GRIFFIN, Circuit Judge.
Defendant Timothy Ryan Richards appeals his convictions by a jury on eleven child-pornography related offenses, in violation of 18 U.S.C. §§ 2251(a) and (d)(1)(A); 18 U.S.C. §§ 2252A(a)(1), (a)(5)(B), and (b)(1); and 18 U.S.C. § 2257(f)(4). The government cross-appeals as substantively unreasonable Richards' below-Guidelines sentence of sixteen years of imprisonment, to be followed by eight years of supervised release. For the reasons that follow, we affirm Richards' convictions and sentence.
The government's investigation of defendant Richards began in July 2005, when a nineteen-year-old "adult performer" named Justin Berry contacted the Federal Bureau of Investigation ("FBI"), offering to provide information about the commercial production, advertising, sale, and distribution of child pornography videos. Berry gave this information under a limited grant of use immunity for his statements, which led to the arrest and prosecution of Richards and two other individuals, Gregory Mitchel and Aaron Brown.
The ensuing FBI investigation revealed that Richards was engaged in the production and distribution of child pornography. Despite his youth,
To manage the large amount of computer data, Richards kept several computers in his home in Nashville, Tennessee, and utilized multiple servers in California that contained approximately one terabyte (a thousand gigabytes) of information. Server log records indicated that shortly after assuming control of the JustinsFriends.com website in July 2005, Richards logged into the server that controlled the website from the internet protocol address tied to his home in Nashville, Tennessee, and uploaded child pornography to the JustinsFriends.net site.
Richards, who used the online alias "Casey Masterson," appeared in many videos in which he engaged in sexually explicit conduct with a then-minor child named Patrick Lombardi, a/k/a "Kyle." Richards befriended and began dating Lombardi in May of 2000, when Richards was almost nineteen and Lombardi was fourteen years old. Their relationship continued for four years. During this time period, Richards produced and made available on the internet recorded images of Lombardi engaged in sexually explicit conduct when Lombardi
Shortly before Lombardi's eighteenth birthday, Richards and Lombardi planned a new website—CaseyandKylesCondo.com—on which they intended to show homosexual pornography with links to photos, journals, and videos. Richards registered the internet domain for this website in his own name, created the content, advertised for it, and made it part of his affiliate marketing program. According to Lombardi, Richards purposefully waited until Lombardi turned eighteen to launch the website, which included pornography of Lombardi when he was a minor. The CaseyandKylesCondo.com website was hosted on a server in Los Angeles operated by BlackSun Technologies (the "Black-Sun server"). After their relationship ended, Lombardi signed a release that allowed Richards to keep the depictions of him, and thereafter Richards alone controlled the website and its contents. In January 2005, Richards registered the CaseysCondo.com domain name, and that site eventually replaced CaseyandKylesCondo.com. The CaseysCondo.com site included the explicit photographs of Lombardi in Australia.
Another website, JustinsFriends.com, was a homosexual pornographic website featuring Justin Berry and other male models. The website was originally run by Berry and Gregory Mitchel, but Berry sought out Richards' assistance in running the website. Richards agreed to help in exchange for a percentage of the profits, and he eventually took over JustinsFriends.com in July 2005 in the wake of a falling out between Berry and Mitchel. Richards transferred the website to the BlackSun server and changed the site's internet domain to JustinsFriends.net, which was registered in his name. Like his other websites, Richards offered access to the sexually explicit content for a fee. The contents of JustinsFriends.net included a version of the Iceland video of Lombardi and Richards and depicted the sexual activity of another minor, "Taylor." Federal agents saw the latter video playing in the free section of JustinsFriends.net in July 2005, during their investigation.
