Chism v. Washington State , 661 F.3d 380 ( 2011 )


Menu:
  •                   FOR PUBLICATION
    UNITED STATES COURT OF APPEALS
    FOR THE NINTH CIRCUIT
    TODD M. CHISM, individually and         
    as husband and wife; NICOLE C.
    CHISM, individually and as wife
    and husband,
    No. 10-35085
    Plaintiffs-Appellants,
    v.                             D.C. No.
    2:09-cv-00025-LRS
    WASHINGTON STATE; WASHINGTON
    OPINION
    STATE PATROL; RACHEL GARDNER,
    individually; JOHN SAGER,
    individually,
    Defendants-Appellees.
    
    Appeal from the United States District Court
    for the Eastern District of Washington
    Lonny R. Suko, Chief District Judge, Presiding
    Argued and Submitted
    February 11, 2011—Seattle, Washington
    Filed August 25, 2011
    Before: Betty B. Fletcher, Richard A. Paez, and
    Sandra S. Ikuta, Circuit Judges.
    Opinion by Judge Paez;
    Dissent by Judge Ikuta
    16307
    16312           CHISM v. WASHINGTON STATE
    COUNSEL
    Robert A. Dunn and Susan C. Nelson, Dunn & Black, P.S.,
    Spokane, Washington, for plaintiff-appellants Todd M. Chism
    and Nicole C. Chism.
    CHISM v. WASHINGTON STATE                      16313
    Robert M. McKenna, Attorney General, and Catherine Hen-
    dricks, Senior Counsel, Seattle, Washington, for defendants-
    appellees Rachel E. Gardner and John Sager.
    OPINION
    PAEZ, Circuit Judge:
    This civil rights action under 
    42 U.S.C. § 1983
     arises from
    an internet child pornography investigation by Washington
    State Police (WSP) Officers Rachel Gardner and John Sager
    (“the officers”). As a result of information the officers
    acquired, Todd Chism became the focus of their investigation.
    Gardner prepared an affidavit in support of a search warrant
    application, which Sager reviewed. On the basis of that affi-
    davit, a magistrate judge issued a broad search warrant to
    search Todd Chism’s home and business office. Relying on
    the same information contained in Gardner’s affidavit, Deputy
    Prosecuting Attorney Christian Peters obtained from the same
    magistrate judge a warrant to arrest Todd for violating Wash-
    ington’s child pornography laws.1 A few days later, several
    WSP officers executed the search and arrest warrants.2 A
    WSP detective eventually conducted forensic examinations of
    the Chisms’ home computer and computers from the Spokane
    Fire Department, where Todd Chism worked as a firefighter.
    The investigation did not reveal any evidence of child pornog-
    raphy, and charges were never filed against Todd Chism.
    1
    Specifically, the arrest warrant stated that probable cause existed to
    support the arrest and detention of Todd for violations of Revised Code
    of Washington §§ 9.68A.060 and 9.68A.070. Section 9.68A.060 prohibits
    “sending or bringing into the state depictions of a minor engaged in sexu-
    ally explicit conduct.” Section 9.68A.070 prohibits “possessi[ng] depic-
    tions of a minor engaged in sexually explicit conduct.”
    2
    The police report detailing the investigation seems to indicate that
    Sager was present for the search. It is unclear from the police report
    whether Gardner was present.
    16314                CHISM v. WASHINGTON STATE
    Several months later, Todd and his wife, Nicole Chism,
    filed this § 1983 action against the State of Washington, the
    WSP, Detective Gardner, and Sergeant Sager, alleging—
    among other things not relevant to this appeal—that the offi-
    cers violated their Fourth and Fourteenth Amendment rights
    by securing the search and arrest warrants with an affidavit
    that deliberately or recklessly contained material omissions
    and false statements.3 The Chisms and the officers filed cross
    motions for summary judgment on the issue of qualified
    immunity as to the constitutional claim. The district court
    granted the officers’ motion, concluding that the officers’
    conduct did not violate a clearly established constitutional
    right of which a reasonable officer would have known. The
    Chisms timely appealed.
    We reverse the district court’s judgment and remand this
    case for trial. Viewing the evidence in the light most favor-
    able to the Chisms, we conclude that the Chisms have made
    a substantial showing of the officers’ deliberate falsehood or
    reckless disregard for the truth and have established that, but
    for the dishonesty, the searches and arrest would not have
    occurred. We also conclude that the officers are not entitled
    to qualified immunity because the Chisms’ right to not be
    searched and arrested as a result of judicial deception was
    clearly established at the time Gardner prepared and submit-
    ted her affidavit.
    I.   BACKGROUND
    On July 3, 2007, Washington’s Missing and                    Exploited
    Children Task Force (MECTF) received a tip                     from the
    National Center for Missing and Exploited                       Children
    (NCMEC). The tip advised MECTF that roughly                    one week
    3
    In addition to their constitutional claim, the Chisms’ First Amended
    Complaint alleges nine other causes of action, most of which are tort
    claims relating to events that occurred after the search and arrest warrants
    were executed.
    CHISM v. WASHINGTON STATE                     16315
    earlier, the web-hosting company Yahoo! had archived
    images of child pornography that were contained on the web-
    site http://foelonipwin-cmezixecvom.us/ (the “foel website”).
    The tip listed Yahoo! user account qek9pj8z9ec@yahoo.com
    (the “first user account”) as the “suspect.” The tip stated that
    Internet Protocol (IP) address 68.113.11.494 was used to open
    the first user account on May 11, 2007. The tip did not pro-
    vide the time or date that the child pornographic images were
    uploaded to the foel website, nor did it provide the IP address
    from which the child pornographic images were uploaded.
    Detective Gardner was assigned to investigate this tip.
    On July 17, 2007, MECTF received another tip from
    NCMEC. Similar to the first tip, the July 17 tip indicated that
    two weeks earlier, Yahoo! archived images of child pornogra-
    phy      that   were     contained      on     the     website
    http://qemtudawyownufiseip.com (the “qem website”). The tip
    listed Yahoo! user account qaagwcyI9ab@yahoo.com (the
    “second user account”) as the “suspect.” The tip stated that IP
    address 67.160.71.115 was used to open the second user
    account on June 19, 2007. The tip did not provide the time or
    date that the child pornographic images were uploaded, nor
    did it provide the IP address from which the child porno-
    graphic images were uploaded. WSP Detective Vic Mauro
    was assigned to investigate this tip.
    The detectives began their investigations by obtaining war-
    rants to search Yahoo! records associated with the first and
    second user accounts.5 In agreement with the first NCMEC
    tip, the Yahoo! records indicated that the foel website was
    4
    As we have explained, “[e]very computer or server connected to the
    Internet has a unique IP address.” United States v. Forrester, 
    512 F.3d 500
    , 510 n.5 (9th Cir. 2008).
    5
    The record indicates that Gardner and Mauro independently obtained
    warrants to search Yahoo! records associated with the NCMEC tips
    because at that point in the investigation the detectives had no reason to
    believe the tips were connected.
    16316                CHISM v. WASHINGTON STATE
    created on May 11, 2007. The information for the first user
    account listed the name “Mr. Nicole Chism” with birthday
    May 20, 1966. The information indicated that “Mr. Nicole
    Chism” lived in Chile and used zip code “ucc16.” The Yahoo!
    records also showed that the first user logged in to the account
    on June 18, 2007 from IP address 69.147.83.181, a different
    IP address than the one used to create the foel website. The
    billing information associated with the first user account listed
    Nicole Chism’s name and contained the Chisms’ correct resi-
    dential address, phone number, and credit card number, which
    ended in 6907. Finally, the Yahoo! records showed that two
    months of “domain service” for the foel website had been
    paid with the Chisms’ credit card.6 The Chisms’ credit card
    statements confirm that they were twice charged a monthly
    fee for domain service for the foel website.
    The information that Yahoo! provided about the second
    user account was similar in character. In agreement with the
    second NCMEC tip, the Yahoo! records indicated that the
    qem website was created on June 19, 2007. The information
    for the second user account listed the name “Mr. Nicole
    Chism” with a birthday of March 11, 1977; indicated that
    “Mr. Nicole Chism” was from Bolivia; and used zip code
    “nf897.” The Yahoo! records also showed that the second
    user logged in twice since opening the account. On July 3,
    2007, the second user logged in twice: once from IP address
    69.147.83.181 (the IP address from which the first user
    logged in on June 18, 2007), and once from a different IP
    address. Yahoo! did not provide any billing information for
    the second user account, but the Chisms’ credit card state-
    ments showed that Yahoo! charged them one hosting fee for
    the qem website on June 22, 2007.
    6
    The “domain service” fee is a fee that Yahoo! charges to host, or, pro-
    vide server space and internet connection, for an individual website. We
    use the terms “domain service fee” and “hosting fee” interchangeably
    throughout.
    CHISM v. WASHINGTON STATE                     16317
    Detectives Gardner and Mauro also independently obtained
    warrants to trace the IP addresses used to create the two user
    accounts and websites. Detective Gardner learned that the IP
    address used to open the first user account and to create the
    foel website was traced to Cheryl Corn of Walla Walla,
    Washington. The IP address used to open the second user
    account and to create the qem website was traced to Vitina
    Pleasant of Federal Way, Washington. It appears that neither
    Gardner nor Mauro traced IP address 69.147.83.181—the IP
    address from which the first user logged in on June 18, 2007
    and the second user logged in on July 3, 2007.
    A few months later, Mauro’s assignment was transferred to
    WSP Detective Shelby Wilcox. After reviewing the informa-
    tion from Yahoo!, Gardner and Wilcox noticed that both user
    accounts used the name “Mr. Nicole Chism” and both web-
    sites had at some point been accessed from the IP address
    69.147.83.181. Gardner and Wilcox concluded that the tips
    might be connected, and Gardner took over the investigation
    of both tips. Gardner decided to investigate the Chism lead,
    largely because Nicole’s name was common to both tips.
    Gardner first determined that the Chisms’ 6907 card was a
    Bank of America Visa credit card. Gardner contacted Bank of
    America in September 2007 and learned from a Bank of
    America employee that the Chisms had reported a lost credit
    card in 2006. The 6907 card was a replacement for the lost
    card. The Bank of America employee, however, informed
    Gardner that no fraudulent activity had been reported on the
    6907 card.7 Gardner eventually obtained credit card state-
    ments for the 6907 card and confirmed that the Chisms had
    7
    This information was, in fact, false. The Chisms reported fraudulent
    activity on their 6907 card in August 2007, roughly one month after Gard-
    ner received the NCMEC tips and roughly one month before Gardner
    spoke to Bank of America. Because the officers were not aware of this
    reported fraud at the time Gardner drafted her affidavit, we place no sig-
    nificance on the omission of this relevant information from the affidavit.
    16318             CHISM v. WASHINGTON STATE
    paid two charges for the foel website and one charge for the
    qem website. On the basis of this information, Gardner con-
    cluded that there was probable cause to believe that Todd
    Chism had committed a crime.
    In January 2008, Gardner submitted a search warrant appli-
    cation and affidavit to a magistrate judge and obtained a war-
    rant to search the Chisms’ home in Nine Mile Falls,
    Washington, and Todd Chism’s workplace in Spokane, Wash-
    ington. Sager reviewed the affidavit and agreed that probable
    cause existed. On the same day, Deputy Prosecuting Attorney
    Christian Peters obtained a warrant to arrest Todd for
    “[s]ending, bringing into the state depictions of minor
    engaged in sexually explicit conduct and [p]ossession of
    depictions of [m]inor engaged in sexually explicit conduct.”
    The warrants were executed five days later. WSP officers
    arrested, detained, and interrogated Todd; they scoured the
    Chisms’ home; and they seized the Chisms’ computers. No
    child pornography was found, and criminal charges were
    never filed against Todd.
    The Chisms sued the State of Washington, the WSP, Detec-
    tive Gardner, and Sergeant Sager under 
    42 U.S.C. § 1983
    ,
    alleging violations of their constitutional rights. Both the
    Chisms and the officers moved for summary judgment on the
    issue of qualified immunity, and the district court granted the
    officers’ motion and denied the Chisms’ motion. The district
    court then declined to exercise supplemental jurisdiction over
    the Chisms’ state law claims, pursuant to 
    28 U.S.C. § 1367
    (c)(3), and dismissed them. The Chisms appeal the dis-
    trict court’s grant of summary judgment.
    II.   ANALYSIS
    [1] We review de novo a grant of summary judgment on
    the ground of qualified immunity, and “must determine, view-
    ing the evidence in the light most favorable to the nonmoving
    party, whether there are any genuine issues of material fact
    CHISM v. WASHINGTON STATE                      16319
    and whether the district court correctly applied the relevant
    substantive law.” Prison Legal News v. Lehman, 
    397 F.3d 692
    , 698 (9th Cir. 2005) The officers are entitled to qualified
    immunity unless: (1) the Chisms have “ma[de] out a violation
    of a constitutional right,” and (2) “the right at issue was
    ‘clearly established’ at the time of [the officers’] alleged mis-
    conduct.” Pearson v. Callahan, 
    555 U.S. 223
    , 232 (2009) (cit-
    ing Saucier v. Katz, 
    533 U.S. 194
    , 201 (2001)); Bull v. City
    and Cnty. of San Francisco, 
    595 F.3d 964
    , 971 (9th Cir. 2010)
    (en banc). We may consider the two prongs of the qualified
    immunity analysis in any order. Pearson, 
    555 U.S. at 236
    . We
    begin with the first prong.
    A.    Constitutional Violation
    [2] The Chisms argue that the officers violated their Fourth
    Amendment rights through judicial deception.8 For the
    Chisms’ judicial deception claim to survive summary judg-
    ment, the Chisms “must 1) make a substantial showing of [the
    officers’] deliberate falsehood or reckless disregard for the
    truth and 2) establish that, but for the dishonesty, the
    [searches and arrest] would not have occurred.” Liston v.
    Cnty. of Riverside, 
    120 F.3d 965
    , 973 (9th Cir. 1997) (citing
    Hervey v. Estes, 
    65 F.3d 784
    , 788-89 (9th Cir. 1995)) (inter-
    nal quotation marks omitted).9
    8
    We disagree with the Dissent’s brief suggestion that the Chisms
    waived the opportunity to argue that Gardner’s affidavit contained false
    statements. The Chisms’ failure to precisely articulate each false statement
    and omission to support their judicial deception claim does not undermine
    our ability to consider all of the false statements and omissions contained
    in Gardner’s affidavit. The Supreme Court has explained that it is claims
    —not arguments—that are waived by failure to present an issue to the
    court below. See Lebron v. Nat’l R.R. Passenger Corp., 
    513 U.S. 374
    (1991); accord United States v. Guzman-Padilla, 
    573 F.3d 865
    , 877 (9th
    Cir. 2009); United States v. Pallares-Galan, 
    359 F.3d 1088
    , 1095 (9th Cir.
    2004).
    9
    A judicial deception claim is different from a garden-variety claim that
    a warrant lacked probable cause on its face. We have explained that a
    16320                 CHISM v. WASHINGTON STATE
    [3] We first observe that Gardner’s affidavit contained sev-
    eral false statements and omissions. The first false statement
    contained in Gardner’s affidavit was her assertion that,
    “[b]ased on the information received from NCMEC about the
    images downloaded by Todd M. Chism, it is likely to believe
    he was using internet service at his residence and/or his busi-
    ness office.” Gardner’s allusion to “images downloaded by
    Todd M. Chism” is inaccurate. When Gardner drafted the
    affidavit, she possessed no information that Todd had ever
    accessed any child pornographic images, let alone the particu-
    lar images that were uploaded to the qem and foel websites.
    Nor did Gardner have any evidence that the images were ever
    downloaded by anyone. As far as Gardner knew, the only evi-
    dence linking Todd to the websites was the fact that the credit
    card he shared with Nicole was used to pay the hosting fees
    for the sites. Thus, Gardner’s assertion that Todd downloaded
    images of child pornography was not a truthful representation
    of the evidence she had gathered.
    [4] The second false statement contained in Gardner’s affi-
    davit was her assertion that the Chisms’ credit card was “used
    to purchase the images of child pornography from the web-
    site.” This statement was false because the Chisms’ credit
    card was not used to buy images of child pornography.
    Rather, the Chisms’ card was used to pay hosting fees for the
    sites to which illegal images were uploaded at some unknown
    time, date, and location. Gardner’s statement that the Chisms’
    plaintiff bringing a judicial deception claim “argues that [an officer] mis-
    led the magistrate judge when applying for the warrant, and had the mag-
    istrate considered all of the facts that the magistrate would not have found
    probable cause.” Smith v. Almada, 
    640 F.3d 931
    , 937 (9th Cir. 2011). A
    judicial deception claim can be contrasted with a garden-variety claim that
    a warrant lacked probable cause on its face, in which “the arresting officer
    enjoys qualified immunity unless the warrant application is so lacking in
    indicia of probable cause as to render official belief in its existing unrea-
    sonable.” 
    Id.
     (quoting Malley v. Briggs, 
    475 U.S. 335
    , 344-45 (1986))
    (internal quotation marks omitted).
    CHISM v. WASHINGTON STATE                 16321
    card purchased child pornographic images was therefore
    patently false.
    [5] Gardner’s affidavit also contained several serious omis-
    sions. First, Gardner omitted her discovery that the IP
    addresses that were used to open the offending Yahoo! user
    accounts and websites were traced to people other than the
    Chisms. Second, Gardner omitted the fact that a third IP
    address—69.147.83.18—was used to log in to both the first
    and second user accounts on June 18, 2007, and that this IP
    address was never traced. Third, Gardner omitted the fact that
    Nicole shared the 6907 credit card account with Todd, even
    though Nicole’s name—not Todd’s—was associated with the
    two user accounts. Fourth, Gardner did not report that the user
    accounts contained nonsensical identifying information.10
    Having determined that Gardner’s affidavit contained false
    statements and omissions, we next consider whether the
    Chisms have made a substantial showing of the officers’
    intentional or reckless disregard for the truth; and, if so,
    whether their false statements and omissions were material to
    the probable cause determinations. Liston, 
    120 F.3d at 973
    .
    1.        Intentional or Reckless Deception
    [6] As a first element of their judicial deception claim, the
    Chisms must demonstrate that the officers acted deliberately
    or with reckless disregard for the truth in preparing the affida-
    vit. 
    Id. at 973
    . Because the Chisms appeal from a grant of
    summary judgment, they need only make a “substantial show-
    ing” of the officers’ deliberate or reckless false statements and
    omissions. 
    Id.
     “Clear proof of deliberat[ion] or reckless[ness]
    is not required” at the summary judgment stage. United States
    10
    As described above, the first user account was registered with the
    name “Mr. Nicole Chism,” the country Chile, and the zip code ucc16. The
    second user account was registered with the name “Mr. Nicole Chism,”
    the country Bolivia, and the zip code nf897.
    16322             CHISM v. WASHINGTON STATE
    v. Stanert, 
    762 F.2d 775
    , 781 (9th Cir.), amended by 
    769 F.2d 1410
     (9th Cir. 1985). If the Chisms make such a substantial
    showing, then “the question of intent or recklessness is a fac-
    tual determination” that must be made by the trier of fact. Lis-
    ton, 
    120 F.3d at 974
     (internal quotation marks omitted).
    Viewing the evidence in the light most favorable to the
    Chisms, we conclude that the Chisms have made a substantial
    showing that the officers’ deception was intentional or reck-
    less. The most commonsense evidence that the officers acted
    with at least a reckless disregard for the truth is that the omis-
    sions and false statements contained in the affidavit were all
    facts that were within Gardner’s personal knowledge. For
    example, Gardner’s false reference to “images downloaded by
    Todd Chism” was a statement that Gardner knew to be false
    when she drafted her affidavit.
    [7] The declaration Gardner filed in the district court simi-
    larly demonstrates that she knew that the IP addresses used to
    register the user accounts and websites were traced to other
    people, and that she knew that the identifying information for
    the Yahoo! accounts was nonsensical. The fact that the affida-
    vit did not report important factual information that was
    within the officers’ knowledge at the time Gardner prepared
    her affidavit would allow a reasonable factfinder to conclude
    that the officers acted with at least a reckless disregard for the
    truth. See Butler v. Elle, 
    281 F.3d 1014
    , 1025-26 (9th Cir.
    2002) (per curiam); Stanert, 762 F.2d at 781; see also Liston,
    
