Courts Pretty Much OK With FBI's Occasional Stints As Child Porn Distributors
Law enforcement agencies commit criminal acts while conducting criminal investigations. It happens all the time. With the blessing of their handlers, confidential informants routinely engage in criminal activity. Investigators act as co-conspirators in the planning of terrorist attacks and the robbing of imaginary "stash houses."
But many people are taking issue with the FBI's decision to use seized servers loaded with child pornography as honeypots rather than immediately shut them down. For some, this is the one unforgivable criminal act -- the possession and distribution of child porn.
This is something the FBI has done twice (that we know of). The first time was back in 2012, when it seized a server in Bellevue, Nebraska linked to a website called "PedoBook." It ran the site for three weeks while it deployed a Network Investigative Tool to find out more info about its users.
It did it again in 2015. Joseph Cox of Motherboard was the first to cover it, detailing the FBI's two-week stint as the new hosts of "Playpen," another child porn site accessible only to users utilizing the Tor browser. Again, the FBI deployed its NIT to gather information on the site's visitors.
One of those caught in the latest sting is arguing the FBI participated in criminal activity, tainting the evidence it seized.
[T]he Government engaged in illegal conduct by aiding and abetting the distribution of child pornography; and, considering the Fourth Amendment's core reasonableness requirements and the totality of the circumstances, it obtained an unprecedently overbroad general warrant.This is one of several arguments Jay Michaud's attorney is raising. It's also being argued that the use of the NIT violated Rule 41, which governs the use of search warrants. Michaud claims the FBI violated Rule 41's territorial limits by using its control of a server in Virginia (where the NIT warrant was issued) to access Michaud's computer in Vancouver, Washington.
The defense has never questioned the Government's authority to seize "mere evidence," assuming that other requirements of Rule 41 and the Constitution are complied with. Rather, this case involves the territorial limitations of Rule 41, a matter completely unaffected by the enactment of 3103(a).The Rule 41 approach was also explored by Joshua Welch, who was swept up in the FBI's 2012 operation. It was of limited success. While the Eighth Circuit Appeals Court found the NIT warrant fell under Rule 41's time limit of notification of search warrant targets (30 days), it was not enough to offset other evidence gathered by the FBI.
Finally, it is important to note that the Government has not disputed that Rule 41 applies to the NIT warrant or argued that some other law alters or expands the Rule's requirement. Instead, the Government has argued that the Rule is "flexible," despite its plain language, and has proposed several novel and unpersuasive interpretations of the Rule that cannot be reconciled with that language.
In sum, nothing in either of these statutes in any way alters or undercuts the territorial limitations of Rule 41 and thus have no relevance when applied to the facts of this case.
We assume, without deciding, that Rule 41 applies to the NIT warrant. The statute authorizing the magistrate judge to delay notice is perfectly clear-the thirty day extension runs from the execution of the warrant. 18 U.S.C. 3103a(b)(3). This occurred on November 19, 2012, meaning notice was to be provided within thirty days of that date. Moreover, the "notice" provided by the government was insufficient. The government points to a hearing Welch attended in which an agent testified about the NIT and to the entry of the residential search warrant into evidence as notice "provided during the discovery process." But under Rule 41 Welch should have been given a copy of the NIT warrant. Of course it is plainly true that if agents were required to send a copy of the warrant to the subscriber address they obtained before they could search the premises and identify the individual user, Welch would have had ample time to flee prosecution, destroy or tamper with evidence, and otherwise seriously jeopardize the investigation. But these special considerations would have allowed for the magistrate judge to either specify a later date certain, which he did not do, or for the government to return for extensions of time under 3103a(c), which it did not do. Therefore, the notice given Welch failed to comport with Rule 41.If the FBI's use of NITs, especially in conjunction with its decision to act as interim administrators for seized child porn websites, is going to be challenged, Rule 41 seems to be the angle to take. The other route -- challenging the FBI's forays into child porn distribution -- seems far less likely to succeed. The courts have granted a lot of leeway to law enforcement agencies who engage in illegal activities during the course of investigations, as USA Today's Brad Heath has been pointing out on Twitter.
The FBI "hired a heroin-addicted prostitute" to become intimate with a suspect and get him to sell drugs. Court: OK. pic.twitter.com/0MbaBJu3xn
- Brad Heath (@bradheath) January 21, 2016
The FBI "hired a heroin-addicted prostitute" to become intimate with a suspect and get him to sell drugs. Court: OK.
Federal courts have given the government wide latitude to break the law in pursuit of criminals. From a #DOJ brief: pic.twitter.com/pZ8WiNtqJm
- Brad Heath (@bradheath) January 21, 2016
The footnote pictured in the tweet reads:
E.g., United States v. Esch, 832 F.2d 531 (10th Cir. 1987)The latter would seem to be even more reprehensible than simply running an existingchild porn site and allowing users to upload and download child porn. In the 1987 case, the FBI actually encouraged the production of child pornography. Yet the court found no reason to question or discourage this behavior.
(holding that it was not outrageous government conduct to create a pedophilic organization, advertise for members, and encourage those members to create child pornography).
And there will always be other examples of highly-questionable activity engaged in by law enforcement during criminal investigations. An entire cottage industry of sting operations is predicated on pushing potential suspects towards committing criminal behavior and arresting them before the imaginary scheme can be carried out. In stash house robbery cases, the contents of the house to be robbed are limited only to creativity of the agents participating in the sting. Prison terms are predicated on these nonexistent items, allowing the government to send someone away for decades for almost robbing an empty house.
While it is undoubtedly true the FBI would not have been able to uncover the identities of these child porn site visitors without allowing the site to run, one has to question whether it was all worth it. In the two weeks it participated in the hosting and distribution of child porn, 100,000 visitors were logged. But so far, it has only resulted in 137 arrests and far fewer indictments. Its 2012 investigation led to far less: 25 criminal complaints -- nine of which are still only identified as "Doe."
Permalink | Comments | Email This Story
