Courts Pretty Much OK With FBI's Occasional Stints As Child Porn Distributors
Techdirt. 2016-01-27
Summary:
Law enforcement agencies commit criminal acts while conducting criminal investigations. It happens all the time. With the blessing of their handlers, confidential informants routinely engage in criminal activity. Investigators act as co-conspirators in the planning of terrorist attacks and the robbing of imaginary "stash houses." But many people are taking issue with the FBI's decision to use seized servers loaded with child pornography as honeypots rather than immediately shut them down. For some, this is the one unforgivable criminal act -- the possession and distribution of child porn. This is something the FBI has done twice (that we know of). The first time was back in 2012, when it seized a server in Bellevue, Nebraska linked to a website called "PedoBook." It ran the site for three weeks while it deployed a Network Investigative Tool to find out more info about its users. It did it again in 2015. Joseph Cox of Motherboard was the first to cover it, detailing the FBI's two-week stint as the new hosts of "Playpen," another child porn site accessible only to users utilizing the Tor browser. Again, the FBI deployed its NIT to gather information on the site's visitors. One of those caught in the latest sting is arguing the FBI participated in criminal activity, tainting the evidence it seized.
[T]he Government engaged in illegal conduct by aiding and abetting the distribution of child pornography; and, considering the Fourth Amendment’s core reasonableness requirements and the totality of the circumstances, it obtained an unprecedently overbroad general warrant.This is one of several arguments Jay Michaud's attorney is raising. It's also being argued that the use of the NIT violated Rule 41, which governs the use of search warrants. Michaud claims the FBI violated Rule 41's territorial limits by using its control of a server in Virginia (where the NIT warrant was issued) to access Michaud's computer in Vancouver, Washington.
The defense has never questioned the Government’s authority to seize “mere evidence,” assuming that other requirements of Rule 41 and the Constitution are complied with. Rather, this case involves the territorial limitations of Rule 41, a matter completely unaffected by the enactment of § 3103(a). Finally, it is important to note that the Government has not disputed that Rule 41 applies to the NIT warrant or argued that some other law alters or expands the Rule’s requirement. Instead, the Government has argued that the Rule is “flexible,” despite its plain language, and has proposed several novel and unpersuasive interpretations of the Rule that cannot be reconciled with that language. In sum, nothing in either of these statutes in any way alters or undercuts the territorial limitations of Rule 41 and thus have no relevance when applied to the facts of this case.The Rule 41 approach was also explored by Joshua Welch, who was swept up in the FBI's 2012 operation. It was of limited success. While the Eighth Circuit Appeals Court found the NIT warrant fell under Rule 41's time limit of notification of search warrant targets (30 days), it was not enough to offset other evidence gathered by the FBI.
We assume, without deciding, that Rule 41 applies to the NIT warrant. The statute authorizing the magistrate judge to delay notice is perfectly clear–the thirty day extension runs from the execution of the warrant. 18 U.S.C. § 3103a(b)(3). This occurred on November 19, 2012, meaning notice was to be provided within thirty days of that date. Moreover, the "notice" provided by the government was insufficient. The government points to a hearing Welch attended in which an agent testified about the NIT and to the entry of the residential search warrant into evidence as notice "provided during the discovery process." But under Rule 41 Welch should have been given a copy of the NIT warrant. Of course it is plainly true that if agents were required to send