    120 F.3d at 975
     (“Given the importance of the [omitted infor-
    mation] to the probable cause analysis . . . a jury could rea-
    sonably conclude that [the affiant’s] failure to mention [that
    information] in his affidavit amounted to at least reckless dis-
    regard for the truth.”).
    [8] A reasonable factfinder could also find that the officers
    acted recklessly or intentionally because the false statements
    and omissions contained in the affidavit all bolster the case
    for probable cause, which suggests that the mistakes were not
    the product of mere negligence. It is conspicuous that, cumu-
    CHISM v. WASHINGTON STATE               16323
    latively, the omissions purged the affidavit of any reference
    to the possibility that someone other than Todd Chism was
    responsible for the offending websites. Corn and Pleasant
    were the people to whom the offending IP addresses were
    traced, yet this information was omitted from the affidavit.
    Nicole Chism’s credit card information was used to pay the
    hosting fees, yet the fact that Nicole was an authorized user
    of the credit card was omitted from the affidavit. All of the
    information in each Yahoo! profile was nonsensical, yet this
    information was omitted from the affidavit. In short, the net
    effect of Gardner’s omissions was to obscure the prospect that
    someone other than Todd Chism might have registered the
    websites and uploaded images of child pornography. We have
    no difficulty deciding that a reasonable factfinder, viewing the
    evidence in the light most favorable to the Chisms, could con-
    clude that Gardner’s omissions reflected an affiant “reporting
    less than the total story . . . [to] manipulate the inferences a
    magistrate will draw.” Stanert, 762 F.2d at 781. Accordingly,
    we hold that the Chisms made a substantial showing of the
    officers’ reckless or intentional disregard for the truth.
    2.   Materiality of the False Statements and Omissions
    [9] Our inquiry does not end with the Chisms’ substantial
    showing that the affidavit contained reckless or deliberate
    false statements and omissions. To make out their judicial
    deception claim, the Chisms must also establish that the false
    statements and omissions were material to the magistrate
    judge’s probable cause determination. Our inquiry into
    whether the false statements and omissions were material is
    a purely legal question, which we analyze de novo. See But-
    ler, 
    281 F.3d at 1024
    . The false statements and omissions
    contained in Gardner’s affidavit were material if “the affida-
    vit, once corrected and supplemented,” would not have pro-
    vided a magistrate judge with a substantial basis for finding
    probable cause. Stanert, 762 F.2d at 782. We conclude that a
    corrected version of Gardner’s affidavit would not have pro-
    16324              CHISM v. WASHINGTON STATE
    vided the magistrate with a substantial basis for finding prob-
    able cause.
    i.    Materiality as to the Search Warrants
    [10] While there is no “numerically precise degree of cer-
    tainty corresponding to probable cause, . . . it is clear that only
    the probability, and not a prima facie showing, of criminal
    activity is the standard of probable cause.” Illinois v. Gates,
    
    462 U.S. 213
    , 235 (1983) (citing Spinelli v. United States, 
    393 U.S. 410
    , 419 (1969)) (internal quotation marks omitted). The
    Supreme Court has declined to articulate a “neat set of legal
    rules” for evaluating probable cause, id. at 232, and instead
    has instructed magistrate judges to determine probable cause
    by considering the “totality-of-the-circumstances,” id. at 230.
    In issuing a search warrant, the magistrate judge simply must
    determine whether there is a “fair probability” that evidence
    of a crime will be found. Id. at 238, 246.
    [11] Our probable cause analysis is guided by United
    States v. Gourde, 
    440 F.3d 1065
     (9th Cir. 2006) (en banc), a
    recent case involving the search of a criminal defendant’s
    computer for images of child pornography. In Gourde, we
    held that three key pieces of evidence, considered together,
    were sufficient to establish probable cause to believe
    Gourde’s computer contained images of child pornography:
    (1) that the accessed website “was a child pornography site
    whose primary content was in the form of images”; (2) that
    as a subscriber to the website, “Gourde had access and wanted
    access to these illegal images”; and (3) that “[h]aving paid for
    multi-month access to a child pornography site,” and owing
    to the “long memory of computers,” Gourde’s computer was
    likely to contain evidence of a crime. 
    Id. at 1070-71
    . In other
    words, we looked for evidence in the affidavit: (1) that a
    crime was committed; (2) that it was Gourde who committed
    the crime; and (3) that evidence of the crime would be found
    in the place to be searched. In light of this “triad of solid
    facts,” we concluded that “the reasonable inference that
    CHISM v. WASHINGTON STATE                      16325
    Gourde had received or downloaded [child pornographic]
    images easily meets the ‘fair probability’ test.” 
    Id. at 1071
    .
    We use this framework to determine whether Gardner’s affi-
    davit would have supported probable cause if it had presented
    a truthful description of the evidence she collected during her
    investigation of Todd Chism.
    [12] Like the website at issue in Gourde, the parties do not
    dispute that the qem and foel websites here contained images
    of child pornography. Therefore, Gardner’s affidavit meets
    the first prong of the Gourde inquiry: it presents evidence that
    a crime was committed. We also assume without deciding that
    Gardner’s affidavit satisfied the third prong of the Gourde
    framework by presenting evidence that a computer used to
    upload child pornographic images would contain evidence of
    a crime.11 The remaining prong of the Gourde inquiry requires
    us to consider whether a truthful version of Gardner’s affida-
    vit would have provided a “fair probability” that Todd Chism
    committed a crime.
    [13] A truthful version of Gardner’s affidavit would have
    indicated that the sole evidence connecting Todd Chism to
    the child pornographic images was the fact that the credit card
    he shared with Nicole was charged three times for hosting the
    websites that contained child pornographic images. This con-
    nection is a far cry from the facts presented in the affidavit,
    which stated that Todd “downloaded” and “purchase[d]” child
    pornography.12 A supplemented version of Gardner’s affidavit
    11
    Specifically, Gardner’s affidavit stated that “in [her] experiences and
    from [her] conversations with computer forensic examiners, computer evi-
    dence can remain stored on computers for extended periods of time,” and
    can be recovered from a computer even if it is deleted by the user.” The
    affidavit also stated that “[p]ersons involved in sending or receiving child
    pornography tend to retain it for long periods of time.” The Chisms do not
    challenge these assertions.
    12
    The Dissent downplays the significance of the affidavit’s misstate-
    ments. We agree with the Dissent that the affidavit’s use of the word
    16326                CHISM v. WASHINGTON STATE
    also would have informed the magistrate judge that the IP
    addresses used to register the websites were traced to people
    other than the Chisms, and that the Yahoo! user accounts
    associated with the websites contained nonsensical identifying
    information. In considering all of the information available to
    the officers, we do not think it sufficient to establish a fair
    probability that evidence of a crime would be found at the
    Chisms’ home or Todd Chism’s office.
    [14] We find it particularly significant that the IP addresses
    from which the qem and foel websites were created were
    traced to internet subscribers hundreds of miles away from the
    Chisms’ home in Nine Mile Falls, Washington. We have
    explained that a computer that is connected to the internet can
    be uniquely identified by its IP number, much like a land-line
    phone can be uniquely identified by its phone number. See
    Forrester, 
    512 F.3d at
    510 n.5. Moreover, we have repeatedly
    recognized the utility of using IP address information to
    investigate child pornography offenders. See United States v.
    Craighead, 
    539 F.3d 1073
    , 1080-81 (9th Cir. 2008) (holding
    that probable cause existed where the IP address from which
    child pornographic images were shared was traced to the
    defendant); United States v. Hay, 
    231 F.3d 630
    , 634-35 (9th
    Cir. 2000) (holding that an affidavit demonstrated probable
    cause where the agent carefully detailed how the IP address
    associated with the child pornographic images was connected
    to the defendant). Our sister circuits take the same approach.
    “downloaded” instead of “uploaded” is not material because evidence that
    Todd Chism had uploaded images of child pornography—if such evidence
    had existed—would have been just as damaging as evidence that he down-
    loaded child pornography. See Revised Code of Washington
    9.68A.050-9.68A.070 (prohibiting possessing, disseminating, and sending
    child pornography). The problem with the affidavit is not that it uses the
    word “downloaded” instead of “uploaded,” but rather, that it improperly
    states that Todd Chism was the perpetrator. As we have explained, this
    error was significant because there was no evidence that Todd Chism had
    ever accessed either of the offending websites.
    CHISM v. WASHINGTON STATE                      16327
    See, e.g., United States v. Vosburgh, 
    602 F.3d 512
    , 526-27 (3d
    Cir. 2010) (“[S]everal Courts of Appeals have held that evi-
    dence that the user of a computer employing a particular IP
    address possessed or transmitted child pornography can sup-
    port a search warrant for the physical premises linked to that
    IP address.”) (footnote omitted); United States v. Stults, 
    575 F.3d 834
    , 843-44 (8th Cir. 2009); United States v. Perrine,
    
    518 F.3d 1196
    , 1205-06 (10th Cir. 2008); United States v.
    Perez, 
    484 F.3d 735
    , 738-40 (5th Cir. 2007); United States v.
    Wagers, 
    452 F.3d 534
    , 539 (6th Cir. 2006)); Hay, 
    231 F.3d at 635-36
    ; see also United States v. Bynum, 
    604 F.3d 161
    , 165
    (4th Cir. 2010).
    [15] Here, the IP address associated with child porno-
    graphic images led to locations different from the locations to
    be searched, and the affidavit did not establish a physical link
    between the illegal images and the locations to be searched.13
    Several inferences would have to be drawn in order to con-
    clude that Todd violated Washington’s laws against child por-
    nography. First, one would have to infer that Todd had used
    his wife’s name rather than his own to pay the hosting fees for
    the sites. One would also have to infer that Todd devised a
    way to access the foel and qem websites with a forged IP
    address. Finally, one would have to infer from the previous
    two inferences that Todd was the person who uploaded the
    child pornographic images from his computer to the websites
    at an unknown time, date, and location. This convoluted string
    of inferences reduces the possibility that child pornography
    13
    We disagree with the Dissent that Gourde is factually indistinguish-
    able from this case. In Gourde, we noted that the FBI was able to “link[ ]
    the email user—‘gilbert95@yahoo.com,’ a known subscriber to [a child
    pornographic website]—to Gourde and to his home address in Castle
    Rock, Washington.” 
    440 F.3d at 1071
    . We did not specify in Gourde
    whether the FBI used IP address information to link the user information
    to Gourde, nor did any of the evidence in Gourde raise the specter of iden-
    tity theft. In contrast to Gourde, several pieces of evidence in this case
    suggested that Todd Chism was not connected to the child pornographic
    images.
    16328                 CHISM v. WASHINGTON STATE
    would be found at Todd Chism’s home and office to far
    below a “fair probability.” See United States v. Weber, 
    923 F.2d 1338
    , 1345 (9th Cir. 1990) (explaining that “with each
    succeeding inference, the last reached is less and less likely
    to be true.”).14
    Our conclusion also finds support in the WSP’s training
    materials, which explain:
    Much, if not all, of the cyber-evidence (the E-mail
    addresses and IP addresses used) will lead you to an
    innocent person. That’s why simply identifying
    which account was used to commit a crime does not
    provide you with probable cause to get a search or
    arrest warrant for the name and address on that
    account. You’ll need to do more investigating to
    determine if there is a link between the account
    holder (or other members of the household) with the
    criminal activity that was committed with that
    account.
    The affidavit submitted by Marcus Lawson, the president of
    a computer forensic company that examined Todd Chism’s
    computers similarly admonishes:
    [T]o have any success as an Internet criminal,
    regardless of whether one was a thief, a hacker or a
    child pornography collector, it would be incumbent
    to use other people’s identities to do so. . . . It is pri-
    marily for this reason that relying only on informa-
    14
    The Dissent argues that “the lack of a match between the IP addresses
    used for registration and the Chisms’ IP address has no probative value.”
    Dissent at 16339. We disagree. Where, unlike here, a person’s IP address
    is used to upload or download child pornography, there is a direct link
    between that person’s physical location and evidence of a crime. When
    this direct link is absent, at least one, if not several, additional inferences
    are necessary to conclude that evidence of a crime will be found at the
    location to be searched.
    CHISM v. WASHINGTON STATE               16329
    tion provided by the user of a credit card that is
    associated with criminal activity is inherently unreli-
    able.
    (emphasis added).
    [16] We are mindful that “[a] letter-perfect affidavit is not
    essential.” United States v. Esparza, 
    546 F.2d 841
    , 844 (9th
    Cir. 1976). In this case, however, we do not believe that a rea-
    sonable magistrate judge would have issued the search war-
    rant if she had been apprised of an accurate version of the
    evidence. We therefore hold that the affidavit’s false state-
    ments and omissions were material to the probable cause
    determination for the search warrants.
    ii.     Materiality as to Todd Chism’s Arrest
    [17] Unlike the search warrants—which were supported by
    Gardner’s affidavit—the warrant for Todd’s arrest was sup-
    ported by a Certification of Probable Cause (CPC) from
    Peters, a state prosecutor. In the CPC, Peters cited Gardner’s
    investigation as the source of his information.
    [18] Like Gardner’s affidavit, Peters’ CPC contained mate-
    rial false statements and omissions. For example, like Gard-
    ner’s affidavit, Peters’ CPC stated that the Chisms’ card was
    used to “purchase the images of child pornography,” which is
    a false statement. Also like Gardner’s affidavit, Peters’ CPC
    omitted critical information, including the fact that the IP
    addresses used to create the Yahoo! user accounts and web-
    sites were traced to Corn and Pleasant. Peters similarly with-
    held the fact that the two Yahoo! user accounts contained
    nonsensical identifying information for the Chisms, and that
    Nicole shared the 6907 credit card with Todd. These false
    statements and omissions were material as to Todd Chism’s
    arrest for the reasons discussed above.
    [19] That the CPC supporting probable cause was submit-
    ted by Peters—not Gardner—is inconsequential. In fact, the
    16330             CHISM v. WASHINGTON STATE
    officers do not dispute that they might be held responsible for
    damages stemming from Todd’s arrest even though the war-
    rant for this arrest was supported by Peters’ CPC rather than
    Gardner’s affidavit. Moreover, we have held that a “deliberate
    or reckless omission by a government official who is not the
    affiant can be the basis for a [suppression claim under Franks
    v. Delaware, 
    438 U.S. 154
     (1978)].” United States v. DeLeon,
    
    979 F.2d 761
    , 764 (9th Cir. 1992). Because Franks suppres-
    sion claims and judicial deception claims under § 1983
    involve the same constitutional right, we do not see any rea-
    son to distinguish DeLeon from this case. Hervey, 
    65 F.3d at 789
     (“The showing necessary to get to a jury in a section 1983
    action is the same as the showing necessary to get an evidenti-
    ary hearing under Franks.”). Therefore, we hold that the
    Chisms have made out a judicial deception claim for Todd’s
    arrest.
    B.   Qualified Immunity
    [20] Qualified immunity shields the officers from liability
    “insofar as their conduct d[id] not violate clearly established
    statutory or constitutional rights of which a reasonable person
    would have known.” Harlow v. Fitzgerald, 
    457 U.S. 800
    , 818
    (1982). Although there are genuine triable issues of fact as to
    the merits of the Chisms’ judicial deception claim, our discus-
    sion in the previous section demonstrates that the Chisms
    have made an adequate showing that there was a constitu-
    tional violation. Therefore, we must consider whether the
    Chisms’ constitutional rights were clearly established at the
    time that Gardner submitted her affidavit.
    [21] In determining whether the Chisms’ constitutional
    rights were clearly established at the time of the officers’ con-
    duct, we ask whether the contours of the Chisms’ rights were
    so clear that “every ‘reasonable official would have under-
    stood that what he is doing violates that right.’ ” Ashcroft v.
    al-Kidd, 
    131 S. Ct. 2074
    , 2083 (2011) (quoting Anderson v.
    Creighton, 
    483 U.S. 635
    , 640 (1987)). Although “[w]e do not
    CHISM v. WASHINGTON STATE                      16331
    require a case directly on point, [ ] existing precedent must
    have placed the statutory or constitutional question beyond
    debate.” 
    Id.
    [22] Our analysis of this prong is brief because we have
    already held that governmental employees are not entitled to
    qualified immunity on judicial deception claims. In Branch v.
    Tunnell, 
    937 F.2d 1382
     (9th Cir. 1991) (overruled on other
    grounds by Galbraith v. City and Cnty. of Santa Clara, 
    307 F.3d 1119
     (9th Cir. 2002)), we explained that
    if an officer submitted an affidavit that contained
    statements he knew to be false or would have known
    were false had he not recklessly disregarded the truth
    and no accurate information sufficient to constitute
    probable cause attended the false statements, . . . he
    cannot be said to have acted in a reasonable manner,
    and the shield of qualified immunity is lost.
    Id. at 1387 (quoting Olson v. Tyler, 
    771 F.2d 277
    , 281 (7th
    Cir. 1985)) (internal quotation marks omitted). We have con-
    sistently applied the rule that summary judgment on the
    ground of qualified immunity is not appropriate once a plain-
    tiff has made out a judicial deception claim.15 See, e.g., Liston,
    
    120 F.3d at 972
    ; Hervey, 
    65 F.3d at 788
    . In light of Branch,
    Liston, and Hervey, we conclude that “every ‘reasonable offi-
    15
    In judicial deception cases, our qualified immunity analysis at the
    summary judgment stage is swallowed by the question of reckless or
    intentional disregard for the truth. See Butler, 
    281 F.3d at 1024
     (noting
    that “our cases effectively intertwine the qualified immunity question (1)
    whether a reasonable officer should have known that he acted in violation
    of a plaintiff’s constitutional rights with (2) the substantive recklessness
    or dishonesty question”). We have explained that this “merger” is sensible
    because “no reasonable officer could believe that it is constitutional to act
    dishonestly or recklessly with regard to the basis for probable cause in
    seeking a warrant. Accordingly, should a factfinder find against an official
    on this state-of-mind question, qualified immunity would not be available
    as a defense.” 
    Id.
    16332             CHISM v. WASHINGTON STATE
    cial would have understood’ ” that the Chisms had a constitu-
    tional right to not be searched and arrested as a result of
    judicial deception. al-Kidd, 
    131 S. Ct. at 2083
    . We therefore
    hold that the officers are not entitled to qualified immunity.
    III.   CONCLUSION
    For the foregoing reasons, we reverse the district court’s
    grant of summary judgment to the officers.
    REVERSED AND REMANDED.
    IKUTA, Circuit Judge, dissenting:
    In All the President’s Men, Deep Throat famously advised
    two investigative journalists that in order to find the truth,
    they had to “follow the money.” In United States v. Gourde,
    we endorsed this maxim, holding that payment of subscription
    fees to a site on which child pornography is available was suf-
    ficient to support probable cause for a search warrant. 
    440 F.3d 1065
    , 1071 (9th Cir. 2006) (en banc). Despite the fact
    that this case involved a direct connection between the
    Chisms’ credit card and two websites populated with child
    pornography, the majority holds that the evidence was insuffi-
    cient to support probable cause, and therefore the district
    court erred in granting summary judgment to the police on the
    basis of qualified immunity. In doing so, the majority tram-
    ples on controlling precedent and defies common sense. I
    respectfully dissent.
    I
    The Washington State Police received a hot “cybertip”
    about child pornography on two Yahoo!-hosted websites.
    Yahoo! lets users create their own websites (with unique
    domain names) and host their own content on those websites,
    CHISM v. WASHINGTON STATE              16333
    including populating the websites with images. Yahoo! may
    also provide users with domain-based email accounts.
    The first tip directed the police to a website with the URL
    http://foelonipwin-cmezixecvom.us (referred to here as the
    “foel” website). According to the tip, 14 images of child por-
    nography had been uploaded to this website. The tip identified
    the “screen user name” for the web site as “qek9pj8z9ec” and
    the     email      associated    with     this    website    as
    “qek9pj8z9ec@yahoo.com” (referred to here as the “qek”
    user name and email). Yahoo!’s subscriber information for
    the website identified the subscriber as “Nicole Chism,” with
    the Chisms’ address and phone number, and the qek email
    address. The user’s log-in name was “qek,” with the full name
    given as “Mr. Nicole Chism,” and the country identified as
    “Chile.” The Yahoo! Billing History showed that the Chisms’
    credit card had paid for two months of web hosting fees for
    the site.
    The second tip identified a website with the URL
    http://qemtudawyow-nufiseip.com (referred to here as the
    “qem” website). According to the tip, 63 images of child por-
    nography had been uploaded to this website. The tip identified
    the email associated with this website as “qaagw-
    cy19ab@yahoo.com” and the user name as “qaagwcy19ab”
    (referred to here as the “qaag” email and user name). Yahoo!
    did not provide subscriber information, but according to
    Yahoo!, the user’s full name was “Mr. Nicole Chism,” the
    log-in name was “qaag,” and the country was identified as
    “Bolivia.” The Yahoo! Login Tracker showed that “qaag” had
    logged into the website three times, once from the same IP
    address used by “qek.”
    The police followed up with Bank of America, which had
    issued the credit card that paid for these child pornography
    sites. According to the bank, the Chisms had not reported any
    fraudulent activity on their card. Reviewing the card’s billing
    records, the police confirmed that the Chisms’ credit card was
    16334             CHISM v. WASHINGTON STATE
    used pay for the foel website for two months and the qem
    website for a month.
    Based on this investigation, the police could reasonably
    conclude that a person using the name Chism, providing the
    Chisms’ home address and phone number, and paying with
    the Chisms’ credit card, had created two websites, populated
    them with child pornography, and logged on to the sites sev-
    eral times. Does this create a “fair probability,” Illinois v.
    Gates, 
    462 U.S. 213
    , 246 (1983), that child pornography
    would be found on the Chisms’ computer? Did the magistrate
    judge correctly answer the “commonsense, practical question”
    that there was probable cause to believe that evidence of child
    pornography was located at the Chisms’ residence? 
    Id. at 230
    .
    These questions answer themselves: it is reasonable to “fol-
    low the money” from the child pornography website, to the
    fees paying to host that website, to a credit card owned by the
    Chisms, to the address for the payee (which is the same
    address as the website’s subscriber), and from there to the
    Chisms’ computer. And if there was any doubt, Gourde
    requires us to hold that there was probable cause supporting
    the warrant, as explained below. Therefore, the district court
    did not err in rejecting the Chisms’ claim that their Fourth
    Amendment rights were violated and granting summary judg-
    ment in favor of the police.
    II
    Our en banc decision in United States v. Gourde is directly
    on point and controls our probable cause analysis here.
    In Gourde, the police investigated a website that featured
    child pornography (called “Lolitagurls.com”) and obtained a
    membership list. 
    440 F.3d at 1067
    . The list included the name
    Micah Gourde, and provided Gourde’s name, home address,
    date of birth, and email address. 
    Id. at 1068
    . According to the
    membership list, Gourde’s credit card had been used to pay
    a fee of $19.95 a month for unlimited access to the website
    CHISM v. WASHINGTON STATE               16335
    and its images for over two months, until the FBI shut down
    the site. 
    Id. at 1067-68
    .
    We concluded, based on the evidence that Gourde’s credit
    card had been used to pay subscription fees to a site that con-
    tained child pornography, that there was a “fair probability”
    that “Gourde’s computer contained evidence that he violated”
    federal child pornography laws. 
    Id. at 1069
    .
    First, we inferred that Gourde “had access and wanted
    access to [ ] illegal images.” 
    Id. at 1070
    . We based this infer-
    ence on evidence that Gourde had been a paying member of
    a website containing images of child pornography. Because
    his credit card had been used to pay for access to the website,
    and Gourde could not have paid two months of subscription
    fees “by accident or by a mere click of a button,” 
    id.,
     we rea-
    soned that Gourde had knowingly and willingly paid for
    unlimited access to illegal images, see 
    id. at 1070-71
    .
    Given this conclusion, we made the further inference that
    there was “near certainty that his computer would contain evi-
    dence of a crime had he received or downloaded images” in
    violation of federal law. 
    Id. at 1071
    . As we explained, “[i]t
    neither strains logic nor defies common sense to conclude,
    based on the totality of these circumstances, that someone
    who paid for access for two months to a website that actually
    purveyed child pornography probably had viewed or down-
    loaded such images onto his computer.” 
    Id.
    Based on this “triad of solid facts,” namely that: (1) “the
    site had illegal images,” (2) the inference that Gourde
    intended to have and wanted access to these images; and (3)
    our further inference that “these images were almost certainly
    retrievable from his computer if he had ever received or
    downloaded them,” we determined that “the reasonable infer-
    ence that Gourde had received or downloaded images easily
    meets the ‘fair probability’ test.” 
    Id.
     “Employing the princi-
    ples of Gates-practicality, common sense, a fluid and non-
    16336             CHISM v. WASHINGTON STATE
    technical conception of probable cause, and deference to the
    magistrate’s determination,” we concluded that the search
    warrant was supported by probable cause. 
    Id.
    In reaching this conclusion, we rejected Gourde’s argument
    that the police should have looked for evidence of Gourde’s
    downloads in the computer hosting the child pornography
    website, and his claim that “absent such concrete evidence,
    the profile data and other facts are insufficient to support a
    warrant.” 
    Id. at 1072
    . We disagreed that the police had any
    obligation to conduct such additional investigation or obtain
    any additional evidence: Gourde asserted that the police did
    not need to turn a “fair probability” into a “near certainty.” 
    Id. at 1073
    .
    Gourde is directly applicable and controls the outcome of
    this case. The same “triad of solid facts” found in Gourde are
    present here: (1) the foel and qem websites contained images
    of child pornography, (2) the Chisms’ credit card paid to host
    both sites, raising the inference that the Chisms intended to
    have and wanted access to these images, and therefore (3)
    images of child pornography “were almost certainly retriev-
    able from [the Chisms’] computer if [the Chisms] had ever
    received or downloaded them.” 
    Id. at 1071
    . Like the defen-
    dant in Gourde, the Chisms could not have paid two months
    of hosting fees for the sites “by accident or by a mere click
    of a button,” 
    id. at 1070
    , and the inference that the Chisms’
    computer contained child pornography was eminently reason-
    able given that they paid multi-month fees to host a child por-
    nography website, see 
    id. at 1071
    . Under Gourde, these two
    facts raise the additional inference that images of child por-
    nography were retrievable from the Chisms’ computer had
    they “ever received or downloaded them.” 
    Id. at 1071
    . Indeed,
    this additional inference is even stronger here than it was in
    Gourde, because there was evidence that the user names asso-
    CHISM v. WASHINGTON STATE                       16337
    ciated with a “Mr. Nicole Chism” were used to log in to both
    the foel and qem websites.1
    Under any reasonable reading, Gourde dictates that the link
    between the Chisms’ credit card and the websites containing
    child pornography, coupled with the multi-month charges, the
    repeated log-ins, and the lack of any billing challenge from
    the Chisms, is necessarily sufficient to establish probable
    cause. Even viewing the record in the light most favorable to
    the Chisms, the police had probable cause to search the
    Chisms’ residence irrespective of any alleged misrepresenta-
    tions or omissions in the affidavits submitted to obtain the
    search and arrest warrants. The Chisms therefore suffered no
    Fourth Amendment violation, and their § 1983 claim for judi-
    cial deception must fail as a matter of law.
    III
    In supporting its contrary conclusion, the majority relies on
    both omissions and alleged false statements in the affidavit,
    Maj. Op. at 16320-21, but places the most weight on alleged
    misrepresentations that are clearly immaterial. Indeed, their
    immateriality is amply evidenced by the fact that the Chisms
    failed to even mention the alleged misrepresentations until
    this appeal. Before the district court, the Chisms alleged only
    that the affidavit contained material omissions. Now, for the
    1
    The majority’s attempt to distinguish Gourde is unavailing. See Maj.
    Op. at 16327 n.13. In Gourde, the FBI used subscription information pro-
    vided by Lancelot Security to link membership in the Lolitagurls.com
    website to Gourde and his home address in Castle Rock, Washington. 
    440 F.3d at 1070-71
    . Here, the police used subscription information provided
    by Yahoo! and credit card information provided by Bank of America to
    link the user accounts for the foel and qem websites to the Chisms and
    their home address in Nine Mile Falls, Washington. The information is
    effectively identical. In addition, the majority’s attempted distinction of
    Gourde on the ground that none of the evidence in that case raised “the
    specter of identity theft” is peculiar, given the majority’s correct statement
    that here the police had no reason to know of any reported credit card
    fraud. Maj. Op. at 16317 n.7.
    16338             CHISM v. WASHINGTON STATE
    first time on appeal, the Chisms raise the claim that the affida-
    vits contained recklessly made false statements. Even assum-
    ing the latter claim is appropriately before us, cf. Whittaker
    Corp. v. Execuair Corp., 
    953 F.2d 510
    , 515 (9th Cir. 1992),
    it is baseless in any event.
    To be clear, the Chisms have been able to dig up only two
    alleged false statements in the police officers’ affidavit. First,
    the affidavit notes the credit card number used to pay for the
    foel website, and states: “This is the [credit] card the suspect
    used to purchase the images of child pornography from the
    website ‘[foel].’ ” Although the majority places much weight
    on the fact that the credit card “was not used to buy images
    of child pornography,” Maj. Op. at 16320, this error in the
    affidavit is immaterial, given that the Chisms’ credit card was
    used to buy the website itself, that is, to pay hosting fees for
    a website populated with child pornography. While the affida-
    vit’s misstatement may evince carelessness, or a lack of preci-
    sion, it does not establish a deliberate or reckless disregard for
    truth.
    Second, the affidavit states, “Based on the information
    received from NCMEC about the images downloaded by
    Todd M. Chism, it is likely to believe he was using internet
    services at his residence and/or business office.” Again, the
    majority makes much of the fact that there was no evidence
    that Todd Chism had downloaded images of child pornogra-
    phy. But any error is again immaterial. The evidence estab-
    lishes that someone controlling the foel website uploaded
    child pornography to the website, and uploading images of
    child pornography raises exactly the same inferences as
    downloading such images. Moreover, Gourde instructs that
    we can infer that a person who pays for access to images of
    child pornography has downloaded them. 
    440 F.3d at 1071
    .
    Again, the affidavit’s use of the word “download” instead of
    “upload” cannot be the basis of a judicial deception claim.
    The majority places less weight on the alleged omissions in
    the affidavit, and for good reason: they are either immaterial,
    CHISM v. WASHINGTON STATE                16339
    or not really omissions at all. First, the majority points to the
    affidavit’s failure to state that the IP addresses used to register
    the foel and qem websites were traced to Cheryl Corn and
    Vitina Pleasant. Maj. Op. at 16317, 16321. This carries little
    weight, given that the credit card used to pay the hosting fees
    for the sites and the usernames used to log in to both sites
    were registered to the name “Chism.” Moreover, given the
    existence of proxy software, which allows an unknown indi-
    vidual to log on to the internet under another person’s IP
    address, the lack of a match between the IP addresses used for
    registration and the Chisms’ IP address has no probative
    value. See, e.g., United States v. Vosburgh, 
    602 F.3d 512
    , 527
    n.14 (3d Cir. 2010) (recognizing that “proxy servers can be
    used to mask IP addresses”); Tagged, Inc. v. Does 1 Through
    10, 
    2010 WL 370331
    , at *2 (N.D. Cal. Jan. 25, 2010) (finding
    IP address information unreliable where pattern of IP
    addresses indicated the use of a proxy server). In other words,
    while a match between an IP address associated with porno-
    graphic images and the IP address of a defendant’s computer
    increases probable cause that the defendant is involved in a
    crime, as the majority argues, Maj. Op. at 16326-27, no case
    has relied on the reverse proposition (that the lack of a match
    between an IP address associated with such images and the IP
    address of the defendant’s computer reduces probable cause
    of the defendant’s involvement). Indeed, in this case, the FBI
    determined that proxy software had been installed on Cheryl
    Corn’s computer, allowing an unknown individual to log onto
    the internet under her IP address. Thus the absence of infor-
    mation in the affidavit about the IP addresses used to register
    the foel and qem sites was immaterial.
    Second, Agent Gardner’s failure to disclose the fact that the
    police never traced the IP address that was used to log in to
    both the foel and qem websites, Maj. Op. at 16317, 16321,
    cannot be deemed an omission: as in Gourde, the police have
    no obligation to turn a “fair probability” into a “near certain-
    ty” by conducting such an additional investigation. 
    440 F.3d at 1071
    . As Gourde explained, “[a]n affidavit may support
    16340                CHISM v. WASHINGTON STATE
    probable cause even if the government fails to obtain poten-
    tially dispositive information,” 
    id.
     at 1073 n.5.2
    Third, the majority’s reliance on the omission of the infor-
    mation that Nicole and Todd Chism both used the credit card
    that paid the hosting fees, Maj. Op. at 16320-21, is baffling.
    Surely the failure to inform the magistrate judge that hus-
    bands and wives often use the same credit card cannot be
    deemed a material omission. At a minimum, this revelation
    would not have changed the “fair probability” that child por-
    nography would be found at the Chisms’ residence.
    In fact, no weight can be placed on any of the alleged mis-
    representations and omissions given the ample evidence to
    support probable cause, and thus they cannot be used to sup-
    port a judicial deception claim. It is well established that
    “[o]missions or misstatements resulting from negligence or
    good faith mistakes will not invalidate an affidavit which on
    its face establishes probable cause.” United States v. Smith,
    
