum opinion formalizes and supplements the oral ruling.

INTRODUCTION AND BACKGROUND

The Warrant Application

Due to perceived constraints placed on federal search warrants of computers, Immigration and Customs Enforcement (ICE) agents requested assistance from state law enforcement personnel in obtaining and executing the search warrant. Dkt. 74 pp. 5. In collaboration with ICE, on June 3, 2010, an officer of the Vancouver Police Department sought permission in the District Court of Clark County, Washington, to search and seize evidence of two crimes: Dealing in depictions of a minor engaged in sexually explicit conduct (RCW 9.68A.050) and Possession of depictions of a minor engaged in sexually explicit conduct (RCW 9.68A.070). Dkt. 64-1 pp. 8, 30. The application for the warrant did not contain any of the protocols for a search of electronically stored information suggested by the concurring opinion in United States v. Comprehensive Drug Testing, Inc., 621 F.3d 1162 (9th Cir.2010) (CDT III), nor did it address the need for “greater vigilance” required by CDT III.

The search warrant application states that in December of 2008, German law enforcement personnel informed ICE that [1294]*1294an investigation of a child pornography peer-to-peer file sharing network known as “eDonkey” had revealed that illicit images were distributed to and by computers in the United States. The German investigation revealed that during a four hour period on October 20, 2008, a computer with an IP address of 97.115.106.34 was making available for download, copies of a file containing child pornography. Dkt. 64-1 pp. 17-18. The German authorities confirmed that the hash value (digital foot print) of the file offered by the computer at IP address 97.115.106.34 matched the hash value of a known file containing child pornography. Id. The eDonkey hash value of the file matched the hash value of a child pornography video in German authority’s contraband files library. Id. The German authorities supplied ICE agents a copy of the file. Id., at pp. 18. ICE investigators determined that the IP address was assigned to Defendant Schesso at his Vancouver, Washington residence. Id., at pp. 20-21. Based on this single four hour incident in October 2008, the Vancouver Police Department, in collaboration with ICE, filed the June 2010 application for search warrant.

The application seeks broad authorization to seize and examine every sort of computer storage device and records found at Schesso’s residence. Dkt. 64-1 pp. 23-28. The application also seeks unlimited authorization to peruse all the stored data to determine which particular files are evidence or instrumentalities of crime. Id., at 28-30

The remainder of the application consists of a set of “definitions” related to cybercrime investigations (Dkt. 64-1 pp. 8-10); a general explanation of how computers and the Internet operate (Id., at 10-14, 16); and a generic pornography “collector profile” (Id. at 14-16). There is nothing in the application that directly connects this generic information regarding child pornographers to the Defendant. There is no information in the application that the named storage devices are the type typically used in connection with computer peer-to peer file sharing as found in the investigation of Defendant Schesso.

The Search Warrant

The search warrant did not name the particular crimes that the investigators were aware of, but found probable cause to search for evidence of the crimes of Revised Code of Washington (“RCW”) 9.68A.050 Dealing In Depictions Of A Minor Engaged In Sexually Explicit Conduct, and RCW 9.68A.070 Possession Of Depictions Of A Minor Engaged In Sexually Explicit Conduct. Dkt. 64-1 pp. 36. The warrant provided for the search and seizure of any computer or electronic equipment or digital data storage devices that are capable of being used to commit or further the crimes, or to create, access, or store the types of evidence, contraband, fruits, or instrumentalities of such crimes. Id., at 36-39. Upon execution of the warrant at the Defendant’s home, officers seized computers and all electronic media capable of storing, transporting, and viewing electronic data. Dkt. 74-1 pp. 12.

Forensic examination of a seized 16MB Fujifilm camera media card revealed six deleted but recoverable pictures of a young, prepubescent girl’s genital area. Dkt. 74-1 pp. 8. Data embedded in the six pictures confirms that they were taken with a Fujifilm FinePix S5100 camera, the same make and model of camera physically connected to Schesso’s computer and seized at his residence. Id., at pp. 9. Subsequent investigation revealed that the prepubescent girl depicted was Schesso’s niece. Dkt. 74 pp. 8. Along with the six images of Schesso’s niece, forensic examination of Schesso’s electronic media revealed over 3,400 images of commercial child pornography and approximately 632 [1295]*1295videos of child pornography, including the video shared over the eDonkey peer-to-peer network. Dkt. 74-1 pp. 8.

Federal Prosecution

Based upon the discovery of the evidence of child pornography, the U.S. Attorney’s office was contacted regarding federal prosecution. Dkt. 74-1 pp. 10. A four count federal indictment was filed against Schesso. Dkt. 25. Count I charged Schesso with Production of Child Pornography/Sexual Exploitation of Children, 18 U.S.C. §§ 2251(a) and 2251(e). Count 2 charged Schesso with Distribution of Material Constituting or Containing Child Pornography, 18 U.S.C. §§ 2252A(a)(2) and 2252A(b)(l). Count 3 charged Schesso with Receipt of Material Constituting or Containing Child Pornography, 18 U.S.C. §§ 2252A(a)(2)

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
842 F. Supp. 2d 1292, 2011 WL 6989822, 2011 U.S. Dist. LEXIS 129993, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-schesso-wawd-2011.