On September 12, 2005, agents executed a search warrant for the BlackSun server in Los Angeles, which had been identified as the host for JustinsFriends.com and JustinsFriends.net. On the same date, agents also executed a search warrant for a server in the San Francisco area (the "Hurricane Electric server"), which had hosted JustinsFriends.com and was associated with Aaron Brown. Ten days later, on the basis of information provided by Berry and Mitchel, Richards was arrested at his Nashville home. Agents then executed search warrants for the Nashville residence and a second residence to which Richards was moving. The seized items included eight computers, cameras, videotapes (including the "Casey@16" video), and documents. The subsequent search of the BlackSun server revealed that the JustinsFriends websites were stored in one of two hard drives on the server, along with several of Richards' websites containing pornography and child pornography.
In October 2005, the government returned a single count indictment charging Richards with the distribution of child pornography. Other charges were added and, ultimately, in September 2006, a twenty-seven count third superseding indictment was issued, charging Richards with various
Pertinent to the present appeal, the district court denied Richards' pretrial motions to suppress the fruits of the searches and seizures of the computer servers; to compel compliance with the court's order requiring the government to identify images to be used in its case-in-chief; and to dismiss counts in the indictment as multiplicitous.
The trial commenced on October 10, 2006. At trial, the defense did not dispute the fact that Richards operated the various websites. The defense challenged the government's assertion that the pornography on the websites actually depicted minors and that Richards knew of their status as minors. Lombardi testified as a prosecution witness that he was a minor when the videos were made; Richards testified on his own behalf that Lombardi and the other alleged minors, Taylor and Tory, were eighteen years of age when the images and videos were recorded.
Six of the twenty-seven counts were dismissed and not submitted to the jury. On October 26, the jury convicted Richards on eleven counts—three transportation counts, three advertising counts, two record-keeping counts, one conspiracy to transport count, one production count, and one possession count. The jury acquitted Richards on the remaining ten counts.
With a total offense level of 48 and a Category I criminal history, the recommended Guidelines sentence was life imprisonment. On November 7, 2008, the district court sentenced Richards to 16 years of imprisonment, 8 years of supervised release, and a special assessment of $1,100. Richards now timely appeals his convictions, and the government cross-appeals the sentence, which it asserts is too lenient and substantively unreasonable.
Richards first contends that the district court erred in denying his motion to suppress evidence obtained from the search of the BlackSun computer server because the search warrant was overbroad under the Fourth Amendment and the search exceeded the scope of probable cause set forth in the warrant.
On September 12, 2005, FBI Special Agent Monique Winkis applied in the Western District of Virginia for a warrant to seize and search the BlackSun server.
Agent Winkis stated that federal agents made an undercover purchase of a membership to JustinsFriends.net after being redirected there by the JustinsFriends.com website, where they saw, inter alia, sexually-explicit videos of Berry and Taylor, both minors at the time. The company that processed memberships for the JustinsFriends websites advertised its name as "Neova.net." Further investigation identified BlackSun as the web hosting company for the websites; this information was confirmed by Black-Sun representatives. The BlackSun facility in Los Angeles, California, has 2,000 servers; investigators discovered that the particular server in question, which hosted both JustinsFriends.com and JustinsFriends.net was located "in cabinet 200.02, server number 4 and has a sticker on it that states collegeboyslive."
In her affidavit, Winkis stated that James Fottrell, the Manager of the High Technology Investigative Unit in the Child Exploitation Section of the U.S. Department of Justice, informed her that upon approval and execution of the search warrant, the contents of the server and/or hard drives hosting the JustinsFriends.com and JustinsFriends.net websites would be "imaged" (exact copies made) so that their contents could be examined at an FBI field office and other locations following completion of the on-site search. Fottrell further advised Winkis that "the entirety of the unallocated space of the servers on which materials relating to IP address 66.54.91.171 are found should be searched because the unallocated space of those servers is likely to contain relevant evidence of materials that have been deleted or otherwise moved from the servers." Agent Winkis represented that "[i]t is difficult to know, prior to the search, which exact method of extracting the evidence will be needed and used and which expert possesses sufficient specialized skills to best obtain the evidence and subsequently analyze it," but "[n]o matter which method is used, . . . data analysis protocols are exacting scientific procedures, designed to protect the integrity of the evidence and to recover even hidden, erased, compressed, password-protected, or encrypted files." Any content or materials unrelated to the investigation would be erased or deleted from the government storage devices within a reasonable time. On the basis of the foregoing information, Agent Winkis submitted that
Attachment A described the BlackSun premises and the specific server to be searched, "cabinet number 200.02, server number 4." Attachment B listed the items to be seized:
(Emphasis removed.)
On September 12, 2005, a magistrate judge issued the warrant, which on its face authorized a search of "BlackSun, 66.54.91.171, Server # 4, Cabinet # 200.02, 1200 West 7th Street, Los Angeles, CA 90017." It was executed that same day, with the eventual search yielding some of Richards' child-pornography websites on Server # 4.
Richards moved to suppress the fruits of the seizure and search of the BlackSun server on the grounds that the warrant authorized seizing only those sections of the server hosting JustinsFriends.com and JustinsFriends.net; alternatively, if the warrant did in fact authorize seizure of the entire server, then the warrant was unconstitutionally overbroad.
At the suppression hearing convened by the district court, James Fottrell, the government's expert, testified that the Black-Sun server was a commercial web server, which provided configuration for websites and "serve[d] up" those webpages for computers requesting access through the internet. Each website's files were stored in the server's directory, either in a folder structure that distinguishes between websites or in an "intermeshed" structure that contains elements common to the websites. Each server had an operating system and an account for an administrator, who had access to and complete control over the files stored on the server. Each website operator had control over the website and the file directories associated with it, but could not alter content on other sites or in
Fottrell's examination of the entire server after its seizure revealed that JustinsFriends.net was stored in one of two hard drives on the server, along with six other websites, including Richards' CandKcondo.com, PenisClub.com, CaseysCondo.com, Premium.ckcondo.com, and CollegeBoysLive.com. Fottrell found an administrator account and user accounts for "Casey" and "Aaron" on the server. At the time of the suppression hearing, he had not yet detected any "locks or barriers" at the web site level on the server that would have precluded users from accessing the entire server, and he confirmed that the BlackSun administrator had unfettered access to the server.
Fottrell explained that he would not restrict his search for child pornography offenses to the folders associated with the JustinsFriends websites, but would search the entire server because, in his experience, individuals intentionally mislabel directory structures to hide the presence of child pornography and thus store it in other locations on the server. Moreover, servers have unallocated space, which might contain deleted files, log records, relevant e-mails, and there may be commonalities with the credit card transaction processors, advertising, or shared links. Thus, without looking at individual server files, Fottrell would not know whether any of the websites were related.
At the conclusion of the hearing, the district court denied Richards' motion to suppress. Noting that Richards conceded that unallocated server space could be searched, the court found probable cause to search the entire server because: (1) the agents did not know how many websites were on the server before seizing it; and (2) the server administrator had access to all of the sites and, therefore, "could have secreted in any other websites [or in the unallocated space] information relevant to the investigation concerning the child pornography contained on the [JustinsFriends websites]." The court concluded that the search warrant was not impermissibly overbroad.
When reviewing the denial of a motion to suppress, we review the district court's findings of fact for clear error and its conclusions of law de novo, considering the evidence in the light most favorable to the government. United States v. Lucas, 640 F.3d 168, 173 (6th Cir.2011). We review de novo a district court's determination of particularity. United States v. Greene, 250 F.3d 471, 477 (6th Cir.2001). "The proponent of a motion to suppress has the burden of establishing that his own Fourth Amendment rights were violated by the challenged search or seizure." Rakas v. Illinois, 439 U.S. 128, 130 n. 1, 99 S.Ct. 421, 58 L.Ed.2d 387 (1978).
The Fourth Amendment guarantees the right of liberty against unreasonable searches and seizures by providing:
U.S. Const. amend. IV.
"It is well-settled that items to be seized pursuant to a search warrant must be described with particularity to
The particularity requirement may be satisfied through the express incorporation or cross-referencing of a supporting affidavit that describes the items to be seized, even though the search warrant contains no such description. Id. at 439-40. "[T]he degree of specificity required is flexible and will vary depending on the crime involved and the types of items sought." Greene, 250 F.3d at 477; see also Guest v. Leis, 255 F.3d 325, 336 (6th Cir. 2001) ("A search warrant must particularly describe the things to be seized, but the description, whose specificity will vary with the circumstances of the case, will be valid if it is as specific as the circumstances and the nature of the activity under investigation permit.") (internal quotation marks omitted).
"The cases on particularity are actually concerned with at least two rather different problems: one is whether the warrant supplies enough information to guide and control the agent's judgment in selecting what to take; and the other is whether the category as specified is too broad in the sense that it includes items that should not be seized." United States v. Upham, 168 F.3d 532, 535 (1st Cir.1999) (citations and internal quotation marks omitted). It is the latter problem—overbreadth—that is alleged by Richards in this case. "[I]nfirmity due to overbreadth does not doom the entire warrant; rather, it requires the suppression of evidence seized pursuant to that part of the warrant. . ., but does not require the suppression of anything described in the valid portions of the warrant. . . ." Greene, 250 F.3d at 477 (internal quotation marks omitted).
We recently observed, in the context of determining that the search of a defendant's laptop computer did not exceed the scope of his consent to search his home, that
United States v. Lucas, 640 F.3d 168, 178 (6th Cir.2011); see also United States v. Comprehensive Drug Testing, Inc., 621 F.3d 1162, 1177 (9th Cir.2010) ("The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable
Courts that have addressed the permissible breadth of computer-related searches have grappled with how to balance two interests that are in tension with each other:
United States v. Stabile, 633 F.3d 219, 237 (3d Cir.2011) (citation and internal quotation marks omitted).
Our court has not yet had occasion to confront this issue in depth. Ultimately, however, given the unique problem encountered in computer searches,
Id. at 1094 (footnote omitted).
As is the case with paper documents, on occasion in the course of a reasonable search, investigating officers may examine, "at least cursorily," some "innocuous documents . . . in order to determine whether they are, in fact, among those papers authorized to be seized." Andresen v. Maryland, 427 U.S. 463, 482 n. 11, 96 S.Ct. 2737, 49 L.Ed.2d 627 (1976); see also Stabile, 633 F.3d at 234 (applying Andresen to a computer search); United States v. Banks, 556 F.3d 967, 973 (9th Cir.2009) (holding that search warrant for a computer and other items, for evidence of child pornography, was not overbroad, noting, "[a] generalized seizure of business documents may be justified if it is demonstrated that the government could not reasonably segregate . . . documents on the basis of whether or not they were likely to evidence criminal activity") (citation and internal quotation marks omitted).
Applying a reasonableness analysis on a case-by-case basis, the federal courts have rejected most particularity challenges to warrants authorizing the seizure and search of entire personal or business computers. See, e.g., Stabile, 633 F.3d at 239 (determining that the search of a computer folder was objectively reasonable because "criminals can easily alter file names . . . to conceal contraband" and the officer "took steps to ensure that his investigation complied with the state search warrant"); Banks, 556 F.3d at 973 (holding that warrant to search personal computer for items connected to "child pornography" or "minors engaged in sexually explicit conduct" was not overbroad because the warrant sought only evidence of child pornography and no more limited search would have
In other words, in general, "[s]o long as the computer search is limited to a search for evidence explicitly authorized in the warrant, it is reasonable for the executing officers to open the various types of files located in the computer's hard drive in order to determine whether they contain such evidence." United States v. Roberts, No. 3:08-CR-175, 2010 WL 234719, at *15 (E.D.Tenn. Jan. 14, 2010) (quoting United States v. Jack, No. S-07-0266, 2009 WL 453051, at *4 (E.D.Cal. Feb. 29, 2009)). Under the facts of the present case, this principle should be applied to Richards' computer server as well.
