United States v. Ziegler

CourtCourt of Appeals for the Ninth Circuit
DecidedJanuary 29, 2007
Docket05-30177
StatusPublished

This text of United States v. Ziegler (United States v. Ziegler) is published on Counsel Stack Legal Research, covering Court of Appeals for the Ninth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Ziegler, (9th Cir. 2007).

Opinion

FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

UNITED STATES OF AMERICA,  No. 05-30177 Plaintiff-Appellee, D.C. No. v.  CR-03-00008-RFC JEFFREY BRIAN ZIEGLER, ORDER AND Defendant-Appellant.  OPINION

Appeal from the United States District Court for the District of Montana Richard F. Cebull, District Judge, Presiding

Argued and Submitted March 6, 2006—Seattle, Washington

Filed January 30, 2007

Before: Diarmuid F. O’Scannlain, Barry G. Silverman, and Ronald M. Gould, Circuit Judges.

Opinion by Judge O’Scannlain

1077 1080 UNITED STATES v. ZIEGLER

COUNSEL

David F. Ness, Assistant Federal Defender, Great Falls, Mon- tana, argued the cause for the defendant-appellant. Anthony R. Gallagher, Federal Defender, District of Montana, was on the briefs.

Marcia Hurd, Assistant United States Attorney, Billings, Montana, argued the cause for the plaintiff-appellee. William W. Mercer, United States Attorney, District of Montana, was on the brief. UNITED STATES v. ZIEGLER 1081 ORDER

The petition for panel rehearing is GRANTED. The opin- ion filed on August 8, 2006, is withdrawn. The superseding opinion will be filed concurrently with this order. Further petitions for rehearing or rehearing en banc may be filed.

OPINION

O’SCANNLAIN, Circuit Judge:

We must determine whether an employee has an expecta- tion of privacy in his workplace computer sufficient to sup- press images of child pornography sought to be admitted into evidence in a criminal prosecution. If there is such an expec- tation, we must determine whether the search in this case was reasonable under the narrow exceptions to the Fourth Amend- ment’s warrant requirement.

I

A

Frontline Processing (“Frontline”), a company that services Internet merchants by processing on-line electronic payments, is located in Bozeman, Montana.1 On January 30, 2001, Anthony Cochenour, the owner of Frontline’s Internet-service provider and the fiancé of a Frontline employee, contacted Special Agent James A. Kennedy, Jr. of the FBI with a tip that a Frontline employee had accessed child-pornographic websites from a workplace computer. 1 Although the district court referred to the company as “Front Line,” we use the single-word formulation which more frequently appears in the record. 1082 UNITED STATES v. ZIEGLER Agent Kennedy pursued the report that day, first contacting Frontline’s Internet Technology (“IT”) Administrator, John Softich. One of Softich’s duties at Frontline was to monitor employee use of the workplace computers including their Internet access. He informed Kennedy that the company had in place a firewall, which permitted constant monitoring of the employees’ Internet activities.2

During the interview, Softich confirmed Cochenour’s report that a Frontline employee had accessed child pornogra- phy via the Internet. Softich also reported that he had person- ally viewed the sites and confirmed that they depicted “very, very young girls in various states of undress.” Softich further informed Kennedy that, according to the Internet Protocol address and log-in information, the offending sites were accessed from a computer in the office of Appellant Jeffrey Brian Ziegler, who had been employed by Frontline as direc- tor of operations since August 2000. Softich also informed Kennedy that the IT department had already placed a monitor on Ziegler’s computer to record its Internet traffic by copying its cache files.3 2 A firewall is a piece of “computer hardware or software that prevents unauthorized access to private data (as on a company’s local area network or intranet) by outsider computer users (as of the Internet).” MERRIAM- WEBSTER’S COLLEGIATE DICTIONARY 471 (11th ed. 2003). It can also be “programmed to analyze the network traffic flowing between [a] computer and the Internet”; it then “compares the information it monitors with a set of rules in its database,” and “[i]f it sees something not allowed . . . the firewall can block and prevent the action.” NEWTON’S TELECOM DICTIONARY 392 (22nd ed. 2006). Further, “[m]ost firewall programs let you adjust the rules to allow certain types of data to flow freely back and forth without interference.” Id. 3 A cache is “a computer memory with very short access time used for storage of frequently or recently used instructions or data.” MERRIAM- WEBSTER’S COLLEGIATE DICTIONARY 171 (11th ed. 2003). “[I]nformation is cached by placing it closer to the user or user application in order to make it more readily and speedily available . . . .” NEWTON’S TELECOM DICTIO- NARY 189 (22nd ed. 2006). UNITED STATES v. ZIEGLER 1083 Agent Kennedy next interviewed William Schneider, Sof- tich’s subordinate in Frontline’s IT department. Schneider confirmed that the IT department had placed a device in Ziegler’s computer that would record his Internet activity. He reported that he had “spot checked” Ziegler’s cache files and uncovered several images of child pornography. A review of Ziegler’s “search engine cache information” also disclosed that he had searched for “things like ‘preteen girls’ and ‘underage girls.’ ” Furthermore, according to Schneider, Fron- tline owned and routinely monitored all workplace computers. The employees were aware of the IT department’s monitoring capabilities.

