United States v. Kyle Bateman ( 2019 )


Menu:
  •                          RECOMMENDED FOR FULL-TEXT PUBLICATION
    Pursuant to Sixth Circuit I.O.P. 32.1(b)
    File Name: 19a0306p.06
    UNITED STATES COURT OF APPEALS
    FOR THE SIXTH CIRCUIT
    UNITED STATES OF AMERICA,                              ┐
    Plaintiff-Appellee,   │
    │
    >      No. 18-3977
    v.                                              │
    │
    │
    KYLE BATEMAN,                                          │
    Defendant-Appellant.     │
    ┘
    Appeal from the United States District Court
    for the Southern District of Ohio at Dayton.
    No. 3:17-cr-00156-1—Thomas M. Rose, District Judge.
    Decided and Filed: December 23, 2019
    Before: McKEAGUE, BUSH, and NALBANDIAN, Circuit Judges.
    _________________
    COUNSEL
    ON BRIEF: Gregory A. Napolitano, LAUFMAN & NAPOLITANO, LLC, Cincinnati, Ohio,
    for Appellant. Kevin Koller, UNITED STATES ATTORNEY’S OFFICE, Cincinnati, Ohio, for
    Appellee.
    _________________
    OPINION
    _________________
    JOHN K. BUSH, Circuit Judge. This appeal is from a child pornography conviction
    obtained through the government’s deployment of a Network Investigative Technique (“NIT”) to
    unmask anonymous users of a “dark-web” child pornography website known as “Playpen.”
    Defendant-appellant Kyle Bateman, like defendants in other Playpen-related prosecutions,
    challenges the validity of the nationwide search warrant (“NIT warrant”) that the government
    No. 18-3977                          United States v. Bateman                             Page 2
    obtained from a federal magistrate judge in the United States District Court for the Eastern
    District of Virginia, which authorized the initial use of NIT. The NIT warrant, in turn, led the
    United States District Court of the Southern District of Ohio to issue a search warrant
    (“S.D. Ohio warrant”), thus allowing authorities to search Bateman’s residence and computer.
    There, law enforcement agents obtained over 599 illicit images of children in Bateman’s
    possession.
    Bateman filed two motions: (1) to suppress the evidence obtained from the search
    warrants, and (2) for a hearing pursuant to Franks v. Delaware, 
    438 U.S. 154
    (1978), to question
    FBI Special Agent Douglas Macfarlane, who submitted the affidavit to obtain the initial NIT
    warrant. The district court denied both motions. Bateman then pleaded guilty to possession of
    child pornography, in violation of 18 U.S.C. § 2252(a)(4)(B); however, his plea agreement
    reserved him the right to appeal the district court’s denial of his suppression and Franks motions.
    Bateman’s suppression motion fails based on our rulings in United States v. Moorehead,
    
    912 F.3d 963
    (6th Cir.), cert. denied, 
    140 S. Ct. 270
    (2019), and United States v. Harney,
    
    934 F.3d 502
    (6th Cir. 2019). We also reject Bateman’s arguments for a Franks hearing, as they
    are not persuasive under this court’s precedent. Accordingly, we AFFIRM.
    I.
    The ever increasing and unprecedented capabilities of today’s world wide web offer users
    access to information far beyond even twentieth-century imagination––all in just a matter of
    seconds. Adopting the vernacular of cyber-speak, the great majority of this content is on the
    “open” or “traditional” internet, meaning it is accessible by ordinary users without use of any
    special equipment, passwords, secret knowledge, or closed networks. But, beneath this easily
    accessible world lies a wholly separate world of cyber content, known colloquially as the “dark-
    No. 18-3977                                 United States v. Bateman                                        Page 3
    web,” which is largely inaccessible to average internet users.1 Within this space, a number of
    cyber outlets distribute questionable content.2
    “Playpen,” formerly one of the most notorious child pornography websites online with
    more than 215,000 registered users around the world,3 was one of those dark-web outlets.
    Created and operated by a private citizen, the site offered anonymous web users, like Bateman,
    an unmatched forum not only to access sexually illicit images of children, but also to “discuss”
    those images across the various discussion threads frequented by fellow users.4 Such activity is
    the subject of this appeal.
    ***
    FBI agents began to investigate the Playpen website in September 2014. Once accessed
    by agents, they discovered Playpen to be a message board with primary objectives of advertising
    and distributing child pornography.
    Playpen’s cyber location within the “dark-web”––as protected by the “Tor hidden service
    network” (“Tor”)5 ––rendered the website relatively inaccessible, as compared to websites on the
    1See  Jose Pagliery, The Deep Web you don’t know about, CNN, (Mar. 10, 2014, 9:18 AM),
    https://money.cnn.com/2014/03/10/technology/deep-web/index html.
    2See Cadie Thompson, Beyond Google: Everything you need to know about the hidden internet, Business
    Insider, (Dec. 16, 2015, 2:43 PM), https://www.businessinsider.com/difference-between-dark-web-and-deep-web-
    2015-11.
    3Brad    Heath, FBI ran website sharing thousands of child porn images, USA Today
    (Jan. 21, 2016, 5:36 PM),    https://www.usatoday.com/story/news/2016/01/21/fbi-ran-website-sharing-thousands-
    child-porn-images/79108346/.
    4See   
    id. 5Developed originally
    by the U.S. Navy and funded initially by the U.S. Department of State and the U.S.
