U.S.A v. Richardson

Decision Date11 June 2010
Docket NumberNo. 09-4072.,09-4072.
Citation607 F.3d 357
PartiesUNITED STATES of America, Plaintiff-Appellee,v.Thomas McCoy RICHARDSON, Jr., Defendant-Appellant.AOL LLC, Amicus Supporting Appellee.
CourtU.S. Court of Appeals — Fourth Circuit

COPYRIGHT MATERIAL OMITTED

COPYRIGHT MATERIAL OMITTED

ARGUED: Anthony Glen Scheer, Rawls, Dickinson & Scheer, PA, Charlotte, North Carolina, for Appellant. Amy Elizabeth Ray, Office of the United States Attorney, Asheville, North Carolina, for Appellee. ON BRIEF: Edward R. Ryan, United States Attorney, Charlotte, North Carolina, for Appellee. Christopher G. Bubb, Vice President, General Counsel, John R. LoGalbo, Assistant General Counsel, AOL LLC, Dulles, Virginia, for Amicus Supporting Appellee.

Before TRAXLER, Chief Judge, and WILKINSON and DUNCAN, Circuit Judges.

Affirmed by published opinion. Chief Judge TRAXLER wrote the opinion, in which Judge WILKINSON and Judge DUNCAN joined.

OPINION

TRAXLER, Chief Judge:

Thomas McCoy Richardson, Jr., pled guilty to violating 18 U.S.C. § 2252A(a)(1) & (b)(1) by “knowingly transport[ing] and ship[ping] in interstate and foreign commerce, by means of a computer, child pornography,” J.A. 16, and to violating 18 U.S.C. § 2252A(a)(5) by “knowingly possess[ing] material that contained images of child pornography,” J.A. 16. In doing so, Richardson preserved the right to appeal the district court's order denying his motion to suppress and quashing his subpoena duces tecum under Rule 17(c)(2) of the Federal Rules of Criminal Procedure.

On appeal, Richardson contends that AOL LLC (“AOL”), an internet service provider (“ISP”) with whom he had an email account, discovered the illegal images on which Richardson's child pornography charges were based by conducting an unconstitutional search on behalf of the Government. Richardson also contends that the search warrant subsequently executed at his Charlotte-area apartment was not supported by probable cause, rendering the evidence culled from his computer inadmissible. Finally, Richardson claims that the district court committed reversible error in granting AOL's motion to quash his subpoena seeking the production of documents that would establish an agency relationship between AOL and the Government with respect to the detection of AOL subscribers involved in child pornography. We conclude that the district court correctly rejected these arguments and affirm the district court.

I.

On June 10, 2004, AOL, pursuant to a mandatory reporting requirement set forth in 42 U.S.C. § 13032(b)(1),1 reported to the Cyber Tip Line at the National Center for Missing and Exploited Children (“NCMEC”) that AOL had detected the transmission of child pornography images by a subscriber using an e-mail address called knifeisland@ aol. com. NCMEC, also as mandated by the same federal law, passed along this information to the North Carolina State Bureau of Investigation (“SBI”), which, in turn, served AOL with an administrative subpoena for subscriber information related to the “knifeisland@ aol. com” address. AOL determined that the “knifeisland@ aol. com” account was registered to Richardson at 2541 Pine View Lane, Apartment H, Gastonia, North Carolina. The screen name “tr2066” was also linked to this account. By August 2004, however, when SBI agents received and followed up on this information, Richardson no longer resided at the 2541 Pine View Lane address and no forwarding address was available.

The investigation of Richardson apparently stalled for about one year. Then, on September 2, 2005, AOL reported to NCMEC that it had detected the transmission of two e-mail messages containing images depicting child pornography from an account named “tr 1029@ aol. com” by a person using the screen name “tr1029.” NCSBI Agent J.D. White initiated an investigation following this second report. Pursuant to another administrative subpoena, AOL indicated that the “tr 1029@ aol. com” account was registered to Richardson at 8508 Park Road, Charlotte, North Carolina. The Park Road address, as it turned out, was the location of a UPS store. Further investigation by the NCSBI, however, revealed that Richardson was residing in Charlotte at 7805 Andover Woods Drive, Apartment 604, and linked Richardson through his driver's license to both the Park Road address of the UPS store (where Richardson had apparently received mail for a period of time) and the Pine View Lane address in Gastonia (where Richardson had established the knifeisland@ aol. com account).

