Searching over 5,500,000 cases.

Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.

United States v. Sherlock

United States District Court, M.D. Louisiana

January 4, 2018




         This matter is before the Court on the Motion to Suppress[1] filed by the Defendant, Sean Sherlock (“Defendant” or “Sherlock”). The United States (“the Government”) has filed an Opposition[2] to this motion. The Court held an evidentiary hearing on this motion on December 5, 2017 and took the matter under advisement.[3] The Court has considered the arguments of the Parties, the testimony and evidence presented at the hearing, and the law as applied to the facts of this case. For the reasons set forth below, the Defendant's motion shall be DENIED.


         On November 16, 2016, Special Agent Randall Gohn, Sr. (“Agent Gohn”) of the Louisiana Department of Justice, applied to the 23rd JDC, Parish of Ascension, for a search warrant to search a residence in Gonzales, LA, for evidence of child pornography offenses.[5] The warrant application contained the following facts. In September of 2016, special agents of the Attorney General's Cyber Crime Unit were investigating peer-to-peer (P2P) file sharing networks used by child pornography offenders to trade child pornography.[6] The investigation involved automated searching of P2P networks for file names indicative of child pornography.[7] Investigators received information from an automated search that, on September 20, 2016, the computer associated with a particular IP address had/possessed several files available for download that had file names indicative of child pornography.[8] Those files included the following:

Webcam stickcam spycam - 12y - Chatzppl - Gegee 29Mar10.avi ((PTHC)) BRAZIL PROSTITUTES (21).jpg ((PTHC)) BRAZIL PROSTITUTES (30).jpg[9]

         The Secure Hash Algorithm (“SHA” or “SHA-1”)[10] values of the files were compared to SHA values of known child pornography.[11] Based on the comparison, at least one of the files was determined to be known child pornography. The Government then subpoenaed Cox Communications and found the IP address was assigned to a Cox Subscriber in Gonzales, LA.[12]

         On November 16, 2016, Judge Thomas Kliebert, Jr. of the 23rd JDC, issued a warrant, authorizing a search of the Cox Subscriber's residence for the seizure of computers, electronic devices, digital storage media, and other items.[13] According to the Government, the Defendant was present at the residence during the execution of the warrant and admitted the residence was his home.[14] During the search, agents seized a computer from the Defendant's bedroom which was found to contain thousands of images of child pornography.[15] Defendant was interviewed during the execution of the warrant and, after being advised of his Miranda rights, he admitted that he had downloaded, and continued to possess, child pornography on the computer in his bedroom.[16]

         II. LAW & ANALYSIS

         A. Motion to Suppress

         Generally, “[t]he proponent of a motion to suppress has the burden of proving, by a preponderance of the evidence, that the evidence obtained was in violation of his Fourth Amendment rights.[17] Conversely, at a suppression hearing, the Government must prove, by a preponderance of the evidence, that the challenged evidence was lawfully obtained.[18]

         B. The Warrant Requirement and Good Faith Exception to the Exclusionary Rule.

         A valid search warrant may be issued only upon a finding of probable cause.[19] The information necessary to show probable cause must be contained within a written affidavit given under oath.[20] Probable cause does not require proof beyond a reasonable doubt; a magistrate[21] need only have a substantial basis for concluding that a search would uncover evidence of wrongdoing.[22] A magistrate's determination is entitled to deference by reviewing courts.[23] Even if the magistrate authorizes an otherwise invalid search warrant, officers may rely on the good faith exception to the exclusionary rule.[24] The good faith exception precludes the suppression of evidence obtained by law enforcement officers acting on an objectively reasonable good faith reliance on a search warrant, even if the affidavit on which the warrant was based was insufficient to establish probable cause.[25] However, an officer may not invoke the good faith exception if the affidavit upon which the warrant is founded is “so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable” and is thus a “bare bones” affidavit.[26] A bare bones affidavit is one that contains wholly conclusional statements about an affiant's knowledge and beliefs.[27]

         While the Fifth Circuit has not reviewed a case under these specific circumstances, other circuits have determined that similar information contained in a warrant application was sufficient to establish probable cause. In U.S. v. Beatty, [28] the Third Circuit upheld a district court decision denying a motion to suppress based on allegations of insufficient probable cause. The court held that the graphic nature of the titles of the files found on the Defendant's computer, combined with information that the SHA-1[29] values of the files were identical to SHA-1 values known to authorities to be child pornography, was enough to establish probable cause. In U.S. v. Stults, [30] the Eighth Circuit confirmed that an application for search warrant was supported by probable cause. In Stults, the application contained information of an investigation using P2P file sharing, an agent then identified a defendant's computer IP address as sharing files of child pornography, downloaded, reviewed, and identified those files as child pornography.[31]

         The Fifth Circuit has reviewed a case wherein a search warrant identified that child pornography had been sent from a particular IP address was found to be supported by probable cause. In U.S. v. Perez, [32] an affidavit presented to the magistrate judge contained information that child pornography was sent by an e-mail from IP address[33] After subpoenaing Time Warner Cable, FBI agents found the IP address was assigned to the defendant's residence.[34] The FBI agent also stated in the warrant that, in his experience, persons interested in child pornography typically retain numerous images of child pornography.[35] The court determined, based on this information, there was probable cause to believe that violations of child pornography laws would be found in the residence associated with the IP address.[36]

Here, Sherlock challenges the sufficiency of the affidavit and asserts that no reasonable officer could have believed the warrant was valid. In other words, Defendant argues that the search warrant was based on a “bare bones” affidavit such that the good faith exception cannot apply. In support of his argument, Defendant contends that the warrant application was merely a “form document” that only contained information that a computer associated with a particular IP address had file names strongly suggestive or indicative of child pornography rather than proof of actual child pornography. Defendant also argues that, according to the search warrant itself, after the computer search occurs, an investigator must review files and identify a pattern of activity that links a single IP address to specific files of child pornography. Essentially, Sherlock argues that the affidavit should have contained more than just the single computer search which returned what the Defendant contends was only three arguably questionable file names.

         The facts presented in the current affidavit fall short of those presented in Beatty, Stults, and Perez. In each of those cases, law enforcement was able to present more detailed information for the magistrate to make an assessment as to probable cause, i.e. specific graphic nature of the identified file descriptions, actual download of the identified files, or testimony of actual receipt of child pornography. Additionally, as noted by the Defendant, the search warrant application states:

Later, after the automated software system has run, an investigator can review the information obtained from one or more reports and identify a pattern of activity that links a single IP address (i.e. a specific offender) to specific files of child pornography with a high degree of accuracy. These automated systems have been tested by your affiant and proven reliable. These systems conducted search in similar manner as a law enforcement officer would but with much greater speed.[37]

         The Court views this language as a guide for law enforcement as to best practices when conducting P2P searches, which was not followed in this case. But even if viewed as a protocol on best practices for investigation of suspected child pornography offenses, the language of the application clearly uses the permissive “can” instead of a mandatory “shall.” The present application failed to contain any information of a pattern of activity for the particular IP address or any information as to the particular file(s) found on the Defendant's computer that matched the SHA values of known child pornography. However, the officers' failure to follow the protocol does not negate the probable cause found by the Judge who issued the warrant.

         In light of all the facts presented in the matter, the Court finds that the present affidavit contained sufficient information such that it was objectively reasonable for law enforcement officers to rely on the search warrant in good faith. The Fifth Circuit has stated, “An affidavit supporting a search warrant for child pornography does not need to show specific, individualized evidence of possession of child pornography.”[38] Rather, a court considering whether probable cause exists “must make a practical, common-sense decision as to whether, given all the circumstances set forth in the affidavit ... there is a fair probability that contraband or evidence of a crime will be found in a particular place.”[39]The Defendant's argument overlooks a critical fact contained in the warrant application: the comparison and match of the SHA value of at least one of the files found on Defendant's ...

Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.