-
ACCEPTED 01-14-00516-CR FIRST COURT OF APPEALS HOUSTON, TEXAS Nos. 01-14-00516-CR, 01-14-00517-CR, 01-14-00518-CR 4/20/2015 10:16:35 AM CHRISTOPHER PRINE 01-14-00519-CR, 01-14-00520-CR CLERK In the Court of Appeals FILED IN For the 1st COURT OF APPEALS HOUSTON, TEXAS First District of Texas 4/20/2015 10:16:35 AM At Houston CHRISTOPHER A. PRINE ♦ Clerk Nos. 1370904, 1370905, 1370906, 1370907, 1370908 In the 230th District Court Of Harris County, Texas ♦ HUGO PACHAS-LUNA Appellant v. THE STATE OF TEXAS Appellee ♦ State’s Appellate Brief ♦ DEVON ANDERSON District Attorney Harris County, Texas STEPHEN DRIVER KATHRYN KAHLE Assistant District Attorneys Harris County, Texas CLINTON A. MORGAN Assistant District Attorney Harris County, Texas State Bar No. 24071454 morgan_clinton@dao.hctx.net 1201 Franklin, Suite 600 Houston, Texas 77002 Tel: (713) 755-5826 FAX: (713) 755-5809 Counsel for the Appellee Oral Argument Not Requested Statement Regarding Oral Argument The appellant requested oral argument, though he gave no particular reason why. The State believes the briefs in this case adequately apprise this Court of the issues and the law, and any marginal benefit from oral argument does not justify the considerable amount of time that preparation for oral argument requires of the parties and the Court. Therefore, the State does not request oral argument. i Identification of the Parties Counsel for the State: Devon Anderson District Attorney of Harris County Stephen Driver & Kathryn Kahle — Assistant District Attorneys at trial Clinton A. Morgan Assistant District Attorney on appeal Appellant: Hugo Pachas-Luna Counsel for the Appellant: Connie Williams — Counsel at trial Alexander Bunin & Sarah V. Wood — Counsel on appeal Trial Judge: Brad Hart Presiding judge ii Table of Contents Page Statement Regarding Oral Argument .......................................................... i Identification of the Parties ........................................................................ ii Table of Contents .......................................................................................... iii Index of Authorities ....................................................................................... v Statement of the Case ................................................................................... 1 Statement of Facts ......................................................................................... 1 Reply to the Appellant’s Sole Point of Error Most of the appellant’s complaints are minor or completely meritless. His one legitimate complaint — the possible discrepancy between when the IP address was sharing child pornography and when the IP address was connected to the appellant — is unpreserved, and a matter of first impression that this Court should refrain from addressing. Given the deferential standard of review in warrant cases, this Court should defer to the magistrate’s determination of probable cause. ................................................... 2 I. Appellate courts review warrant affidavits by reading them in a common-sense manner, and giving deference to both the trial court and the issuing magistrate. ....................................................................................................... 2 II. A fair reading of the affidavit shows that it is not nearly so bad as the appellant makes it seem.................................................................................................... 4 A. Corporal Lee’s Background Knowledge ........................................................ 5 1. Lee’s Training ......................................................................................................... 5 2. Lee’s Knowledge of Peer-to-Peer Networks .............................................. 6 3. Lee’s Software, and “Hash Values”................................................................. 7 B. This Investigation ................................................................................................... 8 1. The Child Pornography Files............................................................................ 8 2. Connecting the IP to the Appellant ............................................................ 10 3. “People who have a sexual interest in children …” .............................. 12 iii III. All but one of the appellant’s complaints are without merit, and on that issue there is a sufficient basis in the affidavit that the trial court’s ruling was not an abuse of discretion. ..................................................................... 12 A. The name of the online database was not necessary to show probable cause............................................................................................................... 12 B. Lee adequately described his investigative software........................... 14 C. The missing verb is apparent from context clues. ................................. 15 D. The affidavit elsewhere describes in detail some of the child pornography found on the suspect IP address, thus whether the phrase “labeled as child notables” was “conclusory and uncredited” is irrelevant, as it was not necessary for the probable-cause determination. ............................................................................................................... 17 E. There was information regarding only one IP address; the “different” IP address mentioned in the affidavit was obviously a typo, as the trial court determined................................................................................... 18 F. The appellant’s sole legitimate complaint — regarding the imprecise connection between the suspect IP address and the appellant’s residence — is unpreserved. If this Court addresses it, it is a question of first impression and this Court should defer to the inferences drawn by the magistrate and the trial court. ............................. 20 G. The appellant’s complaint about Lee’s “method” of comparing hash values is irrelevant. ...................................................................................................... 23 H. The information in the affidavit connecting child pornography to the appellant’s residence was not stale. ............................................................. 25 Conclusion .................................................................................................... 29 Certificate of Compliance and Service ..................................................... 30 iv Index of Authorities Cases Barrett v. State
367 S.W.3d 919(Tex. App.— Amarillo 2012, no pet.) ....................................................................................................... 21 Champion v. State
919 S.W.2d 816(Tex. App.— Houston [14th Dist.] 1996, pet. ref’d) ................................................................... 16, 19 Gardner v. State
433 S.W.3d 93(Tex. App.— Houston [1st Dist.] 2014, pet. ref’d).............................................................................. 22 Hereford v. State
339 S.W.3d 111(Tex. Crim. App. 2011) .......................................................................... 4 Illinois v. Gates
462 U.S. 213(1983) ................................................................................................................. 3 Pair v. State
184 S.W.3d 329(Tex. App.— Fort Worth 2006, no pet.) .................................................................................................. 24 Reyes v. State 02-11-00327-CR,
2013 WL 1338023(Tex. App.— Fort Worth Apr. 4, 2013, no pet.) (mem. op. not designated for publication) ................................................................. 16 Rodriguez v. State
232 S.W.3d 55(Tex. Crim. App. 2007) .......................................................................... 23 Rothstein v. State
267 S.W.3d 366(Tex. App.— Houston [14th Dist.] 2008, pet. ref’d) ................................................................. passim Sanders v. State
191 S.W.3d 272(Tex. App.— Waco 2006, pet. ref’d) ......................................................................................................... 28 v Serrano v. State
123 S.W.3d 53(Tex. App.— Austin 2003, pet. ref’d) .......................................................................................................... 3 State v. Cotter
360 S.W.3d 647(Tex. App.— Amarillo 2012, no pet.) ....................................................................................................... 28 State v. Delagarza
158 S.W.3d 25(Tex. App.— Austin 2005, no pet.)............................................................................................................... 3 State v. Jordan
342 S.W.3d 565(Tex. Crim. App. 2011) .......................................................................... 3 Tucker v. State
369 S.W.3d 179(Tex. Crim. App. 2012) .......................................................................... 4 United States v. Bervaldi
226 F.3d 1256(11th Cir. 2000)................................................................................. 26, 27 United States v. Diecidue
603 F.2d 535(5th Cir. 1979) ............................................................................................. 27 United States v. Hay
231 F.3d 630(9th Cir. 2000) ............................................................................................. 28 United States v. Morales-Aldahondo
524 F.3d 115(1st Cir. 2008).............................................................................................. 28 United States v. Vosburgh
602 F.3d 512(3d Cir. 2010)............................................................................................... 21 vi Statement of the Case The appellant was charged in five indictments with different charges of possession of child pornography. (1 CR 13; 2 CR 13; 3 CR 13; 4 CR 13; 5 CR 13).1 The appellant waived his right to a jury trial and pled not guilty to the trial court. (2 RR 4-8). The trial court found him guilty as charged. (4 RR 130- 31). After a pre-sentence investigation, the trial court assessed punishment for each case at eight years’ confinement, with the sentences to run consecutively. (5 RR 18; 1 CR 87-88; 2 CR 88-89; 3 CR 88-89; 4 RR 86-87; 5 RR 80-81). The appellant filed timely notices of appeal and the trial court certified his right of appeal. (1 CR 92, 94). Statement of Facts A Harris County Precinct Four Constable’s Deputy conducted an investigation into online child-pornography file sharing and discovered a computer sharing child pornography from an internet account associated with the appellant. (Def.’s Ex. 1). The deputy obtained a warrant for the appellant’s house, and when the warrant was served police found numerous hard drives 1 The State will refer to the clerk’s records in the different causes as though they were sequential volumes. Thus the record for 01-14-00516- CR will be 1 CR, the record for 01- 14-00517-CR will be 2 CR, and so on, in numerical order. If the same document appears in all the records, the State will cite to the copy in 1 CR. 1 containing, in total, more than 18,000 images and videos of child pornography, including the four images and one video for which he was charged in this case. (4 RR 103-16). Reply to the Appellant’s Sole Point of Error Most of the appellant’s complaints are minor or completely meritless. His one legitimate complaint — the possible discrepancy between when the IP address was sharing child pornography and when the IP address was connected to the appellant — is unpreserved, and a matter of first impression that this Court should refrain from addressing. Given the deferential standard of review in warrant cases, this Court should defer to the magistrate’s determination of probable cause. The appellant filed a pre-trial motion to suppress alleging, inter alia, that the warrant affidavit in this case did not contain probable cause to believe contraband would be found in the appellant’s home, thus the evidence was obtained illegally. (1 CR 79-81). The trial court held a hearing on the motion to suppress at the beginning of the appellant’s bench trial and denied the motion. (3 RR 129-31). In his sole point of error, the appellant claims that the trial court erred in denying his motion to suppress. I. Appellate courts review warrant affidavits by reading them in a common-sense manner, and giving deference to both the trial court and the issuing magistrate. Probable cause exists if, under the totality of the circumstances set forth in the affidavit before the magistrate, there is a fair probability that 2 contraband or evidence of a crime will be found in a particular place at the time the warrant is issued. State v. Jordan,
342 S.W.3d 565, 568-69 (Tex. Crim. App. 2011). The magistrate may interpret the affidavit in a non-technical, common-sense manner and may draw reasonable inferences from the facts and circumstances contained within its four corners.
Id. at 569.When reviewing whether a warrant should have issued, courts — whether at the trial or appellate level — are not to determine whether there actually was probable cause. State v. Delagarza,
158 S.W.3d 25, 29 (Tex. App.— Austin 2005, no pet.). The test at the trial court is: considering the totality of the circumstances before the issuing magistrate, was there a substantial basis to believe that probable cause existed. Ibid.; Illinois v. Gates,
462 U.S. 213, 268 (1983). On appellate review, then, the appropriate test is: did the trial court abuse its discretion in finding that the magistrate had a substantial basis to believe that probable cause existed. “The resolution of doubtful or marginal cases should largely be determined by the preference to be accorded to warrants.”
Delagarza, 158 S.W.3d at 29. On appeal, the sufficiency of a warrant affidavit is generally determined by looking at the affidavit itself, without regard to extrinsic evidence. Serrano v. State,
123 S.W.3d 53, 58 (Tex. App.— Austin 2003, pet. ref’d). 3 In reviewing a trial court’s ruling on a motion to suppress, appellate courts give almost total deference to the trial court’s factual determinations, even when those determinations are based on affidavit, but review de novo the trial court’s application of the law of search and seizure. Tucker v. State,
369 S.W.3d 179, 184 (Tex. Crim. App. 2012). The record should be viewed in the light most favorable to the trial court’s decision, and the trial court’s decision should be upheld so long as it is reasonable in light of the record. Hereford v. State,
339 S.W.3d 111, 18 (Tex. Crim. App. 2011). II. A fair reading of the affidavit shows that it is not nearly so bad as the appellant makes it seem. In his brief, the appellant engages in a persnickety reading of certain sections of the affidavit. He focuses, at times, on what the affidavit does not say rather than what it does. He seems befuddled by certain phrases in the affidavit that are explained clearly enough in other parts. And he demands descriptions and definitions of ordinary notions that any magistrate of common intelligence would have understood. The State will grant that Corporal Lee is unlikely to be nominated for any literary prizes based on this affidavit, but appellate review is not about critiquing stylistic and typographical errors. Rather, this Court is to examine the whole document and determine whether it was reasonable for the trial 4 court to conclude that the affidavit gave the issuing magistrate a substantial basis to find probable cause that there would be evidence of a crime at the searched address. What follows is an attempt to read through the affidavit for its relevant parts and to place them in the order that makes the most sense. A. Corporal Lee’s Background Knowledge 1. Lee’s Training The affidavit begins with the qualifications of the affiant. (Def.’s Ex. 1 at 4-5). Corporal Jeffrey Lee is employed as a peace officer by the Harris County Precinct Four Constable, and he has been a law enforcement officer for more than a decade. “[H]is duties include the investigation of technologically advanced offenses including … Child Pornography.” (Def’s. Ex. 1 at 4). He is certified “in Basic Cybercrime Investigation.” Lee has spoken with others in the law enforcement community who know about the ways of those who trade and collect child pornography. Moreover, he “has been personally involved in the investigation, arrest, and prosecution of numerous persons involved in child sexual exploitation.” (Def’s Ex. 1 at 4). Lee is a member of the Houston Metro Internet Crimes Against Children Task Force, a federally funded initiative. 5 2. Lee’s Knowledge of Peer-to-Peer Networks Through his training and experience, Lee is aware that “the trade of child pornography through the internet is extensive and one of the main methods of distribution for this type of contraband.” (Def.’s Ex. 1 at 4). Lee is aware that the use of peer-to-peer (P2P) networks is “one of the most pervasive methods for the distribution of child pornography through the internet.” (Def.’s Ex. 1 at 4). Lee knows that P2P file sharing is accomplished by downloading software and listing certain files and folders as being “shared,” and then those files and folders are indexed by an “ultra-peer,” through which other users can search the shared files and folders and select which ones to download. (Def.’s Ex. 1 at 5). Once a user chooses to download a file from another user, those computers are then connected through an internet protocol (IP) address. (Def.’s Ex. 1 at 5). The sending and receiving computers record each others’ IP addresses in order to facilitate the file sharing. (Def.’s Ex. 1 at 5). An IP address is “a unique four-byte number assigned to a computer when that computer accesses the Internet.” (Def.’s Ex. 1 at 17). Every computer on the internet has an IP address that is assigned to it by its internet service provider when it logs on. (Def.’s Ex. 1 at 17). An IP address “is unique in the sense that no two users can have the exact same IP address at the same 6 time.” (Def.’s Ex. 1 at 17). Internet service providers generally keep records that allow them to know which subscriber was using a particular IP address at a particular time. (Def.’s Ex. 1 at 8-9, 17). 3. Lee’s Software, and “Hash Values” Lee has received “specialized training” for the investigation of P2P networks using “a specialized program developed to allow investigators to access a variety of [P2P] networks.” (Def.’s Ex. 1 at 5). Lee “is trained and licensed to use this software.” (Def.’s Ex. 1 at 5). The software allows investigators to “search the variety of networks for digital material from users connecting to the [P2P] Networks and download files that the users ‘share’ with the network…” (Def.’s Ex. 1 at 5). The software allows investigators to narrow their searches in a couple of ways. One way is that they can narrow their searches so that they only return results from specified geographic areas, “such as Harris County, the City of Houston, or City of Pasadena.” (Def.’s Ex. 1 at 5). The second way in which this software allows investigators to limit their searches is that the software can be set to return results for “confirmed images of child pornography.” (Def.’s Ex. 1 at 5). It does this through the use of “hash values.” All digital files can be processed through a Secure Hash Algorithm to 7 produce an identifying hash value that will be the same for any two duplicate files, but which will be different if the files differ in any way. (Def.’s Ex. 1 at 7). Lee knows that by comparing the hash value of two files, he can determine whether two files are identical “with a precision that greatly exceeds 99.9999 percent certainty.” (Def.’s Ex. 1 at 7). Because of how hash values are produced, “there has never been a documented occurrence of two different files being found on the Internet having different contents while sharing the same [hash] value.” (Def.’s Ex. 1 at 7). Lee’s investigative software uses hash values to limit its search. The software can take the hash values of files that have been determined to be child pornography and return search results only from computers that are sharing known child pornography. (Def.’s Ex. 1 at 5). Lee is aware that through the use of this software and of the methods in which has been trained, “hundreds of [P2P] cases have been successfully investigated throughout the United States.” (Def.’s Ex. 1 at 6). B. This Investigation 1. The Child Pornography Files On August 9, 2012, Lee conducted an investigation using an “online database.” (Def.’s Ex. 1 at 6). “The software allows licensed investigators to 8 track [IP addresses] in order to determine specifically what the individual or computer has downloaded over a specific … time frame.” (Def.’s Ex. 1 at 6). That afternoon, Lee conducted a search limited to Harris County and discovered that IP address 98.194.180.10 was sharing 2 more than twenty files that were “child notables,” meaning that “they are files that have been observed by other law enforcement officers as being ‘child pornography.’” (Def.’s Ex. 1 at 6). That computer was sharing “numerous other files” that “had titles which were indicative of child porn.” (Def.’s Ex. 1 at 6). Lee conducted additional checks of this IP address, and it repeatedly showed up as sharing what appeared to be child pornography.3 (Def.’s Ex. 1 at 6). 2 As the appellant correctly notes in his brief, this portion of the affidavit is missing a verb. The affidavit states that Lee “located IP address 98.194.180.106 which several unique files….” (Def.’s Ex. 1 at 6). The appellant believes this renders the affidavit incomprehensible. (See Appellant’s Brief at 21-22). However, later in the same paragraph of the affidavit, Lee states that a later search of the IP address showed that it “continued to have files within its share folder and those files all have files which are indicative of being child pornographic and nature ….” (Def.’s Ex. 1 at 6). Using context clues, it is apparent that the missing verb must be “was sharing” or something similar. 3 As the appellant also correctly notes, in a single instance the affidavit specifies an IP address that differs by one numeral from the other references to an IP address in the affidavit. In three instances the affidavit refers to IP 98.194.180.106; it once, however, refers to 98.194.180.196. (Def.’s Ex. 1 at 6-7). From the context clues this must be regarded as a typographical error. The affidavit refers to an “additional check” of IP address 98.194.180.196, and states that this “additional check” shows that the IP address “continue[d]” to share child pornography, when the only check previously mentioned in the affidavit was of IP 98.194.180.106. (Def.’s Ex. 1 at 6). Additionally, the affidavit states that Lee requested information from Comcast “based upon the dates and times the IP address was seen downloading” child pornography, indicating that Lee meant to refer only to a single IP address in the affidavit. The State’s appellate counsel will also note that the numerals 9 and 0 are directly next to each other on a standard keyboard. 9 Lee then took the hash values of the files that were being shared from this IP address and asked other investigators whether they had seen files with those hash values. (Def.’s Ex. 1 at 7). Lee knows this method of matching files “has proven to be extremely reliable,” and he has used hash values to match “thousands of files and has never found two files with different contents but the same” hash value. (Def.’s Ex. 1 at 7). On August 17, 2012, Lee procured from other investigators copies of three video files that matched the hash values of files being shared by the suspect IP address. (Def.’s Ex. 1 at 7-8). One involved a girl between the ages of 5 and 8 being raped; the second involved four girls between 11 and 14 engaging in sex with each other and with the male cameraman; the third involved a girl between the ages of 13 and 16 engaging in oral and vaginal sex with a male. (Def.’s Ex. 1 at 8). 2. Connecting the IP to the Appellant Lee knows that “absent fraud or intentional deception, an [IP] address is an accurate method to find the method of internet connection for an individual accessing the internet.” (Def.’s Ex. 1 at 8). Internet service providers “keep accurate records that can be traced back to specific accounts if the [service providers] are provided with accurate dates and times of [internet] use.” (Def.’s Ex. 1 at 9). 10 After identifying the suspect IP address as being from a block of IP addresses used by Comcast, Lee sent a grand jury subpoena to Comcast requesting information regarding “the subscriber assigned to that IP address, based upon … the dates and time the IP address was seen downloading what are believed to be child pornographic images or videos.” (Def.’s Ex. 1 at 6). On August 20, 2012, Lee received a response from Comcast. It stated that on April 4, 2012, at 8:57 pm, and on August 5, 2012 at 8:42 pm, IP address 98.194.180.106 was being used by an the appellant’s account, the address for which was 18107 Fairhope Oak Street, Houston. (Def.’s Ex. 1 at 7). The account was created on August 7, 2009, and was still active at the time of the grand jury subpoena. (Def.’s Ex. 1 at 7). When Lee ran an additional check on the IP address on December 7, 2012 using his investigative software, he saw that the IP address had been active on one P2P network for roughly a year predating the investigation, from August 27, 2011 through September 3, 2012. (Def.’s Ex. 1 at 6). While using that network, the IP address had been seen using software with two Globally Unique Identifiers (GUIDs). (Def.’s Ex. 1 at 6). While it is possible for a computer’s IP address to change, the GUIDs used by a particular program will remain the same unless the program is updated or uninstalled. (Def.’s Ex. 1 at 6). 11 3. “People who have a sexual interest in children …” Based on his training and experience, Lee believes the individual at 18107 Fairhope Oak Street who was downloading and sharing child pornography had “a sexual interest in children.” (Def.’s Ex. 1 at 12). Lee is aware of several characteristics of such individuals. They “often collect sexually explicit materials … depicting children, which they use for their own sexual gratification and fantasy. (Def.’s Ex. 1 at 12). They “rarely, if ever, dispose of their sexually explicit materials … and those materials are treated as prized possessions.” (Def.’s Ex. 1 at 12-13). III. All but one of the appellant’s complaints are without merit, and on that issue there is a sufficient basis in the affidavit that the trial court’s ruling was not an abuse of discretion. The appellant raises eight specific complaints about the warrant in his brief. The State will address them one by one. A. The name of the online database was not necessary to show probable cause. In his first complaint, the appellant points out that the “online database” mentioned once in the affidavit is not named in the affidavit. (Appellant’s Brief at 16-17). This observation is true, as far as it goes. 12 The State’s first response is that this argument is not preserved because it was not presented to the trial court either in the appellant’s motion to suppress (1 CR 79-81) or in his arguments to the trial court (3 RR 83-88). See Rothstein v. State,
267 S.W.3d 366, 373 (Tex. App.—Houston [14th Dist.] 2008, pet. ref’d) (where defendant filed generic motion to suppress and presented certain specific arguments to trial court, other specific arguments not presented to trial court were not preserved). Second, the appellant gives away the insignificance of this point when he notes that, aside from a single insubstantial reference, “this online database … is not mentioned or described anywhere else in the voluminous affidavit ….” (Appellant’s Brief at 16). The appellant is correct. All of the evidence connecting the appellant to the child pornography was discovered using the investigative software described by Lee; the importance of the “online database” and its relation to the software are not obvious from the affidavit. If this Court were to completely disregard anything in the affidavit relating to an online database, it would not affect the quantum of evidence present to support probable cause. 13 B. Lee adequately described his investigative software. The appellant next complains that the software used by Lee “is Not Credited within the Affidavit.” (Appellant’s Brief at 17-20). The appellant seems confused by the fact that the affidavit describes two types of software. First, the affidavit gives a description of the sort of software commonly used for P2P sharing. (Def.’s Ex. 1 at 4-5). Later, the affidavit describes the investigative software for which Lee has received specialized training and that was used in the investigation of this case. (Def.’s Ex. 1 at 5-6). First, this matter was not raised in the appellant’s motion to suppress or in his arguments to the trial court, thus, on abuse-of-discretion review, it should play no role in this Court’s decision.
Rothstein, 267 S.W.3d at 373. On the merits, though, the State does not believe the affidavit is confusing in the least on this point. In its discussion of P2P file sharing, the affidavit mentions the publicly-available software, stating that Lee “learned that computer users can choose to install publicly available software that facilitates the trading of images.” (Def.’s Ex. 1 at 5). Later, the affidavit states that Lee “has received specialized training regarding the investigations of [P2P] Networks in which a specialized software program developed to allow investigators to access a variety of [P2P] Networks is used.” (Def.’s Ex. 1 at 5). The affidavit then states that Lee “is trained and licensed to use this software”; 14 this is followed by further descriptions of the capabilities of “this software.” (Def.’s Ex. 1 at 5-6). There is no indication anywhere in the affidavit that Lee used any “software” other than the investigative software he described with some detail. Perhaps the affidavit could have been clearer had Lee used the specific name of his investigative software, but, in light of Lee’s descriptions of its capabilities, the name of the program would neither add to nor detract from its reliability. C. The missing verb is apparent from context clues. The third complaint raised by the appellant is that there is a missing verb in one sentence: “Your Affiant located IP address 98.194.180.106 which several unique files, over twenty of them being labeled as child notables, meaning they are files that have been observed by other law enforcement officers as being ‘child pornography.’” (Def.’s Ex. 1 at 6). According to the appellant, it is “impossible” to determine the meaning of this sentence. (Appellant’s Brief at 21). This matter was not raised in the appellant’s motion to suppress or at the trial court. That indicates two things: First, neither trial counsel nor the trial court had any apparent difficulty deciphering the meaning of this 15 sentence; second, the matter is not preserved for this Court’s review.
Rothstein, 267 S.W.3d at 373. The appellant’s failure to raise this matter in the trial court has further significance, because, while the sufficiency of an affidavit is normally determined by what is contained within its four corners, a typographical error in an affidavit can be explained through testimony at a motion-to-suppress hearing. See Champion v. State,
919 S.W.2d 816, 818 (Tex. App.—Houston [14th Dist.] 1996, pet. ref’d) (citing Green v. State,
799 S.W.2d 756, 760 (Tex. Crim. App. 1990)); see also Reyes v. State, 02-11-00327-CR,
2013 WL 1338023, at *3 (Tex. App.—Fort Worth Apr. 4, 2013, no pet.) (mem. op. not designated for publication) (collecting cases). Had the appellant raised this matter in the trial court, the parties could have questioned Lee as to what the missing word was. As a final note on this point, as the State observed in Footnote 2 of this brief, the context in which this sentence occurs makes apparent that the missing verb was “was sharing” or something similar. Two sentences later the affidavit notes that “an additional check” of the IP address “show[ed] the IP has continued to have files within its shared folders and those files all have files [sic.] which are indicative of being child pornographic in nature. ….” (Def.’s Ex. 1 at 6). In this context (and, indeed, in the larger context of the affidavit 16 itself, which is seeking to establish probable cause that a particular IP address associated with the appellant was sharing child pornography), it would be passingly strange if the missing verb were something that did not indicate the suspected IP address was sharing child pornography. D. The affidavit elsewhere describes in detail some of the child pornography found on the suspect IP address, thus whether the phrase “labeled as child notables” was “conclusory and uncredited” is irrelevant, as it was not necessary for the probable-cause determination. The appellant’s next complaint is that the affidavit’s use of the phrase “labeled as child notables” “is conclusory and uncredited. (Appellant’s Brief at 22). The State’s first response, again, is that this complaint was not made either in the appellant’s motion to suppress or in his argument to the trial court, thus it should not factor into this Court’s determination of whether the trial court abused its discretion.
Rothstein, 267 S.W.3d at 373. Second, this part of the affidavit is merely describing the investigation and is not essential for determining probable cause. Later in the affidavit, Lee went into graphic detail regarding three of the files that were being shared by the suspected IP address, and that should be more than sufficient to show probable cause even if this Court disregards the “labeled-as-child-notables” line. 17 E. There was information regarding only one IP address; the “different” IP address mentioned in the affidavit was obviously a typo, as the trial court determined. In his fifth complaint, the appellant notes that in three instances the affidavit refers to IP address 98.194.180.106, but in one instance in the middle of these references the affidavit refers to IP address 98.194.180.196. (Appellant’s Brief at 23-24). The appellant presented this argument at the motion-to-suppress hearing, and the trial court determined that the reference to 98.194.180.196 was a typo and should have read 98.194.180.106. (3 RR 93- 94). Lee testified at the hearing before the trial court, and while he did not explicitly state that the reference to 98.194.180.196 was a typo, it could easily be inferred from his testimony, from the nature of the questioning, and from the affidavit itself. Lee testified that in this case he investigated IP address 98.194.180.106. (3 RR 21). Throughout the hearing the parties questioned Lee about this IP address, and in seemingly every instance the questioning was phrased in the singular (i.e. the investigation involved only one IP address), and Lee responded, likewise, in the singular. (See, e.g., 3 RR 33 (Defense Counsel: “Is that the day you found out who the IP belonged to and what address it was coming from?” Lee: “That’s the date I found out that the IP address was assigned to that account.”)). Most tellingly, at one point the 18 prosecutor asked Lee “how many dates did you verify that child pornography was available for trade from that particular IP address you mentioned earlier,” and Lee responded: “Two days.” (3 RR 55). The affidavit mentions viewing child pornography on an IP address on two dates, but it refers to different IP addresses for each date. (Def.’s Ex. 1 at 6). Thus, Lee’s testimony that on two dates he viewed child pornography on the same IP address is, effectively, testimony that the reference to IP 98.194.180.196 was a typo. The conclusion that the reference to 98.194.180.196 was a typo is also supported by the affidavit itself. When IP address 98.194.180.196 is mentioned, it follows a mention to a check performed on IP 98.194.180.106 and states that an “additional check” was performed on 98.194.180.196, which “continued to have” child pornography available for sharing. (Def.’s Ex. 1 at 6). Reading the reference to IP 98.194.180.196 as a typo makes sense of the paragraph. Reading it, as the appellant does, as a reference to a second IP address renders half the paragraph nonsensical. It is obvious from the surrounding context that this was a typo, and the trial court had testimony supporting its conclusion that it was a typo. See
Champion, 919 S.W.2d at 818. This Court should defer to the trial court’s determination that this was a typo and not a wholly nonsensical paragraph. 19 F. The appellant’s sole legitimate complaint — regarding the imprecise connection between the suspect IP address and the appellant’s residence — is unpreserved. If this Court addresses it, it is a question of first impression and this Court should defer to the inferences drawn by the magistrate and the trial court. The most serious problem with this affidavit is that it does not explicitly connect the appellant to the suspected IP address at the precise moments when the IP address was sharing child pornography. The appellant raises this matter in his brief. (See Appellant’s Brief at 25-29). At trial, however, the appellant’s only argument related to IP addresses was that the appellant’s IP address could have changed between the date that Lee subpoenaed Comcast and the date the warrant issued. (3 RR 86 (“[W]hat I’m getting to, this does not refer to the fact that at a certain time it belonged to him and necessarily belonged to him in December or in November.”), 92-93). That is a different (and irrelevant) issue. This Court should disregard this appellate complaint as unpreserved, particularly because the record shows that the trial court labored under an incorrect interpretation of the affidavit that could have been corrected had trial counsel pointed it out. See
Rothstein, 267 S.W.3d at 373. The appellant’s appellate complaint, though unpreserved, is well taken. Reading it in the light most favorable to the trial court’s findings, the affidavit states that Lee observed IP 98.194.180.106 sharing and/or downloading child 20 pornography on August 9, November 13, and December 7. (Def.’s Ex. 1 at 6). It then states that Lee subpoenaed Comcast regarding which subscriber was using that IP address “based upon … the dates and time the IP address was seen downloading what are believed to be child pornographic images or videos.” (Def.’s Ex. 1 at 6). Comcast responded to this subpoena stating that the suspect IP address was being used by the appellant at particular times on April 4 and August 5. (Def.’s Ex. 1 at 6). Had the affidavit connected the IP address to the appellant’s account at the precise time the IP address was sharing or downloading child pornography, the caselaw is clear that this would have been adequate to establish probable cause. See, e.g., United States v. Vosburgh,
602 F.3d 512, 518, 527 (3d Cir. 2010) (so holding, and collecting cases). What is not clear, though, is how close in time the affidavit must connect the IP address to the suspect. The Texas cases the State can find have determined that probable cause existed if the IP address is “associated” with the suspect, or if it has been “assigned” to the suspect, but those cases have not specified whether the evidence showed that the IP address was “associated” with or “assigned” to the suspect at the precise moment illegal activity was observed. See, e.g., Barrett v. State,
367 S.W.3d 919, 923 (Tex. App.—Amarillo 2012, no pet.) (IP address “associated” with suspect); Gardner v. State,
433 S.W.3d 93, 100 (Tex. 21 App.—Houston [1st Dist.] 2014, pet. ref’d) (IP address “assigned to” suspect). The State can find no case, either in Texas or in the federal courts, where an affidavit connected the suspect to the offending IP address but not at the precise moment the illegal activity occurred, and the appellant has cited to no such case. At the motion-to-suppress hearing, the trial court focused on the next paragraph of the affidavit, which stated that the appellant’s Comcast account “was created on 07/09/2009 and is currently active on [August 20, 2012].” (Def.’s Ex. 1 at 7). The trial court believed this meant that the appellant had had the same IP address for the entire period his account was active: “[T]he information in the search warrant that the officer got from the grand jury subpoena from Comcast shows that this IP address was created on July 9th of 2009 for this defendant at this address and remained with him at least up until the point of, I guess, August 9th of 2012.” (3 RR 89-90). Nothing in the affidavit directly supports or refutes this belief. Trial counsel did not apprise the trial court that this belief was incorrect. There is still a substantial basis in the affidavit for a magistrate to find that the appellant had the offending IP address at the time it was seen downloading and/or sharing child pornography. First, the affidavit states that Lee subpoenaed Comcast for subscriber information “based upon the dates 22 and time the IP address was seen downloading what are believed to be child pornographic images or videos.” (Def.’s Ex. 1 at 6). It is a fair inference from these facts that Lee had observed this IP address downloading child pornography on April 4 and August 5 but had not mentioned it explicitly in his affidavit.4 See Rodriguez v. State,
232 S.W.3d 55, 62 (Tex. Crim. App. 2007) (“The inquiry for reviewing courts, including the trial court, is whether there are sufficient facts, coupled with inferences from those facts, to establish a ‘fair probability’ that evidence of a particular crime will likely be found at a given location.”). Certainly this inference is at least as fair as inferring that Lee had subpoenaed information for relevant dates but Comcast had replied with more-or-less random information. G. The appellant’s complaint about Lee’s “method” of comparing hash values is irrelevant. In his brief, the appellant complains that Lee “did not use valid techniques to compare the hash values” of the files found on the appellant’s computer to known child pornography. (Appellant’s Brief at 29-31). In the trial court, most of the appellant’s arguments related to the hash value comparison. (3 RR 83-85, 87-88). 4 Lee testified to as much at the motion-to-suppress hearing. (3 RR 56). 23 The appellant’s complaint is both meritless and irrelevant. In his brief, the appellant bases his complaint on a statement in the affidavit where Lee states that his software “allows investigators to compare the digital hash values of the offered files to the hash values of known child pornography provided by the National Center for Missing and Exploited Children, which acts as a clearinghouse for images and videos of Child Pornography.” (Def.’s Ex. 1 at 6). From this statement, the appellant draws the conclusion that comparing hash values to images from the National Center for Missing and Exploited Children is the only appropriate method to determine from a file’s hash values if it contains child pornography. (Appellant’s Brief at 29-30). This conclusion has no basis in the affidavit and is facially absurd, as it suggests that no one other than the National Center for Missing and Exploited Children is capable of determining whether a file contains child pornography. The affidavit clearly lays out Lee’s method in this case and his basis for believing it was reliable. He obtained the hash values of files that were being shared by the appellant’s computer. He then asked other law officers if they had seen files with those hash values. He obtained copies of three files that matched those hash values. See Pair v. State,
184 S.W.3d 329, 338 (Tex. App.— Fort Worth 2006, no pet.) (when law enforcement officer swears out affidavit and describes getting information from other officers, that information is 24 presumed credible). He stated that, to his knowledge, there have never been two files with the same hash values but different content. He also stated that he had personally matched up “thousands” of files by using their hash values. And he described in graphic detail the contents of the files that matched the hash values of the files the appellant was sharing. Nothing in the appellant’s brief undermines the validity of the hash-value comparison Lee performed in this case. H. The information in the affidavit connecting child pornography to the appellant’s residence was not stale. In his next complaint, the appellant points out that, while the affidavit connects the appellant and his internet account to 18107 Fairhope Oaks in August (via the subpoena return from Comcast), the affidavit was not sworn to until December 10, and nothing in the affidavit indicates that police did anything to confirm that the appellant was still living at the address in December. (Appellant’s Brief at 31-32). The appellant claims that this four- month gap in information renders the affidavit stale. However, the affidavit, read in the light most favorable to the trial court’s ruling, includes information that the appellant had had this internet account at this address for more than three years at the time of the subpoena return. 25 (Def.’s Ex. 1 at 7). This is how the trial court interpreted the affidavit. (3 RR 89- 90). The State can find no Texas case describing how long information regarding an individual’s residence remains fresh enough to support a warrant for that residence, and the appellant does not cite to any. The State would direct this Court to the case of United States v. Bervaldi,
226 F.3d 1256(11th Cir. 2000). That case dealt with the execution of an arrest warrant; the police executed an arrest warrant at a particular address on the basis of information that the suspect had lived there six months earlier. Bervaldi, 226 F3d 1265. On appeal, Bervaldi complained that the police did not have a “reasonable belief” — the standard required by the Supreme Court in order to allow police to serve an arrest warrant at a particular location — that he would be at that residence.
Ibid. The Eleventh Circuitbegan its analysis by recognizing that, while “reasonable belief” was a different standard than “probable cause,” the same general rules of staleness would apply to both situations.
Ibid. The Bervaldi courtcompared the situation to cases where affidavits had described ongoing criminal activity at a location or bullets in the walls of a location and concluded that, because of the nature of what was described in the affidavit, probable cause did not dissipate as quickly as it would if the affidavit 26 described a single drug transaction at a location.
Id. at 1265(citing United States v. Diecidue,
603 F.2d 535, 560 (5th Cir. 1979) (four-month-old information about bullets in floors and walls of searched location not stale)). “Residency in a house, like protracted and continuous criminal activity or projectiles embedded in the house's walls and floors, generally is not transitory or ephemeral, but instead endures for some length of time.”
Bervaldi, 226 F.3d at 1265. In this case, the affidavit gave information that the appellant had lived a particular location for several years. That location, as described in the affidavit, was not an apartment or vacation rental, but a single-family suburban home. (Def.’s Ex. 1 at 1). Given those facts, the State believes that whatever probable cause to believe that the appellant lived at this address in August had not become stale by the time the warrant issued four months later. As for the information regarding the child pornography itself, the affidavit in this case stated that those who download child pornography tend to collect it and hold it as “prized possessions,” and tend to keep it even if they move or change computers. (Def.’s Ex. 1 at 12-13). When an affidavit contains such statements and details the ongoing possession of child pornography, the information will be “fresh,” for probable-cause purposes, for a lengthy period of time. See State v. Cotter,
360 S.W.3d 647, 654 (Tex. App.—Amarillo 2012, no 27 pet.) (four months); Sanders v. State,
191 S.W.3d 272, 279 (Tex. App.—Waco 2006, pet. ref’d) (seventeen months); United States v. Hay,
231 F.3d 630, 636 (9th Cir. 2000) (six months); United States v. Morales-Aldahondo,
524 F.3d 115, 119 (1st Cir. 2008) (forty-four months). In sum, while the appellant may be correct that it might have been better for Lee to have updated some of his information sometime between August and December, it is not this Court’s role to determine what he should have done. The only question on appeal is whether what he did do provided the magistrate with a substantial basis for finding probable cause. The caselaw, both of this State and of the federal courts, indicates that the information Lee provided in his affidavit was still fresh enough to support a finding of probable cause. 28 Conclusion The State respectfully submits that under the applicable standard of review the trial court was within its discretion to deny the motion to suppress, and this Court should affirm that decision. DEVON ANDERSON District Attorney Harris County, Texas /s/ C.A. Morgan CLINTON A. MORGAN Assistant District Attorney Harris County, Texas 1201 Franklin, Suite 600 Houston, Texas 77002-1923 (713) 755-5826 Texas Bar No. 24071454 29 Certificate of Compliance and Service I certify that, according to Microsoft Word’s word counting function, the portion of this brief for which Rule of Appellate Procedure 9.4(i)(1) requires a word count contains 6,380 words. I also certify that I have requested that efile.txcourts.gov electronically serve a copy of this brief to: Sarah V. Wood sarah.wood@pdo.hctx.net /s/ C.A. Morgan CLINTON A. MORGAN Assistant District Attorney Harris County, Texas 1201 Franklin, Suite 600 Houston, Texas 77002-1923 (713) 755-5826 Texas Bar No. 24071454 Date: April 20, 2015 30
Document Info
Docket Number: 01-14-00519-CR
Filed Date: 4/20/2015
Precedential Status: Precedential
Modified Date: 4/17/2021