NCSBI agents researched Richardson's criminal history and discovered that Richardson was a registered sex offender in South Carolina as a result of two 1996 convictions. In the first instance, Richardson was arrested and charged with performing a lewd act upon a child under 14 years of age after he entered a Wal-Mart store in Florence, South Carolina, grabbed the buttocks of a minor girl, and uttered an obscene remark to her. He was ultimately convicted of assault and battery of a high and aggravated nature. In the second instance, Richardson was convicted for exposing himself as he walked through the same Wal-Mart.

On November 17, 2005, Agent White applied for a search warrant to search Richardson's Andover Woods Drive apartment in Charlotte primarily for evidence of Richardson's use of a computer to view, store, and transmit images of child pornography. In support of his probable cause showing, Agent White included the information disclosed by AOL pursuant to the administrative subpoenas and the details of the subsequent investigation conducted by NCSBI. Additionally, Agent White provided a summary of his background in criminal and computer investigation as well as his special training in the “investigation[ ] of child sexual exploitation and child pornography.” J.A. 41. Based on his experience, Agent White indicated [t]he use of computers to traffic in, trade, or collect child pornography has become one of the preferred methods of obtaining such materials ... [because computers] provide[ ] a high degree of anonymity in obtaining child pornography ... [and] a sense of privacy and secrecy not attainable by other media.” J.A. 50. White further explained in his affidavit that [i]ndividuals involved in the possession and transportation of child pornography rarely, if ever, dispose of their sexually explicit materials,” which “are extremely valuable to these individuals because of the difficulty, scarcity, expense, and danger involved in their collection.” J.A. 50. Noting that even computer files that are deleted from the hard drive can be retrieved through a forensic examination of the computer, White asked the issuing judge to find “probable cause to believe that Thomas Richardson's residence, 7805 Andover Woods Drive, Apartment 604, Charlotte, North Carolina, contains a computer or computers that have been used to communicate with individuals to acquire child pornography; store images of child pornography, and distribute images of child pornography.” J.A. 51.

On November 17, 2005, law enforcement officers executed the search warrant for Richardson's Andover Woods apartment. The primary evidence recovered in the search was a computer. Richardson indicated that he was the sole user of the computer and admitted that he had sent and received child pornography by email. Richardson also told officers that he was “addicted to viewing [child pornography] over the Internet, but denied ever meeting or speaking by phone with anyone he met on the Internet under the age of 18.” J.A. 211. A forensic examination of Richardson's computer revealed 28 images and 21 video files containing child pornography. Some of these images included depictions of adults engaged in illegal, obscene sexual acts with children between four and nine years of age.

Richardson moved to suppress both the evidence seized in the search of his home and his statements to law enforcement officers during the search. First, Richardson argued that in reporting the contents of his email, AOL was acting as an agent of the Government and had therefore conducted an unconstitutional warrantless search of his private email communications. Second, Richardson argued that even if AOL had not acted as a law enforcement agent in reporting the emails, the issuing judge lacked probable cause to believe that evidence of a child pornography offense would be located at his apartment at the time of the search.

Subsequently, in hopes of obtaining documentary support for his argument that AOL was acting as an agent for the Government, Richardson served AOL with a subpoena duces tecum pursuant to Rule 17(c)(1) of the Federal Rules of Criminal Procedure requesting that AOL produce

all records (including but not limited to emails, postal correspondence, minutes/notes of meetings, memoranda, and public relations material, and Congressional testimony) relating to AOL's coordination of efforts, training and/or strategic partnerships with all agencies of the United States Department of Justice, the United States Postal Service, the Secret Service, the Internet Crimes Against Children Task Force with the Department of Justice, and the [NCMEC], regarding the detection and reporting of child pornography content in emails and/or web browsing activities by AOL subscribers or on its network.

J.A. 64.

In response to the subpoena, AOL filed a motion to quash on the grounds that the subpoena was grossly overbroad in scope and that “compliance would be unreasonable or oppressive.” Fed.R.Crim.P. 17(c)(2). AOL argued that Richardson's subpoena was essentially a fishing expedition “based on the unsupported legal theory that AOL is an agent of the United States,” J.A. 58, and that compliance with the subpoena would require AOL “to carry out a search of its immense paper files and data bases seeking that which does not exist.” J.A. 60.

In support of its motion to quash, AOL submitted a declaration from AOL Assistant General Counsel John R. LoGalbo primarily...

To continue reading

Request your trial
161 cases
  • United States v. Somerlock
    • United States
    • U.S. District Court — District of Maryland
    • May 4, 2022
    ...McKenzie-Gude, 671 F.3d 452, 462 (4th Cir. 2011) ; United States v. Clenney, 631 F.3d 658, 663 (4th Cir. 2011) ; United States v. Richardson , 607 F.3d 357, 369 (4th Cir. 2010). On the other hand, if the allegedly false statements are not necessary for the probable cause finding, the accuse......
  • United States v. Bosyk
    • United States
    • U.S. Court of Appeals — Fourth Circuit
    • August 1, 2019
    ...Cir. 2018) (probable cause to search house based on two child pornography images uploaded to messaging app); United States v. Richardson , 607 F.3d 357, 361, 371 (4th Cir. 2010) (same, based on two emailed images); United States v. Vosburgh , 602 F.3d 512, 526–28 (3d Cir. 2010) (same, based......
  • Boyd v. Armstrong
    • United States
    • U.S. District Court — District of Maryland
    • March 29, 2019
    ...954 F.2d 960 (en banc) (4th Cir. 1992)). The concept of probable cause is not subject to precise definition. United States v. Richardson, 607 F.3d 357, 369 (4th Cir. 2010). Rather, probable cause "is a 'fluid concept' that cannot be 'reduced to a neat set of legal rules.'" Bailey, 349 F.3d ......
  • In re Search Warrant
    • United States
    • Vermont Supreme Court
    • December 14, 2012
    ...to execute the warrant, as contemplated by the issuing court, it would be no less a governmental search. See United States v. Richardson, 607 F.3d 357, 364 (4th Cir.2010). 27. To be sure, as noted by the majority, police may, in special circumstances not posed here, propose or accede to ass......
  • Request a trial to view additional results
4 books & journal articles
  • Grand jury proceedings
    • United States
    • James Publishing Practical Law Books Federal Criminal Practice
    • April 30, 2022
    ...grand jury subpoena pursuant to FRCrP 17(c)(2) [ In re Impounded , 241 F.3d 308, 313 (3d Cir. 2001); United States v. Richardson , 607 F.3d 357, 368 (4th Cir. 2010) (“A subpoena is unreasonable or oppressive if it is excessively broad or overly vague.”) (internal quotation marks omitted).] ......
  • PUNTING THE PRIVATE SEARCH DOCTRINE: How THE GOOD FAITH EXCEPTION IMPEDES FOURTH AMENDMENT JURISPRUDENCE.
    • United States
    • Rutgers Computer & Technology Law Journal Vol. 48 No. 1, March 2022
    • March 22, 2022
    ...139 S. Ct. 2525, 2543 (2019) (citing Katz v. United States, 389 U.S. 347, 357 (1967)). (13) See, e.g., United States v. Richardson, 607 F.3d 357, 364 (4th Cir. 2010) (citing United States v. Jarrett, 338 F.3d 339, 344 (4th Cir. 2003)) ("The Fourth Amendment, however, does not protect agains......
  • Earning Virtual Responsibility: Raising the Level of Accountability for Interactive Computer Service Providers Due to User-Generated Trafficking.
    • United States
    • Suffolk University Law Review Vol. 55 No. 3, June 2022
    • June 22, 2022
    ...private actor's search subject to Fourth Amendment depends on level of government involvement); accord United States v. Richardson, 607 F.3d 357, 364 (4th Cir. 2010) (showing how Fourth Amendment may apply to private (17.) See S. 3398 [section] 4(a)(3) (noting recommended best practices to ......
  • A Cloudy Forecast: Divergence in the Cloud Computing Laws of the United States, European Union, and China
    • United States
    • University of Georgia School of Law Georgia Journal of International & Comparative Law No. 41-2, 2013
    • Invalid date
    ...supra note 4, at 400.168. 18 U.S.C. § 2258A (2006). 169. Soghoian, supra note 164, at 202.170. See, e.g., United States v. Richardson, 607 F.3d 357, 362-63 (4th Cir. 2010) (noting that AOL developed a program to scan its customers' email attachments of child pornography).171. Soghoian, supr......

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT