USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 1 of 19
[PUBLISH]
IN THE UNITED STATES COURT OF APPEALS
FOR THE ELEVENTH CIRCUIT
________________________
No. 17-15611
________________________
D.C. Docket No. 2:17-cr-14047-DMM-1
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
versus
SCOTT JOSEPH TRADER,
Defendant-Appellant.
________________________
Appeals from the United States District Court
for the Southern District of Florida
________________________
(November 25, 2020)
Before WILLIAM PRYOR, Chief Judge, HULL and MARCUS, Circuit Judges.
WILLIAM PRYOR, Chief Judge:
This appeal requires us to decide whether the government needed a warrant
to obtain a criminal suspect’s email address and internet protocol addresses from a
third party’s business records. It also requires us to decide whether probable cause
supported a warrant to search the defendant’s house and whether a sentence of life
imprisonment was an unreasonable punishment for his crimes involving child
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 2 of 19
pornography. We conclude that the government did not need a warrant for the third
party’s business records, probable cause supported the warrant to search the
defendant’s house, and the sentence was reasonable. We affirm.
I. BACKGROUND
For years, Scott Trader recorded videos of himself sexually abusing his
daughters and distributed the videos on the internet. The abuse occurred while one
daughter was a preteen and the other was a toddler. When abusing his own children
was not enough, Trader used messaging apps to send child pornography to other
young girls and to solicit nude photos and videos from them. He exchanged child
pornography with more than forty minors and engaged in sexually explicit
conversations with more than a hundred apparent minors. And he took other
opportunities when they presented themselves, like recording a video of himself
exposing his daughter’s young friend during a sleepover.
Trader came to the attention of the Department of Homeland Security on
May 30, 2017, when a parent in North Carolina discovered that someone had sent
his nine-year-old daughter child pornography and solicited nude photos from her.
The conversation occurred on an app called SayHi, and the perpetrator’s username
was “Scott.” The parent reported the conversation to his local police department,
which referred the report to Homeland Security.
2
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 3 of 19
Homeland Security agents examined the nine-year-old’s device and learned
that “Scott” sent her a sexually explicit video that he said depicted himself and his
daughter. He also sent a photo of his face. The agents observed that Scott’s profile
on SayHi disclosed his username on another messaging app, Kik. The associated
Kik profile photo matched the photos of “Scott” on SayHi.
The investigation unfolded quickly. Because SayHi was based abroad but
Kik was domestic, agents thought Kik would be more responsive to requests for
information about the user. The agents sent Kik an emergency disclosure request
seeking information about the user. Kik provided the user’s email address and
recently used internet protocol addresses. The email address associated with the
account was “strader0227@yahoo.com.” And the user had repeatedly logged into
Kik from a cell phone using a particular internet protocol address over the last
month.
Homeland Security next traced the internet protocol address to the internet
service provider, Comcast. Agents sent Comcast an emergency disclosure request
for the subscriber records associated with the repeated internet protocol address.
Comcast obliged. The account was registered to Shelly Trader and located at an
address on Edinburgh Drive in Port St. Lucie, Florida.
State records revealed that a person named Scott Trader had a driver’s
license associated with the mailing address, and his driver’s license photo matched
3
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 4 of 19
the photos from SayHi and Kik. A criminal records check revealed that Trader had
been charged in December 2016 with molesting a victim younger than 12. And
property records revealed that Shelly Trader-Bonanno and Leon Bonanno owned
the Edinburgh Drive house, and Trader-Bonanno’s age was consistent with her
being Trader’s mother.
Homeland Security used that information to apply for a warrant to search the
Edinburgh Drive house. The warrant affidavit recited the steps of the investigation.
It explained that “there were logons to the [Kik] account from” the internet
protocol address associated with Trader’s residence “starting 1 May 2017, through
31 May 2017, at 06:36 UTC.” The warrant affidavit also explained that child
pornography distributors and collectors “almost always possess and maintain their
material . . . in the privacy and security of their homes” and that traces of child
pornography could likely be found through forensic examination of devices that
had been used to access child pornography.
