United States v. Simons

29 F. Supp. 2d 324, 1998 U.S. Dist. LEXIS 19646, 1998 WL 883289
CourtDistrict Court, E.D. Virginia
DecidedDecember 15, 1998
DocketCriminal Action 98-375-A
StatusPublished
Cited by2 cases

This text of 29 F. Supp. 2d 324 (United States v. Simons) is published on Counsel Stack Legal Research, covering District Court, E.D. Virginia primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Simons, 29 F. Supp. 2d 324, 1998 U.S. Dist. LEXIS 19646, 1998 WL 883289 (E.D. Va. 1998).

Opinion

MEMORANDUM OPINION

CACHERIS, District Judge.

The matter before the Court is Defendant’s Motion to Suppress. On October 8, 1998, a federal grand jury in the Eastern District of Virginia returned a two count indictment charging Defendant, Mark L. Si-mons, with violating 18 U.S.C. § 2252A(a)(2)(A), Receiving Materials Containing Child Pornography, and 18 U.S.C. § 2252A(a)(5)(B), Possession of Material Containing Child Pornography. The Court conducted an evidentiary hearing on this matter on December 11, 1998, and the Court now concludes that the Motion must be DENIED.

I.

Defendant Mark L. Simons is currently employed as an electronic engineer within the Foreign Bureau of Information Services (“FBIS”) component of the CIA. Defendant has access to a government computer system owned and operated by the CIA, and he has access to the Internet.

At the December 11, 1998 hearing, the Government first called Clifford Lee Mauck (“Mauck”) to testify. Mauck works as the Systems Operations Center Manager at Science Applications International Corporation (“SAIC”). As the Manager, Mauck manages the computer network for FBIS, which includes monitoring Internet connections through a device called a firewall. (Tr. at 12-13.) The firewall logs all traffic going outside of the network, and it shows which computers have accessed the outside. (Tr. at 13-15.)

Mauck explained that on July 17, 1998, he examined the firewall to determine the capabilities of the system. He examined the firewall because it was new, and he believed that FBIS would require him to know more about its capabilities. (Tr. at 15-16). He had no reason to believe that there was any inappropriate use of the network going on before he began his examination. (Tr. at 18.)

*326 During Mauck’s examination, he noticed that the firewall’s log was very large. He conducted a keyword search of the work “sex” because he believed that if the firewall registered inappropriate activity, then “sex” would likely be an area that would be registered. (Tr. at 17-18.)

After Mauck entered the word “sex,” he came up with a significant number of “hits.” When he pulled the “hits,” he noticed that several of them were Internet web sites. Mauck also noticed that a significant group of hits traced back to the same work station, which was later determined to be Defendant’s work station. Mauck determined, based on his experience, that these hits evidenced significant activity rather than casual or accidental activity. (Tr. at 17-18.) As Mauck explained, he “could see by looking at the web sites that they weren’t necessarily for business purposes.” (Tr. at 28.) After this discovery, Mauck called his Government counterpart at FBIS, the Network Branch Chief, Katherine Camer. (Tr. at 20.)

The Government next called Mr. Robert Harper (“Harper”) to testify at the hearing. Harper is employed by SAIC, and his duties include monitoring, troubleshooting, and repairing FBIS’s computer network. (Tr. at 37.) On July 20,1998, his Branch Chief, also Katherine Camer, told him that a particular web site, was found in the network’s firewall and based on its title it appeared to be pornographic — the title was “www.xratedpic-tures.com.” (Tr. at 37, 48.) The Branch Chief asked Harper to go to the web site and verify that the site was pornographic. Harper agreed, and from his own office, he went to the site, and verified its pornographic nature. (Tr. at 38.)

Harper’s Branch Chief then asked him to examine the work station that was seen going to the pornographic site, i.e. Defendant’s work station, to determine whether there were any pictures or files downloaded to that work station. From Harper’s own office, he accessed Defendant’s work station and determined that over one thousand files had been downloaded that contained pictures. (Tr. at 39-40.) He then examined several of the downloaded files and explained that “they were pornographic in nature.” (Tr. at 41.)

After Harper’s supervisors reviewed a listing of the downloaded files, he was asked to copy the contents of the hard drive at Defendant’s work station. (Tr. at 42.) Harper copied the hard drive — from his own work station and via the network — and then set up a copy for Special Investigators of the CIA to review. (Tr. at 43, 52.) The Special Investigators arrived on July 31, 1998, and they reviewed certain files, which appeared to depict child pornography. (Tr. at 59.) After that, Harper went into Defendant’s office, removed his hard drive, and replaced it with a copy of the original hard drive. (Tr. at 43-44).

On August 5, 1998, Special Agent John Mesisca (“Mesisca”) of the FBI responded to a request by the Special Investigators and reviewed the copy of Defendant’s hard drive. Then, on August 6, 1998, Mesisca obtained a search warrant from Judge Buchanan to search Defendant’s CIA office. On that same day, the warrant was executed. Copies were made of Defendant’s hard drive and of floppy disks found in Defendant’s desk. Copies were also made of documents that pertained to computer screen names and personal correspondence. Mesisca did not leave a property inventory, and Defendant was not present during the search.

On September 17,1998, Mesisca obtained a search warrant for Defendant’s work site and computer from Judge Sewell in order to obtain the contraband observed during the August 6, 1998 search. That search warrant was executed on September 23, 1998 while Defendant was present.

II.

Defendant first argues that the July 1998 searches conducted by Mauck, Harper, and the Special Investigators were illegal searches in violation of the Fourth Amendment because they were conducted without a warrant or other lawful justification.

For a Fourth Amendment analysis, the Court must first consider whether the employee searched had a reasonable expectation of privacy. The person must have had an actual or subjective expectation of privacy and the expectation must have been one that *327 society recognizes as reasonable. See Katz v. United States, 389 U.S. 347, 361, 88 S.Ct. 507, 19 L.Ed.2d 576 (1967) (Harlan, J. concurring). “The employee’s expectation of privacy must be assessed in the context of the employment relation.... Given the great variety of work environments in the public sector, the question whether an employee has a reasonable expectation of privacy must be addressed on a case-by-case basis.” O’Connor v. Ortega, 480 U.S. 709, 717-18, 107 S.Ct. 1492, 94 L.Ed.2d 714 (1987).

In Ortega, the Supreme Court found that the person searched had a reasonable expectation of privacy in his desk and file cabinets located in his office. See id. at 718, 107 S.Ct. 1492. The Court recognized, nonetheless, that public employees’ expectations of privacy in their offices, desks, and file cabinets, may be reduced by actual office practices and procedures.

In this ease, the FBIS had an official policy regarding Internet use.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Thompson v. Thompson, et al.
2002 DNH 108 (D. New Hampshire, 2002)
Commonwealth v. Ellis
10 Mass. L. Rptr. 464 (Massachusetts Superior Court, 1999)

Cite This Page — Counsel Stack

Bluebook (online)
29 F. Supp. 2d 324, 1998 U.S. Dist. LEXIS 19646, 1998 WL 883289, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-simons-vaed-1998.