United States v. Perrine
Full Opinion (html_with_citations)
Defendant and appellant Steven C. Per-rine appeals the denial of his motion to suppress evidence following his conviction by a jury on three counts relating to the distribution, receipt and/or possession of child pornography, one count of possession of a firearm by a convicted felon, and two counts of criminal forfeiture. He also appeals the denial of his motion to dismiss the case against him, on the ground that governmental authorities engaged in outrageous conduct. We affirm.
BACKGROUND
On September 2, 2005, James Vanland-ingham reported to local police that, while in a Yahoo! chat room and while using the screen name âdanaUiotlips05,â he began chatting with a person with the screen name âstevedragonslayer.â âstevedragon-slayerâ invited Vanlandingham/âdanaJiot-lips05â to watch a web cam video depicting two nude six-to-nine-year-old girls. While waiting for the police to arrive, Vanland-ingham stayed on the line with âstevedra-gonslayerâ and continued to chat. Van-landingham asked if âstevedragonslayerâ had any more videos, to which âstevedra-gonslayerâ replied he did not know what might offend âdana_hotlips05.â After Vanlandingham informed âstevedragon-slayerâ that he liked âthe young hard stuff,â âstevedragonslayerâ played several videos depicting young girls in various explicit sexual acts.
âstevedragonslayerâ stopped sending video clips to âdanaUiotlips05â prior to the arrival of police officers at Vanlanding-hamâs house, but Vanlandingham was able to preserve a copy of the chat room conversation. One of the Pennsylvania law enforcement authorities interviewed Van-landingham and viewed the saved chat room conversation.
Based upon Vanlandinghamâs account of these events, Pennsylvania law enforcement personnel obtained a disclosure order dated October 14, 2005, pursuant to 18 U.S.C. § 2703(d) and 18 Pa.C.S.A. § 5743(d), 1 directing Yahoo! to provide the subscriber information for the screen name âstevedragonslayer.â Yahoofs records indicated that âstevedragonslayerâ logged on to the Yahoo! website from the IP address 68.103.177.146 on October 9, 2005, October 22, 2005, October 29, 2005, October 30, 2005, November 1, 2005, and November 6, 2005. 2
Further investigation revealed that this IP address was maintained by Cox Communications, Inc. Pennsylvania authorities obtained another disclosure order requiring Cox to provide the subscriber information for that IP address. Cox reported that the Yahoo! logins from this particular IP address at the times reported by Ya- *1200 boo! were associated with an account belonging to Steve Perrine, 11944 Rolling Hills Court, Wichita, Kansas.
Pennsylvania authorities then contacted Kansas authorities, who discovered that Steve Perrine had a prior state conviction for sexual exploitation of a child, for which he was still on probation. Wichita police obtained a search warrant for Perrineâs house, which was executed on December 22, 2005. In addition to seizing Perrineâs computer, the police also found firearms and drug paraphernalia. They accordingly amended the search warrant to authorize seizure of those items as well. A forensic examination of Perrineâs computer revealed thousands of images of child pornography.
On February 7, 2006, Perrine was charged in a superceding indictment with one count of distributing child pornography, in violation of 18 U.S.C. § 2252(a)(2); one count of receiving child pornography, in violation of 18 U.S.C. § 2252(a)(2); one count of possessing child pornography, in violation of 18 U.S.C. § 2252(a)(4)(B); one count of being a felon in possession of a firearm, in violation of 18 U.S.C. §§ 922(g)(1) and 924(a)(2); and two counts of forfeiture. Among other motions, Per-rine filed a motion to suppress and a motion to dismiss based upon outrageous government conduct.
The district court held a motions hearing, at which Perrine testified that he was âstevedragonslayer.â Perrine further testified that he had enĂĄbled peer-to-peer file sharing on his computer, thereby giving anyone with internet access and certain software the ability to gain entrance to certain files on his computer. After subsequent briefing, the district court denied Perrineâs motions.
The case proceeded to a jury trial. A Wichita Police Department Computer Forensics detective, Detective Stone, testified that he found in excess of 16,000 images of child pornography on Perrineâs computer. Detective Stone also found Kazaa, a peer-to-peer file sharing program, installed on Perrineâs computer. Stone further testified that Kazaa is a program which allows individual users like Perrine to identify folders that are available to share with others, search other computers with Kazaa for specific topics, and download files from other computers, while allowing other computers to download files from Perrineâs computer. 3
Additionally, Annie Cheung, the senior compliance paralegal at Yahoo!, testified that Yahoo! tracks dates, times, and IP addresses for log-in attempts on a Yahoo! account and maintains that information for approximately thirty days. She further *1201 testified that Yahoo! records showed that the IP addresses 68.103.177.226 and 68.103.177.146 belonged to âstevedragon-slayer.â
Perla Rodriguez, the Cox Communications Customer Escalations Coordinator, testified that residential account IP addresses can change because they are leased for twenty-four hours at a time. Cox Communications residential account IP addresses release and renew every twenty-four hours; when an IP address releases, if the same IP address is available, it reattaches within a few seconds. Rodriguez further testified that only one IP address is assigned to a user at a time and that it is the customerâs address on the internet when he or she is online. She stated that the IP address 68.103.177.146 was used by Perrine. Perrine was convicted on all counts.
Perrine thereafter filed a motion for a new trial, a motion for a judgment of acquittal, and a motion for arrest of judgment. After denying the motions, the district court sentenced Perrine to 235 monthsâ imprisonment, to be followed by supervised release for life. Perrine appeals, arguing (1) the district court erred in failing to suppress evidence obtained against him in violation of the Fourth Amendment and/or 18 U.S.C. § 2703(d) and 18 Pa.C.S.A. § 5743(d); and (2) the district court erred in failing to dismiss the case against Perrine due to outrageous government conduct.
DISCUSSION
Perrine appeals the denial of his motion to suppress. âWhen reviewing a district courtâs denial of a motion to suppress, we review the district courtâs factual findings for clear error and consider the evidence in the light most favorable to the Government.â United States v. Zamudio-Carrillo, 499 F.3d 1206, 1209 (10th Cir. 2007). Further, â[determinations relating to the sufficiency of a search warrant and the applicability of the good-faith exception are conclusions of law, ... which this court reviews de novo.â United States v. Danhauer, 229 F.3d 1002, 1005 (10th Cir.2000). Finally, while we review the district courtâs ruling on the sufficiency of a search warrant de novo, we do not review de novo the determination of probable cause by the issuing judge or magistrate. Rather, a state judgeâs âdecision to issue a warrant is entitled to great deference,â and we âneed only ask whether, under the totality of the circumstances presented in the affidavit, the [state] judge had a âsubstantial basisâ for determining that probable cause existed.â United States v. Artez, 389 F.3d 1106, 1111 (10th Cir.2004) (further quotations and citations omitted).
We first consider Perrineâs argument that evidence was seized in violation of the ECPA and its state law equivalent, as well as the Fourth Amendment.
I. ECPA/State Law and Fourth Amendment
Perrine argues that compliance with 18 U.S.C. § 2703(d) and 18 Pa.C.S.A. § 5743(d) is âakin to a Terry stop within the scope of the Fourth Amendment and suppression is available to remedy violations.â Appellantâs Br. at 7. Section 2703 is the core provision of the ECPA, and it authorizes the government to require disclosure of stored communications and transaction records by third-party service providers. Under 18 U.S.C. § 2703(c)(2), â[a] provider of electronic communication service or remote computing service shall disclose to a governmental entity the ... name; ... address; ... telephone or instrument number or other subscriber number or identity, including any temporarily assigned network address ... of a subscriber to or customer of such service.... â 18 U.S.C. § 2703(c)(2). Section 2703(d) specifies that â[a] court order for disclo *1202 sure under subsection ... (c) ... shall issue only if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that the ... records or other information sought[] are relevant and material to an ongoing criminal investigation.â 18 U.S.C. § 2703(d). 4
Perrine argues that suppression, an appropriate remedy for an impermissible Terry stop, 5 is an available remedy for a violation of the ECPA. However, section 2708 of the ECPA specifically states that â[t]he remedies and sanctions described in this chapter are the only judicial remedies and sanctions for nonconstitutional violations of this chapter.â 18 U.S.C. § 2708. Section 2707, in turn, describes remedies for violations of the Act as including civil actions for violators other than the United States and administrative discipline against federal employees in certain circumstances. 18 U.S.C. § 2707. Thus, violations of the ECPA do not warrant exclusion of evidence. See United States v. Steiger, 318 F.3d 1039, 1049 (11th Cir. 2003); United States v. Smith, 155 F.3d 1051, 1056 (9th Cir.1998); Bansal v. Russ, 513 F.Supp.2d 264, 282-83 (E.D.Pa.2007); United States v. Sherr, 400 F.Supp.2d 843, 848 (D.Md.2005); United States v. Kennedy, 81 F.Supp.2d 1103, 1110 (D.Kan.2000). 6
Perrine next argues that, in any event, the government violated the ECPA and the Pennsylvania law by failing to present âspecific and articulableâ facts in support of its applications for court orders requiring Yahoo! and Cox to reveal Per-rineâs IP address and name, and that the government therefore used illegally obtained information in support of its search warrants. We disagree. As Perrine notes, the âspecific and articulable factsâ standard derives from the Supreme Courtâs decision in Terry. Thus, we are familiar with the standard imposed.
Perrine argues the governmentâs affidavit in support of its application for an order failed to provide specific and articu-lable facts because it did not attach a copy of the âchatâ between âstevedragonslayerâ and Vanlandingham; it did not contain anything specifically indicating that Van-landingham was a truthful and reliable person; and it failed to show that âsteve-dragonslayerâ was logged on to Yahoo! on the date of the crime, September 2, 2005, at 2 p.m. The affidavit attached to the October 14, 2005, application for a disclosure order for Yahoo! stated as follows:
Officer Humbert received information from Leetsdale Police Officer Wayne Drish indicating that a resident of his jurisdiction had received what appeared to be child pornography via his computer while in a Yahoo! Inc messaging chat room.
Officer Humbert interviewed the resident, James Vanlandingham, and learned that he was logged into Yahoo Messaging Chat on September 2, 2005 at approximately 2:00 PM EDT. He received a message from an individual logged in Yahoo Messaging Chat as âstevedragonslayer.â This individual invited James Vanlandingham to view his web cam. When James Vanlandingham viewed the cam he was presented with images of a young female he describes as between 6 and 9 years of age per *1203 forming oral sex on an adult male, images of a young female he describes as between 6 and 9 years of age having oral sex performed on her by an adult female and images of two young females he describes as between 6 and 9 years of age walking around in a bathroom unclothed. James Vanlandingham immediately reported the incident to law enforcement. I did view that chat log of this session between James Vanlanding-ham and âstevedragonslayer.â
Appellantâs App. at 72, attach. D. The affidavit attached to the December 8, 2005, application for a disclosure order for Cox recited the same information as above, and added at the bottom:
On 11/22/05 I received a response from Yahoo! Inc. which provided the IP login address of 68.103.177.146 for the screen-name âstevedragonslayerâ on 10/09/05, 10/22/05, 10/29/05, 10/30/05, 11/01/05, and 11/06/05.
Appellantâs App. at 83: attach. E.
The statutory standard requires that âthe governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that the ... records or other information sought, are relevant and material to an ongoing criminal investigation.â 18 U.S.C. § 2703(d). The affidavits above satisfy that standard. There is no reason to doubt Vanlandinghamâs account of what happened; indeed, he immediately contacted the police, which suggests he was simply a concerned citizen. Further, the officer stated that he had personally read the chat log between Vanlandingham and âstevedragonslayer.â The details provided are specific and certainly would lead to a reasonable suspicion that âstevedragon-slayerâ was involved in child pornography.
Perrine also alleges that the application for the order was deficient because it failed to show that âstevedragonslayerâ was on line with Vanlandingham on September 2, 2005, at 2 PM. The district court dismissed this as âof no momentâ because Yahoolâs logs simply did not go back that far. As indicated above, Yahoo! employee Annie Cheung testified that Yahoo! tracks dates, times, and IP addresses for login attempts on a Yahoo! account and maintains that information for approximately thirty days. Both Cheungâs testimony and the actual document turned over by Yahoo! to law enforcement pursuant to the courtâs order revealed that âstevedragonslayerâ had IP addresses of both 68.103.177.226 and 68.103.177.146. Appellantâs App. at 129-30. Yahoo!âs records also revealed that âstevedragonslayerâ with IP address 68.103.177.146 had logged on to Yahoo! a number of times in October and November 2005.
We agree with the district court that the absence of a specific record of âstevedra-gonslayerâ with IP address 68.103.177.226 or 68.103.177.146 being logged on at 2 PM on September 2, 2005, does not undermine the adequacy of the affidavit. The reason for that absence is simply that Yahoo! fails to maintain records for more than thirty days. Perrine admitted he was âstevedra-gonslayerâ and gives no explanation for who else could have been logged on to Yahoo! on September 2, 2005, with the name âstevedragonslayer,â when every other login for âstevedragonslayerâ matches the IP address of Perrineâs computer. 7 In sum, we conclude that the affi *1204 davits submitted in the application for an order under the ECPA and the Pennsylvania statute contained âspecific and articula-ble facts showing that there are reasonable grounds to believe that the ... information sought[ ][ ][is] relevant and material to an ongoing criminal investigation.â 18 U.S.C. § 2703(d); 18 Pa.C.S.A. § 5743(d).
Perrine also appears to make a broader Fourth Amendment challenge to the governmentâs acquisition of his subscriber information from Yahoo! and Cox. The district court held:
the identifying information at issue here&emdash;defendantâs name, address, etc.&emdash; was information that he voluntarily transmitted to the third-party internet providers, Cox and Yahoo!. Indeed, defendant also admitted at the hearing that he had enabled peer-to-peer file sharing on his computer, thereby giving anyone with internet access the ability to gain entrance to his computer. Under such a scenario, a defendant holds no reasonable expectation of privacy that the Fourth Amendment will protect.
Mem. and Order at 16, Appellantâs App. at 149. We agree with the district court.
Every federal court to address this issue has held that subscriber information provided to an internet provider is not protected by the Fourth Amendmentâs privacy expectation. See, e.g., Guest v. Leis, 255 F.3d 325, 336 (6th Cir.2001) (holding, in a non-criminal context, that âcomputer users do not have a legitimate expectation of privacy in their subscriber information because they have conveyed it to another person-the system operatorâ); United States v. Hambrick, 225 F.3d 656 (4th Cir.2000) (unpublished), affirming United States v. Hambrick, 55 F.Supp.2d 504, 508-09 (W.D.Va.1999) (holding that there was no legitimate expectation of privacy in noncontent customer information provided to an internet service provider by one of its customers); United States v. DâAndrea, 497 F.Supp.2d 117, 120 (D.Mass.2007) (âThe Smith line of cases has led federal courts to uniformly conclude that internet users have no reasonable expectation of privacy in their subscriber information, the length of their stored files, and other non-content data to which service providers must have access.â); Freedman v. America Online, Inc., 412 F.Supp.2d 174, 181 (D.Conn.2005) (âIn the cases in which the issue has been considered, courts have universally found that, for purposes of the Fourth Amendment, a subscriber does not maintain a reasonable expectation of privacy with respect to his subscriber information.â); United States v. Sherr, 400 F.Supp.2d 843, 848 (D.Md.2005) (âThe courts that have already addressed this issue ... uniformly have found that individuals have no Fourth Amendment privacy interest in subscriber information given to an ISP.â); United States v. Cox, 190 F.Supp.2d 330, 332 (N.D.N.Y.2002) (same); United States v. Kennedy, 81 F.Supp.2d 1103, 1110 (D.Kan.2000) (âDefendantâs constitutional rights were not violated when [internet provider] divulged his subscriber information to the government. Defendant has not demonstrated an objectively reasonable legitimate expectation of privacy in his subscriber information.â). Cf. United States v. Forrester, 512 F.3d 500, 510 (9th Cir.2008) (âe-mail and Internet users have no expectation of privacy in the to/from addresses of their messages or the IP addresses of the websites they visit because they should know that this information is provided to and used by Internet *1205 service providers for the specific purpose of directing the routing of information.â); United States v. Lifshitz, 369 F.3d 173, 190 (2d Cir.2004) (âIndividuals generally possess a reasonable expectation of privacy in their home computers.... They may not, however, enjoy such an expectation of privacy in transmissions over the Internet or e-mail that have already arrived at the recipient.â).
