Justia Internet Law Opinion Summaries

by
This case revolves around the question of whether a search for internet-related evidence that extended to a previously unknown basement apartment was reasonable, even though the apartment was not specified in the warrant. The police had obtained a warrant to search a property after receiving information that child pornography had been downloaded to a particular IP address associated with that address. The property appeared to be a single-family home. However, during the execution of the warrant, the police encountered Kevin Matthew Dhyne, who lived in a basement apartment on the property and used the same internet access as the rest of the house. The police searched Dhyne’s apartment and found sexually explicit material involving children on his laptop.The trial court agreed with Dhyne's argument that the search violated the U.S. and Colorado constitutions because the warrant was not specific to his basement apartment. However, the court denied Dhyne’s motion to suppress the evidence, reasoning that even if the officers had not searched his apartment in conjunction with the original warrant, they would have executed the same search later that day under a warrant specific to the basement apartment, and the evidence would therefore have inevitably been discovered. Dhyne was convicted of two counts of sexual exploitation of a child.The Colorado Court of Appeals affirmed the trial court’s denial of the suppression motion, though it did so by upholding the search rather than by applying the inevitable discovery exception. The court of appeals agreed that for a multi-dwelling unit, separate dwellings normally require separate, specific warrants. However, the court justified the search of Dhyne’s apartment based on the shared use of the IP address.The Supreme Court of the State of Colorado affirmed the outcome, holding that the warrant's reference to the property's "[h]ouse, garage, and any outbuildings" was sufficiently specific because there were no outward indicators that the basement apartment existed. The court also held that the execution of the warrant was reasonable in this specific scenario, where the warrant was for all buildings on the property and the defendant told the police that he lived in the basement and used the IP address that provided grounds for the search. View "Dhyne v. People" on Justia Law

by
The case involves Clayton Zellmer, who sued Meta Platforms, Inc. (formerly Facebook) for alleged violations of the Illinois Biometric Information Privacy Act (BIPA). Zellmer, who never used Facebook, claimed that the company violated BIPA when it created a "face signature" from photos of him uploaded by his friends and failed to publish a written policy outlining its retention schedule for collected biometric data.The district court granted summary judgment in favor of Meta on Zellmer's claim under Section 15(b) of BIPA. The court reasoned that it would be practically impossible for Meta to comply with BIPA if it had to obtain consent from everyone whose photo was uploaded to Facebook before it could use its Tag Suggestions feature. The court also dismissed Zellmer's claim under Section 15(a) of BIPA for lack of standing, holding that Zellmer did not suffer a particularized injury.The United States Court of Appeals for the Ninth Circuit affirmed the district court's decisions but on different grounds. The appellate court rejected the district court's reasoning for granting summary judgment, stating that BIPA's plain text applies to everyone whose biometric identifiers or information is held by Facebook. However, the court concluded that there was no material dispute of fact as to whether Meta violated BIPA's plain terms. The court found that face signatures, which are created from uploaded photos, cannot identify and therefore are not biometric identifiers or information as defined by BIPA. The court also affirmed the dismissal of Zellmer's claim under Section 15(a) of BIPA for lack of standing, agreeing with the district court that Zellmer did not suffer a particularized injury. View "ZELLMER V. META PLATFORMS, INC." on Justia Law

by
Tammy and James Rutledge filed a lawsuit against Pamela Menard and Randall Nappi, seeking to recover personal property. The Rutledges followed the instructions on Form CV-218, which was available on the Maine Judicial Branch's website, to serve the defendants. This form was created during the COVID-19 pandemic and instructed plaintiffs to prepare for a telephonic status conference as the first court event. However, by the time the Rutledges filed their lawsuit, the Maine Supreme Judicial Court had rescinded most of the pandemic management orders, and court proceedings had returned to an in-person format.The District Court (Bridgton, Malia, J.) dismissed the Rutledges' complaint with prejudice due to their failure to appear in person for a hearing. The Rutledges had mistakenly believed that the initial court proceeding would be a telephonic status conference, as per the instructions on Form CV-218. They appealed the decision, arguing that the court erred in dismissing their case with prejudice and denying their post-judgment motion to reopen the case or amend the judgment to a dismissal without prejudice.The Maine Supreme Judicial Court found that the District Court did not err in finding that the Rutledges failed to appear. However, it held that the dismissal with prejudice was too drastic a sanction given the circumstances. The court noted that the Judicial Branch's website continued to direct parties to Form CV-218, which no longer reflected current court practices, contributing to the Rutledges' mistaken belief. The court also noted that the Rutledges' nonappearance was neither deliberate nor the result of misconduct, and they made a sustained effort to remedy their error. The court vacated the judgment and remanded the case to the District Court for entry of a judgment of dismissal without prejudice. View "Rutledge v. Menard" on Justia Law

by
The case involves Scott Rosenthal, a Massachusetts resident, who filed a class action lawsuit against Bloomingdales.com, LLC, an Ohio-based company with its principal place of business in New York. Rosenthal alleged that Bloomingdales unlawfully intercepted and used information about his activity on its website. The company had commissioned third-party vendors to embed JavaScript computer code on its website, which was deployed onto Rosenthal's internet browser while he visited the site. This code intercepted, recorded, and mapped his electronic communications with the website. Rosenthal claimed that this violated the Massachusetts Wiretapping Act and the Massachusetts Invasion of Privacy Statute.The United States District Court for the District of Massachusetts dismissed Rosenthal's complaint for lack of specific personal jurisdiction over Bloomingdales. The court concluded that the defendant's conduct, which formed the basis of Rosenthal's claims, occurred outside of Massachusetts. The court also determined that Bloomingdales had not initiated contact with Massachusetts. Because the complaint failed to identify a 'demonstrable nexus' between Rosenthal's claims and Bloomingdale's contacts with Massachusetts, the court found no basis for specific jurisdiction over Bloomingdales.The United States Court of Appeals for the First Circuit affirmed the district court's dismissal. The court found that Rosenthal failed to provide "affirmative proof" that Bloomingdales purposefully deployed the JavaScript code to intentionally target users in Massachusetts. The court concluded that Rosenthal had not sufficiently established that Bloomingdales purposefully availed itself of what Massachusetts has to offer, thus failing to meet the requirements for specific jurisdiction. View "Rosenthal v. Bloomingdales.com, LLC" on Justia Law

by
In 2021, Hugo Escudero was investigated as a suspected wholesale cocaine dealer based on information provided by a confidential informant. The informant claimed that Escudero and his brother were selling large amounts of cocaine and used a runner, M.G., to deliver the drugs. Law enforcement officers corroborated this information through surveillance and obtained a GPS tracking warrant for Escudero's vehicle. This led to additional search warrants for Escudero's apartment and music studio. In September 2021, officers arrested Escudero and M.G. when they arrived with a kilogram of cocaine for a controlled buy.Escudero was indicted and filed a motion to suppress the evidence obtained from the tracking and search warrants. A federal magistrate judge recommended denying Escudero's motions to suppress, and the district court adopted this recommendation. During the trial, Escudero posted a message on M.G.'s Facebook page, which the court admitted into evidence as it was "probative of the consciousness of guilt" and not unfairly prejudicial. The jury found Escudero guilty of possessing five or more kilograms of cocaine with intent to distribute, and he was sentenced to 216 months of imprisonment.On appeal, Escudero challenged the legitimacy of the tracking warrant, the admission of his Facebook message, and the sufficiency of evidence for his guilty verdict. The United States Court of Appeals for the Eighth Circuit affirmed the district court's decision. The court found that the Leon good-faith exception to the exclusionary rule applied to the tracking warrant, the district court did not abuse its discretion in admitting Escudero's Facebook message and witness list comment, and the evidence was sufficient to convict Escudero of possession. View "United States v. Escudero" on Justia Law

by
The case involves a professional photographer who sexually exploited a minor. The defendant initially contacted the victim through a social networking site and began communicating with her through various means, eventually soliciting and receiving explicit images of the victim. The defendant also met the victim in person and sexually abused her. After the victim's parents reported the exploitation to the police, an investigation was launched. The police seized a computer tower, an external hard drive, and other items from the defendant's former residence. A forensic examination of the hard drives revealed explicit images of the victim, communications between the defendant and the victim, and hundreds of images of unidentified females in various stages of undress.The defendant was indicted on multiple counts, including aggravated rape of a child and enticement of a minor. He pleaded guilty to all charges, except for the eight counts of aggravated rape of a child, where he pleaded guilty to the lesser included offense of statutory rape. After being sentenced, the defendant filed a motion for the return of the seized property. The Commonwealth opposed the return of the property, arguing that it was in the "public interest" to destroy the devices. The Superior Court denied the defendant's request for the return of certain property.The Supreme Judicial Court of Massachusetts granted an application for direct appellate review. The court concluded that the procedural requirements set forth in G. L. c. 276, §§ 4 to 8, must be followed before a forfeiture decree may be issued under G. L. c. 276, § 3. The court vacated the Superior Court orders denying the return of certain property to the defendant and remanded the case for further proceedings consistent with its opinion. View "Commonwealth v. James" on Justia Law

by
In January 2021, John William Thomas Flechs, using the pseudonym “John Breezy,” began conversations on the Kik online messaging platform with someone he believed to be a 14-year-old boy. In fact, Flechs was messaging Sergeant John Haning, a member of the Rogers County, Oklahoma Internet Crimes Against Children Task Force. Over the next four days, Flechs and the minor discussed sexual topics in graphic detail. After they discussed meeting in person, Flechs asked the minor if he would be going to the skatepark. When Flechs arrived at the skatepark, he handed two Dr. Pepper sodas to an officer posing as the minor. Officers then arrested him.A grand jury indicted Flechs for attempted enticement of a minor in violation of 18 U.S.C. § 2422(b). A petit jury returned a guilty verdict. The district court sentenced Flechs to 120 months in prison and five years of supervised release. Flechs timely appealed.On appeal, Flechs argued that the trial evidence was insufficient to prove that he intended to entice the minor or took a substantial step toward enticement. He also argued that the jury instruction on the term “grooming” violated Federal Rule of Evidence 605, contained an unconstitutional presumption on the element of intent, and misstated the law. The United States Court of Appeals for the Tenth Circuit rejected these arguments and affirmed the conviction. The court held that the evidence was sufficient to convict Flechs of attempted enticement of a minor under 18 U.S.C. § 2422(b). The court also held that the jury instruction on the term “grooming” did not violate Federal Rule of Evidence 605, did not contain an unconstitutional presumption on the element of intent, and did not misstate the law. View "United States v. Flechs" on Justia Law

by
The case involves Raji Afife Azar, who was charged with three counts of "computer crime" under ORS 164.377(2)(c) for selling items on eBay that he believed to be stolen. The state argued that by selling stolen merchandise on eBay, Azar had accessed and used a computer system for the purpose of committing theft of property. Azar moved for judgment of acquittal, arguing that the state had not proved that he had engaged in "computer hacking," which he asserted was required to establish computer crime. The trial court denied Azar's motion, and a nonunanimous jury convicted him of those counts.The Court of Appeals upheld the trial court's denial of Azar's motion for judgment of acquittal. The court concluded that Azar's conduct of selling stolen property on eBay constituted computer crime under ORS 164.377(2)(c). The court reasoned that "theft" as used in ORS 164.377(2)(c) encompasses each of the forms of theft described in ORS 164.015, including theft by receiving.The Supreme Court of the State of Oregon reversed the decision of the Court of Appeals. The court concluded that the legislature did not intend for the computer crime statute to reach conduct such as Azar's, which may constitute "theft" within the meaning of the Criminal Code but neither interferes with another’s protected interests in a computer, computer system, or computer network nor depends on computer technology as the means of gaining access to the thing that the person seeks to unlawfully obtain. The court held that the trial court erred in denying Azar's motion for judgment of acquittal and remanded the case to the circuit court for further proceedings. View "State v. Azar" on Justia Law

by
In this case, the defendant, Cody Wayne Hopkins, was charged with Attempted Enticement of a Minor Using the Internet, in violation of 18 U.S.C. § 2422(b). The accusation revolved around an online conversation Hopkins had with a government agent posing as a 13-year-old girl. Despite knowing her age, Hopkins continued the conversation, making explicit sexual remarks, and arranging to meet her at a nearby high school. Upon arriving, Hopkins was arrested, and in a subsequent interview, admitted to knowing the girl was underage but claimed his intention was only to talk to her.During his trial, Hopkins claimed he was severely sleep-deprived during the interview, which led to confusion. However, the prosecution implied that he was lying about this assertion since it was not mentioned in the interview's transcript, which was redacted and given to the jury. Furthermore, the prosecution argued that Hopkins intended to entice a minor into engaging in illegal sexual activity based on his explicit text messages, despite Hopkins's claims of merely wanting to talk.The jury found Hopkins guilty, and he moved for a new trial citing prosecutorial misconduct. He argued that the prosecution had attacked his credibility based on untrue facts - that he had not mentioned sleep deprivation during the interview - and had repeatedly misstated the elements of the charged crime. However, the district court denied his motion for a new trial.Upon review, the United States Court of Appeals for the Eighth Circuit affirmed the district court's decision. The appellate court found no plain error in the prosecution’s conduct that would affect Hopkins' substantial rights, as the evidence of his guilt was overwhelming. The court also did not find any exceptional circumstances warranting reversal due to the prosecutor's alleged misstatement of the elements of the crime during the closing argument. Lastly, the court concluded that the cumulative effect of the alleged prosecutorial misconduct did not deny Hopkins a fair trial. View "United States v. Cody Hopkins" on Justia Law

by
The case involves tech icon Steve Wozniak and 17 other plaintiffs who sued YouTube and Google over a cryptocurrency scam. The scam involved hijacking popular YouTube channels, impersonating tech celebrities, and hosting fake live events promising to double any cryptocurrency sent to a specific account. The plaintiffs claimed that YouTube and Google knowingly hosted, promoted, and profited from the scam for years. The trial court dismissed the case on the grounds of the Communications Decency Act (CDA) of 1996, which provides immunity to interactive computer services against liability arising from content created by third parties.On appeal, the Court of Appeal of the State of California, Sixth Appellate District, affirmed the lower court's decision for most of the plaintiffs’ claims. It held that the claims were barred by the CDA as they sought to treat YouTube and Google as publishers of third-party content. However, the court found one claim – that YouTube and Google created their own content and materially contributed to the illegality of the scam by providing verification badges to hijacked YouTube channels – could potentially fall outside the scope of CDA immunity. The court concluded that as currently pleaded, these allegations were inadequate, but there was a reasonable possibility the defects could be cured by amendment. Therefore, the court reversed and remanded the case for further proceedings. View "Wozniak v. YouTube, LLC" on Justia Law