    588 F.2d 737
    , 740 (9th Cir. 1978). Here, even if the affidavit
    was corrected per the Chisms’ claimed omissions and misrep-
    resentations, it was not “so lacking in indicia of probable
    cause as to render official belief in its existence unreason-
    able.” Malley v. Briggs, 
    475 U.S. 335
    , 345 (1986).
    Finally, the majority errs in its determination that the affi-
    davit failed to establish probable cause because the police did
    not establish “a physical link between the illegal images and
    the locations to be searched.” See Maj. Op. at 16327. The
    majority’s ruling is directly contrary to the Supreme Court’s
    decision in Gates, which held that a determination of probable
    2
    The majority’s argument that the lack of a match between the IP
    address used to register the foel and qem websites is a material omission
    and reduces probable cause because it means that “one additional infer-
    ence is necessary to conclude that evidence of a crime will be found at the
    location to be searched,” Maj. Op. at 16328 n.14, likewise runs afoul of
    Gourde’s admonition that the government need not “obtain potentially dis-
    positive information.” 
    440 F.3d at
    1073 n.5.
    CHISM v. WASHINGTON STATE                     16341
    cause must be based on the totality of the circumstances, not
    on the presence or omission of specific items of evidence. 
    462 U.S. at 230-31
    ; see also United States v. Martinez-Garcia,
    