    Department of Defense, the “Tor hidden service network,” or more simply, “Tor,” is software that can be employed
    by internet users to browse the Web anonymously, as well as to exchange private communications with others. Tor,
    as similar to more ubiquitous internet browsers, such as Chrome or Firefox, can be downloaded online. Therefore,
    the software can theoretically be employed for a range of purposes, as would any other internet browser. However,
    the critical differences are that the identities of internet users employing Tor are blocked entirely during ordinary
    web searching. According to the Tor project, the non-profit organization that currently runs Tor, a wide array of
    internet constituents make use of the Tor software, including those who want to protect their internet activities from
    website and advertising tracking, users concerned about cyberspying, and users who seek to avoid censorship by
    certain foreign governments. Users with Tor can also access online “hidden services,” which are essentially
    anonymous websites that can only be located within the protected Tor network––otherwise known as the “dark-
    web.” The location of these websites, as well as the identities of their administrators, are equally protected by Tor’s
    No. 18-3977                                United States v. Bateman                                      Page 4
    “open” internet. And, of course, this was by design: The website’s URL deliberately was
    composed of a convoluted array of algorithmically-generated characters,6 meaning it was
    virtually impossible to access this content through an ordinary web user’s search. Additional
    barriers to entry included the numerous affirmative steps required of interested users, like
    Bateman, to access Playpen’s content. He had to (1) download and install the dark-web Tor
    software on his computer; (2) obtain the site’s intricate URL address directly from other
    anonymous users of Playpen, or from internet postings describing the website’s location and
    content; and (3) enter this precise URL into the downloaded Tor browser. Because of this
    arduous cyber arrangement, Playpen was able to mask the IP addresses of users like Bateman,
    thus hampering the FBI’s initial efforts to locate the site’s central American-based server, as well
    as identify registered Playpen “members.”
    However, in December 2014, after approximately two months of investigation, a foreign
    law enforcement agency alerted FBI agents of its suspicions that a U.S.-based IP address was
    being used to house Playpen. Armed with this information, agents identified the server hosting
    the website. In January 2015, agents then executed a search warrant on the server, which in turn
    allowed them to create a duplicate version of the server at a government facility in the Eastern
    District of Virginia. On February 19, 2015, the FBI apprehended the suspected administrator of
    Playpen and assumed administrative control of the website.
    Server data with nothing more, however, were insufficient to identify Playpen’s
    individual users. Only a more targeted search warrant could do that. Consequently, on February
    20, 2015, the FBI applied for a search warrant from a magistrate judge in the United States
    District Court for the Eastern District of Virginia, which would allow agents to employ NIT as a
    means in which to reveal the IP addresses of all users who logged onto Playpen. As a basis for
    the NIT warrant, the FBI included two attachments.                   Attachment A, entitled “Place to be
    technology, thus making the “dark-web” an attractive location for sites hosting questionable content. Stuart Dredge,
    What is Tor?       A beginner’s guide to the privacy tool, The Guardian, (Nov. 5, 2013, 7:47 PM),
    https://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser.
    6Tor  websites, like Playpen, use a lengthy, randomized array of algorithmically-generated characters for
    their URLs in order to make it unlikely that a user would accidentally type the URL into a browser. For example,
    between September 16, 2014 and February 18, 2015, the Playpen website was located at muff7i44irws3mwu.onion.
    On February 18, 2015, the URL changed to upf45jv3bziuctml.onion. (R. 16-7, NIT warrant at 228).
    No. 18-3977                                 United States v. Bateman                                        Page 5
    Searched,” outlined the warrant’s purpose in allowing for the authorization of NIT on the
    government’s Eastern Virginia-based computer server. (R. 16-5, NIT warrant at 210). NIT was
    justified as a critical vehicle through which agents could obtain relevant information connected
    to the activated computers of any user or administrator who logged into the Playpen website via
    a username or password. Attachment B outlined the specific information to be seized from a
    user’s computer, which included the computer’s accurate IP address. FBI agents predicted that
    these IP addresses could lead to the identities of the site’s individual users and administrators.
    In support of the NIT warrant request, FBI Special Agent Douglas Macfarlane swore out
    a 32-page affidavit. Covering a number of topics related to the NIT deployment, the affidavit
    included (1) pertinent background information on the Tor software that formed the basis of
    Playpen’s operation; (2) specifics related to how agents would operate the NIT;7 (3) an outline of
    the multi-step process required of users wishing to access Playpen;8 and (4) the substantive
    content a user would encounter during each level of access into Playpen. 9 Elaborating further on
    the substantive content section, Agent Macfarlane also included a separate section of the
    affidavit, where he offered even greater detail regarding the types of graphic content encountered
    by users upon logging in, which included Playpen’s various sections, forums, and sub-forums
    devoted to certain “topics” and related discussion posts.10
    7As   explained by the affidavit, the government planned to target its NIT deployment for the specific
    purpose of obtaining information about a user’s computer only after that individual had gone through Playpen’s
    registration process (meaning the user had obtained a username and password, and then subsequently entered this
    information within Playpen’s homepage in order to access content).
    8The  affidavit explained in detail the complicated process for logging into Playpen, which required users to
    register an account, and obtain a username and password—all of which the site promised would remain hidden.
    9For    example, the affidavit explained that any users who reached the homepage would immediately
    encounter “two images depicting partially clothed prepubescent females with their legs spread apart.” (R. 16-5, NIT
    warrant at 228). This image was placed next to a set of instructions for joining Playpen. The affidavit also noted the
    cryptic prohibitions listed on Playpen and their translation into plain English. For example, the site’s explicit text,
    stating “No cross-board reposts, .7z preferred, encrypt filenames, include preview, Peace out,” translated into a
    prohibition on users from posting material derived from websites other than Playpen. (Id.) Also, the particular
    message element “.7z” referenced the method users could follow to compress large files for distribution to other
    users.” (Id. at 228–29).
    10For example, nested within the “Pre-teen Videos” section of the website, was a “Girls HC” (hardcore)
    sub-forum, which contained over 1,400 discussion topics and over 20,000 posts. (Id. at 231). According to Agent
    Macfarlane, the forums he reviewed “revealed [that] the majority contained discussions, as well as numerous images
    No. 18-3977                               United States v. Bateman                                     Page 6
    On February 20, 2015, a United States magistrate judge from the Eastern District of
    Virginia signed the warrant. Immediately, and until March 4, 2015, law enforcement agents
    began operating the Playpen website and deploying NIT. During this short tenure, agents were
    able to uncover the IP addresses of all users who logged onto Playpen.                        One such user,
    “nevernudeever” (R. 16-7, S.D. Oho warrant at 309), was Bateman. Using the NIT software,
    FBI agents confirmed Bateman’s identity in connection with this IP address, and identified a
    service billing address matching Bateman’s home address.                       In addition, based on the
    “nevernudeever” profile, the NIT software was able to discern that Bateman had registered his
    Playpen account on or around November 19, 2014. Between that date and March 2, 2015,
    Bateman was recorded to have been actively logged onto Playpen for a total of 11 hours and 54
    minutes. Between February 20, 2015 and March 4, 2015––when FBI agents operated Playpen
    and deployed NIT––Bateman had logged onto Playpen numerous times, during which he had
    accessed approximately 75 threads in total, each of which contained various discussion posts.
    Based on the information obtained about Bateman’s Playpen activities through the NIT
    warrant, the government applied for a second warrant in the Southern District of Ohio––the
    district encompassing Bateman’s residence––in order to search Bateman’s home and collect
    evidence of his crimes related to the receipt and distribution of child pornography. In support of
    the warrant, FBI Special Agent Andrea Kinzig submitted a 33-page affidavit, where she set forth
    facts regarding (1) the Tor network; (2) the FBI’s administration of the website since February
    20, 2015; (3) Playpen’s graphic content; and (4) information collected about Bateman’s various
    activities while operating under the Playpen username “nevernudeever,” including three specific
    examples of the types of images and discussion threads he was accessing.11 Collectively, this
    that appeared to depict child pornography (“CP”) and child erotica of prepubescent females, males, and toddlers.”
    (Id. at 232).
    11In  her affidavit, Agent Kinzig provided detailed information about Bateman’s activities on Playpen,
    which included his accessing of three specific discussion threads between February and March 2015. These threads
    included the following: (1) a thread entitled, “[new]MyBerryTryingtoGetItInEDIT [new],” which depicted an adult
    male engaged in sexual intercourse with a prepubescent female child; (2) a thread entitled “PTHC Anal dildo,”
    which contained close-up images of a purple object inserted into a female child’s anus; and (3) a thread entitled
    “A GIRL NAMED ALICIA 3yo or 4yo,” which included an image in which the finger of an adult male was inserted
    into the vagina of a nude, prepubescent, toddler-aged female child. (R. 16-7, S.D. Ohio warrant at 311–13).
    In Agent Kinzig’s opinion, the majority of images found within these threads contained child pornography as
    defined under 18 U.S.C. § 2256. (Id.).
    No. 18-3977                               United States v. Bateman                                     Page 7
    information led Agent Kinzig to believe, based on her training and experience, that most of the
    images Bateman accessed depicted child pornography, as defined under 18 U.S.C. § 2256.
    Finally, within the affidavit, Agent Kinzig set forth facts confirming that the “nevernudeever”
    account was connected to Bateman’s IP address and home address. Based on this affidavit, on
    August 18, 2015, a United States magistrate judge from the Southern District of Ohio signed the
    search warrant for the search of Bateman’s home located in Washington Township, Ohio.
    Pursuant to the S.D. Ohio warrant, the government seized Bateman’s desktop computer and
    external hard drive. Across both sources, agents discovered approximately 599 images and
    video files depicting child pornography.
    On September 28, 2017, a grand jury returned a single-count indictment against Bateman,
    charging him with possession of child pornography in violation of 18 U.S.C. § 2252(a)(4)(B).
    Thereafter, Bateman filed three motions to suppress, only two of which are relevant for this
    appeal. In the first, Bateman sought suppression of all evidence obtained by the government as a
    result of the NIT warrant, which also encompassed the evidence seized pursuant to the
    subsequent S.D. Ohio warrant. In the final motion, Bateman advanced supplemental arguments
    for suppressing the evidence obtained as a result of the NIT warrant, and requested a Franks
    hearing in order to interrogate Agent Macfarlane about the affidavit submitted in support of that
    warrant.12
    The district court denied all three motions to suppress. In denying the first motion, the
    district court referenced its previous ruling in United States v. Jones, 
    230 F. Supp. 3d 819
    , 821–
    22 (S.D. Ohio 2017). In Jones, although the court had concluded that the NIT was a “tracking
    device,” it nonetheless held that even if the warrant violated Federal Rule of Criminal Procedure
    41, the good-faith exception to the exclusionary rule applied, meaning the evidence did not have
    to be suppressed. 
    Id. at 828;
    see United States v. Leon, 
    468 U.S. 897
    (1984). In denying the
    third motion, the court held that Bateman made none of the necessary showings to justify a
    Franks hearing. Namely, Bateman had failed to (1) make a substantial preliminary showing of
    the falsity of Agent Macfarlane’s statements; (2) make a substantial preliminary showing that
    12However, Bateman’s third motion did not reference the S.D. Ohio warrant, and therefore, did not request
    a Franks hearing to question Agent Kinzig about her affidavit.
    No. 18-3977                          United States v. Bateman                             Page 8
    Agent Macfarlane made the allegedly false statements about Playpen with deliberate or reckless
    disregard for the truth; and (3) address, let alone establish, materiality in his motion. As to the
    latter, the district court concluded that even if what Bateman had alleged to be false in the
    affidavit was suppressed, there were still “sufficient facts to establish the necessary probable
    cause [for the magistrate judge] to have properly issued the NIT warrant.” (R. 22, decision
    & entry at 457). Subsequently, on May 7, 2018, Bateman entered a conditional plea agreement,
    admitting that he had used various internet sites to access, download, and view child
    pornography files over a span of two years in violation of 18 U.S.C. § 2252(a)(2). However,
    pursuant to Federal Rule of Criminal Procedure 11(a)(2), based on his plea agreement, Bateman
    reserved the right to appeal the district court’s denials of his motions to suppress and for a
    Franks hearing. Accordingly, this timely appeal ensued.
    II.
    A.      Bateman’s Motion to Suppress
    Generally, when reviewing the denial of a defendant’s motion to suppress, “we review
    the district court’s findings of fact for clear error and its conclusions of law de novo.” United
    States v. Moorehead, 
    912 F.3d 963
    , 966 (6th Cir. 2019) (quoting United States v. Buford,
    
    632 F.3d 264
    , 268 (6th Cir. 2011)). The evidence is assessed “in the light most likely to support
    the district court’s decision.” 
    Id. (quoting United
    States v. Powell, 
    847 F.3d 760
    , 767 (6th Cir.),
    cert. denied, 
    138 S. Ct. 143
    (2017)). “[A] denial of a motion to suppress will be affirmed on
    appeal if the district court’s conclusion can be justified for any reason.” 
    Id. (alteration in
    original) (quoting United States v. Pasquarille, 
    20 F.3d 682
    , 685 (6th Cir. 1994)).
    The Fourth Amendment protects individuals against “unreasonable searches and
    seizures.” U.S. Const. amend. IV. The Amendment mandates that warrants be based on the
    government’s showing of “probable cause” and include language “particularly describ[ing] the
    place to be searched, and the persons or things to be seized.” 
    Id. When officials
    violate these
    commands, courts generally suppress the resulting evidence. See Mapp v. Ohio, 
    367 U.S. 643
    ,
    648 (1961); see also 
    Harney, 934 F.3d at 505
    . “But because the Fourth Amendment by its terms
    and history does not require exclusion . . . courts will not exclude evidence when the costs of
    No. 18-3977                          United States v. Bateman                             Page 9
    suppression outweigh the benefits of deterrence,” 
    Harney, 934 F.3d at 505
    (citing Davis v.
    United States, 
    564 U.S. 229
    , 236–37 (2011)), “such as when reasonable officers rely on a
    magistrate’s warrant in good faith,” 
    id. (citing Leon,
    468 U.S. at 919–21). Notwithstanding this
    exception, an officer still “cannot reasonably presume” that a “facially deficient” warrant is
    valid. 
    Leon, 468 U.S. at 923
    . Evidence obtained as a result of a facially invalid warrant cannot
    be admitted pursuant to the “good faith” exception. See 
    id. At the
    district court, Bateman moved to suppress all the evidence collected by the
    government, as well as all his statements made on August 19, 2015, when the FBI searched his
    home and interrogated him pursuant to the S.D. Ohio warrant, which was in turn, based on the
    NIT warrant issued from the Eastern District of Virginia. Bateman sought suppression based on
    the “fruit of the poisonous tree” doctrine. Namely, Bateman argued that the first NIT warrant
    was void ab initio because it lacked applicability outside of the Eastern District of Virginia, and
    therefore, all the evidence and statements obtained by the government pursuant to the warrant
    issued out of the Southern District of Ohio must be suppressed.
    As Bateman acknowledges, his motion to suppress the NIT warrant is identical to that
    already decided twice by this circuit, and similar to other motions filed by defendants across the
    country, who have been charged under 18 U.S.C. § 2252(a)(4)(B) based on the government’s
    deployment of the NIT technique between February 20, 2015 and March 4, 2015.
    In Moorehead, we considered a motion to dismiss filed by a defendant who was
    subjected to a residential search of his home located in the Western District of Tennessee, based
    upon a warrant that was issued pursuant to the government’s original NIT 
    warrant. 912 F.3d at 965
    –66. At the district court level, the defendant argued that the NIT warrant violated Federal
    Rule of Criminal Procedure 41 and 28 U.S.C. § 636, given that it was executed outside of the
    issuing magistrate judge’s territorial jurisdiction. Dismissing these arguments, we engaged in a
    straightforward application of the good-faith exception to the exclusionary rule under Leon.
    Under this framework, we found that even if the NIT warrant was void ab initio and violated
    Rule 41(b), in that it authorized a search outside of the Eastern District of Virginia, the
    good-faith exception to the exclusionary rule still precluded suppression of the evidence seized
    pursuant to the warrant. See 
    id. at 968.
    We made this determination based upon the principle
    No. 18-3977                                 United States v. Bateman                                      Page 10
    that “[t]he good-faith exception is not concerned with whether a valid warrant exists, but instead
    asks whether a reasonably well-trained officer would have known that a search was illegal.” 
    Id. Under this
    directive, we then concluded that the FBI officers involved in the computer and
    residential searches pursuant to the original NIT warrant would reasonably not have known that
    the NIT warrant was invalid, and therefore, were acting in good faith. 
    Id. at 968–71.
    Even with the binding value of the Moorehead decision, the defendant in Harney
    attempted to place his situation outside of our precedent by advancing numerous additional
    objections to the warrant’s validity. 
    Harney, 934 F.3d at 505
    –07. However, based on the
    directives of our previous ruling, which we held applicable to the facts in Harney, we dismissed
    each of the defendant’s arguments summarily.                    
    Id. In doing
    so, we reaffirmed that the
    investigators who seized evidence pursuant to the original warrant acted in good faith when
    relying on that warrant. 
    Id. at 505–06.
    Pertinent to our findings were the detailed facts alleged
    by Agent Macfarlane in his 32-page affidavit that were accepted as establishing probable cause
    by the issuing magistrate judge in the Eastern District of Virginia. 
    Id. at 505.
    Namely, Agent
    Macfarlane’s affidavit offered specific and particular details that (1) explained the need for the
    NIT search; (2) offered logistical information on how the program would work; (3) explained
    how the government would only be limited to searching computers that logged onto Playpen
    with a username and password; and (4) listed the seven specific items that the government
    sought from each computer logging into Playpen during the span in which agents would be
    administering the site. 
    Id. Accordingly, we
    find that under this court’s holdings in Moorehead and Harney, the
    search of Bateman’s home executed pursuant to the NIT warrant was valid under the good-faith
    exception. Indeed, Bateman acknowledges that his appeal here is without merit under this
    court’s precedent, and he raises it only to preserve his argument from a claim of waiver should
    our precedent change by virtue of an en banc decision, or by a ruling of the Supreme Court.13
    Also, as Bateman concedes, all other circuits that have been faced with questions of the validity
    13Note  that as of this writing, this circuit has neither granted an en banc rehearing to an appellant who has
    challenged the NIT warrant, nor has the Supreme Court granted certiorari on this issue, despite multiple petitions
    having been filed seeking such review.
    No. 18-3977                                 United States v. Bateman                                      Page 11
    of the NIT warrant have uniformly rejected defendants’ analogous arguments to suppress the
    evidence seized by the government from their activated computers and from their physical
    residences. See United States v. Eldred, 
    933 F.3d 110
    (2d Cir. 2019) (assuming arguendo that
    the NIT warrant violated the Fourth Amendment but holding officers acted in good faith and
    suppression is not warranted); United States v. Ganzer, 
    922 F.3d 579
    (5th Cir. 2019); United
    States v. Henderson, 
    906 F.3d 1109
    (9th Cir. 2018); United States v. Kienast, 
    907 F.3d 522
    (7th
    Cir. 2018); United States v. Werdene, 
    883 F.3d 204
    (3d Cir. 2018); United States v. McLamb,
    
    880 F.3d 685
    (4th Cir. 2018); United States v. Levin, 
    874 F.3d 316
    (1st Cir. 2017); United States
    v. Horton, 
    863 F.3d 1041
    (8th Cir. 2017); United States v. Workman, 
    863 F.3d 1313
    (10th Cir.
    2017).
    To reiterate then, Bateman acknowledges, and we recognize, that our controlling
    precedent forecloses his challenge to the district court’s denial of his suppression motion.
    Consequently, we AFFIRM the holding of the district court.14
    B.       Bateman’s Motion for a Franks Hearing
    Lastly, Bateman argues that the district court erred in denying his motion for a Franks
    hearing. In making this argument, Bateman claims there was a substantial preliminary basis
    upon which to conclude that Agent Macfarlane made deliberately false or recklessly misleading
    declarations, which were essential to the magistrate judge’s finding of probable cause to issue the
    NIT warrant. And, although Bateman did not raise this argument at the district court level, he
    also contends that he was improperly denied a Franks hearing in connection with the S.D. Ohio
    warrant issued for a search of his residence. Here too, he argues that Agent Kinzig made
    deliberately false or recklessly misleading declarations, which were essential to the magistrate’s
    14Although    we affirm the holding of the district court on this issue, we make one small modification to the
    district court’s labeling of the government deployment of the NIT operation as a “tracking device.” (R. 22, decision
    and entry at 455) (“T[his] Court has previously considered the Network Investigative Technique, (NIT), to be a
    tracking device . . . [and it] has not changed its view.”). Namely, to ensure uniformity with our most recent holding
    on this issue, we characterize the government’s NIT deployment as a “search,” not as a “tracking device.”
    See 
    Harney, 934 F.3d at 505
    (ruling on the validity of the warrant under the Leon good faith exception for reasons
    including that Agent Macfarlane submitted a lengthy affidavit “explaining the need for the search and detailing how
    it would work”) (emphasis added)).
    No. 18-3977                                  United States v. Bateman                                      Page 12
    finding of probable cause to issue the subsequent warrant.15 On this point, Bateman argues that
    unlike other defendants who have come before the district court in connection with the
    government’s NIT deployment, he did not have the opportunity to examine either of the affiant
    officers responsible for the warrants issued in this case.                   Instead, the district court denied
    Bateman’s motion for a Franks hearing of Agent Macfarlane, concluding that Bateman had
    neither met his burden to demonstrate that Agent Macfarlane had acted with deliberate falsity or
    recklessness, nor demonstrated the materiality of what Bateman believes were the false factual
    assertions leading to the issuance of the warrant.
    This court evaluates a “district court’s denial of a Franks hearing under the same standard
    as for the denial of a motion to suppress: the district court’s factual findings are reviewed for
    clear error and its conclusions of law are reviewed de novo.” United States v. Graham, 
    275 F.3d 490
    , 505 (6th Cir. 2001); see also United States v. Young, 
    847 F.3d 328
    , 348 (6th Cir.), cert
    denied, 
    138 S. Ct. 147
    , 199 (2017); United States v. Poulsen, 
    655 F.3d 492
    , 504 (6th Cir. 2011)
    (“The determination as to whether a statement made in an affidavit is made with reckless
    disregard of the truth is a fact question.” (quoting United States v. Rice, 
    478 F.3d 704
    , 709 (6th
    Cir. 2007)).
    “[O]f course, a presumption of validity [exists] with respect to the affidavit supporting
    the search warrant.” 
    Franks, 438 U.S. at 171
    . And, “[w]hether to hold an evidentiary hearing
    based upon a challenge to the validity of a search warrant’s affidavit, given alleged
    misstatements and omissions, is committed to the sound discretion of the district court.” 
    Young, 847 F.3d at 348
    ; see also 
    Graham, 275 F.3d at 505
    . A defendant challenging the validity of a
    search warrant’s affidavit bears a heavy burden. To be entitled to a Franks hearing, he must “1)
    make[] a substantial preliminary showing that the affiant knowingly and intentionally, or with
    15We recognize that Bateman’s three motions to suppress in the district court did request the suppression of
    evidence obtained at his physical residence, which was seized pursuant to the S.D. Ohio warrant––a warrant that
    was issued based upon information the government obtained via the NIT warrant. However, not one of Bateman’s
    motions before the district court directly challenged the validity of the S.D. Ohio warrant. Nor did Bateman request
    a Franks hearing to question Agent Kinzig. Instead, Bateman’s district court motion for a Franks hearing singularly
    challenged Agent MacFarlane’s affidavit. Appropriately then, the district court’s order denying all three of
    Bateman’s motions did not reference Agent Kinzig’s affidavit. And because Bateman’s conditional guilty plea
    preserves his right only to appeal the district court’s decision––as opposed to any failure of the district court to sua
    sponte order a Franks hearing on the S.D. Ohio warrant––Bateman has waived his Franks argument related to the
    S.D. Ohio warrant, here. See United States v. Martin, 
    526 F.3d 926
    , 933 (6th Cir. 2008).
    No. 18-3977                                United States v. Bateman                                    Page 13
    reckless disregard for the truth, included a false statement or material omission in the affidavit;
    and 2) prove[] that the false statement or material omission is necessary to the probable cause
    finding in the affidavit.”        
    Young, 847 F.3d at 348
    –49 (quoting United States v. Pirosko,
    
    787 F.3d 358
    , 369 (6th Cir. 2015)). If the defendant alleges an affiant’s “recklessness,” the court
    employs a subjective test. United States v. Cican, 63 F. App’x 832, 835–36 (6th Cir. 2003);
    United States v. Colquitt, 604 F. App’x 424, 429–30 (6th Cir. 2015). A law enforcement
    officer’s statement is only considered to be issued with “reckless disregard for the truth” if a
    defendant shows that the affiant subjectively “entertain[ed] serious doubts as to the truth of his
    [or her] allegations.” Cican, 63 F. App’x at 836 (quoting United States v. Whitley, 
    249 F.3d 614
    ,
    621 (7th Cir. 2001)).          “Allegations of [an agent’s] negligence or innocent mistake are
    insufficient.” 
    Franks, 438 U.S. at 171
    . “Only after the defendant makes this showing may the
    court consider the veracity of the statements in the affidavit or the potential effect of any omitted
    information.” United States v. Archibald, 
    685 F.3d 553
    , 558–59 (6th Cir. 2012). Here, a
    defendant must “point out specifically the portion of the warrant affidavit that is claimed to be
    false.” 
    Franks, 438 U.S. at 170
    ; see United States v. Green, 572 F. App’x 438, 442 (6th Cir.
    2014) (“[T]his court’s well-settled framework for Franks hearings requires a defendant to ‘point
    to specific false statements’. . . .” (quoting United States v. Cummins, 
    912 F.2d 98
    , 103 (6th Cir.
    1990))). “[I]f, when material that is the subject of the alleged falsity or reckless disregard is set
    to one side, there remains sufficient content in the warrant affidavit to support a finding of
    probable cause, no hearing is required.” 
    Franks, 438 U.S. at 171
    –72.
    We find that the district court did not err in denying Bateman’s request for a Franks
    hearing of Agent Macfarlane.16
    First, in an effort to establish the preliminary “falsity” showing for a Franks hearing,
    Bateman claims that Agent Macfarlane’s affidavit contained a “false description of [Playpen’s]
    16The    district court’s decision was consistent with every other reported district court decision on
    defendants’ motions for Franks hearings related to the NIT warrant. To date, there have been nearly twenty cases in
    which defendants have advanced the motion. See, e.g., United States v. Gaver, No. 3:16-CR-88, 
    2017 WL 1134814
    (S.D. Ohio Mar. 27, 2017); United States v. Kahler, 
    236 F. Supp. 3d 1009
    (E.D. Mich. Feb. 14, 2017); United States
    v. Darby, 
    190 F. Supp. 3d 520
    (E.D. Va. June 3, 2016), aff’d by United States v. Darby, 721 F. App’x 304 (4th Cir.
    2018). Furthermore, the Seventh Circuit has been the only circuit to directly address this issue on appeal; when
    doing so, it affirmed the district court’s decision that a Franks hearing was not warranted. See United States v.
    Kienast, 
    907 F.3d 522
    (7th Cir. 2018).
    No. 18-3977                                United States v. Bateman                                    Page 14
    home page, which was the single most important piece of the probable cause puzzle,” and “false
    statements about the place to be searched pursuant to the NIT warrant.” (R. 22, decision and
    entry at 456–57) (citation omitted). Specifically, Bateman claims the affidavit falsely described
    the Playpen website as a forum dedicated to the advertisement and distribution of child
    pornography, as well as a forum dedicated to the sexual abuse of children.17 However, it is clear
    that Bateman is merely splitting hairs in making this accusation, and accordingly, we agree with
    the district court that Bateman makes a vain attempt to “characterize the Playpen website as
    merely a source of innocent child erotica.” (Id. at 457).
    As the district court noted correctly, the topics, images, and discussion forums of which
    Bateman attempts to characterize as falling within the legal bounds of child erotica are far from
    it. Make no mistake: The Playpen website was designed to disseminate child pornography, and
    it was used as a vehicle to do so by those in the “know,” who took the multiple, arduous steps to
    gain access to this dark-web haven. Despite Bateman’s argument, it is of little import that the
    Playpen website did not offer an explicit description of its purpose on the homepage—its
    purpose could be perceived almost immediately by the illicit material littered across that page
    and the site’s various connected pages.
    Related to his first falsehood contention, Bateman argues that the general descriptions of
    Playpen provided by Agent Macfarlane in his affidavit could have misled the magistrate judge
    into believing that explicit advertisements of Playpen’s distribution of child pornography
    objective were included throughout the website. Here again, we make a similar conclusion as
    above: The technicality that Bateman raises is of no import, as he still fails to demonstrate any
    showing of falsity or material omission within Agent Macfarlane’s statements. And in fact, we
    agree with the district court that in no way does Agent Macfarlane’s affidavit suggest or imply
    17For the first time on appeal, Bateman alleges that the affidavit falsely described Playpen’s homepage as
    including “two images depicting partially clothed prepubescent females with their legs spread apart,” when in fact,
    he argues, by the time the warrant was issued, the homepage only included a single image of a prepubescent female
    posed in a sexually suggestive manner. (Appellant Bateman Br. at 14). Other defendants convicted in the NIT
    operation have raised this same argument many times in district court, and every court has rejected it. See, e.g.,
    United States v. Owens, No. 16-CR-38 JPS, 
    2016 WL 7079609
    , at *6 (E.D. Wis. Dec. 5, 2016), aff’d by Kienast,
    
    907 F.3d 522
    (7th Cir. 2018); Gaver, 
    2017 WL 1134814
    , at *5; 
    Kahler, 236 F. Supp. 3d at 1023
    ; Darby, 190 F.
    Supp. 3d at 533–34. Thus, we likely would reject it here, as well. Bateman failed to raise the claim below, and
    because the alleged images Bateman describes are not in the district court record (Bateman relies on an opinion in
    another case), see Gaver, 
    2017 WL 1134814
    , at *4–5, we will not address the merits of the argument.
    No. 18-3977                          United States v. Bateman                         Page 15
    that an explicitly defined purpose of Playpen appeared on the website’s homepage or was
    presented to users upon their logging into the site.     Rather, we view Agent Macfarlane’s
    summary descriptions of the website as operating as general backdrop paragraphs in which to
    contextualize why the FBI planned to conduct its NIT program.              Further, the detailed
    descriptions provided by Agent Macfarlane were necessary to explain the graphic nature of the
    material contained in Playpen (on the homepage and within its various pages), and in no way
    would have misled the magistrate judge about the general content contained on Playpen’s
    homepage, or on the site in general. But, even if we were to accept Bateman’s technicality
    argument and conclude that somehow, Agent Macfarlane’s descriptions of Playpen contained
    falsehoods or material omissions, Bateman fails to offer any evidence showing that Agent
    Macfarlane knowingly, intentionally, or with reckless disregard to the truth, included such
    falsehoods or material omissions in his affidavit.
    Yet, most fatal to the claim, Bateman makes no showing that removing the allegedly false
    descriptions of Playpen’s homepage provided by Agent MacFarlane would have materially
    affected the probable cause assessment of the magistrate judge in validating the warrant.
    Probable cause “requires only a probability or substantial chance of criminal activity.” United
    States v. Tagg, 
    886 F.3d 579
    , 585–86 (6th Cir. 2018) (quoting District of Columbia v. Wesby,
    
    138 S. Ct. 577
    , 586 (2018)). This is not a high bar for the government to satisfy. Accordingly,
    the magistrate judge’s determination of the existence of probable cause was likely not contingent
    on the appearance or non-appearance of explicit text on Playpen’s homepage that outlined, in
    words, the site’s purpose of disseminating child pornography. Rather, probable cause was more
    likely established through the magistrate judge’s assessment of the entirety of Agent
    Macfarlane’s affidavit, which as we explain above, provides necessary details of (1) Playpen’s
    provocative homepage; (2) its secret location within the “dark-web” Tor network; and (3) the
    various affirmative steps that users, like Bateman, had to take in order to locate the website,
    register, and subsequently access child pornography. Cf. 
    Kienast, 907 F.3d at 529
    (“[B]y the
    time such actors have downloaded the software needed to access the dark web, entered the
    specific, sixteen-digit character jumble that is Playpen’s web address, and logged into the site
    featuring at least one sexually suggestive image of a child, we are very skeptical that they are
    surprised to find themselves on a website offering child pornography.”).
    No. 18-3977                                 United States v. Bateman                                      Page 16
    In a final effort to allege a falsehood and render the NIT warrant defective, Bateman
    states that Agent Macfarlane suggested implicitly in the affidavit that the government’s search
    activity would be confined within the Eastern District of Virginia. In making the argument,
    Bateman appears to rely simply on the cover page of the warrant, which does indicate that the
    intended subject property was to be located within the Eastern District of Virginia. However, an
    assessment of the affidavit in its entirety, including its referenced attachment, makes clear that
    Agent Macfarlane did not misrepresent the locations to be searched under the NIT deployment.
    Rather, in the affidavit and the attachment, he states that the warrant would authorize agents
    carrying out the NIT program to “cause an activating computer—wherever located—to send
    [identifying information] to a computer controlled by or known to the government.” (R. 16-5
    NIT Warrant at 244) (emphasis added); see 
    Harney, 934 F.3d at 505
    –06 (concluding the NIT
    warrant satisfied the “particularity” requirement of the Fourth Amendment because it
    “sufficiently described the place to be searched, saying all that reasonably could be said under
    the circumstances” and “allowed the government to search only those computers that logged into
    Playpen” during a set period of time).18
    Moreover, tantamount to our assessment above, even if we were to agree with Bateman
    that the affidavit contained falsehoods or material omissions related to the location to be
    searched, he fails to provide any evidence that Agent Macfarlane knowingly, intentionally, or
    recklessly included such statements within his affidavit. Accordingly, we agree with the district
    court’s finding that Agent Macfarlane’s affidavit (1) accurately described the locations to be
    searched by agents administering the NIT deployment, which necessarily included locations
    outside of the Eastern District of Virginia, and (2) accurately described the NIT’s operation as
    being triggered only when an activating computer’s signals entered the Eastern District of
    Virginia (i.e. the jurisdiction in which agents were administering Playpen).
    18In  his brief, Bateman also claims that the affidavit’s description of the location to be searched was false
    because “[f]ull disclosure of the intended extrication of private [IP] addresses from each computer visitor to the
    Playpen website is wholly absent from the declaration of the search contained within the Virginia warrant, or its
    attachment.” (Appellant Bateman Br. at 17). Although we disagree with this argument, we will not address its
    merits in this opinion, as Bateman raises it for the first time on appeal.
    No. 18-3977                              United States v. Bateman                       Page 17
    Finally, Bateman offers no evidence to show that the allegedly false locations, or
    omissions of such, within the affidavit were material in the magistrate judge’s ultimate
    determination of probable cause. To reiterate, the government need not show more than simply a
    “probability or substantial chance of criminal activity” to establish probable cause.        
    Tagg, 886 F.3d at 585
    . Based on this standard, it is unlikely that the affidavit’s naming of locations to
    be searched––be it through searches conducted directly from the government’s administration of
    Playpen from the Eastern District of Virginia, or the searches of the computers of Playpen users,
    which were physically located within other jurisdictions, but technologically connected to
    Playpen’s home page within the Eastern District of Virginia––was material in the magistrate
    judge’s determination that there was a “probability” or “substantial chance” that Playpen users,
    like Bateman, entered Playpen for the purpose of accessing child pornography in violation of
    18 U.S.C. § 2252(a)(4)(B). Instead, as we discussed above, the likelihood of this criminal
    activity occurring was sufficiently established by the totality of the affidavit, as Agent
    Macfarlane provided a detailed and sufficiently specific picture of Playpen, its content, the
    process for users to register and access the site, and the government’s NIT program.
    In light of the above, we AFFIRM the district court’s dismissal of Bateman’s Franks
    motion, as Bateman failed to show any of the requisite elements to trigger a Franks hearing in
    connection with the NIT warrant.
    III.
    For the aforementioned reasons, we conclude that the district court did not err either in
    denying Bateman’s motion to suppress evidence seized pursuant to the NIT warrant, which led to
    his conviction under 18 U.S.C. § 2252(a)(4)(B), or in denying Bateman’s request for a Franks
    hearing of Agent Macfarlane in connection with the NIT warrant. Therefore, we AFFIRM the
    judgment of the district court in full.