Searching over 5,500,000 cases.

Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.

United States v. Heleniak

United States District Court, W.D. New York

February 9, 2015



HUGH B. SCOTT, District Judge.

This matter has been referred to the undersigned pursuant to 28 U.S.C. § 636(b)(1)(C) (text Referral Order, dated Mar. 5, 2014). The instant matter before the Court is defendant's omnibus motion (Docket No. 37), including his motion to suppress statements of defendant's admission to possession of child pornography; suppress evidence from search warrant; and to controvert the search warrant. This Court here considers whether a hearing is in order for these forms of relief. Other relief (service of a Bill of Particulars, identification of informants, production of discovery, production of Jencks Act material and Brady material, production of Federal Rules of Evidence 404(b), 608, 609, preservation of rough notes, and production of Grand Jury transcripts) will be addressed in a separate Order upon determination that all briefing on the motion is deemed submitted.


Defendant was charged with transportation of child pornography in interstate commerce, in violation of 18 U.S.C. § 2252A(a)(1) and (b)(1), on various dates in 2013 and 2014, and possession of child pornography on those dates, in violation of 18 U.S.C. § 2252(a)(5)(B) and (b)(2). (Docket No. 18, Indict.). The Indictment also charged a criminal forfeiture of visual depictions of child pornography (id.).

The alleged pornography at issue was distributed through email by an AOL account. As the Government explains (Docket No. 39, Gov't Response at 1-4), AOL as service provider requires subscribers to agree to terms of service that users comply with applicable laws and not use AOL's facilities to conduct illegal activity, in particular to not post content that is explicit or graphic descriptions of sexual acts. AOL states that, to avoid violations and to enforce the terms of service, it will take any technical, legal, or other actions deemed necessary without notice to the user (id. at 1-2, Ex. 1, AOL terms of service). In United States v. DiTomasso, No. 14-cr-160 (SAS), 2014 U.S. Dist. LEXIS 152505, at *4-5, 27 (S.D.N.Y. Oct. 28, 2014), Judge Scheindlin found that AOL, in its Member Community Guidelines, id. at *4 n.13, had reserved the right to take any action deemed warranted to prevent illegal activity, including cooperating with law enforcement (see Docket No. 51, Gov't Response at 2, Ex. 1, AOL Member Community Guidelines).

Among techniques used by AOL is a scanning tool called Image Detection and Filtering Process ("IDFP") to compare the hash value (or a unique numeric identifier for digital computer files) of scanned email with known files containing apparent child pornography (id. at 2). When IDFP makes a match of hash values for a known pornographic file, the suspected email is reported to the National Center for Missing and Exploited Children (or "NCMEC") CyberTipline, pursuant to 18 U.S.C. § 2258A(a)(1) (id. at 2 & n.1; see Docket No. 37, Def. Atty. Affirm. ¶ 101). NCMEC was founded in 1984 under the Missing Children's Assistance Act (Docket No. 37, Def. Atty. Affirm. ¶ 175).

Federal Bureau of Investigation task force officer Michael Hockwater swore an affidavit in support of a federal search warrant that, AOL, in detecting a suspicious file and reporting it to NCMEC, does not inspect the contents of the electronic file to determine whether child pornography exists (Docket No. 37, Def. Atty. Affirm. ¶ 101). The Government later concedes that it learned from AOL that AOL, in fact, did physically review the suspected files before sending them to NCMEC (Docket No. 39, Gov't Response at 4 n.4). NCMEC then inspects the file to confirm the presence or absence of child pornography and then reports this information to law enforcement (Docket No. 37, Def. Atty. Affirm. ¶ 101; Docket No. 39, Gov't Response, Ex. 4).

In this case, on September 3, 2013, AOL submitted a report to NCMEC declaring that an AOL user submitted an e-mail with three attachments containing suspicious images of child pornography sent to the same e-mail address (Docket No. 37, Def. Atty. Affirm. ¶ 102; Docket No. 39, Gov't Response at 4). NCMEC representatives then reviewed the e-mail and attachment and concluded that it contained child pornography (Docket No. 37, Def. Atty. Affirm. ¶ 102), referring the matter to the New York State Attorney General's office. On November 4, 2013, New York State Police investigator John Lombardi viewed the images from the NCMEC CyberTipline Report, confirming that these images were child pornography (Docket No. 39, Gov't Response at 5-6). On January 3, 2014, Lombardi confirmed the AOL user was the defendant living in West Seneca, New York, and the Federal Bureau of Investigation was contacted for a possible federal prosecution (id. at 6).

On January 23, 2014, this Court issued a search warrant for the premises of 174 Broadway Road, West Seneca, New York, defendant's residence (Docket No. 37, Def. Atty. Affirm. ¶ 100). That warrant was executed on January 24, 2014. Defendant was not in custody when the warrant was executed and defendant volunteered to be interviewed. During the interview, defendant allegedly admitted to searching for and downloading child pornography for the past eight months; he would find images, copy and e-mail them to himself. (Docket No. 39, Gov't Response at 6.) Defendant was shown the three images from the CyberTipline Report and he confirmed that he e-mailed those images to himself (id.). Defendant provided a written statement (id., Ex. 5) wherein he identified his AOL e-mail address (the same as the one reported in the NCMEC report), admitted that he looked at and e-mailed child pornography. During the execution of the warrant, defendant's computer was seized and a subsequent forensic examination found ten images of alleged pornography (Docket No. 39, Gov't Response at 6). This forensic examination also revealed that, after AOL terminated defendant's account, he upgraded his operating system to Windows 8, which would have deleted all child pornography actively saved on the computer (id. at 6-7). Following execution of the search warrant, defendant was arrested and charged in a criminal complaint (Docket No. 1) with receipt of child pornography (Docket No. 39, Gov't Response at 7). On January 29, 2014, a second search warrant was executed for defendant's former AOL account, revealing that three times e-mails were sent from that AOL address back to that address with child pornography attachments (id.), including the three images in the NCMEC report. In another e-mail, defendant sent himself an e-mail with ten attachments of child pornography (id.).

Defendant's Suppression Motion

Within defendant's omnibus motion (Docket No. 37), defendant seeks to controvert the search warrants for the search of the house and for the AOL account (id., Def. Atty. Affirm. ¶¶ 102-07, 108-09, 110). Defendant sought an Order that the Government describe the process (discussed above) for AOL's involvement in this matter (id. ¶ 111). Defendant argues that NCMEC is a Government agency and thus AOL is an agent of the Government and that NCMEC's review was done without a prior search warrant (id. ¶¶ 113, 175; see Docket No. 50, Def. Atty. Aff. ¶ 5). Defendant seeks a hearing regarding the argued warrantless search and seizure of the images cited in the supporting affidavit for the search warrant (Docket No. 37, Def. Atty. Affirm. ¶ 150). Defendant wants this Court to find whether the acts of AOL "were based upon a relationship it had with federal authorities, " whether NCMEC's review of the e-mail without a warrant violates defendant's Fourth Amendment rights; whether the subsequent search warrants should be controverted and evidence suppressed and whether the warrants were tainted by these unlawful acts (id. ¶ 170).

Defendant also contends that Attachment B to the search warrant renders the subsequent search general (id. ¶ 115) because the supporting affidavit was not incorporated by reference to the warrant to restrict its scope (id. ¶ 118). Even if the affidavit is referred to, defendant contends that it provides no guidance and this Court's authorization became general and an exploratory search of defendant's home (id. ¶ 132). Defendant also denies that probable cause exists to justify the search (id. ¶ 133). Defendant seeks a hearing as to the appropriateness of the seizure of all images on defendant's computer, since defendant argues this exceeds the scope permitted by the warrant (id. ¶ 135), see United States v. Galpin, 720 F.3d 436 (2d Cir. 2013) (searches of computer hard drive requires particularity) (id. ¶¶ 136-47).

Defendant also challenges the conclusory allegations of agent Hochwater of the ages of the youths depicted in the images at issue, claiming that they appeared to be under 16 (id. ¶¶ 153-57) without any basis (factual or expert) for that finding (id. ¶ 162).

In response, the Government first denied that defendant was in custody when he made his oral and written statements to Government agents conducting the search of his house (Docket No. 39, Gov't Response at 8-9). The Government insists upon an affidavit from a person with factual knowledge to support defendant's motion for an evidentiary hearing (id. at 10). Defense counsel later stated that defendant will ...

Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.