Searching over 5,500,000 cases.


searching
Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.

United States v. Heleniak

United States District Court, W.D. New York

July 10, 2015

UNITED STATES OF AMERICA,
v.
JOSEPH S. HELENIAK, Defendant.

ORDER

HUGH B. SCOTT, Magistrate Judge.

This matter has been referred to the undersigned pursuant to 28 U.S.C. § 636(b)(1)(C) (text Referral Order, dated Mar. 5, 2014). The instant matter before the Court is the motion of the National Center for Missing and Exploited Children ("NCMEC") to appear in this case as amicus curiae (Docket No. 54) and the supporting motion by the Government to accept NCMEC's amicus brief (Docket No. 58). During the beginning of evidentiary hearing on March 19, 2015, the Government indicated NCMEC's desire to serve as amicus; the Government was to brief this issue by March 31, 2015, and defendant was to respond by April 30, 2015 (Docket No. 57), but did not. The matter was considered during the hearing on June 26, 2015, when pro hac vice status was granted to NCMEC counsel Christopher Schmidt (Docket No. 63; see Docket No. 56); later pro hac vice status was granted to Logan Rutherford (Docket No. 66; see Docket No. 55). The matter was deemed submitted as of June 26, 2015.

BACKGROUND

Defendant was charged with transportation of child pornography in interstate commerce, in violation of 18 U.S.C. § 2252A(a)(1) and (b)(1), on various dates in 2013 and 2014, and possession of child pornography on those dates, in violation of 18 U.S.C. § 2252(a)(5)(B) and (b)(2), with forfeiture of computer instruments (Docket No. 18, Indict.).

The alleged pornography at issue was distributed through email by an AOL account. As the Government explained in a previous document (Docket No. 39, Gov't Response at 1-4), AOL as service provider requires subscribers to agree to terms of service that users comply with applicable laws and not use AOL's facilities to conduct illegal activity, in particular to not post content that is explicit or graphic descriptions of sexual acts. To avoid violations and to enforce the terms of service, AOL will take any technical, legal, or other actions deemed necessary without notice to the user (id. at 1-2, Ex. 1, AOL terms of service). In United States v. DiTomasso, No. 14-cr-160 (SAS), 2014 U.S. Dist. LEXIS 152505, at *4-5, 27 (S.D.N.Y. Oct. 28, 2014), Judge Scheindlin found that AOL, in its Member Community Guidelines, id. at *4 n.13, had reserved the right to take any action deemed warranted to prevent illegal activity, including cooperating with law enforcement (see Docket No. 51, Gov't Response at 2, Ex. 1, AOL Member Community Guidelines).

Among techniques used by AOL is a scanning tool called Image Detection and Filtering Process ("IDFP") to compare the hash value (or a unique numeric identifier for digital computer files) of scanned email with known files containing apparent child pornography (id. at 2). When IDFP makes a match of hash values for a known pornographic file, the suspected email is reported to the NCMEC CyberTipline, pursuant to 18 U.S.C. § 2258A(a)(1) (id. at 2 & n.1; see Docket No. 37, Def. Atty. Affirm. ¶ 101). NCMEC was founded in 1984 under the Missing Children's Assistance Act (Docket No. 37, Def. Atty. Affirm. ¶ 175; but cf. Docket No. 54, Ex. A, NCMEC Amicus Brief (describing its origins and purposes)).

Federal Bureau of Investigation task force officer Michael Hockwater swore an affidavit in support of a federal search warrant that, AOL, in detecting a suspicious file and reporting it to NCMEC, does not inspect the contents of the electronic file to determine whether child pornography exists (Docket No. 37, Def. Atty. Affirm. ¶ 101). The Government later conceded that it learned from AOL that AOL, in fact, did physically review the suspected files before sending them to NCMEC (Docket No. 39, Gov't Response at 4 n.4). NCMEC then inspects the file to confirm the presence or absence of child pornography and then reports this information to law enforcement (Docket No. 37, Def. Atty. Affirm. ¶ 101; Docket No. 39, Gov't Response, Ex. 4).

In this case, on September 3, 2013, AOL submitted a report to NCMEC declaring that an AOL user submitted an e-mail with three attachments containing suspicious images of child pornography sent to the same e-mail address (Docket No. 37, Def. Atty. Affirm. ¶ 102; Docket No. 39, Gov't Response at 4). NCMEC representatives then reviewed the e-mail and attachment and concluded that it contained child pornography (Docket No. 37, Def. Atty. Affirm. ¶ 102), referring the matter to the New York State Attorney General's office. On November 4, 2013, New York State Police investigator John Lombardi viewed the images from the NCMEC CyberTipline Report, confirming that these images were child pornography (Docket No. 39, Gov't Response at 5-6). On January 3, 2014, Lombardi confirmed the AOL user was the defendant living in West Seneca, New York, and the Federal Bureau of Investigation was contacted for a possible federal prosecution (id. at 6).

On January 23, 2014, this Court issued a search warrant for the premises of 174 Broadway Road, West Seneca, New York, defendant's residence (Docket No. 37, Def. Atty. Affirm. ¶ 100). Defendant was not in custody when the warrant was executed and defendant volunteered to be interviewed. During the interview, defendant allegedly admitted to searching for and downloading child pornography for the past eight months; he would find images, copy and e-mail them to himself. (Docket No. 39, Gov't Response at 6.) Defendant was shown the three images from the CyberTipline Report and he confirmed that he e-mailed those images to himself (id.). Defendant provided a written statement (id., Ex. 5) wherein he identified his AOL e-mail address (the same as the one reported in the NCMEC report), admitted that he looked at and e-mailed child pornography. During the execution of the warrant, defendant's computer was seized and a subsequent forensic examination found ten images of alleged pornography (Docket No. 39, Gov't Response at 6). This forensic examination also revealed that, after AOL terminated defendant's account, he upgraded his operating system to Windows 8, which would have deleted all child pornography actively saved on the computer (id. at 6-7). Following execution of the search warrant, defendant was arrested and charged in a criminal complaint (Docket No. 1) with receipt of child pornography (Docket No. 39, Gov't Response at 7). On January 29, 2014, a second search warrant was executed for defendant's former AOL account, revealing that three times e-mails were sent from that AOL address back to that address with child pornography attachments (id.), including the three images in the NCMEC report. In another e-mail, defendant sent himself an e-mail with ten attachments of child pornography (id.).

Defendant's Suppression Motion

Within defendant's omnibus motion (Docket No. 37), defendant seeks to controvert the search warrants for the search of the house and for the AOL account (id., Def. Atty. Affirm. ¶¶ 102-07, 108-09, 110). Defendant argues that NCMEC is a Government agency and thus AOL is an agent of the Government and that NCMEC's review was done without a prior search warrant (id. ¶¶ 113, 175; see Docket No. 50, Def. Atty. Aff. ¶ 5). Defendant sought (and obtained) a hearing regarding the argued warrantless search and seizure of the images cited in the supporting affidavit for the search warrant (Docket No. 37, Def. Atty. Affirm. ¶ 150). Defendant wanted this Court to find whether the acts of AOL "were based upon a relationship it had with federal authorities, " whether NCMEC's review of the e-mail without a warrant violates defendant's Fourth Amendment rights; whether the subsequent search warrants should be controverted and evidence suppressed and whether the warrants were tainted by these unlawful acts (id. ¶ 170).

In reply, defendant pointed out that the Government conceded that in one case, United States v. Keith, 980 F.Supp.2d 33, 40 (D. Mass. 2013), that NCMEC was found to be a Government agent when it provides information to law enforcement (Docket No. 50, Def. Atty. Aff. ¶ 10; cf. Docket No. 39, Gov't Response at 21).

NCMEC's Motion to Be Amicus

NCMEC moved (Docket No. 54) for leave to appear as amicus curiae and to file a brief (Docket No. 54, Ex. A (proposed Amicus Brief)). NCMEC explains that it is "in a unique position to explain the intricacies of its mission, goals, and conduct in operating the CyberTipline, and it can bring a specialized perspective to this matter that would be useful to" this Court (Docket No. 54, NCMEC Motion, at 1). NCMEC has interests beyond this case "because this Court's decision could undermine CyberTipline operations generally, " thus NCMEC seeks to appear as amicus in this case (id. at 1-2). NCMEC conferred with the parties, the Government consented to NCMEC's participation while defendant did not (id. at 2). Counsel for NCMEC also moved for admission pro hac vice (Docket Nos. 55, 56), which were granted (Docket Nos. 63 (minutes, June 26, 2015), 65 (transcript of June 26, 2015, hearing), 66). The Government filed a ...


Buy This Entire Record For $7.95

Download the entire decision to receive the complete text, official citation,
docket number, dissents and concurrences, and footnotes for this case.

Learn more about what you receive with purchase of this case.