Opinion
No. 10-00328-01-CR-W-DW.
August 29, 2011
ORDER
Before the Court is Magistrate Judge Robert E. Larsen's Report and Recommendation to Deny Defendant's Motion to Suppress Evidence (Doc. 38), and Report and Recommendation to Deny Defendant's Motion to Suppress Statement (Doc. 39). The Defendant filed objections to both Reports. See Docs. 42, 43. After an independent review of the record, the applicable law and the parties' arguments, the Court adopts the Magistrate's findings of fact and conclusions of law.
Consequently, it is hereby ORDERED that the Magistrate's Reports and Recommendations (Docs. 38, 39) be attached to and made a part of this Order; it is further
ORDERED that the Defendant's Motion to Suppress All Evidence Seized From Defendant's Home (Doc. 18), the Defendant's Motion to Suppress Defendant's Statements Made to the FBI (Doc. 19), and the Defendant's Supplemental Motion to Suppress (Doc. 31) are DENIED; it is further
ORDERED that because the Defendant filed his objections to the Magistrate's Reports and Recommendations within the time requested, the Defendant's Motion to Extend the 10 Day Objection Deadline to the Magistrate's Reports (Doc. 40) is GRANTED.
IT IS SO ORDERED.
REPORT AND RECOMMENDATION TO DENY DEFENDANT'S MOTION TO SUPPRESS EVIDENCE
Before the court is defendant's motion to suppress evidence seized from his home pursuant to a search warrant on the grounds that (1) the affidavit willfully omits critical and significant information known to the affiant that if revealed would have resulted in denial of the warrant, and (2) the affidavit does not establish probable cause that child pornography would be found on defendant's computer. I find that there was no material omission and that the search warrant was supported by probable cause. Therefore, defendant's motion to suppress should be denied.
I. BACKGROUND
On October 8, 2009, TFO Amanda Jatkowski in Springfield, Missouri, used the internet file-sharing application LimeWire to perform a search for shared files using terms and phrases commonly associated with child pornography. Her search argument returned a "host," or computer, with an IP ("internet protocol") address of 99.31.55.168 as having shared files with such terms and phrases included in file names or file descriptions. Using LimeWire, TFO Jatkowski was able to query the target host for all shared files, of which 93 were present. Of the 93 shared files, TFO Jatkowski downloaded 31 and determined that all 31 contained child pornography.
Using commands widely known to IP professionals, TFO Jatkowski was able to determine that the IP address 99.31.55.168 had been assigned by AT T Internet Services. On October 14, 2009, an administrative subpoena was served on AT T Internet Services, who responded on October 21 with the name, address, phone number and email address of the subscriber of the internet service. The subscriber was identified as Angela Pennington at 1401 South Osage Street, Independence, Missouri.
On October 12, 2009, TFO Jeffrey Elliott, in Oklahoma City, using the same LimeWire file-sharing application as that used by TFO Jatkowski, performed a similar search using the term "Witch Nudist", a phrase commonly associated with child pornography. His search returned files that were being shared by a host with an IP address of 75.54.75.211. A query of all shared files on the host returned 76 files. Of those, nine were downloaded, opened and determined to be child pornography. The following day, an administrative subpoena was served on AT T Internet Services who had assigned IP address 75.54.75.211. On October 21, 2009, AT T responded, indicating that the subscriber at the time of the downloads was Angela Pennington, 1401 South Osage Street, Independence, Missouri.
Many of the terms used in the affidavit and pleadings may not be fully understood by those with little exposure to the argot of digital age. The 15-page affidavit includes not only the above description of the investigation, but definitions, a background on computers and child pornography, the specifics of search and seizure of computer systems, how computers are searched, etc. The following paragraphs are an attempt to present a succinct clarification of how the simultaneous investigation by TFO Jatkowski and TFO Elliott led to 1401 South Osage in Independence, Missouri.
What is Limewire? Peer to peer (P2P) file sharing became a cultural phenomenon in 1999 with the advent of Napster, which was strictly a music-sharing site. The following year the P2P application LimeWire was released, followed by several others such as KaZaa, Morpheus, BearShare, etc. All were based on the Gnutella client developed by Nullsoft, which was acquired by AOL in 2000. In 2001 Napster was ordered to shut down due to copyright violations. Over the ensuing years virtually all of the Gnutella clients either shut down or adopted a "for pay" business model. An alternative to Gnutella — BitTorrent — has filled the file-sharing void, though in the last few years legitimate media sites such as iTunes and NetFlix have made available an enormous library of music, film, books and other media at low cost, putting file sharing sites based on copyright infringement increasingly on the fringe of polite society. While Napster was strictly a music-sharing site, the Gnutella clients were capable of sharing images, movies, software, published materials and so on. All that is needed to obtain and share files is an internet connection coupled with a client such as LimeWire. Once LimeWire is installed, the user can enter a search term into LimeWire, which sends the request across the internet to a peer also running a Gnutella client, which will forward that query to any peers it is connected to, and so on. The peers that are sharing files that conform to the search argument will respond back to the originating peer with its IP address, filename, file size and other detail. Depending upon the search argument, there may be many thousands of peers with the same file or like files, or few to none if the search was for something more arcane. Once the search is complete, the user can select a file from the list and choose to download it to his computer. Additionally, the user can query the remote PC for all files that are being shared. These are the actions TFOs Jatkowski and Elliott performed to discover child pornography stored on the PC at Angela Pennington's home in Independence.
How could the same computer have different IP addresses at different times? Computers communicating on the internet are assigned a unique internet protocol (IP) address for the duration of their connection to the internet. There is a finite number of IP addresses available under the present internet architecture — approximately 4.3 billion. These addresses are divided up by international agreement into regional divisions, which then are further divided into pools of addresses used by internet service providers (ISPs), such as AT T, for assignment to subscribers. Both because of the address limit and the nevertheless large number of addresses to be managed, provisions had to be made within the architecture to account for this limitation. Two of these provisions are known as Network Address Translation (NAT) and Dynamic Host Configuration Protocol (DHCP). NAT overcomes the address limit by providing for the use of private, non-routable IP addresses from within a domain, while DHCP provides a means of providing an IP address to a host as needed, rather than having that address statically assigned, which would effectively remove that address from the available pool. NAT does not have a particular bearing on this case. DCHP, however, answers the question as to why on October 8, 2009, the computer responding to TFP Jatkowski's LimeWire search had IP address 99.31.55.168, while the same computer responding to TFO Elliott's LimeWire search had IP address 75.54.75.211 four days later.
On November 9, 2009, Special Agent Michael Daniels obtained a federal search warrant for 1401 South Osage Street, Independence, Missouri — a residence shared by defendant and his girl friend, Angela Pennington. The warrant was executed the following day. Three computers were seized, two of which had internet connection. At the scene, defendant and his live-in girl friend both identified the computer containing child pornography as defendant's computer.
On November 19, 2010, an indictment was returned charging defendant with one count of attempted receipt of child pornography over the internet, in violation of 18 U.S.C. § 2252(a)(2), two counts of attempted distribution of child pornography over the internet, in violation of 18 U.S.C. § 2252(a)(2), one count of receiving child pornography over the internet, in violation of 18 U.S.C. § 2252(a)(2), and one count of possessing child pornography, in violation of 18 U.S.C. § 2252(a)(4).
On February 25, 2011, defendant filed a motion to suppress (document number 18) arguing that there was "less than a 10% chance that the contraband [child pornography] was at the subscriber residence on the subscriber's computer", yet police were able to get a search warrant because the issuing judge was not made aware of this fact. Attached to his motion is an affidavit of forensic expert Greg Chatten, an affidavit of Sprint Corporation IT Senior Manager Hardy Medlin, administrative subpoenas issued to AT T, an internet article from Australia on the dangers of WiFi, an article from 2007 Washington Post on the dangers of open WiFi, and the search warrant and supporting affidavit. On March 11, 2011, the government filed a response (document number 21) in opposition. On April 25, 2011, defendant filed supplemental citations of authority and evidence in support of his motion for a Franks hearing (document number 31).
II. FRANKS HEARING/PROBABLE CAUSE
Defendant argues that AT T should have been the initial possible suspect, and that no further investigation was done to determine if the child pornography passed through defendant's computer to another party through open wireless network (WiFi). In other words, defendant believes that the issuing judge was duped into thinking it more likely than it really was that defendant's residence held the computer that downloaded the child pornography — rather, it was more likely that either (1) an employee of AT T downloaded it; or (2) someone essentially parked near defendant's residence with a laptop and accessed the internet through defendant's non-secure internet service, downloaded child pornography, and then left the scene. This is the material omission which, defendant argues, requires a Franks hearing.
Notably, defendant does not actually allege that his internet was non-secure.
In Franks v. Delaware, 438 U.S. 154 (1978), the Supreme Court defined a limited exception to the presumptive validity of an affidavit supporting a search warrant application. Under Franks v. Delaware, if the government intentionally includes material false statements in its warrant affidavits or includes material false statements with reckless disregard for the truth that is the legal equivalent of an intentional falsehood, the court must set aside those statements and then review the remaining portions of the affidavit to see if what remains is sufficient to establish probable cause. United States v. Ozar, 50 F.3d 1440, 1443 (8th Cir.), cert. denied, 516 U.S. 871 (1995);United States v. Garcia, 785 F.2d 214, 222 (8th Cir.), cert.denied, 475 U.S. 1143 (1986). Defendant bears the burden of proving the intentional or reckless inclusion of false statements in a warrant affidavit. Id. at 222. The same analysis applies to omissions of fact, i.e., the defendant must show that the affiant intentionally or recklessly omitted material facts thereby making the affidavit misleading, and that the affidavit, if supplemented by the omitted information, could not support a finding of probable cause. United States v. Humphreys, 982 F.2d 254, 259 n. 2 (8th Cir. 1992).
An evidentiary hearing is not warranted unless the defendant makes a strong initial showing of "deliberate falsehood or of reckless disregard for the truth." Franks v. Delaware, 438 U.S. at 171; United States v. Freeman, 625 F.3d 1049, 1052 (8th Cir. 2010). The critical step in a Franks v. Delaware analysis is to determine whether the warrant affidavit, corrected for any false statements and omissions, is sufficient to show probable cause.United States v. Ozar, 50 F.3d at 1446.
Other courts have addressed the very same argument proposed by defendant, and those courts have rejected defendant's position. In United States v. Carter, 549 F. Supp. 2d 1257 (D. Nev. 2008), law enforcement authorities identified an IP address associated with the attempted downloading of child pornography, served an administrative subpoena on the internet service provider which issued that IP address, obtained the name and address of the subscriber who used that IP address at the time the attempt was made to download child pornography, and then verified that name and address through DMV and utility records. This information was included in an affidavit for a warrant to search the residence for evidence of child pornography. The defendant in that case moved to suppress the evidence, arguing that evidence that an IP address was used to download child pornography, combined with evidence regarding the IP address subscriber's identity and residential address, was insufficient to establish probable cause to believe that evidence of child pornography would be found at the subscriber's residence. The court disagreed:
In deciding whether the Defendant has made a sufficient threshold showing to warrant a Franks evidentiary hearing, the Court assumes that the factual information set forth in Mr. Mare's and Mr. Tobin's affidavits is accurate. The article on the FBI website also verifies that an outsider can use a subscriber's wireless connection and IP address to gain access to the Internet and, among other things, use that connection and IP address to either send or receive child pornography. The fact that an outside computer user can gain access to the Internet through the Internet service subscriber's wireless connection and IP address, with or without his knowledge, or that computer users can use software to "spoof" another person's assigned IP address or MAC address, are certainly possibilities that diminish the likelihood that the Internet transmission emanated from the subscriber's premises.
The Court nevertheless agrees with Perez that even if the information set forth in Mr. Mare's and Mr. Tobin's affidavits had been included in Agent Flaherty's affidavit, there would still have remained a likelihood or fair probability that the transmission emanated from the subscriber's place of residence and that evidence of child pornography would be found at that location. The Defendant, therefore, has not met his initial burden to show "that the 'affidavit, once corrected and supplemented,' would not 'provide . . . a substantial basis for concluding that probable cause existed' to search defendant's residence." United States v. Jawara, 474 F.3d at 582, quoting Stanert. Additionally, unlike the circumstances in Stanert, supra, where the omitted information would have clearly negated probable cause, the omissions in this case do not support an inference that they were made intentionally to mislead the Court or with reckless disregard for the truth.Id. at 1268-69.
United States v. Perez, 484 F.3d 735 (5th Cir. 2007).
United States v. Stanert, 762 F.2d 775 (9th Cir. 1985).
In United States v. Hibble, 2006 WL 2620349 (D. Ariz. 2006), the defendant argued that he used an unsecured wireless router to access the internet, which allows anyone who has WiFi software to access the defendant's IP address. "This is the type of technology that is available in coffee shops like Starbucks, which allows any laptop user to use the Starbucks' IPA." The Defendant in Hibble argued that the child pornography files could have been downloaded from another computer that was accessing the defendant's IP address and that law enforcement officers "should have confirmed that it was in fact Defendant's activity emanating from the Defendant's computer." As was the case inUnited States v. Carter, discussed above, the court held that the government was not required to obtain potentially dispositive information to put in its affidavit of probable cause for a warrant.
At the time of her affidavit of probable cause, SA Andrews had no way of knowing that Defendant was using a wireless router. This was discovered as a result of the search.
The Government is not required to obtain potentially dispositive information in its affidavit of probable cause. See United States v. Gourde, 440 F.3d 1065, 1073 n. 5 (9th Cir. 2006) ("See: United States v. Miller, 753 F.2d 1475, 1481 (9th Cir. 1985) (holding that an affidavit supported probable cause even though '[i]ndependent verification could have been easily accomplished in this case and the officers failed to take these simple steps'); United States v. Ozar, 50 F.3d 1440, 1446 (8th Cir. 1995) ('[T]he magistrate judge erred in focusing his Franks v. Delaware analysis on what the FBI could have learned with more investigation'); United States v. Dale, 991 F.2d 819, 844 (D.C. Cir. 1993) (noting that 'failure to investigate fully is not evidence of an affiant's reckless disregard for the truth' and that 'probable cause does not require an officer to . . . accumulate overwhelming corroborative evidence.')"
Here, SA Andrews's affidavit was based on her peer-to-peer search of the internet using a term she knew to be associated with child pornography that discovered files labeled as child pornography available for sharing at an IPA registered to the Defendant. She downloaded and opened two files, verifying that the files available at this IPA depicted child pornography. As noted in the R R, "a magistrate judge is only required to answer the 'commonsense, practical question of whether there is probable cause to believe that contraband or evidence is located in a particular place before issuing a search warrant."
* * * * *
. . . [T]he warrant was supported by probable cause because there was a fair probability that evidence of child pornography would be found on the computer located at the other end of the IPA. There is no showing to warrant a Franks hearing. Defendant's myriad of explanations are more suited to being raised as a defense at trial.Id. at *3-4.
Here, defendant attempts to persuade the court that there was only a ten percent chance that the child pornography downloaded through an IP address assigned to defendant's computer would actually be found on defendant's computer. I disagree. The possibility that an AT T employee or someone sitting in defendant's driveway downloaded the child pornography certainly exists — but not to the extent that it destroys the probable cause to believe the child pornography would indeed be found on defendant's computer.
Defendant's supplemental citations of authority do not change my opinion. In that document defendant describes an article about a man in Buffalo, New York, whose home was the subject of a search warrant. It was later learned that the man's neighbor had downloaded the child pornography. The article states that investigators "could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal" which could have raised the possibility that someone else was responsible for the downloads. I find that the authority offered in defendant's supplemental citations does not change my analysis, and I note also that using defendant's proffered argument, one would essentially shield himself from search warrants by maintaining open WiFi. I am not saying that further investigation should be discouraged or that the chances of people being wrongly suspected could get out of hand. I am simply saying at this point that the article presented by defendant in his supplemental brief does not persuade me that a Franks hearing is in order or that the search warrant's probable cause is in question.
Probable cause to issue a search warrant exists when an affidavit sets forth sufficient facts to justify a prudent person in the belief that there is a fair probability that contraband or evidence of a crime will be found in a particular place. Illinois v. Gates, 462 U.S. 213, 238 (1983); Brinegar v. United States, 338 U.S. 160 (1949); United States v. Reivich, 793 F.2d 957, 959 (8th Cir. 1986). A determination whether probable cause has been established involves a practical, common-sense evaluation of the totality of the circumstances. Illinois v. Gates, 462 U.S. at 238; United States v. Reivich, 793 F.2d at 959. It is unimportant whether individual corroborating facts appear to exemplify innocent or guilty activities; rather, it is how these facts fit together in the entirety which concerns a reviewing court. United States v. Robinson, 756 F.2d 56, 59-60 (8th Cir. 1985). If a common-sense decision based on all the surrounding circumstances demonstrates a fair probability that contraband or evidence of a crime will be found in a certain place, then issuance of a search warrant is proper. Illinois v. Gates, 462 U.S. at 238; United States v. Rich, 795 F.2d 680, 682 (8th Cir. 1986).
Considering the totality of the circumstances, I find that the affidavit in support of the search warrant in this case establishes probable cause that child pornography would be found on a computer in defendant's residence. The affidavit indicates that two agents conducting independent investigations learned that child pornography had been downloaded by IP addresses that had been assigned to the computer in defendant's house at the time the child pornography was downloaded. It describes the process of peer-to-peer file sharing and how child pornography is stored on computers. It describes how seized computers are searched by qualified computer experts. It describes the search procedure of electronic data. And it describes characteristics common to individuals involved in the distribution, receipt, or possession of child pornography based on the knowledge, experience, and training of the affiant and other law enforcement officers involved in investigating these crimes. Those characteristics include the retaining of child pornography on computers and in hard copy form in their residences for many years, and the maintenance of correspondence from other child pornography distributors/collectors.
This information justifies a prudent person in the belief that there is a fair probability that child pornography would be found on a computer in defendant's residence. The fact that someone could have sat outside defendant's residence with a laptop and downloaded child pornography certainly exists, but it does not negate the "fair probability" that someone inside the house downloaded that material. Defendant argues that law enforcement officers should have sat outside the residence with a laptop to see if the internet was secure or not before applying for a search warrant; however, defendant never even claims that his internet was not secure. Law enforcement officers are not required to rule out every other possibility before requesting a search warrant to further their investigation. However, I find that even if the affidavit had included the possibility that an AT T employee or person outside defendant's residence with a laptop could have downloaded the child pornography using defendant's IP address, the affidavit would still have established probable cause that child pornography would be found on a computer inside defendant's residence.
III. CONCLUSION
Based on all of the above, I find that (1) defendant has failed to meet his burden of proving the intentional or reckless omission of material information in the warrant affidavit, and (2) with or without the information defendant believes should have been included in the affidavit, it establishes probable cause to believe that child pornography would be found on a computer inside defendant's residence. Therefore, it is
RECOMMENDED that the court, after making an independent review of the record and the applicable law, enter an order denying defendant's motion for a Franks hearing and to suppress the evidence seized from his residence during execution of the search warrant.
Counsel are advised that, pursuant to 28 U.S.C. § 636(b)(1), each has ten days from the date of this report and recommendation to file and serve specific objections.
Kansas City, Missouri
August 1, 2011
REPORT AND RECOMMENDATION TO DENY DEFENDANT'S MOTION TO SUPPRESS STATEMENT
Before the court is defendant's motion to suppress his statement on the grounds that (1) his statement was obtained after an unlawful search of his residence and constitutes the unlawful fruit of that search, and (2) his statement was involuntary. Defendant's fruits argument has been addressed in a separate motion to suppress evidence in which I have found that the search was not unlawful. Here I find that defendant's statement was voluntary. Therefore, defendant's motion to suppress his statement should be denied.
I. BACKGROUND
On November 10, 2009, a search warrant was executed at defendant's residence. During the search, defendant was interviewed and made incriminating statements regarding receipt, distribution, and possession of child pornography. On November 19, 2010, an indictment was returned charging defendant with one count of attempted receipt of child pornography over the internet, in violation of 18 U.S.C. § 2252(a)(2), two counts of attempted distribution of child pornography over the internet, in violation of 18 U.S.C. § 2252(a)(2), one count of receiving child pornography over the internet, in violation of 18 U.S.C. § 2252(a)(2), and one count of possessing child pornography, in violation of 18 U.S.C. § 2252(a)(4).
On February 25, 2011, defendant filed a motion to suppress (document number 19) arguing that his statement was the fruit of an illegal search and that he "also believes that his statements were involuntary under the totality of the circumstances inasmuch as his 'will' was overborne by the inherently coercive setting in which he found himself." Defendant does not elaborate on that argument.
On March 11, 2011, the government filed a response (document number 20) arguing that defendant was at his own home, was advised he was not under arrest, was advised of the nature of the investigation, and was not placed under arrest at any time that day. Additionally, agents made no threats, displayed no violence, and made no promises in order to get defendant to make a statement.
On April 6, 2011, I held a hearing on defendant's motion. The government appeared by Assistant United States Attorney Teresa Moore. The defendant was present, represented by John Osgood. The following witnesses testified:
1. FBI Special Agent Michael Daniels
2. Angela Pennington, defendant's girl friend
3. Defendant, Michael Larson
In addition, the government offered the FBI 302 of the interview with defendant which was admitted as plaintiff's exhibit 1.
II. EVIDENCE
On the basis of the evidence presented at the suppression hearing, I submit the following findings of fact:
1. On November 10, 2009, law enforcement authorities executed a search warrant on 1401 South Osage Street, Independence, Missouri (Tr. at 7-8). The residence was an older two-story home with a large front porch with a bench off to the right of the front door (Tr. at 36). Agents arrived at defendant's residence at 6:45 a.m., which is standard procedure so that it is likely someone is home and for officer safety since residents are usually caught off guard at that time of morning (Tr. at 8-9, 29). Six to eight agents were present, which is standard (Tr. at 9). It is typical to keep one or two agents with each resident, and the agents want to be able to search the entire place in a reasonable amount of time (Tr. at 9-10).
2. For safety, the law enforcement officers who were present wore bullet proof vests with "FBI" or "Police" clearly displayed (Tr. at 10, 34). They had their guns drawn, in a "low ready" position, i.e., pointed at the ground (Tr. at 11, 34). No gun was pointed at anyone during this incident (Tr. at 11).
3. The agents could see lights on inside the residence, so they assumed someone inside was up (Tr. at 36). Agent Daniels knocked on the door and announced their presence, stating that they were there with a search warrant (Tr. at 9, 10). Either Angela Pennington or defendant came to the door; agents stated they had a search warrant and they were let inside the house (Tr. at 9).
Special Agent Daniels testified that he does not remember whether it was defendant or Ms. Pennington who answered the door (Tr. at 30).
4. The standard procedure is to remove everyone from the residence so that there is no access to any possible weapons and so that the residence can be swept and secured without concern for officer safety (Tr. at 11). Defendant and Ms. Pennington were taken to the front porch during the security sweep (Tr. at 12). They sat together on the bench (Tr. at 37). Special Agent Daniels and a uniformed police officer stayed on the porch with them (Tr. at 12). Police conducted the security sweep in five minutes or less (Tr. at 12). The only people present in the house were defendant and Angela Pennington (Tr. at 11-12). Once the residence was secure, the agents and officers put their vests in their cars and holstered their weapons (Tr. at 23, 39).
5. Special Agent Daniels told defendant and Ms. Pennington that he had a search warrant, he gave them a copy of the warrant, and he summarized the investigation (Tr. at 12-13, 38). They were told that there were no charges pending, no one was under arrest, they were free to leave, and any statements they made would be voluntary (Tr. at 14, 38, 44). The officers knew that defendant worked, so they told him that if he wanted to go to work, he could go to work (Tr. at 14).
6. Once the house was secured, the agents found an area within the house, somewhat removed from where the search was occurring, where they could conduct interviews (Tr. at 13-14). Defendant and Ms. Pennington were separated for the interviews (Tr. at 14).
7. Defendant was interviewed first; the interview took place in the dining room (Tr. at 15). Special Agents Michael Daniels and Richard Anderson conducted the interview (Tr. at 16). Special Agent Anderson had been on the job for about three months at the time (Tr. at 16). His role was to act as the second agent present, which is standard procedure during an interview, but also to observe (Tr. at 16).
8. Defendant was told again that there were no charges pending, that no one was under arrest, that any statement was voluntary, that no one would be arrested and taken with them when law enforcement authorities left (Tr. at 15). Defendant was told that he was going to stay there and continue about his day as he normally would (Tr. at 15).
9. The dining room was just inside the house, the first room on the left (Tr. at 15). Nothing was blocking any of the doors (Tr. at 15). Officers executing the search warrant would bring items out the front door which was near the dining room, but no one came into the dining room during the interview (Tr. at 23). The agents started out making small talk about remodeling of the house that was going on (Tr. at 16). They explained again the search warrant and the probable cause which brought them there (Tr. at 16).
10. Defendant agreed to speak to the agents and did not show any hesitation about making a statement (Tr. at 17). When defendant agreed to talk to the agents, he was taken into the dining room without Ms. Pennington (Tr. at 39). Defendant was reminded that he was not under arrest and that he was free to leave (Tr. at 40-41). Special Agent Daniels learned that defendant was 34 years of age (Tr. at 17). Defendant said he drove a green Ford F150 and had lived at 1401 South Osage for over five years (Tr. at 19). Defendant said he worked at Lafarge as an equipment operator, a position he had held for six years (Tr. at 19). Special Agent Daniels asked defendant if he had access to computers at work; defendant said he did, but it was a basic computer without internet access (Tr. at 19).
11. Defendant said there were three computers in his home; one belonged to Ms. Pennington, one was his, and one was used by his stepson (Tr. at 20). The one used by his stepson was not connected to the internet (Tr. at 20). The computers were all in an upstairs room (Tr. at 20, 41).
12. Defendant said he used his computer to buy and sell things on eBay, to do general internet surfing, and he also used LimeWire (Tr. at 20). LimeWire is a peer-to-peer file sharing program (Tr. at 20). Defendant said he used LimeWire to download music and pornography (Tr. at 20).
13. Special Agent Daniels asked defendant about child pornography (Tr. at 20). Defendant said that a couple years ago he saw an image of child pornography using LimeWire (Tr. at 21). After he saw the first image, it peaked his curiosity and he began to look for additional images of child pornography (Tr. at 21). Defendant last looked at child pornography a few days prior to the search of his house (Tr. at 21).
14. Defendant said there were no issues with the functioning of his computer (Tr. at 21). He used the terms "preteen," "teen," "Loli" and "hussy fan" to search for child pornography (Tr. at 22, 41). Defendant was aware of the file sharing feature of LimeWire (Tr. at 22). Defendant said he did not think he had shared any child pornography through LimeWire, but there was a possibility that he had (Tr. at 22).
15. Defendant and Ms. Pennington lived at 1401 South Osage (Tr. at 22). Defendant said his stepson would visit every other weekend and a Chadwick St. Clair lived there off and on (Tr. at 22). Mr. St. Clair had lived there for about a year and had moved out recently (Tr. at 22-23).
16. Defendant was not advised of his Miranda rights because he was not in custody and was free to leave (Tr. at 17). Special Agent Daniels had no difficulty communicating with defendant; he appeared to understand the questions, and his responses were relevant to the questions asked (Tr. at 18). The interview was conversational — not question/answer — and there was no hostility, no raised voices (Tr. at 18, 41). Defendant's demeanor was cooperative (Tr. at 18). He knew why they were there, so the agents only had to ask simple questions (Tr. at 24). Defendant showed the typical nervousness that the agents see when they talk to people (Tr. at 18).
17. No one lied to defendant, no one attempted to threaten or frighten defendant, there were no promises made by anyone, no tricks were used to get him to speak with the agents (Tr. at 24-25, 29). Defendant was never told he was required to talk to the agents; he never indicated that he wanted to stop talking to them or call an attorney (Tr. at 25). Nothing was damaged during the execution of the search warrant (Tr. at 13). At no time were defendant or Ms. Pennington handcuffed (Tr. at 15). Once the residence was secured, the agents and officers holstered their weapons and no weapon was displayed after that time (Tr. at 24). Law enforcement officers were in the residence a total of about an hour (Tr. at 24, 26). The interview of defendant took about 30 minutes (Tr. at 24, 26, 44).
The receipt of property taken, which is signed by the resident when the police are ready to leave, was signed by defendant at 7:55 a.m. (Tr. at 25-26).
Angela Pennington
18. At the time of the hearing, Ms. Pennington had been in a relationship with defendant for about ten years (Tr. at 46, 57). She was living with defendant on the day of the search (Tr. at 46, 57). At 6:00 a.m. she and defendant were in bed when she heard pounding on the door and someone shouting, "FBI" (Tr. at 47). The bedroom is on the first floor of the two-story house (Tr. at 49-50). She and defendant got up intending to answer the door but expecting it to be her neighbor who was known to play pranks on people around the neighborhood (Tr. at 64-65). As she and defendant were walking out of their bedroom, she saw the door swing open, someone put a flashlight in her face, and people were "going around with guns." (Tr. at 47). The guns were pointed directly at her and defendant (Tr. at 49). Ms. Pennington believed that the flashlights were part of the weapons (Tr. at 56). The officers had assault weapons and rifles (Tr. at 49). Ms. Pennington did not open the front door — she was just coming out of her bedroom when she was told to put her hands out (Tr. at 47-48). Ms. Pennington and defendant both put their hands out in front of them (Tr. at 51-52). An agent told Ms. Pennington that the front door of the house was not locked (Tr. at 48). Defendant and Ms. Pennington never lock their front door (Tr. at 48). Both defendant and Ms. Pennington were dressed in sweat pants and t-shirts, which is what they typically wear to bed (Tr. at 48).
19. Defendant and Ms. Pennington were taken out to the front porch (Tr. at 52). No one told them they could get shoes and socks or that they could leave (Tr. at 53). Had anyone told Ms. Pennington she could leave, she would have (Tr. at 53). Ms. Pennington was told only that the agents had a search warrant (Tr. at 54). Defendant tried to get up and walk around the porch, but he was told to sit back down (Tr. at 55). Some officers took defendant inside and left Ms. Pennington on the porch with two other officers (Tr. at 56). No one told her that she did not have to talk to the officers; they said, "We just have a few questions for you." (Tr. at 56). Ms. Pennington thought she was in custody (Tr. at 56, 58, 63). The officers did not tell her she was under arrest, but they also did not tell her she was free to leave (Tr. at 58, 63). She asked if she could get her cell phone so she could call her boss "to let my boss know I was going to be late." (Tr. at 57). An officer said, "Oh, we'll be out of here pretty quick." (Tr. at 57). Ms. Pennington stayed out on the porch for 30 to 45 minutes (Tr. at 53). She talked to the officers once they were done talking to defendant (Tr. at 57). She told them that she and defendant's brother had seen an image of a very young child on defendant's computer (Tr. at 60).
20. Neither Ms. Pennington nor defendant were arrested at any time that day (Tr. at 58-59). No one was handcuffed that day (Tr. at 59, 62). The agents left around 7:30 or 7:45 (Tr. at 59).
21. To the extent it contradicts the testimony of Special Agent Daniels, I do not find Ms. Pennington's testimony credible for the following reasons:
a. Ms. Pennington testified that she thought she was in custody; but she also testified that she asked if she could get her phone so she could call her boss to say she was going to be late. Had she believed she was in custody, she would have thought she would miss work, not be late.
b. As far as the issue of whether the officers entered the residence on their own or after one of the residents opened the door, Ms. Pennington's testimony was all over the place:
i. She first testified that as she was exiting her bedroom, she saw "people" armed with assault weapons already in her house and shining flashlights at her (Tr. at 47-48).
ii. Upon examination by me, she testified that "they were outside of the house in front of the dining room window." (Tr. at 65).
iii. Because of her conflicting testimony, I tried to get clarification as to whether the agents were inside the house or outside the house when she came out of her bedroom. Ms. Pennington then said, "They were coming in the house." (Tr. at 65).
Whether the agents were inside the house or outside the house is a very simple question; however, Ms. Pennington had difficulty sticking with a solid answer:
Q. When you say coming in the house, where were they? A. They were at the front door. Q. Were they inside the residence or at the front door of the residence? . . . [I]t's pretty simple. I'm trying to get an idea, if somebody is at your front door knocking, they're outside the house. A. Yes. Q. When they step through the front door and they're in your living room . . ., they're inside your house. Are you saying that these agents were inside your house when you were trying to come out [of your bedroom]? A. They were coming in the house at that time, yes. Q. They were already coming in. Where were they? A. They were — one of them was standing right inside the door with the light flashing telling us to put our hands out. . . . I'm right here and the door pops open. And I heard one voice. I don't know if there — how many people were behind that person. But I also saw a person outside the dining room window at that time, too, as well. (Tr. at 65-67).iv. When asked again whether there were multiple officers in the house when she came out of her bedroom, Ms. Pennington said, "I know of one person because I only heard one voice inside the house." (Tr. at 67).
v. I asked one final time, "All I care about, ma'am, all I want to know is were — are you saying that these agents were inside your house before you ever came to the door and let them in or Michael came to the door and let them in?" to which Ms. Pennington said, "Yes. They were inside the house before we even got to the living room door." (Tr. at 67-68).
Because Ms. Pennington testified that at the time she exited her bedroom, there were "people" already walking around her house with guns, there were people outside on the porch whom she could see through a window, there were people coming into the house, there was one person coming in the house and others outside, and that she heard the voice of one person inside the house, and then back to multiple people being in the house already, I give no weight to her testimony on this issue.
c. Ms. Pennington testified that the officers arrived at 6:00 a.m. Special Agent Daniels testified that they arrived at 6:45 a.m. There is no dispute that the receipt of property form signed by defendant states that the law enforcement officers left at 7:55 a.m. Ms. Pennington's testimony, therefore, is that law enforcement were present for just under two hours. Special Agent Daniels's testimony is that they were there for about 50 minutes. A comparison of the various stories of how long things occurred leads me to conclude that Ms. Pennington's testimony on this issue is not credible.
Special Agent Daniels testified that it took about five minutes to conduct a security sweep of the residence. He then questioned defendant for approximately 30 minutes. The questioning of defendant included small talk about the remodeling he was doing to the house. This leaves approximately 15 minutes for the agents to interview Ms. Pennington before departing at 7:55.
Defendant testified that the agents arrived at 6:00 a.m. (although he did not have a watch and did not look at a clock). He said he spent 15 minutes on the porch and then he was questioned for 20 to 25 minutes. This takes up a maximum of 40 minutes meaning that the police would then have spent the remaining hour and 15 minutes questioning Ms. Pennington.
Finally, Ms. Pennington testified that she spent 30 to 45 minutes on the porch. This would encompass the time when the security sweep was being conducted and when defendant was being interviewed. She was then interviewed. Again, this would leave a minimum of one hour and ten minutes for her interview.
It is not plausible that defendant, who admitted to police that he was looking at and downloading child pornography, would be interviewed approximately one third the length of time Ms. Pennington was. The more believable scenario is that the police arrived at 6:45, conducted a security sweep of the residence for about five minutes and questioned defendant for 30 minutes — which matches Ms. Pennington's recollection of how long she was on the porch before being questioned — and then they spent about 15 more minutes questioning her before they left.
d. Ms. Pennington testified that someone was shining a flashlight at her, yet she saw "people" running around her home with guns. Aside from the noncredible testimony about people running around her home before she answered the door (discussed above), her testimony contradicts both logic and that of defendant with respect to her ability to see guns with a flashlight shining in her eyes.
Defendant
22. Defendant believes that law enforcement showed up at his house around 6:00 a.m. when he was still asleep; but he did not look at a clock or a watch (Tr. at 72). He heard a loud thud followed by, "FBI, search warrant!" (Tr. at 72). After the entire incident, defendant inspected his front door and observed that there was a dent in it "from what looked like could have been a blunt object, a heel of a shoe or something in it." (Tr. at 72). Defendant said one of the agents said the door was not latched "when he kicked it." (Tr. at 72). Defendant does not remember who said that (Tr. at 72). The door is wooden and is approximately 20 years old (Tr. at 86).23. Defendant's girl friend got up first and defendant followed her out the bedroom door (Tr. at 73). When they came "around the corner," defendant heard someone say, "Put your hands out in front of you," and a light was shining on defendant and Ms. Pennington (Tr. at 73). Defendant could not see any weapons because of the light shining in his direction (Tr. at 73). The agents led defendant and Ms. Pennington toward the agents; and once the light was taken off them, defendant could see that weapons were pointed directly at him (Tr. at 73). He saw at least one assault rifle (Tr. at 73). The agents were inside the house when defendant and Ms. Pennington exited their bedroom (Tr. at 83).
24. Defendant and Ms. Pennington were taken to the porch (Tr. at 73). Defendant asked for his shoes but was denied them (Tr. at 73). He asked to put on his jacket, and he was denied that as well (Tr. at 73-74). He and Ms. Pennington were told to sit on the bench on the porch and three agents (two male and one female) stayed with them (Tr. at 75). The agents' guns were holstered at that time (Tr. at 76). Defendant was not handcuffed (Tr. at 76). He was told the agents were there to execute a search warrant, and he was given a copy of the paperwork (Tr. at 77). At one point defendant got up and attempted to move around, but he was told to stay on the bench (Tr. at 76-77). Defendant was not told he could leave, and he was frightened (Tr. at 77). He was not told he was under arrest and he does not know whether he thought he was under arrest, but he did not believe he was free to leave (Tr. at 77-78).
25. After about 15 minutes, two agents came to get defendant off the porch (Tr. at 77). They took him into the dining room (Tr. at 79). Defendant was told that the agents were going to interview defendant and Ms. Pennington and that it was part of the search warrant process (Tr. at 78). The interview lasted 20 to 25 minutes (Tr. at 80, 85). Defendant was asked if he had heard of certain search terms and defendant said he had (Tr. at 80). Defendant does not recall telling the agents he had used those search terms (Tr. at 81). Defendant never asked for a lawyer and never asked to stop the interview or to leave (Tr. at 81). He did not think he was free to leave, and he was so terrified that asking for a lawyer never crossed his mind (Tr. at 81-82). Defendant did not feel that the interview was "very voluntary at all;" and he thought there was a strong possibility that he was going to be arrested afterward (Tr. at 82).
Whether the agents brought up the search terms first or defendant did is irrelevant to the issue of whether defendant's statement was voluntary.
26. Defendant was never told he could leave and go to work (Tr. at 84). He did not, in fact, go to work that day (Tr. at 84-85). He would normally start work at 10:00 (Tr. at 85).
27. Defendant agreed that the agents never raised their voices, never threatened him, and did not arrest him until over a year later (Tr. at 85). Defendant does not recall whether agents told him that any statement would be voluntary and that he was not under arrest (Tr. at 87-88). He knows he was never told that he could leave (Tr. at 88).
28. To the extent defendant's testimony differs from that of Special Agent Daniels, I find it not credible for the following reasons:
a. Defendant testified that law enforcement arrived at 6:00 a.m.; however, he admitted he had not looked at a watch or a clock. He had, however, just sat through the testimony of his girl friend, and she testified that law enforcement arrived at 6:00 a.m. It appears defendant was attempting to corroborate Ms. Pennington's testimony. I find defendant's testimony about the time the officers arrived to be not credible for the reasons already discussed in the credibility discussion of Ms. Pennington's testimony above.
b. Defendant testified that an agent kicked in his front door, damaging the door, and that the law enforcement officer indicated that the door had not been locked when he kicked it in. It is not plausible that a law enforcement officer would kick in a door before checking to see if the door were locked. Ms. Pennington testified that she and defendant never locked their front door. Additionally, it is undisputed that the agents had no intention of taking anyone into custody that day, which makes it even more implausible that they felt the need to kick in an unlocked door rather than waiting for the residents to answer.
c. Defendant testified that he was too terrified to think about requesting a lawyer, yet he admitted that no one threatened him, no one raised his or her voice, he was never handcuffed, he was not arrested, and he was in his own dining room at the time he was questioned.
III. VOLUNTARINESS OF STATEMENT
Defendant argues that his statement was involuntary; however, he does not provide any basis for his argument.
Custody
Miranda v. Arizona, 384 U.S. 436 (1966), requires that a suspect be advised of (among other things) his right to remain silent and to have an attorney with him during questioning. Law enforcement officers are required to advise a suspect of hisMiranda rights only if custodial interrogation takes place. Id. Custody occurs either upon formal arrest or under any other circumstances where the suspect is deprived of his freedom of action in any significant way. Id. at 429.
In determining whether a suspect is "in custody," courts examine the extent of the physical or psychological restraints placed on the suspect during interrogation in light of whether a "reasonable person in the suspect's position would have understood his situation" to be one of custody. Berkemer v. McCarty, 468 U.S. 420, 442 (1984). The totality of the circumstances is considered. United States v. Carter, 884 F.2d 368 (8th Cir. 1989).
The Eighth Circuit has outlined six factors to be considered in determining whether a suspect is "in custody" for Miranda purposes:
Whether the suspect was informed at the time of questioning that the questioning was voluntary, that the suspect was free to leave or request the officers to do so, or that the suspect was not under arrest; whether the suspect possessed unrestrained freedom of movement during the interview; whether the suspect initiated contact with authorities or voluntarily acquiesced to official requests to respond to questions; whether strong arm tactics or deceptive stratagems were employed during questioning; whether the atmosphere of the questioning was dominated by law enforcement officers; and whether the suspect was placed under arrest at the termination of the questioning.United States v. Czichray, 378 F.3d 822, 831 (8th Cir. 2004),cert. denied, 544 U.S. 1060 (2005). The affirmative presence of one or more of the first three factors mitigates the existence of custody at the time of the questioning. United States v. McKinney, 88 F.3d 551, 554 (8th Cir. 1996). The presence of one or more of the last three factors during questioning will tend to support a finding of custody. Id. A finding of custody does not, however, have to be supported by all six factors. Id.
1. The most obvious and effective means of demonstrating that a suspect has not been taken into custody or otherwise deprived of freedom of action is for the police to inform the suspect that an arrest is not being made and that the suspect may terminate the interview at will. Oregon v. Mathiason, 429 U.S. 492, 495 (1977);Miranda v. Arizona, 384 U.S. at 444. Although failure to advise a suspect that he is free to leave may suggest restraint, the absence of a statement suggesting that a suspect is not free to leave suggests freedom of movement. United States v. Lanni, 951 F.2d 440, 442 (1st Cir. 1991).
The credible evidence establishes that defendant was informed at the time the officers arrived and prior to his interview that there were no charges pending, no one was under arrest, any statement he made was voluntary, and no one would be arrested and taken away when law enforcement authorities left the residence.
2. The credible evidence establishes that defendant was moved to the porch of the residence and asked to sit on the bench for the five minutes it took the officers to conduct a security sweep of the residence. There is no evidence that defendant's freedom of movement was restrained beyond that.
3. The credible evidence establishes that defendant voluntarily agreed to be interviewed and the interview was conversational rather than question-answer.
4. Because strong-arm tactics are more generally associated with formal arrest than with an informal encounter with police, the use of such tactics normally supports a finding of custody.United States v. Griffin, 922 F.2d 1343, 1351 (8th Cir. 1990). There is no evidence (or even allegation) that law enforcement officers used strong-arm tactics or deceptive stratagems.
5. An interrogation which occurs in an atmosphere dominated by the police is more likely to be viewed as custodial than one which does not. Berkemer v. McCarty, 468 U.S. at 438. The question is whether the entire context of the questioning, including such considerations as place and length of the questioning, whether the police assume control of the place of questioning, and whether they dictate the course of conduct followed by the suspect or other persons present at the scene, demonstrates that the course of the investigation was police dominated. United States v. Griffin, 922 F.2d at 1352; United States v. Longbehn, 850 F.2d 450, 453 (8th Cir. 1988). When a suspect is not subject to any sort of police commands or dictations, custody is usually found lacking. United States v. Jones, 630 F.2d 613, 616 (8th Cir. 1980).
The atmosphere of the questioning was not dominated by law enforcement officers. The questioning took place in defendant's dining room, only two officers were present with him and only one asked questions, the questioning took only 20 to 30 minutes, defendant was not handcuffed, no one raised his voice or acted in a threatening manner.
6. Finally, it is undisputed that no one was arrested at the conclusion of the questioning.
The "in custody" requirement is not satisfied merely because the person interviewed is the focus of a criminal investigation.Beckwith v. United States, 425 U.S. 341 (1976). Defendant bears the burden of proving that he was in custody at the time the statement was made. United States v. Davis, 792 F.2d 1299, 1308 (5th Cir.), cert. denied, 479 U.S. 964 (1986); United States v. Charles, 738 F.2d 686,692 (5th Cir. 1984); United States v. Grissom, 825 F. Supp. 949, 954 (D. Kan. 1993). I find that defendant failed to meet this burden. All of the factors discussed above support the conclusion that defendant was not in custody when he made his statement. Therefore, because defendant was not in custody, Miranda warnings were not required.
Voluntariness
The Fifth Amendment right against self-incrimination provides the Constitutional basis for the requirement that a confession be voluntary to be admitted into evidence. Dickerson v. United States, 520 U.S. 428 (2000). In determining whether a confession is voluntary, a court should examine the circumstances surrounding the confession, including the conduct of the law enforcement officials and the capacity of the suspect to resist pressure to confess. United States v. Mendoza, 85 F.3d 1347, 1350 (8th Cir. 1996); United States v. Johnson, 47 F.3d 272, 275-76 (8th Cir. 1995). Coercive government activity is necessary to prove that a statement was not voluntary. Colorado v. Connelly, 479 U.S. 157, 163-64 (1986); United States v. Hatten, 68 F.3d 257, 262 (8th Cir. 1995), cert. denied, 516 U.S. 1150 (1996). See also United States v. Kilgore, 58 F.3d 350, 353 (8th Cir. 1995) (the appropriate test for determining voluntariness is whether the confession was extracted by threats, violence or direct or implied promises such that the defendant's will was overborne and his capacity for self-determination critically impaired).
Here there is no evidence of any coercive government activity. There is not even an allegation of coercive government activity. Defendant admitted that no law enforcement officer used threats or raised his voice. Defendant was not scheduled to start work that day until 10:00, so there was not even any pressure of having to be late for work because of the questioning or the execution of the search warrant. Although defendant testified that he did not believe his statement was "very voluntary at all," he did not provide any factual basis for such a statement, and I find none in the record.
IV. CONCLUSION
Based on the above-stated findings of fact and the law as discussed in section III, I conclude that defendant was not in custody at the time he made his statement and that his statement was voluntary. Therefore, it is
RECOMMENDED that the court, after making an independent review of the record and the applicable law, enter an order denying defendant's motion to suppress his statement.
Counsel are advised that, pursuant to 28 U.S.C. § 636(b)(1), each has ten days from the date of this report and recommendation to file and serve specific objections.
Kansas City, Missouri
August 1, 2011