United States v. Simons

CourtCourt of Appeals for the Fourth Circuit
DecidedFebruary 28, 2000
Docket99-4238
StatusPublished

This text of United States v. Simons (United States v. Simons) is published on Counsel Stack Legal Research, covering Court of Appeals for the Fourth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Simons, (4th Cir. 2000).

Opinion

PUBLISHED

UNITED STATES COURT OF APPEALS

FOR THE FOURTH CIRCUIT

UNITED STATES OF AMERICA, Plaintiff-Appellee,

v. No. 99-4238

MARK L. SIMONS, Defendant-Appellant.

Appeal from the United States District Court for the Eastern District of Virginia, at Alexandria. James C. Cacheris, Senior District Judge. (CR-98-375)

Argued: November 30, 1999

Decided: February 28, 2000

Before WILKINS and NIEMEYER, Circuit Judges, and Margaret B. SEYMOUR, United States District Judge for the District of South Carolina, sitting by designation.

_________________________________________________________________

Affirmed in part and remanded in part by published opinion. Judge Wilkins wrote the opinion, in which Judge Niemeyer and Judge Sey- mour joined.

_________________________________________________________________

COUNSEL

ARGUED: Marvin David Miller, LAW OFFICES OF MARVIN D. MILLER, Alexandria, Virginia, for Appellant. G. David Hackney, Assistant United States Attorney, UNITED STATES ATTORNEY'S OFFICE, Alexandria, Virginia, for Appellee. ON BRIEF: Helen F. Fahey, United States Attorney, UNITED STATES ATTORNEY'S OFFICE, Alexandria, Virginia, for Appellee.

_________________________________________________________________

OPINION

WILKINS, Circuit Judge:

Mark L. Simons appeals his convictions for receiving and possess- ing materials constituting or containing child pornography, see 18 U.S.C.A. § 2252A(a)(2)(A), (a)(5)(B) (West Supp. 1999). Simons, who received the unlawful materials at his government workplace via the Internet, argues that the district court erred in denying his motion to suppress. We affirm in part and remand in part.

I.

Simons was employed as an electronic engineer at the Foreign Bureau of Information Services (FBIS), a division of the Central Intelligence Agency (CIA). FBIS provided Simons with an office, which he did not share with anyone, and a computer with Internet access.

In June 1998, FBIS instituted a policy regarding Internet usage by employees. The policy stated that employees were to use the Internet for official government business only. Accessing unlawful material was specifically prohibited. The policy explained that FBIS would conduct electronic audits to ensure compliance:

Audits. Electronic auditing shall be implemented within all FBIS unclassified networks that connect to the Internet or other publicly accessible networks to support identifica- tion, termination, and prosecution of unauthorized activity. These electronic audit mechanisms shall . . . be capable of recording:

- Access to the system, including successful and failed login attempts, and logouts;

2 - Inbound and outbound file transfers;

- Terminal connections (telnet) to and from external sys- tems;

- Sent and received e-mail messages;

- Web sites visited, including uniform resource locator (URL) of pages retrieved;

- Date, Time, and user associated with each event.

J.A. 125-26. The policy also stated that "[u]sers shall . . . [u]nderstand FBIS will periodically audit, inspect, and/or monitor the user's Inter- net access as deemed appropriate." J.A. 127.

FBIS contracted with Science Applications International Corpora- tion (SAIC) for the management of FBIS' computer network, includ- ing monitoring for any inappropriate use of computer resources. On July 17, 1998, Clifford Mauck, a manager at SAIC, began exploring the capabilities of a firewall recently acquired by SAIC, because Mauck believed that SAIC needed to become more familiar with the firewall to service the FBIS contract properly. 1 Mauck entered the keyword "sex" into the firewall database for July 14 and 17, 1998, and found a large number of Internet "hits" originating from Simons' computer. It was obvious to Mauck from the names of the sites that they were not visited for official FBIS purposes.

Mauck reported this discovery to his contact at FBIS, Katherine Camer. Camer then worked with another SAIC employee, Robert Harper, to further investigate the apparently unauthorized activity. Camer instructed Harper to view one of the websites that Simons had visited. Harper complied and found that the site contained pictures of nude women. _________________________________________________________________

1 A firewall is like a funnel through which all Internet access flows and is registered; the firewall collects data and may be searched as a data- base.

3 At Camer's direction and from his own workstation, Harper exam- ined Simons' computer to determine whether Simons had downloaded any picture files from the Internet; Harper found over 1,000 such files. Again from his own workstation, Harper viewed several of the pictures and observed that they were pornographic in nature. Also at Camer's request and from his own workstation, Harper printed a list of the titles of the downloaded picture files. Harper was then asked to copy all of the files on the hard drive of Simons' computer; Harper accomplished this task, again, from his own workstation.

On or about July 31, 1998, two representatives from the CIA Office of the Inspector General (OIG), one of whom was a criminal investigator, viewed selected files from the copy of Simons' hard drive; the pictures were of minors. Later that day, Harper physically entered Simons' office, removed the original hard drive, replaced it with a copy, and gave the original to the FBIS Area Security Officer. The Security Officer turned it over to the OIG criminal investigator the same day.2 This last assignment was the only one that required Harper to physically enter Simons' office.

On August 5, 1998, FBI Special Agent John Mesisca viewed over 50 of the images on the hard drive that had been removed from Simons' office; many of the images contained child pornography. Mesisca, Harper, the two OIG representatives, and Assistant United States Attorney Tom Connolly worked together to prepare an applica- tion for a warrant to search Simons' office and computer. An affidavit from Mesisca supported the warrant application. The affidavit stated, inter alia, that Simons had connected a zip drive to his computer.3 The affidavit also expressed a "need" to conduct the search in secret. J.A. 140.

The warrant was issued on August 6, 1998. It stated that the exe- cuting officers were to leave at Simons' office a copy of the warrant and a receipt for any property taken. The warrant mentioned neither permission for, nor prohibition of, secret execution. _________________________________________________________________ 2 The OIG investigator "placed it into evidence." J.A. 70. 3 A zip drive is a device for storing computer files; it has greater stor- age capacity than other computer storage devices. Zip drive diskettes work only in zip drives and not with other computer storage devices.

4 Mesisca and others executed the search during the evening of August 6, 1998, when Simons was not present. The search team cop- ied the contents of Simons' computer; computer diskettes found in Simons' desk drawer; computer files stored on the zip drive or on zip drive diskettes;4 videotapes; and various documents, including per- sonal correspondence. No original evidence was removed from the office. Neither a copy of the warrant nor a receipt for the property seized was left in the office or otherwise given to Simons at that time, and Simons did not learn of the search for approximately 45 days.5 When Mesisca reviewed the computer materials copied during the search, he found over 50 pornographic images of minors.

In September 1998, Mesisca applied for a second search warrant.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Katz v. United States
389 U.S. 347 (Supreme Court, 1967)
Franks v. Delaware
438 U.S. 154 (Supreme Court, 1978)
Rakas v. Illinois
439 U.S. 128 (Supreme Court, 1979)
Dalia v. United States
441 U.S. 238 (Supreme Court, 1979)
Illinois v. Gates
462 U.S. 213 (Supreme Court, 1983)
Thompson v. Louisiana
469 U.S. 17 (Supreme Court, 1985)
New Jersey v. T. L. O.
469 U.S. 325 (Supreme Court, 1985)
O'CONNOR v. Ortega
480 U.S. 709 (Supreme Court, 1987)
New York v. Burger
482 U.S. 691 (Supreme Court, 1987)
California v. Greenwood
486 U.S. 35 (Supreme Court, 1988)
Horton v. California
496 U.S. 128 (Supreme Court, 1990)
Vernonia School District 47J v. Acton
515 U.S. 646 (Supreme Court, 1995)
United States v. Martin F. Burke
517 F.2d 377 (Second Circuit, 1975)
United States v. Richard I. Horowitz
806 F.2d 1222 (Fourth Circuit, 1986)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Simons, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-simons-ca4-2000.