U.S. v. Perrine

Citation518 F.3d 1196
Decision Date11 March 2008
Docket NumberNo. 06-3336.,06-3336.
PartiesUNITED STATES of America, Plaintiff-Appellee, v. Steven C. PERRINE, Defendant-Appellant.
CourtUnited States Courts of Appeals. United States Court of Appeals (10th Circuit)

Kristen B. Patty, Wichita, Kansas (Philip R. White, Ariagno, Kerns, Mank & White, LLC, Wichita, Kansas, with her on the brief) for Defendant-Appellant.

Brent I. Anderson, Assistant United States Attorney, Wichita, Kansas (Eric F. Melgren, United States Attorney, Wichita, Kansas, with him on the brief) for Plaintiff-Appellee.

Before TACHA, ANDERSON, and GORSUCH, Circuit Judges.

ANDERSON, Circuit Judge.

Defendant and appellant Steven C. Perrine appeals the denial of his motion to suppress evidence following his conviction by a jury on three counts relating to the distribution, receipt and/or possession of child pornography, one count of possession of a firearm by a convicted felon, and two counts of criminal forfeiture. He also appeals the denial of his motion to dismiss the case against him, on the ground that governmental authorities engaged in outrageous conduct. We affirm.

BACKGROUND

On September 2, 2005, James Vanlandingham reported to local police that, while in a Yahoo! chat room and while using the screen name "dana_hotlips05," he began chatting with a person with the screen name "stevedragonslayer." "stevedragonslayer" invited Vanlandingham/"dana_hotlips05" to watch a web cam video depicting two nude six-to-nine-year-old girls. While waiting for the police to arrive, Vanlandingham stayed on the line with "stevedragonslayer" and continued to chat. Vanlandingham asked if "stevedragonslayer" had any more videos, to which "stevedragonslayer" replied he did not know what might offend "dana_hotlips05." After Vanlandingham informed "stevedragonslayer" that he liked "the young hard stuff," "stevedragonslayer" played several videos depicting young girls in various explicit sexual acts.

"stevedragonslayer" stopped sending video clips to "dana_hotlips05" prior to the arrival of police officers at Vanlandingham's house, but Vanlandingham was able to preserve a copy of the chat room conversation. One of the Pennsylvania law enforcement authorities interviewed Vanlandingham and viewed the saved chat room conversation.

Based upon Vanlandingham's account of these events, Pennsylvania law enforcement personnel obtained a disclosure order dated October 14, 2005, pursuant to 18 U.S.C. § 2703(d) and 18 Pa.C.S.A. § 5743(d),1 directing Yahoo! to provide the subscriber information for the screen name "stevedragonslayer." Yahoo!'s records indicated that "stevedragonslayer" logged on to the Yahoo! website from the IP address 68.103.177.146 on October 9, 2005, October 22, 2005, October 29, 2005, October 30, 2005, November 1, 2005, and November 6, 2005.2

Further investigation revealed that this IP address was maintained by Cox Communications, Inc. Pennsylvania authorities obtained another disclosure order requiring Cox to provide the subscriber information for that IP address. Cox reported that the Yahoo! logins from this particular IP address at the times reported by Yahoo were associated with an account belonging to Steve Perrine, 11944 Rolling Hills Court, Wichita, Kansas.

Pennsylvania authorities then contacted Kansas authorities, who discovered that Steve Perrine had a prior state conviction for sexual exploitation of a child, for which he was still on probation. Wichita police obtained a search warrant for Perrine's house, which was executed on December 22, 2005. In addition to seizing Perrine's computer, the police also found firearms and drug paraphernalia. They accordingly amended the search warrant to authorize seizure of those items as well. A forensic examination of Perrine's computer revealed thousands of images of child pornography.

On February 7, 2006, Perrine was charged in a superceding indictment with one count of distributing child pornography, in violation of 18 U.S.C. § 2252(a)(2); one count of receiving child pornography, in violation of 18 U.S.C. § 2252(a)(2); one count of possessing child pornography, in violation of 18 U.S.C. § 2252(a)(4)(B); one count of being a felon in possession of a firearm, in violation of 18 U.S.C. §§ 922(g)(1) and 924(a)(2); and two counts of forfeiture. Among other motions, Perrine filed a motion to suppress and a motion to dismiss based upon outrageous government conduct.

