U.S. v. Kennedy
Decision Date | 03 January 2000 |
Docket Number | No. 99-10105-01.,99-10105-01. |
Citation | 81 F.Supp.2d 1103 |
Parties | UNITED STATES of America, Plaintiff, v. Michael R. KENNEDY, Defendant. |
Court | U.S. District Court — District of Kansas |
Debra L. Barnett, Office of United States Attorney, Wichita, KS, for plaintiff.
Daniel E. Monnat, Monnat & Spurrier, Chartered, Wichita, KS, for defendant.
On August 25, 1999, Defendant Michael R. Kennedy was indicted for the intentional receipt of child pornography in violation of 18 U.S.C. § 2252(a)(2) (Doc. 1) and forfeiture under 18 U.S.C. § 2253. Before the court for its consideration are:
1. Defendant's motion to suppress evidence (Doc. 13);
2. Defendant's memorandum in support of his motion to suppress (Doc. 14)1;
3. The government's response (Doc. 20);
An evidentiary hearing was held December 2, 1999. For the following reasons, defendant's motion to suppress is denied.
On July 2, 1999, Steven Idelman was working as a customer support specialist for Road Runner, a high speed Internet service provider.2 At approximately 9:00 p.m., Idelman received an anonymous phone call from a still-unidentified male ("the caller"). The caller told Idelman that he was at a friend's house, scanning other computers through the Internet and had viewed images of child pornography on a computer the caller believed to be serviced by Road Runner. The caller told Idelman the IP address of the computer from which the images were viewed, 24.94.200.54,3 and the directory and file names in which the images were located.4 The caller did not say that he was a law enforcement officer or that he was directed to view the computer's files by any law enforcement officer. The caller did not ask Idelman to call the police.
Shortly after the anonymous call, Idelman went to a computer and accessed the IP address given to him by the caller. His purpose was to determine if what the caller told him was correct. He located the computer with the IP address 24.94.200.54 and the directory tree and files mentioned by the caller. Idelman viewed two images located within those files. One of the images depicted two boys, whom Idelman estimated to be approximately eight or nine years old, posed in a sexual nature.5 Idelman then sent an e-mail to his supervisor, Anna Madden, describing the anonymous phone call and the results of his search of the computer with IP address 24.94.200.54.
On July 6, 1999, Kerry Jones, a network engineer for Road Runner, received an e-mail from Anna Madden asking him to research the owner of the Road Runner account connecting to the computer with the IP address 24.94.200.54. Jones was able to determine that the account was assigned to Rosemary D. Kennedy.6 Mr. Jones was able to determine that the account was assigned to the same IP address on July 2, 1999. Believing that the customer service agreement between Road Runner and the account holder authorized him to search a computer's files for offensive material, Jones then viewed the files on the computer's hard drive.7 The files depicted images of boys, whom Jones estimated to be approximately 10 to 13 years old, engaged in sexual activity. Jones then printed out an image of the computer's directory tree in which the files with offensive material were located.
That same day, after consulting with Road Runner's corporate attorney, Scott Petrie, the manager of Road Runner, made the decision to contact law enforcement authorities. Kerry Jones contacted the Exploited Children's Unit of the Wichita Police Department, but his phone call was not returned. Road Runner then contacted Special Agent Leslie Earl of the FBI. Special Agent Earl was informed by Road Runner that the FBI would need to obtain a court order for it to be able to supply the FBI with any subscriber information.
The United States Attorney's Office then applied to a United States magistrate judge for an order directing Road Runner to disclose subscriber information related to IP address 24.94.200.54. In the application, the Assistant United States Attorney stated that:
the Federal Bureau of Investigation is conducting a criminal investigation in connection with possible violation(s) of Tile 18, United States Code, Sections 2252 and 2252A; it is believed that the subject of the investigation used Road Runner's IP address 24.94.200.54 on July 2, 1999, at 11:48 p.m. in furtherance of the subject offenses; and that the information sought to be obtained is relevant to a legitimate law enforcement inquiry in that it is believed that this information will assist in the investigation relating to the aforementioned offenses.
The magistrate judge issued an order, which was presented to Road Runner personnel, who provided the FBI with the following information:
The subscriber whose computer used I.P. address 24.94.200.54 on July 2, 1999, at 11:49 p.m. was Rosemay (sic) D. Kennedy of 9120 Harvest Court, Wichita, Kansas, telephone 316-722-6593. Two users were listed for that account: RKENNEDY@KSCable.COM and KENNEDYM@KSCable.Com. The account had been active since June 7, 1999.
Special Agent Earl next went to the house located at 9120 Harvest Court in Wichita, Kansas. He observed a Chrysler Sebring parked in the driveway. A records check with the Kansas Department of Motor Vehicles revealed that the car was registered to Michael R. Kennedy. Special Agent Earl then called the phone number given to the government by Road Runner. A person identifying himself as Michael Kennedy answered the phone.
In initiating the phone call, Special Agent Earl asked Kennedy if he was satisfied with his Road Runner cable modem Internet service.
Kennedy confirmed that his address was 9120 Harvest Court, Wichita, Kansas, and he confirmed that he was the primary user of the Road Runner cable modem Internet service. Kennedy said he was satisfied with the service and especially liked the speed and quality of the e-mail service. Kennedy estimated he spent an average of two to three hours per night online. Kennedy noted that he always left his system on and connected to the Internet. Kennedy said he used his Internet access only for pleasure and his computer and modem were located in his home.
Kennedy said his computer system was a Gateway 450 megahertz Pentium II with a 17 gigabyte hard drive. When asked if he had any concerns about the Road Runner service Kennedy said he thought the company should warn customers about the possibility of someone else trying to enter their computers through the Internet. Kennedy said he held Internet accounts through Netcom and AOL in the past. Kennedy left those services because they were too slow and he could not use e-mail and Usenet news groups the way he wanted to. Kennedy noted that it took too long for him to download mail with pictures attached on those other services.
. The government applied for and obtained a search warrant for property and evidence located at 9120 Harvest Court.
On August 10, 1999, Special Agents John Sullivan and Leslie Earl went to defendant's home to interview him and execute the search warrant. When defendant came to the door, the agents identified themselves. Defendant invited them in and the three men sat down in the kitchen. During the interview, defendant's mother and brother were in the living room, watching television.
Special Agent Sullivan told defendant why they were interviewing him. Defendant was informed that he was not under arrest and that he would not be arrested at the end of the interview. After providing the agents with some identifying information, defendant stated that he was 46 years old, did not have any drug or alcohol addiction problems, that he was not at that time under the influence of drugs or alcohol, and that he was not being treated for any physical or psychological problems. Defendant told the agents that he had spent one year in college.
Defendant stated that he owned three computers and used Multimedia Cablevision as his Internet service provider. Defendant acknowledged that he had downloaded pictures of young boys engaged in sexual acts from the Internet onto his hard drive. Defendant told the agents that he did not pay for any of the pictures, he did not know the identity of the person who posted the pictures on the Internet, he never discussed the pictures with anyone, nor had he ever transferred the pictures to anyone else. Defendant denied ever using an Internet chat room and claimed he never had any sexual contact with anyone under the age of 18. Although defendant admitted hearing that the possession of sexually explicit pictures of children was illegal, he was not really sure about the legality. Defendant stated that he did not think that anyone would ever find out that he had downloaded the pictures.
Defendant then showed the agents four sexually graphic pictures of young boys that he had printed out. These pictures were in defendant's bedroom. Defendant showed the agents his computers in the basement.
The interview lasted twenty to thirty minutes. Defendant never raised the issue of an attorney. Defendant never refused to answer a question. The agents never promised defendant anything in return for his statements. Defendant was not arrested at the conclusion of the interview and was allowed to turn himself in after the return of the indictment.
Defendant first argues the subscriber information the FBI received from Road Runner should be suppressed. Defendant argues that the information was received in violation of the Electronic Communications Privacy Act and the Cable Communications Policy Act. Defendant further argues that all evidence obtained as a result of the illegal attainment of defendant's subscriber information should be suppressed as...
To continue reading
Request your trial-
In re Verizon Internet Services, Inc.
...understand just what privacy expectation he or she has after essentially opening the computer to the world. See United States v. Kennedy, 81 F.Supp.2d 1103, 1110 (D.Kan.2000) (no expectation of privacy where user opened files up on home computer to anyone who wants to receive them). IV. VER......
-
U.S. v. Christie
...States v. Sherr, 400 F.Supp.2d 843, 848 (D.Md.2005); United States v. Cox, 190 F.Supp.2d 330, 332 (N.D.N.Y.2002); United States v. Kennedy, 81 F.Supp.2d 1103, 1110 (D.Kan.2000); United States v. Hambrick, 55 F.Supp.2d 504, 508-09 (W.D.Va.1999), aff'd 225 F.3d 656, 2000 WL 1062039 (4th Cir.2......
-
In re Verizon Internet Services, Inc., Civil Action No. 03-MS-0040 (JDB) (D. D.C. 4/24/2003)
...understand just what privacy expectation he or she has after essentially opening the computer to the world. See United States v. Kennedy, 81 F. Supp.2d 1103, 1110 (D. Kan. 2000) (no expectation of privacy where user has opened files up on home computer to anyone who wants to receive IV. VER......
-
Doe v. Ashcroft
...privacy interest in their subscriber information because they communicated it to the systems operators"); United States v. Kennedy, 81 F.Supp.2d 1103, 1110 (D.Kan.2000) (holding that defendant could not "claim to have a Fourth Amendment privacy interest in his subscriber information" becaus......
-
The warrantless interception of e-mail: Fourth Amendment search or free rein for the police?
...Hambrick, No. 99-4793, 2000 U.S. App. LEXIS 18665, at *12 (4th Cir. 2000). (274.) Hambrick, 2000 U.S. App. LEXIS 18665, at *10. (275.) 81 F. Supp. 2d 1103 (D. Kan. (276.) Id. at 1110. (277.) Id. (278.) United States v. Perrine, 518 F.3d 1196, 1204 (10th Cir. 2008). (279.) Id. at 1199. (280.......
-
When Rummaging Goes Digital: Fourth Amendment Particularity and Stored E-mail Surveillance
...at 1526-27. 82. CCIPS Search-and-Seizure Manual, supra note 73, at 65; Kerr, supra note 8, at 1026 (citing United States v. Kennedy, 81 F. Supp. 2d 1103, 1110 (D. Kan. 2000)); Ohm, supra note 8, at 83. See CCIPS Search-and-Seizure Manual, supra note 73, at 65; Ohm, supra note 8, at 1527-28.......
-
Computer crimes.
...address, and credit card information. See United States v. Hambrick, 225 F.3d 656 (4th Cir. 2000); see also United States v. Kennedy, 81 F. Supp. 2d 1103, 1110 (D. Kan. 2000) (holding that the defendant did not have reasonable expectation of privacy in information provided by his Internet s......
-
Computer crimes.
...privacy in information provided to his ISP, including his IP address, name, and billing address); see also United States v. Kennedy, 81 F. Supp. 2d 1103, 1110 (D. Kan. (77.) See generally Steven A. Osher, Privacy, Computers and the Patriot Act: The Fourth Amendment Isn't Dead, but No One Wi......