Criminal Law

Crim. Law Journal FALL 2021, VOLUME 21, EDITION 2

RELYING ON "GOOD FAITH" AS A JUDICIAL STOPGAP FOR ADVANCING TECHNOLOGY: NIT WARRANTS & FEDERAL RULE OF CRIMINAL PROCEDURE 41(b)

Written by Jennifer Kelly Corcoran1

INTRODUCTION

Bryan Gilbert Henderson regularly accessed child pornography from his home in San Mateo, California, where he lived with his grandmother.2 Under the moniker "askjeff," Henderson logged into Playpen, a child pornography website, and accessed over thirty hours of content during a six-month period.3 Henderson, along with 150,000 Playpen users,4 avoided law enforcement detection by utilizing "The Onion Router," colloquially known as "Tor."5 Tor is a downloadable software that allows individuals to anonymously access websites.6 Instead of accessing the website directly from an internet browser, Tor’s network connects the user to the website through a "series of virtual tunnels," thus masking the user’s internet protocol (IP) address.7

On March 1, 2015, Henderson logged into Playpen through Tor.8 This time, however, his mask came off. Unbeknownst to any of Playpen’s 150,000 users, the Federal Bureau of Investigation (FBI) had secured a Network Investigative Technique (NIT) warrant which authorized a search of any computer that logged onto Playpen with a username and password.9 The FBI, in conjunction with the Department of Justice’s Child Exploitation and Obscenity Section, had secured the NIT warrant specifically to take down Playpen and its previously anonymous users.10 Operation Pacifier, targeting Playpen, resulted in the successful arrests of over 350 individuals in the United States and over 548 individuals abroad.11

Join CLA to access this page

Join

Log in

Forgot Password

Enter the email associated with you account. You will then receive a link in your inbox to reset your password.

Personal Information

Select Section(s)

CLA Membership is $99 and includes one section. Additional sections are $99 each.

Payment