Category Archives: Forensics

State v. Peppin: No Privacy for Public File Sharing

The Benefits of Electronic File Transfer | GoAnywhere MFT

In State v. Peppin, the WA Court of Appeals ruled law enforcement’s warrantless use of enhanced  peer to peer file sharing software to remotely access shared files on an individual’s computer does not violate either the Fourth Amendment of the United States Constitution or article I, sec. 7 of the Washington Constitution.

In other words, an individual does not have a constitutionally protected privacy right in image files he shares with the public.

Here, defendant Casey Peppin was found guilty of three counts of Possession of Depictions of Minors Engaged in Sexually Explicit Conduct in the First Degree under RCW 9.68A.670. On December 29,2011, Spokane Detective Brian Cestnik conducted an online investigation of the Gnutella network to identify persons possessing and sharing child pornography. Using peer to peer software called “Round Up” version 1.5.3, Detective Cestnik found child pornography on Mr. Peppin’s computer in a shared folder. He obtained a warrant, searched he defendant’s home and recovered the computer(s) allegedly used to view and share images of minors engaged in sexual conduct.

BACKGROUND ON “PEER TO PEER FILE SHARING”

For those who don’t know, “peer to peer file sharing” is a method of Internet communication that allows users to share digital files. User computers link together to form a network; the network allows direct transfer of shared files from one user to another. Peer to peer software applications allow users to set up and share files on the network with others using compatible peer to peer software. For instance, LimeWire and Shareaza are software applications that allow users to share files over the Gnutella network.

To gain access to shared files, a user must first download peer to peer software, which can be found on the Internet. Then, the user opens the peer to peer software on his or her computer and conducts a keyword search for files that are currently being shared on the network. The results are displayed and the user selects a file for download.

The downloaded file is transferred through a direct connection between the computer wishing to share the file and the user’s computer requesting the file. The Gnutella network gives users the ability to see a list of all files that are available for sharing on a particular computer.

F or example, a person interested in obtaining child pornographic images opens the peer to peer software application on his or her computer and conducts a file search using keyword terms such as “preteen sex.” The search is sent out over the network of computers to those using compatible peer to peer software. The results of the search are returned and displayed on the user’s computer. The user selects the file he or she wishes to download. The file is then downloaded directly from the host computer onto the user’s computer. The downloaded file is stored on the user’s computer until moved or deleted.

A peer to peer file transfer is assisted by reference to an Internet Protocol (IP) address. In general, the numeric IP address is unique to a particular computer during an online Internet session. The IP address provides a location, making it possible for data to be transferred between computers.

This is where the police work comes in: investigators can search public records on the Internet to determine which Internet provider is assigned the IP address. Investigators can contact the Internet provider and gain information about the user based on the IP address assigned to the computer.

THE INVESTIGATIONS

Here, Detective Cestnik searched the Gnutella network for “pthc,” the commonly used term for preteen hard core Internet pornography. Clerk’s Papers (CP) at 17. The results indicated that images matching the search terms could be found on a host computer with an IP address linked to Spokane. Detective Cestnik’s check of the IP address through two different Internet search engines confirmed that the IP address was in Spokane and that Qwest Communications was the provider.

Next, Detective Cestnik presented Qwest Communications with a search warrant requesting information on the IP address for the host computer. Qwest Communications advised Detective Cestnik that the IP address was connected to Mr. Peppin and provided Mr. Peppin’s address.

Detective Cestnik then obtained a search warrant for Mr. Peppin’s computer. A complete forensic investigation uncovered over 100 videos of what appeared to be minors engaged in sexually explicit conduct.

TRIAL OUTCOME

Mr. Peppin moved to suppress the computer files downloaded by Detective Cestnik during his Internet search. He maintained that law enforcement’s access and download of his computer files via the Internet was an intrusion into his private affairs and an unlawful warrantless search. The court denied Peppin’s motions to suppress. At trial, he was found guilty on all 3 counts.

COURT OF APPEALS DECISION

The legal issue addressed by the court was whether Mr. Peppin had a constitutionally protected privacy right in the image files he shared with the public. In short, the Court said, “No.”

First, federal circuit courts have consistently held that a person who installs and uses file sharing software does not have a reasonable expectation ofprivacy in the files to be shared on his or her computer.

Second, even the broader protection of the Washington State Constitution also does not offer any relief to Mr. Peppin. It stated, “What is voluntarily exposed to the general public and observable without the use of enhancement devices from an unprotected area is not considered part of a person’s private affairs.” The court emphasized that here, Mr. Peppin voluntarily offered public access to the computer files obtained by Detective Cestnik. Mr. Peppin used peer to peer software to make these shared files available without restriction. Anyone wanting to view or download the files could do so. Law enforcement’s access of these files was not an intrusion into Mr. Peppin’s private affairs.

The court summed it up:

Additionally, this is not the type of information that a citizen of this state is entitled to hold as private. The inherent nature of peer to peer software is the public sharing of digital computer files. Individuals using file sharing software cannot expect a privacy interest in files they hold open to the public. Again, Mr. Peppin’s use of peer to peer file sharing voluntarily opened this information to the public for anyone to access, including law enforcement. There is no disturbance of a person’s private affairs when law enforcement accesses shared computer files that the person holds publically available for viewing and download. Thus, there is no violation within the context of article I, section 7 of the Washington Constitution.

My opinion? Although I understand the logic – as well as the government’s desire to criminalize the sexual exploitation of minors – at what point does “private” communications end and “public” communications begin? How intrusive is the government’s technology? How often do they use the internet to spy on citizens for public safety reasons? I suppose we’ll see . . .

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

Ignition Devices In All New Cars ?

There’s developing technology exploring the possibility that a fingerprint-based ignition interlock device system may someday be installed in new vehicles in the hopes of stopping impaired drivers from operating their vehicles. In other words, sobriety tests in all new cars might prevent most drunk driving deaths.

Installing devices in new cars to prevent drunk drivers from starting the engine could prevent 85 percent of alcohol-related deaths on U.S. roads, saving tens of thousands of lives and billions of dollars from injury-related costs, according to a new analysis.

“Alcohol interlocks are used very effectively in all 50 states as a component of sentencing or as a condition for having a license reinstated after DUIs, but this only works for the drunk drivers caught by police and it doesn’t catch the people who choose to drive without a license to avoid having the interlock installed,” said lead author Dr. Patrick Carter, an emergency physician with the University of Michigan Health System in Ann Arbor.

Most drunk drivers make about 80 trips under the influence before they are stopped for a DUI, Carter said. “If we decided that every new car should have an alcohol ignition interlock that’s seamless to use for the driver and doesn’t take any time or effort, we suddenly have a way to significantly reduce fatalities and injuries that doesn’t rely solely on police.”

Carter and colleagues used U.S. records of traffic accidents and fatalities to determine how many involved drunk driving and then estimated how many of these incidents could be avoided in the future by fitting new cars with alcohol-interlock devices, which detect blood-alcohol levels and prevent drivers above a certain threshold from starting the car.

Then, they estimated the numbers of deaths and injuries that could be prevented in the first year that all new cars sold had screening systems, and assumed it would take 15 years for older models to be replaced with new vehicles.

Over the 15-year implementation period, interlocks may eliminate about $343 billion in costs from fatalities and injuries related to drunk driving, the researchers estimate. Assuming the device costs $400 per vehicle and is 100 percent accurate, the interlock would pay for itself after three years by way of avoided injury costs.

Getting DADSS into all vehicles can eliminate the element of chance involved in catching drunk drivers under our current system that relies on police, said Adrian Lund, president of the Insurance Institute for Highway Safety.

Unlike the alcohol ignition interlocks which require you to blow into a devise and are used for convicted drunk drivers, DADSS is a driver assist system that would be seamless, take less than half a second, and use infrared light to measure a driver’s blood alcohol content in the breath or through the fingertips, which is believed to be far more reliable.

My opinion? Although noble, these devices may cause legal problems and litigation than they’re worth. How accurate are the devices? Are they calibrated regularly? Do they store information which can be used against a defendant accused of DUI? Would the devices also test for the presence of drugs? If so, what if the driver has a prescription for the drugs? Only time will tell . . .

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

State v. Samalia: Search of Abandoned Cell Phone is Lawful

Why this B.C. woman's 'cell phone in the car' ticket should never have been  issued - Vancouver Is Awesome

In State v. Samalia, the WA Court of Appeals upheld the defendant’s conviction for Possession of a Stolen Motor Vehicle under RCW 9A.56.068 because the police used evidence from the defendant’s cell phone found in the abandoned stolen vehicle after he fled from the vehicle and evaded pursuit.

Yakima Police Officer Ryan Yates was on patrol when his vehicle license plate reader indicated he had passed a stolen vehicle. The officer followed the stolen vehicle. The driver got out of the vehicle and faced towards Officer Yates. The driver would not obey Officer Yates’ command to get back in the vehicle and fled. Officer Yates pursued the male driver but he got away.

Officer Yates searched the car and found a cell phone in the center console. Officer Yates conducted some investigations and discovered that the phone belonged to the defendant Mr. Samilia. Later, Officer Yates located Mr. Samalia’s picture in a police database. Officer Yates then identified Mr. Samalia from the database picture as the fleeing man who had been driving the stolen vehicle.

The State charged Mr. Samalia with possession of a stolen motor vehicle. He moved unsuccessfully to suppress the cell phone evidence under ER 3.6. From the above facts, the trial court concluded the cell phone was abandoned, therefore, Mr. Samalia no longer had an expectation of privacy in it. Following a bench trial, the court found Mr. Sam alia guilty as charged. He appealed.

The court reasoned that a warrantless search and/or seizure violates the WA Constitution unless it falls under one of ”’a few jealously guarded exceptions” to the warrant requirement. Searching voluntarily abandoned property is an exception to the warrant requirement. In other words, law enforcement may retrieve and search voluntarily abandoned property without a warrant or probable cause.

The court also considered the status of the area where the cell phone was located. Here, the search area was an unattended stolen vehicle that Mr. Samalia had been driving and had fled from when a police officer approached and directed him to return to the vehicle. Consequently, the court found that a suspect’s hasty flight under these circumstances is sufficient evidence of an intent to abandon the vehicle. In conclusion, because the cell phone was abandoned; used in pursuit of the fleeing suspect, and not directly used to identify Mr. Samalia, the court held that the trial court did not err in denying suppression of Mr. Samalia’s identification from a police database.

My opinion?

I disagree with the court’s decision. This decision is too great a leap in the wrong direction; and fails to follow Washington’s current jurisprudence. Despite the Court’s reasoning, there is NO reported Washington decision which has directly addressed whether a citizen relinquishes his reasonable expectation of privacy in the data on his cell phone by leaving the phone behind at the scene of a crime.

Our jurisprudence says police must generally secure a warrant before conducting a search of data on a cell phone – even one that has been left behind in a place where its owner has no privacy interest. Requiring a search warrant will assure that there is probable cause to believe that the defendant is involved in criminal activity and that evidence of the criminal activity can be found in the data on the cell phone.

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

Melendez-Diaz v. Massachusetts: Protecting the Right to Confront Witnesses

Experts: Crime labs come with built-in bias, shifting science – Orange County Register

In Melendez-Diaz v. Massachusetts, the U.S. Supreme Court held that crime lab reports may not be used against criminal defendants at trial unless the analysts responsible for creating them give testimony and subject themselves to cross-examination.

The case arose from the conviction of Luis E. Melendez-Diaz on cocaine trafficking charges in Massachusetts. Part of the evidence against him was a laboratory report stating that bags of white powder said to have belonged to him contained cocaine. Prosecutors submitted the report with only an analyst’s certificate.

The ruling was an extension of the 2004 Crawford decision that breathed new life into the Sixth Amendment’s confrontation clause, which gives a criminal defendant the 6th Amendment right to confront witnesses.  The Court reasoned that cross-examination of witnesses is designed to weed out not only the fraudulent analyst, but the incompetent one as well.

This reasoning is strong.  In February, for example, the National Academy of Sciences issued a sweeping critique of the nation’s crime labs. It concluded, for instance, that forensic scientists for law enforcement agencies “sometimes face pressure to sacrifice appropriate methodology for the sake of expediency.

Additionally, the decision came in the wake of a wave of scandals at crime laboratories that included hundreds of tainted cases in Michigan, Texas and West Virginia.  Those scandals proved that live testimony from analysts was needed to explore potential shortcomings in laboratory reports.

My opinion?  Excellent decision!  It gives much-needed teeth to the the Supreme Court’s 2004 Crawford decision.  How this decision applies as a practical matter remains to be seen.  Criminal defense lawyers may still stipulate that crime lab reports are accurate, fearing that live testimony will only underscore their clients’ guilt. Others may insist on testimony in the hope that the analyst will be unavailable.

Still, others will now be able to prove that an analyst’s conclusion was mistaken or inconclusive.  As Justice Kennedy wrote, “The defense bar today gains the formidable power to require the government to transport the analyst to the courtroom at the time of trial.”

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

US Supremes Rule Convicted Defendants Have No Right To Test DNA

How Reliable Is DNA Evidence? | The Marshall Defense Firm

In Yeager v. United States, the U.S. Supreme Court ruled that convicts have no constitutional right to test DNA evidence in hopes of proving their innocence long after they were found guilty of a crime.

The decision may have limited impact because the federal government and 47 states already have laws that allow convicts some access to genetic evidence. Testing so far has led to the exoneration of 240 people who had been found guilty of murder, rape and other violent crimes, according to the Innocence Project.

The court ruled 5-4, with its conservative justices in the majority, against an Alaska man who was convicted in a brutal attack on a prostitute 16 years ago.

William Osborne won a federal appeals court ruling granting him access to a blue condom that was used during the attack. Osborne argued that testing its contents would firmly establish his innocence or guilt.

In parole proceedings, however, Osborne has admitted his guilt in a separate bid for release from prison.

The high court reversed the ruling by the 9th U.S. Circuit Court of Appeals in San Francisco. States already are dealing with the challenges and opportunities presented by advances in genetic testing, Chief Justice John Roberts said in his majority opinion.

“To suddenly constitutionalize this area would short-circuit what looks to be a prompt and considered legislative response,” Roberts said. Alaska, Massachusetts and Oklahoma are the only states without DNA testing laws. In some other states, the laws limit testing to capital crimes or rule out after-the-fact tests for people who confess.

But Justice John Paul Stevens said in dissent that a simple test would settle the matter. “The court today blesses the state’s arbitrary denial of the evidence Osborne seeks,” Stevens said.

My opinion?  HORRIBLE DECISION.  Although the crime in question was heinous, there is no doubt that a small group of innocent people — and it is a small group — will languish in prison because they can’t get access to the evidence.  This directly violates a defendant’s 6th Amendment rights.  Unbelievable.

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.

State v. Dingman: Trial Court Erred in Denying Defendant’s Discovery Requests

What Is A Discovery Request? Texas Rules of Civil Procedure

In State v. Dingman, the WA Court of Appeals Court held the State is obligated to disclose all tangible objects in its possession which were obtained from or belonged to the defendant at the time of arrest.

Here, the authorities seized Mr. Dingman’s computers while investigating him for Theft and Money Laundering.  The State created mirror image copies of the computers’ hard drives using a program called EnCase.  Dingman asked for direct access to his computer.  The Court refused, and instead ordered copies be provided using Encase, a program the defense neither had not knew how to use.

Applying court rules/procedures, the WA Court of Appeals Court held the State is obligated to disclose all tangible objects in its possession which were obtained from or belonged to the defendant.  The computer hard drives were tangible objects obtained from the defendant.  Defense counsel should be allowed to examine the hard drives.  Therefore, it was error not to give the defense access to the hard drives.

My Opinion?  Great decision. Division II gave an excellent decision regarding the violation of a defendant’s right to review evidence. The defendant should ALWAYS have access to materials the prosecutor wants to use at trial.  Indeed, it’s a blatant violation of a defendant’s Constitutional rights to deny access.  Providing evidence to the other side is also, quite simply, a professional courtesy.

Please contact my office if you, a friend or family member are charged with a crime. Hiring an effective and competent defense attorney is the first and best step toward justice.