A federal magistrate judge issued the warrant shortly before midnight on
May 31. Law enforcement executed the warrant that same night. They found a
stash of electronic devices hidden behind a loose board under a storage cabinet in
Trader’s bedroom. Forensic examination of the devices revealed years’ worth of
videos of Trader sexually abusing his daughters, along with thousands of images
and videos of child pornography Trader had downloaded from the internet, plus
4
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 5 of 19
archived messages in which Trader shared child pornography with others and
solicited nude images and videos from young girls. The devices also contained
conversations in which Trader described in graphic detail his abuse of his
daughters and his plans to escalate that abuse in the future. He also encouraged two
women to ignore their feelings of guilt, participate in abusing his daughters, and
abuse their own daughters.
Officers arrested Trader. A grand jury indicted him for enticing a minor to
engage in sexual activity, enticing a minor to produce a sexually explicit video, and
possessing and distributing child pornography.
18 U.S.C. §§ 2251(a), (e);
2252(a)(2), (a)(4)(B), (b)(1)–(2); 2256(2); 2422(b). Trader moved to suppress the
evidence from Kik and from the search of the Edinburgh Drive house. The district
court denied the motion. Trader pleaded guilty to all the charges on the condition
that he retained the right to appeal the denial of the motion to suppress and could
withdraw his guilty plea if he succeeded on appeal.
The presentence report detailed that Trader had been caught engaging in
similar behavior before. He was charged in 2012 with promoting a sexual
performance by a child, possessing child pornography, and lewd behavior after a
police officer discovered a stash of child pornography on Trader’s laptop
computer. But the more serious charges were dismissed, and Trader eventually
pleaded no contest to felony child neglect. In December 2016, he was charged with
5
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 6 of 19
molesting a victim younger than 12. That charge arose out of a September 2016
report by Trader’s older daughter that Trader was molesting her. But Trader
managed to keep custody of his daughters, and he continued to abuse them and
collect child pornography while he was on bond awaiting prosecution for that
crime.
At the sentencing hearing, the government played several pornographic
videos of his daughters that Trader created. The government also played child
pornography videos Trader had downloaded that involved sadomasochistic
conduct, abuse of toddlers, and bestiality. The prosecutor summed up the rest of
Trader’s library of child pornography as containing “the most disturbing things that
the [case] agent and I have ever seen.” And the government played a recorded jail
call during which Trader promised to kill the mother of one of his daughters if
released. Last, the government presented the testimony of the mothers of Trader’s
daughters. Both women described the effects of Trader’s abuse on the girls, and
both asked the judge to impose a life sentence.
For his part, Trader presented the testimony of a forensic psychologist who
explained that Trader was a pedophile who would always want to abuse children,
but that he would have a low risk of abusing children if he received therapy in
prison and was not released until age 60. The psychologist admitted that he was not
aware that Trader continued molesting his daughters and downloading child
6
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 7 of 19
pornography while on probation and bond, that he had over 100 victims, or that he
threatened to dox his young victims if they did not continue sending him images.
And he admitted that some of those facts raised the likelihood that Trader would
reoffend. Relying on the psychologist’s testimony, Trader asked for a 28-year
sentence so that he would be released at age 60.
Trader’s base offense level was 32, based on section 2G2.1 of the United
States Sentencing Guidelines. He received two-level enhancements for
distribution, commission of a sexual act or sexual contact, and being a parent of a
minor involved in the offense; four-level enhancements for depicting an infant or
toddler or sadistic or masochistic content and for having victims younger than 12;
and a five-level enhancement for a pattern of behavior. He received a three-level
reduction for acceptance of responsibility, producing an offense level of 48, which
the guidelines treat as the maximum offense level of 43. His criminal history
category was III, so his guideline-sentencing range was life imprisonment.
The district court sentenced Trader to life imprisonment for enticing a minor
to engage in sexual activity, along with concurrent sentences of 240 months each
for possessing and distributing child pornography and 360 months each for two
counts of producing child pornography. The district court explained that it had
“considered the advisory guidelines as well as the statutory factors and the
arguments of Counsel.” It viewed the most important statutory factors as the
7
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 8 of 19
“serious nature of the offense,” “the characteristics of the offender,” and “the need
to protect the public.” The district court expressed “no confidence that [Trader]
will stop” abusing children and obtaining and distributing child pornography
“because he continued it while on bond from a state court proceeding and even
while he was being evaluated by medical professionals[.]” It “t[ook] seriously” but
rejected Trader’s argument that he would not reoffend if he were released at age
60. And it mentioned Trader’s threat to kill his ex-wife. “[F]or all of those
reasons,” the district court sentenced Trader to life imprisonment.
II. STANDARDS OF REVIEW
In an appeal of the denial of a motion to suppress, we review findings of fact
for clear error and view the evidence in the light most favorable to the prevailing
party, and we review the application of the law de novo. United States v. Gibson,
708 F.3d 1256, 1274 (11th Cir. 2013). We give great deference to a determination
of probable cause. United States v. Shabazz,
887 F.3d 1204, 1214 (11th Cir. 2018).
We review the reasonableness of a sentence for abuse of discretion. Gibson,
708 F.3d at 1275. The party challenging the sentence bears the burden of proving
that the sentence was unreasonable, and it succeeds if it shows that the district
court failed to consider relevant factors that were due significant weight, gave
significant weight to an improper or irrelevant factor, or made a clear error of
judgment in balancing the applicable factors.
18 U.S.C. § 3553(a); United States v.
8
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 9 of 19
Kuhlman,
711 F.3d 1321, 1326–27 (11th Cir. 2013); United States v. Tome,
611
F.3d 1371, 1378 (11th Cir. 2010).
III. DISCUSSION
Trader appeals the denial of his motion to suppress the information from Kik
and from the search of the Edinburgh Drive house, and he challenges his sentence
as unreasonable. We address each issue in turn.
A. Carpenter Did Not Create a Reasonable Expectation of Privacy in Email
Addresses or Internet Protocol Addresses.
The Fourth Amendment provides that the “right of the people to be secure in
their persons, houses, papers, and effects, against unreasonable searches and
seizures, shall not be violated, and no Warrants shall issue, but upon probable
cause . . . .” U.S. Const. amend. IV. A search occurs for the purposes of the Fourth
Amendment “when the government violates a subjective expectation of privacy
that society recognizes as reasonable.” Kyllo v. United States,
533 U.S. 27, 33
(2001). Ordinarily, a person lacks a reasonable expectation of privacy in
information he has voluntarily disclosed to a third party. Smith v. Maryland,
442
U.S. 735, 743–44 (1979); United States v. Miller,
425 U.S. 435, 443 (1976). This
principle is called the third-party doctrine.
While Trader’s appeal was pending, the Supreme Court held that the third-
party doctrine does not apply to retrospective collection of cell-site location
information for periods of at least seven days. Carpenter v. United States, 138 S.
9
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 10 of 19
Ct. 2206, 2217 & n.3 (2018). Cell-site location information is the record created
every time a cell phone transmits or receives data through a cell tower. Id. at 2211.
The accuracy of the data “is rapidly approaching GPS-level precision.” Id. at 2219.
Many cell sites can “pinpoint a phone’s location within 50 meters.” Id. And cell
phone users do not share their cell-site location information voluntarily: Carrying a
cell phone is “indispensable to participation in modern society,” cell phones
generate cell-site location information “without any affirmative act on the part of
the user,” and users have no way to stop data collection other than making the
phone useless by disconnecting it from the network. Id. at 2220.
Absent Carpenter, the third-party doctrine would undoubtedly apply to the
information the government received from Kik. Trader affirmatively and
voluntarily acted to download Kik onto his phone and to create an account on the
app. He conveyed his internet protocol address and email address to a third party
when he logged into Kik. And he did so voluntarily, affirmatively acting to open
the app and log in, and without taking available steps to avoid disclosing his
internet protocol address. See United States v. Taylor,
935 F.3d 1279, 1282, 1284
n.4 (11th Cir. 2019) (recognizing a reasonable expectation of privacy in internet
protocol addresses of individuals who used software to avoid disclosing their
internet protocol addresses). So the government violated the Fourth Amendment
only if Carpenter’s exception to the third-party doctrine applies.
10
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 11 of 19
The third-party doctrine controls here because Carpenter’s “narrow”
exception, Carpenter, 138 S. Ct. at 2220, applies only to some cell-site location
information, not to ordinary business records like email addresses and internet
protocol addresses. In Carpenter, the Court said, “we hold that an individual
maintains a legitimate expectation of privacy in the record of his physical
movements as captured through CSLI [cell-site location information].” Id. at 2217;
see also United States v. Gayden,
977 F.3d 1146, 1151 (11th Cir. 2020) (“[T]he
Supreme Court in Carpenter declined to extend the third-party doctrine to cell-site
location information . . . .”); United States v. Green,
969 F.3d 1194, 1206 (11th
Cir. 2020) (“The Supreme Court recently held in Carpenter . . . that the acquisition
of historical cell-site records is a search under the Fourth Amendment, so the
government must obtain a warrant to access such records.”). Carpenter did not
decide even whether cell-site location information always falls outside the third-
party doctrine’s reach. It left open the possibility that the government could obtain
less than seven days’ worth of cell-site location information without a warrant.
Carpenter, 138 S. Ct. at 2217 n.3. It likewise left open the possibility that the
government could collect cell-site location information in real time or through
“tower dumps” not focused on a single suspect. Id. at 2220. And the Court made
clear that it did not address “other business records that might incidentally reveal
location information.” Id. The Court “d[id] not express a view on matters not
11
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 12 of 19
before [it],” lest it “embarrass the future.” Id. (internal quotation marks omitted).
Indisputably, email addresses and internet protocol addresses were not at issue in
Carpenter. The third-party doctrine applies, so the government did not need a
warrant to obtain Trader’s email address or internet protocol addresses from Kik.
Our sister circuits agree. Before Carpenter, every circuit to consider this
issue decided that subscriber information disclosed during ordinary use of the
internet, including internet protocol addresses and email addresses, falls within the
third-party doctrine. United States v. Perrine,
518 F.3d 1196, 1204–05 (10th Cir.
2008) (collecting decisions); see also United States v. Christie,
624 F.3d 558, 573–
74 (3d Cir. 2010); United States v. Bynum,
604 F.3d 161, 164 (4th Cir. 2010);
United States v. Weast,
811 F.3d 743, 747–48 (5th Cir. 2016); United States v.
Caira,
833 F.3d 803, 806–09 (7th Cir. 2016); United States v. Wheelock,
772 F.3d
825, 828–29 (8th Cir. 2014). And every circuit to consider the question after
Carpenter has reached the same conclusion. United States v. Morel,
922 F.3d 1, 9
(1st Cir. 2019); United States v. Contreras,
905 F.3d 853, 857 (5th Cir. 2018); see
also United States v. Wellbeloved-Stone, 777 F. App’x 605, 607 (4th Cir. 2019);
United States v. VanDyck, 776 F. App’x 495, 496 (9th Cir. 2019).
Despite the Court’s clear language limiting the reach of its decision, Trader
argues that Carpenter applies because his email address and internet protocol
addresses constitute “cell phone location records.” Carpenter, 138 S. Ct. at 2217.
12
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 13 of 19
But that argument not only misunderstands Carpenter’s holding; it also fails on its
own terms because email addresses and internet protocol addresses are neither
location records nor cell phone records.
