United States v. Robert Beatty , 437 F. App'x 185 ( 2011 )


Menu:
  •                                                                 NOT PRECEDENTIAL
    UNITED STATES COURT OF APPEALS
    FOR THE THIRD CIRCUIT
    _____________
    No. 10-3634
    _____________
    UNITED STATES OF AMERICA
    v.
    ROBERT EUGENE BEATTY,
    Appellant
    _____________
    On Appeal from the United States District Court
    For the Western District of Pennsylvania
    (Crim. No. 1-08-cr-00051-001)
    District Judge: Honorable Sean J. McLaughlin
    _____________
    Submitted under Third Circuit L.A.R. 34.1(a)
    July 14, 2011
    BEFORE: SLOVITER, FUENTES, and FISHER, Circuit Judges
    (Opinion Filed: July 14, 2011)
    _____________
    OPINION OF THE COURT
    _____________
    FUENTES, Circuit Judge.
    Robert Beatty appeals the District Court‟s decision to deny his motion to suppress
    evidence of contraband retrieved from a search of his home computer, as well as
    subsequent statements made to law enforcement officials. For the reasons set forth
    below, we will affirm.
    I.
    We write primarily for the parties and therefore discuss only the facts necessary to
    explain our decision. Pennsylvania State Trooper Robert Pearson had been conducting
    an online investigation of child pornography using a peer-to-peer (“P2P”) network. See
    e.g., United States v. Stults, 
    575 F.3d 834
    , 837 (8th Cir. 2009) (explaining the purpose of
    a P2P network). Using search terms that typically yield child pornography, Pearson was
    able to locate eleven files with graphic titles implicating sex acts with a child. With the
    help of a Wyoming Internet Crimes Against Children (“Wyoming ICIC”) Task Force
    database, Pearson was able to cross reference and match each file‟s Secured Hash
    Algorithm (“SHA1”) to known child pornography files. See e.g., United States v.
    Miknevich, 
    638 F.3d 178
    , 181 n.1 (3d Cir. 2010) (noting the significance of the SHA1 is
    that it can act like a fingerprint for a message or data file). It was later determined that
    these files belonged to appellant Robert Beatty.
    Based on this information, Federal Bureau of Investigations (“FBI”) special agent
    Tom Brenneis applied for a warrant to search Beatty‟s home. The supporting affidavit
    included the process by which the files were retrieved and the exact name of each file.
    The affidavit did not state that Pearson or Brenneis opened and viewed any of the files.
    Following the issuance and execution of a search warrant, the police seized Beatty‟s
    2
    computer, which contained hundreds of child pornographic movies and arrested him.
    Shortly after, Beatty made various inculpatory statements to the police.
    Beatty was charged with one count of receiving/distributing visual depictions of
    minors engaged in sexually explicit conduct, in violation of 18 U.S.C. §§ 2252(a)(2) and
    2252 (b)(1). Beatty was also charged with one count of possessing visual depictions of
    minors engaged in explicit sexual conduct which had been shipped in interstate and
    foreign commerce, in violation of 18 U.S.C. §§ 2252 (a)(4)(B) and 2252(b)(2). He
    moved to suppress evidence recovered from the search of his home and computer, as well
    as statements he made to the FBI. Specifically, he challenged the adequacy of the
    probable cause on which the search warrant was issued.
    The District Court held that the “highly graphic titles of the files … and []
    Pearson‟s confirmation that these same files were among those identified by the
    Wyoming ICAC Task Force as „known child pornography‟” was enough to establish
    probable cause that evidence of a crime would be found on Beatty‟s computer. United
    States v. Beatty, No. 1:08-cr-51-SJM, 
    2009 WL 5220643
    , at *4 (W.D. Penn. Dec. 31,
    2009). Beatty filed a timely appeal. The District Court had jurisdiction pursuant to 18
    U.S.C. § 3121 and we have jurisdiction over the District Court‟s final order pursuant to
    28 U.S.C. § 1291.
    Our review of the District Court‟s decision denying Beatty‟s motion to suppress
    for lack of probable cause is plenary. United States v. Loy, 
    191 F.3d 360
    , 365 (3d Cir.
    1999). However, we must not conduct a de novo review of the magistrate judge‟s finding
    3
    of probable cause. See United States v. Whitner, 
    219 F.3d 289
    , 296 (3d Cir. 2000). It is
    our job to determine that the magistrate had a “substantial basis” to conclude that the
    affidavit supporting the warrant established probable cause. United States v. Jones, 
    994 F.2d 1051
    , 1054 (3d Cir. 1993). During this process, we must only assess the facts
    presented to the magistrate judge, in this case, what was before her within the “four
    corners” of the supporting affidavit. 
    Id. at 1055.
    In doing so, we must pay great
    deference to the magistrate judge‟s finding of probable cause. Illinois v. Gates, 
    462 U.S. 213
    , 236 (1983). But, this “does not mean that reviewing courts should simply rubber
    stamp a magistrate [judge]‟s conclusion.” United States v. Tehfe, 
    722 F.2d 1114
    , 1117
    (3d Cir. 1983).
    II.
    A.
    The Fourth Amendment protects the right to be free from “unreasonable searches
    and seizures.” U.S. Const. amend. IV. If a warrant is issued , it must be based “upon
    probable cause, supported by Oath or affirmation, and particularly describing the place to
    be searched, and the persons or things to be seized.” 
    Id. A magistrate
    judge may find
    probable cause when, after considering the totality of the circumstances, “there is a fair
    probability that contraband or evidence of a crime will be found in a particular place.”
    
