SEYMOUR, Circuit Judge.
Andre Haymond was convicted of one count of possession or attempted possession of child pornography in violation of 18 U.S.C. § 2252(a)(4)(B) and (b)(2). He appeals various aspects of his conviction. We have jurisdiction pursuant to 28 U.S.C. § 1291 and affirm.
On October 1, 2007, FBI Special Agent Rich Whisman conducted an undercover online investigation searching for individuals involved with child pornography. He did so using LimeWire, a peer-to-peer file sharing program that allows users to trade computer files over the Internet.
Agent Whisman launched LimeWire and typed in "8yo," an acronym for "8 year old" which is associated with child pornography. His search returned a list of files on LimeWire containing "8yo" in the filename, along with the location of users sharing those files. One of the users sharing responsive files was located in Tulsa, Oklahoma. Using LimeWire's "browse host" function. Agent Whisman reviewed the filenames of all of the files available to download from that user. He observed about seventy files, most of which had filenames suggesting child pornography. He downloaded sixty-two files, each of which he viewed and believed contained child pornography.
The user's internet protocol ("IP") address was subsequently traced to a residential address in Tulsa, Oklahoma, where Mr. Haymond lived with his mother.
Based largely on results of his Lime-Wire investigation, Agent Whisman sought a warrant to search Mr. Haymond's residence. He applied for and obtained that warrant on January 16, 2008. It authorized agents and officers to seize and search Mr. Haymond's computer, other digital media, computer passwords, computer security devices, and other items for evidence of child pornography.
Agent Whisman and other FBI agents executed the search warrant on January 23, 2008. They were accompanied by Scott Gibson, an officer with the Tulsa Police Department, and Buddy Carter, an FBI forensic investigator, whose role was to locate and examine the computers and other digital media. Mr. Carter went to Mr. Haymond's bedroom, where he found a computer. They seized the computer's hard drive, along with other items, and took it to the FBI laboratory for forensic examination.
During the January 23 search, Mr. Haymond consented to an interview. Agent Whisman conducted the interview, during which Mr. Haymond made written and oral admissions about his involvement with online child pornography.
Mr. Haymond was subsequently indicted for knowing possession and attempted possession of child pornography in violation of 18 U.S.C. § 2252(a)(4)(B) and (b)(2). The government based its case at trial on seven images found during the post-seizure forensic search of Mr. Haymond's computer.
Before trial, Mr. Haymond filed a motion to suppress evidence and statements obtained during the search of his home, and the related forensic search of his computer, on the ground that the underlying search warrant was issued without probable cause. The district court denied the motion after holding a hearing.
At trial, Agent Whisman testified about Mr. Haymond's admissions during and after the January 23 interview.
Agent Whisman further testified that Mr. Haymond admitted to a pattern of searching for, downloading, and then deleting child pornography from his computer. Mr. Haymond explained that, "to remove the temptation," every time after he would download and view child pornography he would delete the images or "wipe" them by reformatting his hard drive and reinstalling the operating system. Rec., vol. III at 315. Agent Whisman testified that Mr. Haymond told him this process happened frequently and that he had most recently downloaded and deleted child pornography the day before, on January 22.
Consistent with his oral admissions, Mr. Haymond also wrote out and signed a statement during the January 23 interview indicating he had been downloading child pornography once or twice every month or two, and that after downloading the files, he would clean the registry, reformat his computer's hard drive, and reinstall his Windows operating system.
Agent Whisman also testified that before the agents left Mr. Haymond's home, Mr. Haymond admitted the seized computer was his and that he "was responsible for any child pornography found on his computer." Id. at 367. Later that afternoon, Mr. Haymond phoned Agent Whisman and asked what type of forensic software the FBI would use to analyze his computer, a question Agent Whisman declined to answer. Before hanging up, Mr. Haymond said he "knew that [the] computer examiner would find stuff on his hard drive and that he had not wiped it, as he said, the day before." Id. at 319-20.
Mr. Carter, the FBI forensic investigator, testified he examined Mr. Haymond's computer using Forensic Toolkit ("FTK"), a specialized software program. FTK recovered a total of 60,000 graphics and video files from the computer's hard drive, including its unallocated space.
Two other government witnesses testified about the charged images. After holding a Daubert hearing
Dr. Passmore's testimony was corroborated by Immigration and Customs Enforcement Special Agent Mike Jackson. Agent Jackson viewed the seven charged images and recognized the two boys in the photos. He testified that the seven charged images are part of a larger series of photographs identified by the National Center for Missing and Exploited Children as the "Brad and Bry" series. Agent Jackson participated in an investigation into the original production of this series of images. The 2004 investigation revealed that the original photographs were taken sometime in or around 2000 in Spring Hill, Florida. During the investigation, Agent Jackson identified and met with the two boys depicted in the images. He also met the boys' mother. He testified that he had viewed the boys' original birth certificates and driver's licenses. The boys were between twelve and fourteen years old when the photos were taken.
In addition to the charged images, the government introduced evidence from Agent Whisman's undercover LimeWire investigation. This evidence included the list of LimeWire files Agent Whisman found on Mr. Haymond's computer in October 2007, along with the child pornographic content of three of those files.
At the close of the government's case and again at the close of trial, Mr. Haymond moved for judgment of acquittal on grounds of insufficient evidence. See Fed. R.Crim.P. 29. The district court denied both motions. The jury returned a verdict of guilty. The district court sentenced Mr. Haymond to thirty-eight months in prison and ten years of supervised release.
On appeal, Mr. Haymond contends the evidence at trial was insufficient to support his conviction. He also argues the district court erred in denying his motion to suppress and by permitting Dr. Passmore to testify as an expert.
We first consider Mr. Haymond's contention that the evidence was insufficient to support his conviction. We review sufficiency of the evidence claims de novo. United States v. Ramos-Arenas, 596 F.3d 783, 786 (10th Cir.2010). In doing so, "[w]e review the evidence and its reasonable inferences in the light most favorable to the government, to determine whether a reasonable jury could find the defendant guilty beyond a reasonable doubt." Id.
Mr. Haymond was convicted of one count of possessing child pornography in violation of 18 U.S.C. § 2252(a)(4)(B). At the time, the statute provided for punishment of any person who
18 U.S.C. § 2252(a)(4)(B) (2006).
The district court instructed the jury that the government was required to prove the following five elements beyond a reasonable doubt:
Rec., vol. I at 519. Mr. Haymond challenges the sufficiency of the evidence with respect to whether he knowingly possessed the charged images of child pornography and whether the images had a sufficient connection to interstate commerce.
Mr. Haymond first claims the evidence was insufficient to establish he "knowingly possessed" child pornography. He argues the government failed to establish this element of the offense because it presented no evidence he knew of or had the ability to access and control the charged images.
As an initial matter, Mr. Haymond points out that possession of child pornography is an image-specific crime. See United States v. Dobbs, 629 F.3d 1199, 1204 (10th Cir.2011); see also United States v. X-Citement Video, Inc., 513 U.S. 64, 78, 115 S.Ct. 464, 130 L.Ed.2d 372 (1994). The district court recognized this when it instructed the jury that the government was required to prove its case as
It also is true that "possession" requires, at a minimum, that a defendant have the ability to access and control the images. Although the statute does not define "possession," we have previously defined it as "`the holding or having something ... as one's own, or in one's control.'" United States v. Tucker, 305 F.3d 1193, 1204 (10th Cir.2002) (quoting Oxford English Dictionary (2d ed.1989)). As in other contexts, possession of child pornography may be actual or constructive. Id. With respect to the former, the district court instructed: "A person who knowingly has direct physical control over an object or thing, at a given time, is then in actual possession of it." Rec., vol. I at 521. As for constructive possession, it instructed: "A person who, although not in actual possession, knowingly has the power at a given time to exercise dominion or control over an object, either directly or through another person or persons, is then in constructive possession of it." Id. These instructions accord with our case law, see, e.g., Tucker, 305 F.3d at 1204, and are undisputed on appeal.
Additionally, for possession of child pornography to be "knowing," a defendant must know the charged images exist. As we have explained in the analogous context of knowing receipt of child pornography, "defendants cannot be convicted for having the ability to control something that they do not even know exists." Dobbs, 629 F.3d at 1207. In other words, the defendant's control or ability to control "need[s] to relate to images that the defendant knew existed; otherwise, the defendant's conduct with respect to the images could not be deemed to be knowing." Id. To convict Mr. Haymond, the government was required to prove he knew of and also controlled (or at least had the ability to access and control) the particular images that formed the basis of the conviction.
Mr. Haymond argues the government failed to meet this burden because it presented no evidence that he knew these specific images were on his computer or that he had the ability to access them once they were in the unallocated space of his computer. Relying primarily on our decision in Dobbs, 629 F.3d 1199, he suggests the charged images were inadvertently downloaded to his computer from internet web pages. He argues we must reverse his conviction because, as in Dobbs, there was no forensic evidence to indicate he ever saw, clicked on, enlarged, or otherwise accessed or controlled the specific images charged.
Dobbs was decided in an analogous context—a conviction for knowing receipt of child pornography in violation of 18 U.S.C. § 2252(a)(2). In that case, unlike this one, the conviction was based on images found in the cache of the defendant's computer. See id. at 1201. There was no serious dispute in Dobbs that the charged images originated from web pages or that they had been downloaded to Dobbs' computer through his browser's automatic caching function. See id. at 1201-04. As the government's forensic specialist in Dobbs explained, "[W]hen a person visits a website, the web browser automatically downloads the images of the web page to the computer's cache ... regardless of whether [the images] are displayed on the computer's monitor." Id. at 1201. Thus, "a user does not necessarily have to see an image for it
Although there was ample evidence in Dobbs to indicate the defendant had "received" the images from the internet, we reversed the conviction because there was insufficient evidence to establish he did so "knowingly." Id. at 1204. We emphasized that "the government presented no evidence [the defendant] had accessed the files stored in his computer's cache, including the two images at issue. And, more tellingly, there was no evidence that he even knew about his computer's automatic caching function." Id. We also noted that, as to the two charged images, "there was no evidence presented to the jury that [the defendant] even saw them, much less had the ability to exercise control over them by, for example, clicking on them or enlarging them." Id. Without such evidence, we concluded, no reasonable jury could have found the defendant knew the charged images existed on his computer or had the ability to access and control them, either when he visited the originating web pages or later, after the images had been saved to his computer's cache. Id. at 1204-05.
Mr. Haymond's reliance on Dobbs is unavailing, however. In this case, unlike in Dobbs, there was ample evidence from which a reasonable jury could infer Mr. Haymond knew the charged images were on his computer because he searched for and then downloaded them from LimeWire. Here, Mr. Haymond admitted to frequently searching for and downloading child pornography from LimeWire. Mr. Carter testified he found the LimeWire program on Mr. Haymond's computer. The government also introduced three images of child pornography that Agent Whisman found in Mr. Haymond's shared LimeWire folder, which the district court permitted the jury to consider as "proof of... [the] absence of mistake," Fed.R.Evid. 404(b), a ruling that is not challenged on appeal. The jury was not required to credit Mr. Haymond's assertions that he inadvertently downloaded child pornography from LimeWire while attempting to obtain music, particularly when he had admitted he was addicted to child pornography and used LimeWire to search for and download it. It was thus permissible for the jury to infer that Mr. Haymond used LimeWire exclusively to search for and download child pornography.
For similar reasons, we conclude the evidence was sufficient to establish Mr. Haymond exercised actual control over the charged images. Unlike the defendant in Dobbs, who sought out child pornography on internet websites, Mr. Haymond admitted to seeking out and downloading child pornography through peer-to-peer programs, including LimeWire. As the defense's own forensic specialists testified, downloading from LimeWire does not occur automatically. It requires the user to highlight the names of the file or files he wishes to download and then to press "enter." In contrast to the caching process at issue in Dobbs, which occurs automatically, this type of volitional downloading entails "control" sufficient to establish actual possession.
Mr. Haymond also contends the evidence was insufficient to establish he knew the charged images depicted minors engaged in sexually explicit conduct. We are not persuaded.
Mr. Haymond is correct that the "knowledge" requirement of the statute requires more than establishing he knowingly possessed the charged images. In X-Citement Video, Inc., 513 U.S. at 78, 115 S.Ct. 464, the Supreme Court held that "the term `knowingly' in [18 U.S.C.] § 2252 extends both to the sexually explicit nature of the material and to the age of the performers." Although that case involved a conviction for knowing transportation, receipt, and distribution of child pornography under 18 U.S.C. § 2252(a)(1) and (a)(2), its holding is not limited to offenses specified in those particular sub-sections of the statute. Relevant here, the mens rea requirement of X-Citement Video, Inc. applies with equal force in the context of "knowing possession" of child pornography under § 2252(a)(4)(B). See United States v. Alfaro-Moncada, 607 F.3d 720, 733 (11th Cir.2010) (applying X-Citement Video, Inc. in context of "knowing possession"); United States v. Lacy, 119 F.3d 742, 747 (9th Cir.1997) (same).
Thus, to convict Mr. Haymond, the government was required to prove he knew that the specific images he was convicted of possessing depicted minors engaged in sexually explicit conduct. Mr. Haymond suggests the government failed to met this burden because it presented no evidence he knew anything about the content of the charged images. But a showing of means rea "may and often is inferred from circumstantial evidence. ..." United States v. Borg, 501 F.2d 1341, 1343 (10th Cir.1974); see also United States v. Pires, 642 F.3d 1, 8-9 (1st Cir.2011) (recognizing principle in context of "knowledge" requirement of 18 U.S.C. § 2252). As we have already held, the jury was presented with sufficient evidence from which to conclude Mr. Haymond used search terms associated with child pornography to find and then download the charged images from LimeWire. In our view, this is determinative. As the Court of Appeals for the First Circuit has explained, evidence that a defendant "deliberately used search terms associated with child pornography ... when trolling on LimeWire ... can support a finding that he knew that the images retrieved contained child pornography." Pires, 642 F.3d at 9. We readily conclude that the evidence establishing Mr. Haymond used search terms related to child pornography to obtain the charged images was sufficient to prove beyond a reasonable doubt he knew those images contained child pornography.
Mr. Haymond also argues the evidence was insufficient to show the seven charged images had a sufficient connection to interstate commerce. We disagree.
As we recently explained in United States v. Sturm, 672 F.3d 891 (10th Cir. 2012) (en banc), to convict a defendant of possessing child pornography in violation of 18 U.S.C. § 2252(a)(4)(B), "the Government was required to prove the visual depictions had been mailed, shipped, or transported in interstate or foreign commerce."
Here, the government easily met this burden. Agent Jackson testified that he investigated the origin of the original photos which constituted the substantive content of the seven charged images found on Mr. Haymond's computer. He explained these seven photos were part of the "Brad and Bry" series of photographs and were originally taken in Spring Hill, Florida. By presenting evidence that these photos originated in Florida and that the visual depictions were ultimately found on Mr. Haymond's computer in Oklahoma, the government provided sufficient evidence to show the visual depictions had been "mailed, or ... shipped or transported in interstate or foreign commerce." 18 U.S.C. § 2252(a)(4)(B); see Sturm, 672 F.3d at 897.
We turn next to Mr. Haymond's contention that the district court erred in denying his motion to suppress evidence obtained in connection with the warrant-based search of his home on January 23. "When reviewing a district court's denial of a motion to suppress, we review the district court's factual findings for clear error and consider the evidence in the light most favorable to the Government." United States v. Zamudio-Carrillo, 499 F.3d 1206, 1209 (10th Cir.2007). Determinations relating to the sufficiency of a search warrant are conclusions of law which this court reviews de novo. United States v. Danhauer, 229 F.3d 1002, 1005 (10th Cir.2000). "[W]hile we review the district court's ruling on the sufficiency of a search warrant de novo, we do not review de novo the determination of probable cause by the issuing judge or magistrate." United States v. Perrine, 518 F.3d 1196, 1201 (10th Cir.2008). Instead, we give great deference to the issuing judge's finding of probable cause. United States v. Renigar, 613 F.3d 990, 993 (10th Cir. 2010). "We ask only whether, under the totality of the circumstances presented in the affidavit, the ... judge had a `substantial
Mr. Haymond argues the affidavit Agent Whisman submitted in support of the search warrant was insufficient to establish probable cause to search his home for evidence of child pornography. We disagree. An affidavit is sufficient to support probable cause if "the facts presented in the affidavit would warrant a [person] of reasonable caution to believe that evidence of a crime will be found at the place to be searched." Id. (alteration in original) (internal quotation marks omitted). After reviewing Agent Whisman's affidavit and the transcript of the district court's evidentiary hearing on Mr. Haymond's motion to suppress, we agree with the district court that the affidavit satisfied this requirement. Notably, Agent Whisman's affidavit described in detail his undercover LimeWire investigation, including the fact that he observed a user with an IP address linked to Mr. Haymond's residence who had numerous files of child pornography available for other LimeWire users to access, view, and download. This information would cause a reasonable person to believe evidence of child pornography would be recovered from Mr. Haymond's residence.
Mr. Haymond asserts the information in the affidavit was stale because Agent Whisman's LimeWire investigation took place on October 1, 2007 and the search warrant was not obtained until 107 days later, on January 16, 2008. We considered and rejected a similar claim in United States v. Perrine, 518 F.3d 1196, 1205-06 (10th Cir.2008), a case involving possession of child pornography. The defendant there raised a staleness claim on the ground that 111 days had elapsed between the initial incidents linking him to online child pornography and the date on which agents submitted the affidavit in support of the search warrant. Id. We rejected this staleness claim in large part on the observation that "images of child pornography are likely to be hoarded by persons interested in those materials in the privacy of their homes." Id. at 1206 (quoting United States v. Riccardi, 405 F.3d 852, 861 (10th Cir.2005)). On the record before us, we see no reason to depart from the rationale and result we reached in Perrine.
Finally, Mr. Haymond asserts the district court erred in permitting Dr. Passmore, a board-certified pediatrician, to testify as an expert about the ages of the individuals shown in the charged images. See Fed.R.Evid. 702. After looking at the charged images, she opined they depicted boys under the age of eighteen. In doing so, she relied in part on the so-called "Tanner Staging" methodology. See United States v. Hamilton, 413 F.3d 1138, 1143-44 (10th Cir.2005) (describing Tanner Staging methodology); United States v. Katz, 178 F.3d 368,
We need not decide this issue because even assuming the district court erred in admitting Dr. Passmore's statements, "we will reverse a resulting conviction only if the court's error was not harmless—that is, if `it had a substantial influence on the outcome or leaves one in grave doubt as to whether it had such effect.'" United States v. Roach, 582 F.3d 1192, 1207 (10th Cir.2009) (quoting United States v. Bornfield, 145 F.3d 1123, 1131 (10th Cir.1998)); see also United States v. Lewis, 240 F.3d 866, 869 (10th Cir.2001) (harmless error test applies in the context of expert testimony); Fed.R.Crim.P. 52(a). "The question is not whether, omitting the inadmissible statements, the record contains sufficient evidence for a jury to convict the defendant," but whether the evidence had a substantial influence on the jury's decision. United States v. Tome, 61 F.3d 1446, 1455 (10th Cir.1995). We conduct a harmless error review by reviewing the record de novo. Id.
Here, the government provided other sufficiently strong evidence to permit the conclusion that Dr. Passmore's testimony had no substantial effect on the outcome of Mr. Hayden's trial. See, e.g., United States v. Cass, 127 F.3d 1218, 1225 (10th Cir.1997) ("[G]iven the wealth of evidence put forth by the prosecution, we believe the error was harmless."). ICE Special Agent Mike Jackson testified that the charged images depicted known victims who were between twelve and fourteen years old when the underlying photographs were taken. His testimony was not based simply on a review of the one-dimensional charged images, but on a full-fledged investigation into the production of the photographs, including interviews of the boys and their parents.
Moreover, the jury itself had the images to review and assess regarding whether they depicted minors. Certainly in some child pornography cases expert testimony may be necessary to determine whether the young persons depicted in the images were minors. But "[o]ur precedents suggest that experts are not necessarily required to aid in such factual determinations." Riccardi, 405 F.3d at 870 (citing United States v. Kimler, 335 F.3d 1132, 1144 (10th Cir.2003); United States v. Harms, 371 F.3d 1208, 1212 (10th Cir. 2004)); see also Katz, 178 F.3d at 373 (noting that "whether the age of a model in a child pornography prosecution can be determined by a lay jury without the assistance of expert testimony [] must be determined on a case by case basis"). We have previously allowed jurors to determine for themselves whether images involved minors without the benefit of expert testimony, particularly when the subjects were sufficiently young. See Riccardi, 405 F.3d at 870-71; cf. United States v. Stanley, 896 F.2d 450, 452 (10th Cir.1990) (holding it was permissible for postal inspector to provide lay opinion testimony that photographs depicted children in sexually explicit conduct).
Here, even defense counsel conceded in his closing argument that the images appeared to be of minors: "Now, I will concede that when you look at these pictures that initially they look like these could be images of persons that are under the age of 18." Rec., vol. III at 665-66. He then tried to convince the jury that "looks can be deceiving," id. at 666. In light of Agent Jackson's cogent testimony, the significant
For the reasons stated above, we
See Rec., vol. I at 532-33.