Neither kind of information directly records an individual’s location. An
internet protocol address is a string of characters associated in an internet
provider’s business records with a particular device connecting to the internet
through a particular network. See United States v. Hood,
920 F.3d 87, 92 (1st Cir.
2019). Internet protocol addresses can be translated into location information only
indirectly, by examining the internet company’s business records to determine the
physical address where the network is registered.
Id. This kind of “business
record[] that might incidentally reveal location information” falls outside
Carpenter’s narrow exception to the third-party doctrine. Carpenter, 138 S. Ct. at
2220. As for email addresses, Trader does not even attempt to explain how they
could be considered location records.
Neither kind of information is more than incidentally associated with cell
phones. Many kinds of devices access wireless internet networks: computers,
tablets, gaming consoles, household appliances, and more. See Mozilla Corp. v.
FCC,
940 F.3d 1, 39 (D.C. Cir. 2019). And each of those devices has an internet
protocol address.
Id. We cannot conclude that internet protocol addresses are cell
phone records when they are a feature of every electronic device that connects to
13
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 14 of 19
the internet. Some individuals may use cell phones to send and receive emails, but
it strains credulity to say that use transforms email addresses into cell phone
records. Even Trader does not claim that much.
Trader bases some of his arguments on information outside the record about
the request for subscriber information Homeland Security sent Kik and the
response from Kik. We do not consider that information because it is outside the
record. Fed. R. App. P. 10. And we do not consider the arguments Trader raises for
the first time in his reply brief based on United States v. Jones,
565 U.S. 400
(2012); United States v. Karo,
468 U.S. 705 (1984); and Kyllo v. United States,
533 U.S. 27 (2001). See Jones v. Sec’y, Dep’t of Corrs.,
607 F.3d 1346, 1353–54
(11th Cir. 2010).
B. Probable Cause Supported the Warrant to Search Trader’s House.
The Fourth Amendment required the government to have probable cause for
the warrant to search Trader’s home. U.S. Const. amend. IV. Probable cause exists
if, “given all the circumstances set forth in the affidavit . . . , there is a fair
probability that contraband or evidence of a crime will be found in a particular
place.” Illinois v. Gates,
462 U.S. 213, 238 (1983). To establish probable cause to
search a home, a warrant affidavit must “establish a connection between the
defendant and the residence to be searched and a link between the residence and
14
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 15 of 19
any criminal activity.” United States v. Martin,
297 F.3d 1308, 1314 (11th Cir.
2002).
The warrant application provided more than enough evidence to establish a
fair probability that the Edinburgh Drive house contained evidence that a crime
had been committed. Recall the investigation: A SayHi user with the username
“Scott” distributed child pornography and solicited its creation on the evening of
May 30. That user’s profile linked to a profile on Kik. The Kik and SayHi profile
photos and a photo “Scott” sent on SayHi matched each other. The Kik user’s
email address was “strader0227@yahoo.com.” The Kik user logged into Kik from
a particular internet protocol address either on the day of the crime—May 30—or
within a few hours afterwards, early on the morning of May 31. That internet
protocol address was registered to Shelly Trader at the Edinburgh Drive house.
Scott Trader’s driver’s license photo matched the Kik and SayHi photos, and he
listed the Edinburgh Drive house as his mailing address. Child pornographers
typically keep stashes of child pornography in their houses. And traces of child
pornography typically remain present on electronic devices long after files are
downloaded or sent. That evidence is more than enough to establish probable
cause.
Trader argues that probable cause did not support the warrant because the
affidavit established a connection only between a Kik user and the Edinburgh
15
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 16 of 19
Drive house, not between the SayHi user and the Edinburgh Drive house. He
argues that the warrant depended “simply on a hunch that Mr. Trader was the user
of both applications.” We disagree.
Trader would have us separately consider each fact and ignore the
interrelationship of the evidence supporting the warrant. Probable cause does not
work that way. Together, the matching images from SayHi, Kik, and Trader’s
driver’s license, and the SayHi account’s reference to the Kik account, established
more than a fair probability that the user of both SayHi and Kik was Scott Trader.
