United States v. DiTomasso

Decision Date28 October 2014
Docket NumberNo. 14–cr–160 SAS.,14–cr–160 SAS.
Citation56 F.Supp.3d 584
PartiesUNITED STATES of America v. Frank DiTOMASSO, Defendant.
CourtU.S. District Court — Southern District of New York

Lee Ginsberg, Esq., Nadjia Limani, Esq., Freeman, Nooter & Ginsberg, New York, NY, for Defendant Frank DiTomasso.

Margaret Graham, Assistant U.S. Attorney, U.S. Attorney's Office for the Southern District of New York, New York, NY, for the Government.

OPINION AND ORDER

SHIRA A. SCHEINDLIN, District Judge:

I. INTRODUCTION

Frank DiTomasso faces criminal charges for the production and transportation of child pornography. Much of the government's case against DiTomasso depends on evidence found on his computer—evidence that he claims was obtained in violation of the Fourth Amendment. Accordingly, DiTomasso has moved to suppress (1) evidence obtained when internet service provider (“ISP”)1 American Online (“AOL”) examined the content of his email, (2) evidence obtained when ISP Omegle.com LLC (“Omegle”) examined the content of his chats, and (3) all “information and tangible and intangible evidence obtained through subsequent searches by [law enforcement] as fruit of the poisonous tree.2

This Opinion addresses two questions. First, it addresses the threshold question of whether DiTomasso had an expectation of privacy in the content of his emails and chats. If so, his Fourth Amendment challenge to AOL's and Omegle's conduct may proceed. If not, the challenge fails as a matter of law. Second, it addresses whether DiTomasso, by agreeing to AOL's and Omegle's respective terms of use, consented to a search of his emails and/or his chats.

For the reasons set forth below, DiTomasso's motion to suppress is DENIED in part.

II. BACKGROUND

A. AOL Emails

DiTomasso has an AOL email account—frankieinnycl@aol.com. When AOL users send or receive emails that contain attachments, AOL runs two background monitoring systems designed to scan for illicit material, including, but not limited to, child pornography.3 The programs work by assigning “hash numbers” to image and video files. In essence, hash numbers are unique number-strings that can be used to archive packets of data—“fingerprint[s] for electronic media.4

AOL employs two different hashing programs. The first—the Image Detection and Filtering Process (“IDFP”)—sweeps for one-to-one matches with known child pornography.5 If an attached file is a one-to-one match, the email is quarantined—i.e., diverted from the recipient's inbox—and an automatic report is generated and sent to the National Center for Missing and Exploited Children (“NCMEC report”).6

AOL's second hashing program—“photoDNA”—looks for similarities among hash numbers.7 If photoDNA identifies an attachment with a hash number close enough to known child pornography to raise alarm, the email is once again quarantined, and “an AOL employee reviews the flagged file to confirm the presence of apparent child pornography.”8 Once the presence of apparent child pornography is confirmed, the employee “submit[s] a [NCMEC report],”9 and the file's hash number is entered into the IDFP database.

On August 17, 2012, two emails intended for frankieinnycl@aol.com were hashed and quarantined, giving rise to two corresponding NCMEC reports. The first email, which formed the basis of NCMEC report # 1560137, was hashed using photoDNA—and its contents were reviewed by an AOL employee.10 The second email, which formed the basis of NCMEC report # 1558963, was hashed using IDFP.11 No AOL employee reviewed its contents.

B. AOL's Privacy Policy

At the time of the disputed searches, AOL's privacy policy and terms of use required users to assent to the following conditions. First, they forbade users from “post[ing] content that contains explicit or graphic descriptions or accounts of sexual acts or is threatening, abusive, harassing, defamatory, libelous, deceptive, fraudulent, invasive of another's privacy, or tortious.”12 Second, AOL's terms provided that “AOL reserves the right to take any action it deems warranted” in response to illegal behavior, including “terminat[ing] accounts and cooperat[ing] with law enforcement.”13 Third, AOL's terms made clear that if users “disclose information about [themselves] publicly ... others outside of AOL may obtain access to [such] information,” and furthermore, that AOL itself may disclose to others—including law enforcement—“information [that is] relevant to a crime that has been or is being committed.”14

C. Omegle Chats

Omegle.com is an online platform that “randomly pairs a user in a one-on-one session with a stranger, and allows strangers to communicate via text and video chats.”15 Omegle monitors “for inappropriate content ... by capturing snapshots from chats that are conducted on Omegle,”16 which are then “analyze[d] by an automated program “for content that is likely to be inappropriate, including, but not limited to, child pornography.”17 When the automated program flags inappropriate content, the chats are “passed on to two human reviewers,”18 and if a reviewer finds evidence of child pornography, a NCMEC report is filed.19

On three separate occasions—November 30, 2012, January 4, 2013, and December 11, 2013—snapshots of DiTomasso's Omegle chats were flagged for evidence of child pornography. This led to the filing of three NCMEC reports: # 1704143, # 1741964, and # 2235394, respectively.20

D. Omegle's Privacy Policy

At the time of the disputed searches, Omegle's privacy policy set forth the following conditions. First, Omegle's policy explained that Omegle keeps “record[s] of the IP addresses involved in every chat.”21 The policy articulated numerous reasons for maintaining such records—including “for the purpose of law enforcement.”22 Second, Omegle's policy also made clear that it engages in two forms of monitoring distinct from its IP record-keeping, which are intended for “quality control purposes.”23 The first is that messages flagged as spam “may be read by a human being to improve Omegle's anti-spam software.”24 The second is that [w]ebcam videos may be captured from Omegle video charts ... and monitored,” on an ad hoc basis, “for misbehavior.”25 Third, Omegle's policy cautioned users to be “careful about what information [they] reveal” during chats, because “strangers can potentially tell other people anything you tell them.”26

E. DiTomasso's Probation

At the time of the disputed searches, DiTomasso was on probation in connection with a 2010 conviction for possession of child pornography.27 The probation terms—to which DiTomasso consented—required, among other things, that he [p]ermit [his] probation officer or their designee to inspect and access your computer at anytime, [ ] includ[ing] storage devices and any other media.”28

III. APPLICABLE LAW

A. Expectations of Privacy in General

The Fourth Amendment to the United States Constitution protects “the right of the people to be secure ... against unreasonable searches and seizures.”29 Whether an investigative activity qualifies as a “search”—and triggers Fourth Amendment scrutiny—depends on subjective expectations of privacy.30 If (1) an individual expects that information will remain private, and (2) society is “prepared to recognize [that expectation] as ‘reasonable,’31 the Fourth Amendment regulates the investigation of that information by law enforcement.

Constitutionally-recognized “expectations of privacy” differ in two important respects from the “mere expectation ... that certain facts will not come to the attention of the authorities.”32 First, the Fourth Amendment does not protect ill-advised trust. It provides no recourse for “a wrongdoer's misplaced belief that a person to whom he voluntarily confides his wrongdoing will not reveal it.”33 By disclosing sensitive information to someone else, one runs the risk that the other person will reveal the information to law enforcement.

Second, “a person has no legitimate expectation of privacy in information that he voluntarily turns over to third parties.”34 Because this principle, if taken to its logical endpoint, would erode nearly all privacy protections, in Smith v. Maryland the Supreme Court distinguished between (1) the “contents of communication[ ] and (2) the ancillary information that the act of communication incidentally discloses.35 Today, this distinction is often described as the difference between data and metadata. While the former retains Fourth Amendment protection even if disclosed to a third party, the latter loses its protection immediately once disclosed.

B. Diminished Expectations of Privacy While on Probation

“Probationers and parolees are subject to ‘a degree of impingement upon privacy that would not be constitutional if applied to the public at large.’36 In United States v. Knights, the Supreme Court held that probation agreements containing consent-to-search provisions “significantly diminish[ ] [the probationer's] expectation of privacy.”37 In so holding, the Court explicitly reserved the question of whether a consent-to-search provision simply “diminishe[s], or completely eliminate[s], [the probationer's] expectation of privacy”38 —and correspondingly, whether “a search by a law enforcement officer without any individualized suspicion would [satisfy] the reasonableness requirement of the Fourth Amendment.”39

Elaborating on these principles, the Second Circuit has explained that “persons on supervised release who sign [ ] documents [consenting to future searches of their home] manifest an awareness that supervision can include intrusions into their residence and, thus, have ‘a severely diminished expectation of privacy.’40 Furthermore, the Second Circuit has also held that home visits by probation officers—as opposed to full probationary searches—do not even require “reasonable suspicion,” because home visits are so much “less intrusive.”41

C. Fourth Amendment Standing

Fourth Amendment rights are personal rights which ... may not be vicariously asserted.”42 A person lacks standing to raise Fourth...

To continue reading

Request your trial
13 cases
  • United States v. Clark
    • United States
    • U.S. District Court — District of Kansas
    • May 18, 2023
    ...content on the platform is monitored and may be disclosed to law enforcement. Doc. 34-1 at 8; Wilbert, 2018 WL 6729659, at *2; DiTomasso, 56 F.Supp.3d at 588. also informs users that the service requires them to share their IP address with Omegle. DiTomasso, 56 F.Supp.3d at 596. Omegle uses......
  • People v. Thompson
    • United States
    • New York Supreme Court
    • February 17, 2016
    ...[O'Toole, J.] ) (email users have a reasonable expectation of privacy in the content of emails or their attached files); United States v. DiTomasso, 56 F.Supp.3d 584 (S.D.N.Y.2014 [Scheindlin, J.] ) (email users generally have a reasonable expectation of privacy in email contents held by IS......
  • Bowers v. Cnty. of Taylor
    • United States
    • U.S. District Court — Western District of Wisconsin
    • April 14, 2022
    ...concluded that monitoring of email communications for commercial purposes doesn't waive the sender's expectation of privacy. 56 F. Supp. 3d 584, 591 (S.D.N.Y. 2014). The court reasoned that use of electronic devices is necessary for "meaningful participation in social and professional life,......
  • People v. Pierre
    • United States
    • New York Supreme Court
    • March 21, 2016
    ...be fairly inferred that users were consenting to a search so as to defeat a Fourth Amendment claim (see, e.g., United States v. DiTomasso, 56 F.Supp.3d 584 [S.D.N.Y.2014] ). Defendant has asserted a personal, legitimate expectation of privacy in the premises searched and the property seized......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT