United States v. Reddick

Decision Date17 August 2018
Docket NumberNo. 17-41116,17-41116
Parties UNITED STATES of America, Plaintiff-Appellee v. Henry Franklin REDDICK, Defendant-Appellant
CourtU.S. Court of Appeals — Fifth Circuit

Andrew R. Gould, Assistant U.S. Attorney, Carmen Castillo Mitchell, Assistant U.S. Attorney, U.S. Attorney's Office, Houston, TX, for Plaintiff-Appellee.

Marjorie A. Meyers, Federal Public Defender, H. Michael Sokolow, Assistant Federal Public Defender, Federal Public Defender's Office, Houston, TX, for Defendant-Appellant.

Before KING, SOUTHWICK, and HO, Circuit Judges.

JAMES C. HO, Circuit Judge:

Private businesses and police investigators rely regularly on "hash values" to fight the online distribution of child pornography. Hash values are short, distinctive identifiers that enable computer users to quickly compare the contents of one file to another. They allow investigators to identify suspect material from enormous masses of online data, through the use of specialized software programs—and to do so rapidly and automatically, without the need for human searchers.

Hash values have thus become a powerful tool for combating the online distribution of unlawful aberrant content. The question in this appeal is whether and when the use of hash values by law enforcement is consistent with the Fourth Amendment. For the Fourth Amendment concerns not efficiency, but the liberty of the people "to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures." There is no precedent in our circuit concerning the validity of these investigative tools under the Fourth Amendment, and to our knowledge no other circuit has confronted the precise question before us. This case therefore presents an opportunity to apply established Fourth Amendment principles in this new context.

One touchstone of our Fourth Amendment jurisprudence is that the Constitution secures the right of the people against unreasonable searches and seizures conducted by the government—not searches and seizures conducted by private parties. Under the private search doctrine, the Fourth Amendment is not implicated where the government does not conduct the search itself, but only receives and utilizes information uncovered by a search conducted by a private party.

The private search doctrine decides this case. A private company determined that the hash values of files uploaded by Mr. Reddick corresponded to the hash values of known child pornography images. The company then passed this information on to law enforcement. This qualifies as a "private search" for Fourth Amendment purposes. And the government’s subsequent law enforcement actions in reviewing the images did not effect an intrusion on Mr. Reddick’s privacy that he did not already experience as a result of the private search. Accordingly, we affirm the judgment of the district court.

I.

In technical terms, a hash value is "an algorithmic calculation that yields an alphanumeric value for a file." United States v. Stevenson , 727 F.3d 826, 828 (8th Cir. 2013). More simply, a hash value is a string of characters obtained by processing the contents of a given computer file and assigning a sequence of numbers and letters that correspond to the file’s contents. In the words of one commentator, "[t]he concept behind hashing is quite elegant: take a large amount of data, such as a file or all the bits on a hard drive, and use a complex mathematical algorithm to generate a relatively compact numerical identifier (the hash value) unique to that data." Richard P. Salgado, Fourth Amendment Search and the Power of the Hash , 119 Harv. L. Rev. F. 38, 38 (2005).

Hash values are regularly used to compare the contents of two files against each other. "If two nonidentical files are inputted into the hash program, the computer will output different results. If the two identical files are inputted, however, the hash function will generate identical output." Orin S. Kerr, Searches and Seizures in a Digital World , 119 Harv. L. Rev. 531, 541 (2005). Hash values have been used to fight child pornography distribution, by comparing the hash values of suspect files against a list of the hash values of known child pornography images currently in circulation. This process allows potential child pornography images to be identified rapidly, without the need to involve human investigators at every stage.

II.

Henry Reddick uploaded digital image files to Microsoft SkyDrive, a cloud hosting service. SkyDrive uses a program called PhotoDNA to automatically scan the hash values of user-uploaded files and compare them against the hash values of known images of child pornography. When PhotoDNA detects a match between the hash value of a user-uploaded file and a known child pornography hash value, it creates a "CyberTip" and sends the file—along with the uploader’s IP address information—to the National Center for Missing and Exploited Children (NCMEC).

In early 2015, Microsoft sent CyberTips to NCMEC based on the hash values of files that Reddick had uploaded to SkyDrive. Based on location data derived from the IP address information accompanying the files, NCMEC subsequently forwarded the CyberTips to the Corpus Christi Police Department. Upon receiving the CyberTips, police detective Michael Ilse opened each of the suspect files and confirmed that each contained child pornography. Shortly thereafter, Detective Ilse applied for and received a warrant to search Reddick’s home and seize his computer and related materials. This search uncovered additional evidence of child pornography in Reddick’s possession.

Reddick was indicted for possession of child pornography in violation of 18 U.S.C. § 2252(a)(2) and (b)(1). Following his indictment, Reddick initially pled not guilty and moved to suppress all the evidence of child pornography. He alleged that Detective Ilse’s warrantless opening of the files associated with the CyberTips was an unlawful search. He further claimed that any evidence of child pornography found in his home should be suppressed under the exclusionary rule, since the initial review of the suspect files was improper.

The district court denied his motion. Reddick subsequently pled guilty, while retaining the right to appeal the denial of his suppression motion. In denying Reddick’s motion, the district court "assume[d] without deciding that Officer Ilse’s viewing of the file images ... invaded a constitutional expectation of privacy, exceeded the scope of Microsoft Skydrive’s hash value search, and did not fall into any exception to the warrant requirement." The court nevertheless concluded that "the evidence here support[ed] the good faith exception to the exclusionary rule." Accordingly, the court found no justification to suppress the evidence of child pornography found in Reddick’s home.

As a general rule, "[w]e may affirm the district court’s ruling on a motion to suppress ‘based on any rationale supported by the record.’ " United States v. Wise , 877 F.3d 209, 215 (5th Cir. 2017) (citation omitted). Consistent with this rule, we affirm the denial of the motion to suppress on a ground broader than the one invoked by the district court—namely, that under the private search doctrine, Officer Ilse’s viewing of the file images did not violate the Fourth Amendment.

III.

Under the private search doctrine, "the critical inquiry under the Fourth Amendment is whether the authorities obtained information with respect to which the defendant’s expectation of privacy has not already been frustrated." United States v. Runyan , 275 F.3d 449, 461 (5th Cir. 2001). The question presented here, then, is whether, by the time...

To continue reading

Request your trial
36 cases
  • People v. Wilson
    • United States
    • California Court of Appeals
    • October 21, 2020
    ...entirety as equivalent to a private search which frustrated any reasonable expectation of privacy in the subject files. (See Reddick, supra , 900 F.3d at p. 637 [a private company's determination, using an automated computer program, that the hash values of defendant's uploaded files corres......
  • United States v. Wilson
    • United States
    • United States Courts of Appeals. United States Court of Appeals (9th Circuit)
    • September 21, 2021
    ...although the reasoning of the two opinions diverged. The circumstances in both cases were similar to those here. See United States v. Reddick , 900 F.3d 636 (5th Cir. 2018) ; United States v. Miller , 982 F.3d 412, 427 (6th Cir. 2020). In both cases, after an electronic service provider fla......
  • United States v. Miller
    • United States
    • United States Courts of Appeals. United States Court of Appeals (6th Circuit)
    • December 3, 2020
    ..."private-search doctrine." See United States v. Lichtenberger , 786 F.3d 478, 481–82 (6th Cir. 2015) ; see also United States v. Reddick , 900 F.3d 636, 637 (5th Cir. 2018). The Court has held that government conduct does not infringe a reasonable expectation of privacy (or qualify as a "se......
  • United States v. Clark
    • United States
    • U.S. District Court — District of Kansas
    • May 18, 2023
    ...that the officer's viewing of the same files would disclose what the private party already found-child pornography. Id. at 429-31. And in Reddick, the private party flagged images as CSAM through an automatic hash value system; it did not actually “view” the file. 900 F.3d at 639. After rec......
  • Request a trial to view additional results
3 firm's commentaries
9 books & journal articles
  • Evidence
    • United States
    • James Publishing Practical Law Books Archive Texas Criminal Lawyer's Handbook. Volume 2 - 2020 Contents
    • August 16, 2020
    ...they correspond, the files are often referred to the National Center for Missing and Exploited Children (NCMEC). United States v. Reddick, 900 F.3d 636, 637-8 (Fifth Circuit, 2018). This procedure does not violate the Fourth Amendment because under the private search doctrine, the individua......
  • Child Sexual Abuse
    • United States
    • James Publishing Practical Law Books Archive Texas Criminal Lawyer's Handbook. Volume 2 - 2021 Contents
    • August 16, 2021
    ...they correspond, the files are often referred to the National Center for Missing and Exploited Children (NCMEC). United States v. Reddick, 900 F.3d 636, 637-8 (5th Cir. 2018). This procedure does not violate the Fourth Amendment because under the private search doctrine the individual’s exp......
  • Child sexual abuse
    • United States
    • James Publishing Practical Law Books Texas Criminal Lawyer's Handbook. Volume 1-2 Volume 2
    • May 5, 2022
    ...they correspond, the files are often referred to the National Center for Missing and Exploited Children (NCMEC). United States v. Reddick, 900 F.3d 636, 637-8 (5th Cir. 2018). This procedure does not violate the Fourth Amendment because under the private search doctrine the individual’s exp......
  • Evidence
    • United States
    • James Publishing Practical Law Books Archive Texas Criminal Lawyer's Handbook. Volume 2 - 2021 Contents
    • August 16, 2021
    ...they correspond, the files are often referred to the National Center for Missing and Exploited Children (NCMEC). United States v. Reddick, 900 F.3d 636, 637-8 (Fifth Circuit, 2018). This procedure does not violate the Fourth Amendment because under the private search doctrine, the individua......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT