United States v. Stevahn

313 F. App'x 138
CourtCourt of Appeals for the Tenth Circuit
DecidedFebruary 19, 2009
Docket08-8036
StatusUnpublished
Cited by1 cases

This text of 313 F. App'x 138 (United States v. Stevahn) is published on Counsel Stack Legal Research, covering Court of Appeals for the Tenth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Stevahn, 313 F. App'x 138 (10th Cir. 2009).

Opinion

ORDER AND JUDGMENT *

ROBERT H. HENRY, Circuit Judge.

James Stevahn appeals the district court’s denial of his motion to suppress evidence that officers seized from his Gillette, Wyoming home computer, which, according to the officer’s affidavit supporting the search warrant, had been targeted as a “download candidate” for child pornography by “law enforcement officers from around the world.” Rec. vol. I, doc. 25, Att. 1 (Ex. B, Huff Aff. ¶ 4t). While we acknowledge the infirmity of the search warrant’s probable cause, we hold the seized evidence admissible under the good faith exception the Supreme Court outlined in United States v. Leon, 468 U.S. 897, 104 S.Ct. 3405, 82 L.Ed.2d 677 (1984).

I. FACTUAL BACKGROUND

On March 19, 2007, Special Agent Randy Huff, of the Wyoming Division of Criminal Investigation, received an assignment to investigate Mr. Stevahn’s Gillette, Wyoming computer that “had been seen as a download candidate by other law enforcement officers from around the world.” Rec. vol. I, doc. 25, Att. 1 (Ex. B, Huff Aff. ¶ 4t). According to Agent Huffs affidavit in support of a March 27, 2007 application for a search warrant, “[t]he computer was observed by officers to have all or a portion of a movie that is suspected of being child pornography.... Two police officers observed that computer as a download candidate for the child porn movie with the SHA1 value H6v ... EJTN [and Internet protocol] address 69.45.198.82.” Id.

SHA 1 (or SHA-1) is a mathematical algorithm that stands for Secure Hash Algorithm (SHA). “The United States has adopted the SHA-1 hash algorithm” for “computing a condensed representation of a message or data file”; thus it can act “like a fingerprint.” See United States v. Warren, No. 4:08 CR 189 RWS, 2008 WL 3010156, at *1 n. 4 (E.D.Mo. July 24, 2008). The Internet protocol (“IP”) address Agent Huff noted designates “[a]n Internet location — called an Internet protocol address[, which] is a string of integer numbers separated by periods.” Avery Dennison Corp. v. Sumpton, 189 F.3d 868, 871 (9th Cir.1999).

The circuit court of Campbell County issued a warrant to search Mr. Stevahn’s apartment on the same day, and, later that day, officers seized computer hard drives and storage devices alleged to contain images of child pornography. Mr. Stevahn was charged with one count of Receipt of Child Pornography in violation of 18 U.S.C. § 2552A(a)(2)(A) and (b)(1) (count 1), and two counts of Possession of Child, Pornography in violation of 18 U.S.C. § 2552A(a)(5)(B) and (b)(2) (counts 2 and 3). Mr. Stevahn entered a conditional plea of guilty to count 1 (Receipt of Child Pornography), subject to this appeal. He received a sentence of 235 months’ imprisonment, plus supervised release for a term of life.

II. DISCUSSION

Mr. Stevahn appeals the district court’s application of the United States v. Leon *140 exception to the exclusionary rule, which allows admission of otherwise excludable evidence when the officers acted in good faith. 468 U.S. 897, 104 S.Ct. 3405, 82 L.Ed.2d 677 (1984). The district court determined that Agent Huffs affidavit submitted in support of the warrant was lacking in probable cause, but that it was not so lacking in indicia of probable cause so as to make Agent Huffs belief in it unreasonable. We agree with the district court’s reasoning.

A. Standard of Review

On an appeal from the denial of a motion to suppress, we review factual findings for clear error in the light most favorable to the government. United States v. Cantu, 405 F.3d 1173, 1176 (10th Cir.2005). We review the warrant’s probable cause requirement “very deferentially],” searching only for a substantial basis that the underlying affidavit provided probable cause. United States v. Riccardi, 405 F.3d 852, 860 (10th Cir.2005). Finally, even if the above do not indicate probable cause, we may uphold the search if de novo review indicates that Leon applies. Id.

B. The Affidavit did not Provide Sufficient Evidence of Probable Cause.

Although we could simply affirm the district court on the basis of the good faith exception, our circuit encourages “the policy of avoiding ‘freezing’ Fourth Amendment jurisprudence, discussed by the Court in Leon, [which] compels us in this case to resolve the constitutional issue” so that magistrate judges and law enforcement officers are given some guidance in their decisionmaking. United States v. Dahlman, 13 F.3d 1391, 1398 (10th Cir.1993); see Leon, 468 U.S. at 924, 104 S.Ct. 3405 (“[N]othing will prevent reviewing courts from deciding the [Fourth Amendment] question before turning to the good-faith issue.”). Further, in this case, it would “be difficult to determine whether [Agent Huff] acted reasonably without resolving the Fourth Amendment issue.” Leon, 468 U.S. at 925, 104 S.Ct. 3430. Thus, like the district court, we first consider the affidavit Agent Huff submitted in support of his application for the search warrant.

According to the district court, the first third of the warrant is “boilerplate” and the officer “just fill[ed] in the blanks.” Rec. vol. Ill, at 11. It also outlines the process through which Agent Huff might identify SHA1 signatures: “Once a matching set of digital signatures was identified, [Agent Huff] could use publicly available software to request a list of internet network computers that are reported as download candidates of known images. This feature allows [Agent Huff] to conduct undercover operations that involve images of child sexual abuse.” Rec. vol. I, doc. 25, Att. 1 (Ex. B, Huff Aff. ¶4^.

The second part of the affidavit notes, but fails to explain, how “officers from around the world” came to perceive Mr. Stevahn’s computer as a “download candidate:”

CURRENT INYESTIGAGTION
t) On March 19, 2007 your Affiant was assigned to investigate a computer located in Gillette, Wyoming that had been seen as a download candidate by other law enforcement officers from arounf the world. The computer was observed by officers to have all or a portion of a movie that is suspected of being child phornogarphy on October 25,2006. Two police officers observed that computer as a download candidate for the child porn movie the SHA1 value H6V2ZQEX-
MSQVLRY7GJ5FUWCPCSTIETJN. The computer was identified while using IP address 69.145.198.82

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Henderson
595 F.3d 1198 (Tenth Circuit, 2010)

Cite This Page — Counsel Stack

Bluebook (online)
313 F. App'x 138, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-stevahn-ca10-2009.