LA1 follows LA3: Use of “Wyoming Tool Kit” during P2P computer search doesn’t violate some separate reasonable expectation of privacy in CP hash values

A child pornography investigator’s use of the “Wyoming Tool Kit” that searches for and finds child porn on a computer connected peer-to-peer by locating hash (SHA) values of known child porn images does not violate some other expectation of privacy. State v. Dunham, 111 So. 3d 1095 (La. App. 1 Cir. 2012):

The issues presented in the defendant’s brief were recently addressed by the Third Circuit in a factually similar case, State v. Daigle, 2011-1209 (La. App. 3d Cir. 5/2/12), 93 So.3d 657. In Daigle, Louisiana State Police detectives conducted an investigation using the Wyoming Tool Kit and discovered the defendant’s IP address was seen with SHA values consistent with child pornography. At trial, the detectives explained that the Wyoming Tool Kit was designed by the Wyoming Department of Justice and ran on the Gnutella network. According to the detectives, software such as LimeWire and BearShare also ran on the Gnutella network. The Wyoming Tool Kit identified IP addresses that had SHA values matching images previously identified as child pornography. Daigle, 93 So.3d at 659-60. The detectives used GNU Watch in addition to the Wyoming Tool Kit, and testified that both programs only ran on the Gnutella network. Id. at 663. Citing several recent federal court decisions, the court found that in applying for a search warrant, the detective did not violate any reasonable expectation of privacy on defendant’s part by using software available only to law enforcement to identify defendant’s IP address as having SHA values that might be associated with images of child pornography. It explained:

Federal courts have examined the issues presented in Defendant’s appeal and have determined that defendants have no Fourth Amendment privacy rights in computer files that they have shared on file sharing networks such as Gnutella regardless of whether the defendants have logged onto the Gnutella network through clients such as Lime[W]ire, Morpheus, BearShare, or Shareaza. …. This is equally true if the investigating law enforcement officer uses software specially modified to screen for child pornography, such as ShareazaLE or the Wyoming Tool Kit, provided that the software has no greater access to the defendants’ computer files than that available to any other Gnutella client. Gabel, 2010 U.S. Dist. LEXIS 107131, 2010 WL 3927697; United States v. Borowy, 595 F.3d 1045 (9th Cir. 2010) [per curiam], …

Daigle, 93 So.3d at 665.

We agree with third circuit’s reasoning and find that Tpr. Sandifer did not violate the defendant’s right to privacy by using GNU Watch to examine the SHA values for files the defendant had already elected to freely share with other LimeWire users. Moreover, the defendant offered no evidence at trial in support of his assertion that publicly available programs are unable to obtain the SHA values of files on LimeWire, and the record does not support that argument. Therefore, the defendant’s arguments related to the alleged violation of his right of privacy are without merit.

This entry was posted in Uncategorized. Bookmark the permalink.

Comments are closed.