Furthermore, as Perrine conceded, he had peer-to-peer software on his computer, which permitted anyone else on the internet to access at least certain folders in his computer. To the extent such access could expose his subscriber information to outsiders, that additionally vitiates any expectation of privacy he might have in his computer and its contents. Thus, Perrine has no Fourth Amendment privacy expectation in the subscriber information he gave to Yahoo! and Cox.
II. Search of His House
Perrine also challenges the search of his house. In particular, he argues â[t]he affidavits in support of the search warrants do not establish probable cause as the facts revealed therein were not particularized as to [Perrine], contained stale information of alleged criminal activity relating to [Per-rine], and materially omitted facts vitiating probable cause.â Appellantâs Br. at 22.
â[P]robable cause exists where attending circumstances âwould lead a prudent person to believe there is a fair probability that contraband or evidence of a crime will be found in a particular place.â â United States v. Cantu, 405 F.3d 1173, 1176 (10th Cir.2005) (quoting United States v. Basham, 268 F.3d 1199, 1203 (10th Cir.2001)). In assessing whether there is probable cause for a warrant, âwe assess the sufficiency of a supporting affidavit based on the totality of the circumstances.â Id. Further, a magistrateâs or judgeâs determination that a warrant is supported by probable cause is entitled to âgreat deference.â Id. On review, our task is to âensur[e] âthat the magistrate had a substantial basis for concluding probable cause existed.â â United States v. Tisdale, 248 F.3d 964, 970 (10th Cir.2001) (quoting Illinois v. Gates, 462 U.S. 213, 238-39, 103 S.Ct. 2317, 76 L.Ed.2d 527 (1983)).
The affidavits in support of the search warrants in this case provided sufficient information for the judge to conclude that probable cause existed. They recited essentially the same facts as in the applications for the disclosure orders, quoted above, with the addition of a description of the information obtained from Yahoo! and Cox, which identified Perrine as âstevedra-gonslayer.â They also recited the fact that Wichita police officer Shawn Bostick, after further investigation of Perrine/âstevedra-gonslayer,â discovered that he had been previously convicted in Kansas state court of exploitation of a child, was still on probation for that offense, and that the prior case involved Perrine sending images of child pornography and showing videos containing child pornography via Yahoo! Messenger using a web cam.
Perrine argues they were not âparticularized toâ him, Appellantâs Br. at 22, because they did not state that Yahooiâs records showed that âstevedragonslayerâ was in fact logged on to Yahoo! on September 2, 2005. For the same reasons we found that this omission did not undermine the sufficiency of the applications for the disclosure orders, we find it does not undermine the sufficiency of the affidavits in support of the search warrants.
Perrine next argues that the affidavits contained stale information. Per-rine asserts that 111 days had passed between the chat between âstevedragon-slayerâ and Vanlandingham and the submission of the affidavits. Whether information is stale depends on âthe nature of *1206 the criminal activity, the length of the activity, and the nature of the property to be seized.â United States v. Riccardi, 405 F.3d 852, 860 (10th Cir.2005) (further quotation omitted). We have explained:
The observation that images of child pornography are likely to be hoarded by persons interested in those materials in the privacy of their homes is supported by common sense and the cases. Since the materials are illegal to distribute and possess, initial collection is difficult. Having succeeded in obtaining images, collectors are unlikely to destroy them. Because of their illegality and the imprimatur of severe social stigma such images carry, collectors will want to secret them in secure places, like a private residence. This proposition is not novel in either state or federal court: pedophiles, preferential child molesters, and child pornography collectors maintain their materials for significant periods of time.
Id. at 861 (quoting United States v. Lamb, 945 F.Supp. 441, 460 (N.D.N.Y.1996)); see also United States v. Hay, 231 F.3d 630, 636 (9th Cir.2000); United States v. Harvey, 2 F.3d 1318, 1322-23 (3d Cir.1993); United States v. Koelling, 992 F.2d 817, 823 (8th Cir.1993); United States v. Rabe, 848 F.2d 994, 997 (9th Cir.1988). The district court correctly found that the information in the affidavits was not stale.
Finally, Perrine argues the affidavits omitted information that would have vitiated probable cause. Essentially, he reiterates the argument that the affidavits did not state that none of the log ons by the IP address connected to âstevedragonslayerâ occurred on September 2, nor did they attach the Yahoo! Login Tracker, which revealed that fact. He argues that the judge, had he known those facts, would not have found probable cause. For the reasons already stated, we reject this argument. The affidavits gave the issuing judge a âsubstantial basis for ... concluding] that a search would uncover evidence of wrongdoing.â Illinois v. Gates, 462 U.S. 213, 236, 103 S.Ct. 2317, 76 L.Ed.2d 527 (1983) (internal quotation marks omitted).
Even were we to conclude that probable cause was not established, we would affirm the denial of Perrineâs motion to suppress under the good faith exception of United States v. Leon, 468 U.S. 897, 920-24, 104 S.Ct. 3405, 82 L.Ed.2d 677 (1984). In Leon, âthe Supreme Court adopted a good-faith exception to the application of the exclusionary rule and specifically applied that exception where âan officer acting with objective good faith has obtained a search warrant from a judge or magistrate and acted within its scope,â even though the search warrant was later deemed to be invalid.â United States v. Herrera, 444 F.3d 1238, 1249 (10th Cir.2006) (quoting Leon, 468 U.S. at 920, 104 S.Ct. 3405). âIn this circuit, we have concluded that âLeonâs good faith exception applies only narrowly, and ordinarily only when an officer relies, in an objectively reasonable manner, on a mistake made by someone other than the officer.â â United States v. Cos, 498 F.3d 1115, 1132 (10th Cir.2007) (quoting Herrera, 444 F.3d at 1249).
In this case, law enforcement personnel searched Perrineâs house in reliance on warrants issued by a state judge. âWhen reviewing the reasonableness of an officerâs reliance upon a search warrant, this court must examine the underlying documents to determine whether they are âdevoid of factual support.â â Danhauer, 229 F.3d at 1006 (quoting United States v. McKneely, 6 F.3d 1447, 1454 (10th Cir.1993)). The Leon Court recognized four situations in which an officer would not have reasonable grounds for believing that a search warrant had been properly issued. In any of those situations, the good- *1207 faith exception to the exclusionary rule does not apply. Thus, if the issuing judge was misled by an affidavit containing false information or information that the affiant would have known was false but for his âreckless disregard of the truth,â the evidence should be suppressed. Leon, 468 U.S. at 923, 104 S.Ct. 3405. Or suppression is required when the affidavit supporting the warrant is âso lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable.â Id. (further quotation omitted). Additionally, the exception does not apply âwhen a warrant is so facially deficient that the executing officer could not reasonably believe it was valid.â Danhauer, 229 F.3d at 1007 (citing Leon, 468 U.S. at 923, 104 S.Ct. 3405). None of those situations is present in this case.
III. Governmental Outrageous Conduct
Perrine moved to dismiss this case on the ground that the government had engaged in outrageous conduct. The district court denied the motion. We review that denial de novo. United States v. Pedraza, 27 F.3d 1515, 1521 (10th Cir.1994).
Perrineâs claim of outrageous governmental conduct is based upon the following: as indicated above, when Perrine committed the instant offense, he was on probation for a prior offense involving child pornography on his computer. His computer had been confiscated in connection with that prior offense. Before the police returned his computer to him, they thought the computer had been âcleanedâ so that all pornography was removed. Wichita Police Detective Shawn Bostick testified that he had turned the computer over to the forensics unit to have it cleaned. Prior to releasing the computer to Perrineâs attorney in the prior case, Bostick did not check to see that the forensics unit had in fact cleaned the computer. Perrine claims that the computer was returned to him with the child pornography from the prior case still on it, which he claims is tantamount to sticking a needle with heroin into the arm of an addict.
When explaining what happened to Per-rineâs computer, Bostick testified that, during the investigation of the prior case, Perrine had mentioned that he kept a hidden back-up copy of each of his files. Bos-tick further opined that, if the hidden back-up copy was missed during the search of the computer, the files could have been moved back to the computer after the computer was returned to Per-rine, and it would appear that the files had been on the computer the entire time. Bostick thus testified, âAs I stated, is it possible I returned child pornography to [Perrine] mistakenly? It is possible. Is it possible the stuff wasnât there? Itâs possible.â Appelleeâs Supp.App. at 49. The district court found âreturning these images to defendant was probably negligent, even incompetent; however, defendant has failed to make any showing that any governmental official acted intentionally in leaving the images on his computer.â Mem. and Order at 10, Appellantâs App. at 143.
â[T]he relevant inquiry when assessing claims of outrageous government conduct is whether, considering the totality of the circumstances ... the governmentâs conduct is so shocking, outrageous and intolerable that it offends the universal sense of justice.â United States v. Garcia, 411 F.3d 1173, 1181 (10th Cir.2005) (further quotation omitted). â âTo succeed on an outrageous conduct defense, the defendant must show either (1) excessive government involvement in the creation of the crime, or (2) significant governmental coercion to induce the crime.â â Id. (quoting Pedraza, 27 F.3d at 1521). An outrageous conduct defense is of ânarrow scope.â Id. *1208 (quoting United States v. Lacey, 86 F.3d 956, 964 (10th Cir.1996)).
We agree with the district court that, assuming the government did return Per-rineâs computer to him with child pornography still on it, that was the product of negligence or incompetence, at most. It hardly meets the high standard of outrageous conduct.
CONCLUSION
For the foregoing reasons, the district courtâs order is AFFIRMED.
. As discussed more fully below, 18 U.S.C. § 2703(d) is part of the Electronic Communications Privacy Act ("ECPA"), which regulates the disclosure of electronic communications and subscriber information. 18 Pa. C.S.A. § 5743(d) is the Pennsylvania state law similar to the ECPA.
. "The IP, or Internet Protocol, address is unique to a specific computer. Only one computer would be assigned a particular IP address.â United States v. Kennedy, 81 F.Supp.2d 1103, 1105 n. 3 (D.Kan.2000).
. Another court has recently described Kazaa as follows:
Kazaa is a computer program that connects a computer to other computers on which the Kazaa program is also running. Ka-zaa's purpose is to allow users to download each otherâs shared files. The Kazaa program allows the user to designate which folders â and therefore which files â on his computer are shared with other Kazaa users. Each shared file has several descriptive fields that are viewable by other Kazaa users. These fields generally describe the file's contents and can be edited by a file's possessor. Kazaa makes each user's shared files discoverable to other users by allowing any user to perform a keyword search of the descriptive fields of all shared files. Files with descriptive fields containing the search term are listed for the searcher, who can then see all the descriptive fields for each file on the list. Based on these descriptions, the searcher decides which of the available files to download onto his computer. The searcher is likewise free to refrain from downloading a file in which, based on its descriptive fields, the searcher is uninterested.
United States v. Sewell, 513 F.3d 820, 821 (8th Cir.2008). See also United States v. Shaffer, 472 F.3d 1219, 1220-22 (10th Cir.2007) (describing more fully how Kazaa operates).
. 18 Pa.C.S.A. § 5743 provides for comparable disclosure and has virtually identical requirements for the court order.
. Under Terry v. Ohio, 392 U.S. 1, 88 S.Ct. 1868, 20 L.Ed.2d 889 (1968), investigatory stops are permitted if "supported by a reasonable suspicion of criminal activity.â United States v. Treto-Haro, 287 F.3d 1000, 1004 (10th Cir.2002).
.The Pennsylvania statute at issue similarly provides exclusively civil remedies for violations of the act. See 18 Pa.C.S.A. §§ 5747, 5748.
. While no one argues the point, and it is not critical to our decision, it is widely known that any single service provider, like Yahoo!, does not permit more than one subscriber to have the same screen name. Thus, there would have been only one âstevedragonslayerâ as a Yahoo! subscriber during the period of time relevant to this case. Since Perrine admitted he was "stevedragonslayerâ and both Vanlandingham and Officer Humbert observed the chat session with âstevedragon-slayer,â there can be little doubt that the *1204 individual chatting with Vanlandingham on September 2, 2005, and showing pornographic videos was, in fact, Perrine. Furthermore, despite his wholly speculative arguments to the contrary, Perrine presents no evidence that anyone else "hijackedâ his computer and went on line using the name "stevedragon-slayer.â