Trader also argues that the district court misread the warrant affidavit as
stating that Trader accessed Kik from the internet protocol address associated with
the Edinburgh Drive house on the same day he sexted with the nine-year-old
victim, May 30. But we need not delve into that issue. Even if Trader were correct,
that minor mistake would not affect our conclusion that ample probable cause
supported the warrant.
Trader last argues that the warrant affidavit failed to establish a connection
between Trader and the Edinburgh Drive residence. But again we disagree. The
affidavit established that Trader listed the Edinburgh Drive house as his mailing
address, that he had access to its internet network, that the house’s owner shared
his last name and was about the age his mother would be, and that he connected to
the internet network within a few hours of exchanging child pornography with a
16
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 17 of 19
nine-year-old girl. That evidence establishes more than a fair probability that
Trader had a connection to the house, especially under the deferential standard of
review that applies to a probable-cause determination. Gibson, 708 F.3d at 1274;
Shabazz, 887 F.3d at 1214. And because probable cause existed, we need not
address the alternative argument that the good-faith exception applies. See United
States v. Leon,
468 U.S. 897, 922 (1984).
C. Trader’s Life Sentence Is Reasonable.
Finally, Trader argues that his sentence of life imprisonment is substantively
unreasonable. He says the district court gave undue weight to the guidelines and
too little weight to his redeeming personal qualities. We disagree.
The district court imposed a reasonable sentence. After it acknowledged the
advisory nature of the guidelines, the district court explained the statutory factors it
found most important: the nature of the offense, the characteristics of the offender,
and the need to protect the public.
18 U.S.C. § 3553(a)(1), (a)(2)(C). The parties’
evidence and arguments throughout the sentencing hearing focused on precisely
those issues, especially the risk of recidivism. The evidence established that Trader
had over 100 victims; repeatedly sexually abused his daughters, recorded the
incidents, shared them on the internet, and planned to continue and escalate his
abuse in the future; continued this behavior despite an earlier conviction for it, a
pending prosecution for it, and court supervision for it; encouraged others to abuse
17
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 18 of 19
their own daughters; and possessed a cache of the most disturbing child
pornography the prosecutor and case agent had ever seen. On this record, the
district court did not abuse its discretion by imposing a within-guidelines sentence
of life.
Trader unpersuasively argues that his sentence is too harsh in the light of his
age, family ties, lack of serious criminal history, contributions to the community,
and cooperation with authorities. It is unclear what his age—32, at the time of
sentencing—and his unspecified contributions to the community should change
about the sentencing decision. And Trader’s criminal history cuts against him
because a short prison sentence had already failed to deter him from his behavior.
To be sure, Trader’s family ties and cooperation with authorities are mitigating
factors: he lived with his mother, father, stepfather, and autistic brother, and his
mother reported that they had a positive relationship. And Trader pleaded guilty
promptly after his motion to suppress was denied. But the district court considered
those mitigating factors and concluded that, on balance, Trader still deserved a life
sentence. That conclusion was no abuse of discretion.
Trader next argues that the district court should not have relied on the child
pornography sentencing guidelines because they are excessively punitive, but his
arguments miss the mark. For example, he criticizes section 2G2.2 of the
guidelines, which applies to child pornography distribution offenses, even though
18
USCA11 Case: 17-15611 Date Filed: 11/25/2020 Page: 19 of 19
his sentence was based on section 2G2.1, which applies to child pornography
production offenses. And he argues that the child pornography guidelines are
excessive compared to other guidelines because his offense level, inclusive of
enhancements, is higher than the base offense level, without enhancements, for
first-degree murder. But that apples-to-oranges comparison makes no sense. The
district court did not impose an unreasonable sentence by considering the advisory
guidelines in determining Trader’s sentence.
IV. CONCLUSION
We AFFIRM Trader’s conviction and sentence.
19