    397 F.3d 1205
    , 1217 (9th Cir. 2005). And it is directly con-
    trary to Gourde, which rejected the necessity for the sort of
    evidence (e.g., an IP address association or physical link) that
    the majority suggests is required. There was no need, Gourde
    tells us, for the police to develop any evidence that Gourde
    had ever received or downloaded images, let alone evidence
    of downloads traced to his IP address. See 
    440 F.3d at 1072-73
    . Given the government’s evidence that phony IP
    addresses abound in cyberspace, the majority’s “physical
    link” rule will baffle many an investigation into child pornog-
    raphy and its users and peddlers.
    IV
    While it turns out that the Chisms were not responsible for
    the child pornography websites under investigation by the
    police, ample evidence pointed to the conclusion that they
    were. The evidence established more than a fair probability
    that child pornography would be found on computers at the
    Chisms’ residence; indeed, Gourde compels the conclusion
    that the police had probable cause for the search.3 Therefore,
    there was no constitutional violation, and the district court did
    not err in granting summary judgment to the police on the
    basis of qualified immunity. In concluding that evidence lead-
    ing to suspects who are paying to host their own child pornog-
    raphy websites does not create a “fair probability” that child
    pornography will be found on the suspects’ computer, the
    majority turns its back on Deep Throat’s adage, our case law,
    and the Supreme Court’s probable cause jurisprudence. I dis-
    sent.
    3
    Though the arrest warrant is a closer question, the evidence also sup-
    ported probable cause to arrest either Todd or Nicole Chism. See Smith v.
    Almada, 
    640 F.3d 931
    , 937 (9th Cir. 2011).
    

Document Info

Docket Number: 10-35085

Citation Numbers: 661 F.3d 380, 2011 WL 5304125

Judges: Fletcher, Paez, Ikuta

Filed Date: 8/25/2011

Precedential Status: Precedential

Modified Date: 11/5/2024

Authorities (29)

United States v. Alexander Montagu Hay , 231 F.3d 630 ( 2000 )

United States v. Perrine , 518 F.3d 1196 ( 2008 )

United States v. Craighead , 539 F.3d 1073 ( 2008 )

United States v. Perez , 484 F.3d 735 ( 2007 )

Franks v. Delaware , 98 S. Ct. 2674 ( 1978 )

Pearson v. Callahan , 129 S. Ct. 808 ( 2009 )

nelson-galbraith-v-county-of-santa-clara-a-municipality-of-the-state-of , 307 F.3d 1119 ( 2002 )

United States v. Bertha Rubio Esparza , 546 F.2d 841 ( 1976 )

United States v. Jose Alfredo Pallares-Galan , 359 F.3d 1088 ( 2004 )

United States v. Micah J. Gourde , 440 F.3d 1065 ( 2006 )

Dennis L. Olson v. Robert Tyler and O.J. Foster , 771 F.2d 277 ( 1985 )

United States v. Robert Deleon , 979 F.2d 761 ( 1992 )

Spinelli v. United States , 89 S. Ct. 584 ( 1969 )

jerry-l-branch-sylvia-branch-colby-branch-v-dale-l-tunnell , 937 F.2d 1382 ( 1991 )

United States v. Lyman Wagers , 452 F.3d 534 ( 2006 )

United States v. Guzman-Padilla , 573 F.3d 865 ( 2009 )

United States v. Salvador Martinez-Garcia , 397 F.3d 1205 ( 2005 )

Smith v. Almada , 640 F.3d 931 ( 2011 )

United States v. Forrester , 512 F.3d 500 ( 2008 )

Ashcroft v. al-Kidd , 131 S. Ct. 2074 ( 2011 )

View All Authorities »