The district court held a motions hearing, at which Perrine testified that he was "stevedragonslayer." Perrine further testified that he had enabled peer-to-peer file sharing on his computer, thereby giving anyone with internet access and certain software the ability to gain entrance to certain files on his computer. After subsequent briefing, the district court denied Perrine's motions.

The case proceeded to a jury trial. A Wichita Police Department Computer Forensics detective, Detective Stone, testified that he found in excess of 16,000 images of child pornography on Perrine's computer. Detective Stone also found Kazaa, a peer-to-peer file sharing program, installed on Perrine's computer. Stone further testified that Kazaa is a program which allows individual users like Perrine to identify folders that are available to share with others, search other computers with Kazaa for specific topics, and download files from other computers, while allowing other computers to download files from Perrine's computer.3

Additionally, Annie Cheung, the senior compliance paralegal at Yahoo!, testified that Yahoo! tracks dates, times, and IP addresses for log-in attempts on a Yahoo! account and maintains that information for approximately thirty days. She further testified that Yahoo! records showed that the IP addresses 68.103.177.226 and 68.103.177.146 belonged to "stevedragonslayer."

Perla Rodriguez, the Cox Communications Customer Escalations Coordinator, testified that residential account IP addresses can change because they are leased for twenty-four hours at a time. Cox Communications residential account IP addresses release and renew every twenty-four hours; when an IP address releases, if the same IP address is available, it reattaches within a few seconds. Rodriguez further testified that only one IP address is assigned to a user at a time and that it is the customer's address on the internet when he or she is online. She stated that the IP address 68.103.177.146 was used by Perrine. Perrine was convicted on all counts.

Perrine thereafter filed a motion for a new trial, a motion for a judgment of acquittal, and a motion for arrest of judgment. After denying the motions, the district court sentenced Perrine to 235 months' imprisonment, to be followed by supervised release for life. Perrine appeals, arguing (1) the district court erred in failing to suppress evidence obtained against him in violation of the Fourth Amendment and/or 18 U.S.C. § 2703(d) and 18 Pa.C.S.A. § 5743(d); and (2) the district court erred in failing to dismiss the case against Perrine due to outrageous government conduct.

DISCUSSION

Perrine appeals the denial of his motion to suppress. "When reviewing a district court's denial of a motion to suppress, we review the district court's factual findings for clear error and consider the evidence in the light most favorable to the Government." United States v. Zamudio-Carrillo, 499 F.3d 1206, 1209 (10th Cir. 2007). Further, "[d]eterminations relating to the sufficiency of a search warrant and the applicability of the good-faith exception are conclusions of law, . . . which this court reviews de novo." United States v. Danhauer, 229 F.3d 1002, 1005 (10th Cir.2000). Finally, while we review the district court's ruling on the sufficiency of a search warrant de novo, we do not review de novo the determination of probable cause by the issuing judge or magistrate. Rather, a state judge's "decision to issue a warrant is entitled to great deference," and we "need only ask whether, under the totality of the circumstances presented in the affidavit, the [state] judge had a `substantial basis' for determining that probable cause existed." United States v. Artez, 389 F.3d 1106, 1111 (10th Cir.2004) (further quotations and citations omitted).

We first consider Perrine's argument that evidence was seized in violation of the ECPA and its state law equivalent, as well as the Fourth Amendment.

I. ECPA/State Law and Fourth Amendment

Perrine argues that compliance with 18 U.S.C. § 2703(d) and 18 Pa.C.S.A. § 5743(d) is "akin to a Terry stop within the scope of the Fourth Amendment and suppression is available to remedy violations." Appellant's Br. at 7. Section 2703 is the core provision of the ECPA, and it authorizes the government to require disclosure of stored communications and transaction records by third-party service providers. Under 18 U.S.C. § 2703(c)(2), "[a] provider of electronic communication service or remote computing service shall disclose to a governmental entity the . . . name; . . . address; . . . telephone or instrument number or other subscriber number or identity, including any temporarily assigned network address . . . of a subscriber to or customer of such service. . . ." 18 U.S.C. § 2703(c)(2). Section 2703(d) specifies that "[a] court order for disclosure under subsection . . . (c) . . . shall issue only if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that the . . . records or other information sought[ ] are relevant and material to an ongoing criminal investigation." 18 U.S.C. § 2703(d).4

Perrine argues that suppression, an appropriate remedy for an impermissible Terry stop,5 is an available remedy for a violation of the ECPA. However, section 2708 of the ECPA specifically states that "[t]he remedies and sanctions described in this chapter are the only judicial remedies and sanctions for nonconstitutional violations of this chapter." 18 U.S.C. § 2708. Section 2707, in turn, describes remedies for violations of the Act as...

To continue reading

Request your trial
212 cases
  • U.S.A v. Steven Warshak, No. 08-3997
    • United States
    • U.S. Court of Appeals — Sixth Circuit
    • December 14, 2010
    ...and articulable facts, especially given the diminished standard that applies to § 2703(d) applications. See United States v. Perrine, 518 F.3d 1196, 1202 (10th Cir. 2008) (noting that "the 'specific and articulable facts' standard derives from the Supreme Court's decision in Terry"); Warsha......
  • In re Application of the United States for an Order Pursuant to 18 U.S.C. § 2703(d)
    • United States
    • U.S. District Court — Eastern District of Virginia
    • November 10, 2011
    ...IP address information is “subscriber information provided to an Internet provider.” 624 F.3d at 573–74 (citing United States v. Perrine, 518 F.3d 1196, 1204 (10th Cir.2008); Bynum, 604 F.3d at 164). As the Third Circuit observed there, “no reasonable expectation of privacy exists in an IP ......
  • U.S. v. Cray
    • United States
    • U.S. District Court — Southern District of Georgia
    • November 20, 2009
    ...information provided to an internet provider is not protected by the Fourth Amendment's privacy expectation." United States v. Perrine, 518 F.3d 1196, 1204 (10th Cir.2008) (citations omitted). In the instant case, the information gained pursuant to the Customs Summonses and used to support ......
  • Attkisson v. Holder
    • United States
    • U.S. Court of Appeals — Fourth Circuit
    • May 17, 2019
    ...child pornography can support a search warrant for the physical premises linked to that IP address"); United States v. Perrine , 518 F.3d 1196, 1201–04 (10th Cir. 2008). Attkisson’s complaint identified two specific IPv4 addresses owned and controlled by the government that were used to per......
  • Request a trial to view additional results
1 firm's commentaries
  • Subscriber Does Not Have Fourth Amendment Privacy Interest In Own IP Data
    • United States
    • Mondaq United States
    • December 16, 2014
    ...not violate any claim Wheelock may have had to a reasonable expectation of privacy in his IP address. Accord United States v. Perrine, 518 F.3d 1196 (10th Cir. 2008) ("Every federal court to address this issue has held that subscriber information provided to an internet provider is not prot......
16 books & journal articles
  • Search and seizure of electronic devices
    • United States
    • James Publishing Practical Law Books Suppressing Criminal Evidence Fourth amendment searches and seizures
    • April 1, 2022
    ...in (NAME YEAR), only a single lead existed from a four year old investigation that started in 2 See, e.g ., United States v. Perrine , 518 F.3d 1196, 1206 (10th Cir. 2008) (“‘The observation that images of child pornography are likely to be hoarded by persons interested in those materials i......
  • Search and seizure of electronic devices
    • United States
    • James Publishing Practical Law Books Archive Suppressing Criminal Evidence - 2020 Contents
    • July 31, 2020
    ...in (NAME YEAR), only a single lead existed from a four year old investigation that started in 2 See, e.g ., United States v. Perrine , 518 F.3d 1196, 1206 (10th Cir. 2008) (“‘The observation that images of child pornography are likely to be hoarded by persons interested in those materials i......
  • Search and Seizure of Electronic Devices
    • United States
    • James Publishing Practical Law Books Archive Suppressing Criminal Evidence - 2016 Contents
    • August 4, 2016
    ...in (NAME YEAR), only a single lead existed from a four year old investigation that started in 2 See, e.g ., United States v. Perrine , 518 F.3d 1196, 1206 (10th Cir. 2008) (“‘The observation that images of child pornography are likely to be hoarded by persons interested in those materials i......
  • Crime-Severity Distinctions and the Fourth Amendment: Reassessing Reasonableness in a Changing World
    • United States
    • Iowa Law Review No. 97-1, November 2011
    • November 1, 2011
    ...with modern reality, rendering the Fourth Amendment increasingly irrelevant in a changing world. 180 179 . See United States v. Perrine, 518 F.3d 1196, 1204 (10th Cir. 2008) (finding no Fourth Amendment search where government obtained subscriber information from Internet service provider a......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT