Searching over 5,500,000 cases.


searching
Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.

United States v. McCutchin

United States District Court, D. Arizona

March 7, 2019

United States of America, Plaintiff,
v.
Michael James McCutchin, Defendant.

          ORDER

          HONORABLE JAMES A. SOTO, UNITED STATES DISTRICT JUDGE

         Pending before the Court is a Report and Recommendation issued by Magistrate Judge Bernardo P. Velasco. (Doc. 71.) In the Report and Recommendation, Magistrate Judge Velasco recommends that the Court deny Defendant's Motion to Suppress (Doc. 35). As the Court finds that the Report and Recommendation appropriately resolved the Defendant's Motion to Suppress (Doc. 35), the objections are denied.[1] However, the Court will expand on its reasoning.

         FACTS[2]

         On July 24, 2016, the Department of Homeland Security Special Agent (SA) Robert McCarthy identified an Internet Protocol (IP) address that he previously accessed child pornography through a peer-to-peer file-sharing network. SA McCarthy identified that the IP address belonged to Cox Communications, which would then lease the IP address to its consumers. On August 26, 2016, the Department served a Summons under 19 U.S.C. § 1509 on Cox Communications, requiring that it provide customer/subscriber information attached to the previously-identified IP address during the time that SA McCarthy connected it to child pornography. Cox Communications returned the account information for John McCutchin. John McCutchin is Defendant's father. The residential address attached to the Cox Communications account was owned by John McCutchin. John McCutchin resided there with his son and brother-in-law, [3] who resides at the address part time. All the residents report connecting devices to and utilizing the internet under John McCutchin's account and therefore all the residents utilized the IP address in question.

         After further investigation, SA McCarthy applied for a search warrant. On November 22, 2016, Magistrate Judge Lynette Kimmins signed the search warrant for Defendant's home. During the execution of the warrant, agents questioned Defendant and his father; the brother-in-law was not present during the search. Agents seized several electronic devices. Subsequent forensic examination of the devices uncovered child pornography on Defendant's devices.

         The grand jury returned a six-count indictment against Defendant in this matter. Defendant filed a motion to suppress (Doc. 35). The Government responded (Doc. 54) and filed a notice of supplemental authority (Doc. 59). Defendant filed his reply (Doc. 60). On October 30, 2018, Magistrate Judge Velasco held an evidentiary hearing on the matter (Doc. 62). Defendant requested that the parties be permitted to file their closing arguments in the form of written briefs. On December 12, 2018, Defendant filed his Memorandum in Support of His Motion to Suppress (Doc. 66). On December 26, 2018, Government responded to Defendant's memorandum (Doc. 69). On February 1, 2019, Magistrate Judge Velasco filed his Report and Recommendation recommending that the Court deny Defendant's motion (Doc. 71). Defendant timely objected (Doc. 75) and the Government timely responded (Doc. 78).

         ANALYSIS

         The Defendant presents several arguments to the Court in the Motion to Suppress and the subsequent briefing. (Docs. 35, 60, 66.) First, Defendant argues that the summons presented to Cox Communications violated the statutory limits of 19 U.S.C. § 1509.[4] (Doc. 35 at 5.) The Government rejects this notion and argues that the alleged statutory violation would not provide for exclusion of the resulting evidence. (Doc. 54 at 9-10.) Exclusion is “‘primarily to deter constitutional violations' and violations of statutes that enforce constitutional norms.” United States v. Dreyer, 804 F.3d 1266, 1278 (9th Cir. 2015) (internal citation omitted). The exclusionary rule is rarely used to remedy statutory violations. Id. at 1278-79; United States v. Lombera-Camorlinga, 206 F.3d 882, 886-87 (9th Cir. 2000). The Court has not found, and Defendant has not presented, any indication that violation of 19 U.S.C. § 1509 is one of the rare instances when exclusion would be appropriate absent a constitutional violation. Therefore, the Court will not decide if § 1509 was the appropriate method to request subscriber information, but instead determine if Defendant or his father had a Fourth Amendment privacy interest in his father's subscriber information.

         Defendant argues that there is a privacy interest in the subscriber information after Carpenter v. United States, 138 S.Ct. 2206 (2018). (Doc. 35 at 6-10.) The Government rejects this argument and challenge Defendant's standing to present this matter. (Doc. 54 at 4-9.) The Court may address Fourth Amendment standing after addressing the merits of the claim, if necessary. Byrd v. United States, 138 S.Ct. 1518, 1530 (2018). In Carpenter, the government obtained location points known as cell-site location information (CSLI) from the defendant's two cellphone providers. 138 S.Ct. at 2212. The government did not apply for or receive a warrant for the information. Id. The Supreme Court of the United States acknowledged the changing technological advances, particularly with respect to a cellphone's ability to store vast amounts of extremely sensitive information that is “detailed, encyclopedic, and effortlessly compiled.” Id. at 2214, 2216. The Supreme Court distinguished Carpenter from the previous third-party doctrine cases due to the “unique nature of cell phone location records.” Id. at 2217. The records “reveal[] not only [a person's] particular movements, but through them [the person's] ‘familial, political, professional, religious, and sexual associations.'” Id. (internal citation omitted). After the Court “decline[d] to extend Smith and Miller to the collection of CSLI, ” the Court took care to keep the third-party doctrine cases intact. Id. at 2220 (“Our decision today is a narrow one. . . . We do not disturb the application of Smith and Miller or call into question conventional surveillance techniques and tools, such as security cameras. Nor do we address other business records that might incidentally reveal location information.”). The internet subscriber information differs drastically from the CSLI obtained in Carpenter. It provides business records that are not detailed or encyclopedic. Subscriber information does not reveal familial, political, professional, religious, sexual associations, or location. The Court finds that neither Defendant or John McCutchin has a reasonable expectation of privacy to the internet subscriber information as it fits squarely within the third-party doctrine. See United States v. Contreras, 905 F.3d 853, 857 (5th Cir. 2018).

         Defendant argues that Defendant had a privacy interest in the IP address. (Doc. 35 at 13.) This argument is presented without any law, or facts as to how SA McCarthy obtained the IP address in this matter. (Id.) The Court finds that this argument fails on its merits for the same reason that the subscriber information argument fails. The IP address is much like a return address on an envelope or a phone number; it is the IP address that is relayed to websites and allows the requested website to send information to a computer. (Doc. 70 at 14.) There is no doubt that a person does not have a privacy interest in what is put out publicly into the world, such as a return address on an envelope or phone number dialed. United States v. Choate, 576 F.2d 165, 174-78 (9th Cir. 1978) (finding that the gathering of address information from envelopes, not content within the envelopes, is not a Fourth Amendment search); see Smith v. Maryland, 442 U.S. 735, 743-44 (1979) (considering the privacy expectations of phone numbers dialed out of a private residence and finding that there is no legitimate expectation of privacy in the numbers dialed). Defendant seems to argue that people could do nefarious things with an IP address. (Doc. 70 at 21-23.) Defendant never follows that assertion with law, stating that if a piece of information could be used for nefarious purposes there is an increased privacy interest. (Docs. 35, 60, 66, 75.) A return address on an envelope could be used by burglars or identity thieves, bank records could be useful to hackers or identity thieves, and location data may be useful to similar groups, but the ability for people to do nefarious things with the information is not a part of the Fourth Amendment analysis. Carpenter, 138 S.Ct. at 2217- 20 (not considering potential for location data to be used nefariously when discussing the defendant's reasonable expectation of privacy); Smith, 442 U.S. at 743-44; United States v. Miller, 425 U.S. 435, 442-43 (1976); Choate, 576 F.2d at 174-75. The Court finds that Defendant does not have a privacy interest in the IP address used to connect his home with the internet.

         Defendant argues that the search warrant used to search the home was a “general warrant” and violated his Fourth Amendment rights because the warrant was based on stale information and not on probable cause. (Doc. 35 at 11-12.) The Government argues that this was not a general warrant and instead it was supported by probable cause to search devices able to access the internet to distribute or obtain child pornography. (Doc. 54 at 11-14.) The Court shall review the warrant with great deference for the issuing judge. Illinois v. Gates, 462 U.S. 213, 236 (1983) (quoting Spinelli v. United States, 393 U.S. 410, 419 (1969)). The Fourth Amendment requires that warrants are based on probable cause supported by oath and describe with particularity the place to be searched and items to be seized. U.S. Const. amend. IV; United States v. Gourde, 440 F.3d 1065, 1069 (9th Cir. 2006) (en banc).

         There is probable cause if is “there is a fair probability that contraband or evidence of a crime will be found in a particular place.” Gates, 462 U.S. at 214. When courts find that search warrants include illegally obtained information, it should purge the offending information and determine the sufficiency with the remaining information. United States v. Bishop, 264 F.3d 919, 924 (9th Cir. 2001) (internal citation omitted). The Court has found that the IP address and subscriber information were legally gathered or not appropriate for suppression and therefore it is not appropriate to purge any information in the contested search warrant. See id. The evidence obtained in July 2016 regarding Defendant's IP address downloading pornographic material depicting minors was not stale in November 2016. United States v. Flores, 802 F.3d 1028, 1044 (9th Cir. 2015) (finding that passage of time is not the controlling question when analyzing staleness, particularly with electronic evidence, of information collected more than three months prior to the warrant) (quoting Gourde, 440 F.3d at 1071); United States v. Schesso, 730 F.3d 1040, 1042 (9th Cir. 2013) (holding that a twenty month delay between suspected download of illegal electronic material and the execution of the warrant did not render the information stale). Defendant argues that there is no belief that any particular computer or device accessed child pornography. (Doc. 35 at 12.) Probable cause is satisfied if there was a probability that evidence or contraband would be found in a particular place; in this matter, there was a probability that child pornography would be found on an electronic device in Defendant's home as the unique IP address for Defendant's home was connected with the possession of child pornography. See Schesso, 730 F.3d at 1046 (finding probable cause when the IP address connected to defendant's home was connected with a child pornography video on a peer-to-peer file-sharing network twenty months prior); United States v. Nguyen, 743 Fed.Appx. 764, 766 (9th Cir. 2018) (mem.) (finding that child pornography being shared from a computer using a certain IP address was sufficient probable cause that evidence of a crime would be found in defendant's home). The Court finds that the warrant in this matter was supported by probable cause and is not a general warrant.

         The Government also presents a good faith argument. (Doc. 54 at 15-16.) The Court does not reach a conclusion on this matter, ...


Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.