B

The parties dispute what happened next. According to testi- mony that Softich and Schneider provided to a federal grand jury, Agent Kennedy instructed them to make a copy of Ziegler’s hard drive because he feared it might be tampered with before the FBI could make an arrest. Agent Kennedy, however, denied that he directed the Frontline employees to do anything. According to his testimony, his understanding was that the IT department had already made a backup copy of Ziegler’s hard drive. As the government points out, his notes from the Softich interview say, “IT Dept has backed up JZ’s hard drive to protect info.” Thinking that the copy had already been made, Kennedy testified that he instructed Sof- tich only to ensure that no one could tamper with the backup copy.

Whatever Agent Kennedy’s actual instructions, the Fron- tline IT employees’ subjective understanding of that conver- sation seems evident from their actions during the late evening of January 30, 2001. Around 10:00 p.m., Softich and Schneider obtained a key to Ziegler’s private office from Ronald Reavis, the chief financial officer of Frontline, entered Ziegler’s office, opened his computer’s outer casing, and made two copies of the hard drive. 1084 UNITED STATES v. ZIEGLER Shortly thereafter, Michael Freeman, Frontline’s corporate counsel, contacted Agent Kennedy and informed him that Frontline would cooperate fully in the investigation. Freeman indicated that the company would voluntarily turn over Ziegler’s computer to the FBI and thus explicitly suggested that a search warrant would be unnecessary.4 On February 5, 2001, Reavis delivered to Agent Kennedy Ziegler’s computer tower (containing the original hard drive) and one of the hard drive copies made by Schneider and Softich. Schneider deliv- ered the second copy sometime later. Forensic examiners at the FBI discovered many images of child pornography.

C

On May 23, 2003, a federal grand jury handed down a three-count indictment charging Ziegler with receipt of child pornography, in violation of 18 U.S.C. § 2252A(a)(2); posses- sion of child pornography, in violation of 18 U.S.C. § 2252A(a)(5)(B); and receipt of obscene material, in viola- tion of 18 U.S.C. § 1462

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Davis v. United States
328 U.S. 582 (Supreme Court, 1946)
Katz v. United States
389 U.S. 347 (Supreme Court, 1967)
Mancusi v. DeForte
392 U.S. 364 (Supreme Court, 1968)
Schneckloth v. Bustamonte
412 U.S. 218 (Supreme Court, 1973)
United States v. Matlock
415 U.S. 164 (Supreme Court, 1974)
Smith v. Maryland
442 U.S. 735 (Supreme Court, 1979)
O'CONNOR v. Ortega
480 U.S. 709 (Supreme Court, 1987)
United States v. Frank Gargiso
456 F.2d 584 (Second Circuit, 1972)
United States v. Joseph Louis Carter
569 F.2d 801 (Fourth Circuit, 1978)
United States v. Howard Eugene Miller
688 F.2d 652 (Ninth Circuit, 1982)
United States v. Charles Ira Black
767 F.2d 1334 (Ninth Circuit, 1985)
United States v. David Taketa and Thomas O'Brien
923 F.2d 665 (Ninth Circuit, 1991)
United States v. Thurman Reed, Jr.
15 F.3d 928 (Ninth Circuit, 1994)
United States v. Mark L. Simons
206 F.3d 392 (Fourth Circuit, 2000)
Albert J. Muick v. Glenayre Electronics
280 F.3d 741 (Seventh Circuit, 2002)
United States v. Damen Anthony Davis
332 F.3d 1163 (Ninth Circuit, 2003)
United States v. Raymond Wong
334 F.3d 831 (Ninth Circuit, 2003)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Ziegler, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-ziegler-ca9-2007.