    Gates, 462 U.S. at 238
    . As opposed to a “neat set of legal rules,” probable cause is a
    “fluid concept-turning on the assessment of probabilities in particular factual contexts.”
    4
    
    Id. at 232.
    As such, the warrant‟s supporting affidavit must be read in a common sense
    and nontechnical matter. 
    Id. at 230-31.
    B.
    Beatty argues that the warrant‟s supporting affidavit was facially deficient.
    Among other reasons, he argues that 1) an overly broad and unconstitutional definition of
    “child pornography” tainted the reliability of the description of the files and 2) no one
    involved in the issuance of the warrant viewed the files, which, combined with the lack of
    a reasonably specific description of the contents of the files, did not allow the magistrate
    judge to make an independent assessment of probable cause. App. Br. 19.
    We start by addressing the issue of taint. The Government contends that this Court
    “embrace[s] redaction as a practice and principle of law.” United States v. Christine, 
    687 F.2d 749
    , 755 (3d Cir. 1982). When an affidavit has been tainted unconstitutionally, our
    precedent allows us to redact that taint from the warrant, “striking from [it] those
    severable phrases and clauses that are invalid for lack of probable cause or generality and
    preserving those severable phrases and clauses that satisfy the Fourth Amendment.” 
    Id. at 754.
    Beatty alleges that the supporting affidavit made use of 18 U.S.C. §§ 2256(8)(b)
    & (d) and its erroneous and unconstitutional definition of “child pornography,” which
    tainted the magistrate judge‟s ability to determine probable cause. See Ashcroft v. Free
    Speech Coalition, 
    535 U.S. 234
    (2002) (striking down these sections of the statute as
    overbroad and unconstitutional). This argument falls short because even when 18 U.S.C.
    §§ 2256(8)(b) & (d) are redacted from the affidavit, there is still enough information
    5
    available to a magistrate judge to allow for an independent assessment of probable cause.
    See Beatty, 
    2009 WL 5220643
    , at *8-10 (discussing the history of two statutory
    definitions in question and why they were deemed unconstitutional).
    We disagree with Beatty‟s remaining argument because the magistrate judge does
    not have to view the images herself. Beatty cites to decisions in other circuits to bolster
    this contention. See United States v. Battershell, 
    457 F.3d 1048
    , 1051-53 (9th Cir. 2006);
    United States v. Syphers, 
    426 F.3d 461
    , 467 (1st Cir. 2005); United States v. Chrobak,
    
    289 F.3d 1043
    , 1045 (10th Cir. 2002). However, in United States v. Miknevich, a case
    recently decided by this court, we expressly rejected the notion that a magistrate judge
    must review the contents of the actual files in 
    question. 638 F.3d at 183
    . In Miknevich,
    we reasoned that without viewing the actual images, the “magistrate [judge] could have
    drawn a reasonable inference of the file‟s contents based on its highly descriptive name
    and SHA1 value.” 
    Id. at 184.
    The District Court came to the same conclusion in this
    case, and we agree that the titles and SHA1 values of the files established probable
    cause.
    Just as we found in Miknevich, the graphic titles of the files found on Beatty‟s
    computer “contained highly graphic references to specific sexual acts involving
    children.”1 
    Id. Additionally, the
    SHA1 values belonging to the files on Beatty‟s
    computer bore the same SHA1 values as known child pornography in the Wyoming ICIC
    1
    The files include names such as “r@ygold- pedo - 13yo brother fucks 11yo sister and
    sperm inside 61 943 812.mpg,” “(Pthc) 14yo Isabel – (Rape and Fuck) (R@ygold.mpg
    (sic),” and “(Hussyfan) (phtc) (r@ygold) (babyshivid) Jessica 11yo get fuckt (sic)
    good.mpg.” J.A. 103
    6
    Task Force database. Together, these factors allowed a strong inference to be made by
    the magistrate judge which establishes probable cause. Therefore, the District Court
    correctly concluded that “the Magistrate Judge was entitled to infer from the highly
    descriptive and graphic file names and the other information presented in the affidavit
    [the SHA1 values] that there was a fair probability that [Beatty‟s] computer would
    contain material prohibited under either 18 U.S.C. §§2252 or 2252A.” Beatty, 
    2009 WL 5220643
    , at *11.2 The motion to suppress was properly denied.
    III.
    For the foregoing reasons, we will affirm the District Court‟s decision to deny the
    motion to suppress both the files found on Beatty‟s computer and his subsequent
    statements.
    2
    We will not reach the issue of good faith reliance on a warrant as we have already
    decided that the affidavit supporting the warrant was sufficient to establish probable
    cause.
    7