Like the district court, we find no ambiguity in the search warrant's authorization to seize and search the entire server. The warrant identified "BlackSun 66.54.91.171, Server # 4, Cabinet #200.02" at the BlackSun facility address. Attachment B to the warrant listed, as one of the items to be seized, "[a]ll content of the justinsfriends.com and/or justinsfriends.net servers at BlackSun . . . including any computer
Nor was the warrant overbroad. Richards argues that the BlackSun server was set up in a neatly compartmentalized and segregated fashion, rendering it entirely unnecessary to search beyond the content maintained in the JustinsFriends file directory. However, hindsight is 20/20. At the time of the seizure, agents did not know how and where the Justins-Friends-related content would be stored on the server. Richards does not dispute that the government had probable cause to believe that the JustinsFriends websites involved child pornography. Agent Winkis's affidavit explained that "[i]t is difficult to know, prior to the search, which exact method of extracting the evidence will be needed and used and which expert possesses sufficient specialized skills to best obtain the evidence and subsequently analyze it." It also indicated that a forensic procedure could uncover "even hidden, erased, compressed, password-protected, or encrypted files." Therefore, as explained by James Fottrell, searching the entire server was necessary to look for child pornography related to the Justins-Friends websites because individuals often mislabel directory files, the server might contain related websites, and the unallocated server space might contain materials pertaining to those websites.
Although Richards contends that the warrant failed to distinguish between "shared" and "dedicated" servers, Agent Winkis explained that distinction in her affidavit. In any event, before the search, investigators did not know whether the server was shared or dedicated, and, if shared, whether any websites were related, whether users had access to the entire server, or how the directory was organized. The trial evidence confirmed that the websites on the server were related through cross-promotion and use of the same images and videos, and that the user "Casey" (Richards) had administrative rights over the BlackSun server to control all the contents associated with that server. However, it was only after the search that Fottrell discovered that the Justins-Friends content was separated from the other sites and divided into distinct file directories. "The prohibition of general searches is not to be confused with a demand for precise ex ante knowledge of the location and content of evidence. . . . The proper metric of sufficient specificity is whether it was reasonable to provide a more specific description of the items at that juncture of the investigation." United States v. Meek, 366 F.3d 705, 716 (9th Cir.2004).
In light of the information known at the time the search warrant was issued, we hold that it was not unconstitutionally overbroad. The scope of the warrant was
Out of over 2,000 servers at the Black-Sun facility, investigators pinpointed the specific IP address and server that hosted the JustinsFriends websites—"BlackSun 66.54.91.171, Server #4, Cabinet # 200.02"—and in conducting their search and seizure, did not exceed the bounds of reasonableness required by the Fourth Amendment.
Moreover, for the sake of argument, were the warrant overbroad, we hold in the alternative that suppression of the evidence is not required under the Leon good-faith exception, "which allows admission of evidence `seized in reasonable, good-faith reliance on a search warrant that is subsequently held to be defective.'" United States v. Paull, 551 F.3d 516, 523 (6th Cir.2009) (quoting United States v. Leon, 468 U.S. 897, 905, 104 S.Ct. 3405, 82 L.Ed.2d 677 (1984)). "The Leon Court based its refusal to suppress evidence in such situations on its conclusion that `the marginal or nonexistent benefits produced by suppressing evidence obtained in objectively reasonable reliance on a subsequently invalidated search warrant cannot justify the substantial costs of exclusion.'" United States v. Hodson, 543 F.3d 286, 292 (6th Cir.2008) (quoting Leon, 468 U.S. at 922, 104 S.Ct. 3405). Leon made clear that only in exceptional circumstances is law enforcement to disregard a magistrate judge's authorization—for instance, when a warrant is "so lacking in indicia of probable cause as to render official belief in its existence unreasonable[,]" or when a warrant is "so facially deficient that it could not reasonably be presumed valid." Hodson, 543 F.3d at 292 (citations and internal quotation marks omitted).
Neither of these exceptions applies here. Agent Winkis's affidavit explained in detail the facts establishing probable cause to believe that child pornography was distributed through JustinsFriends.net. Further, the warrant was not "so facially deficient" in describing the items to be seized that the agents could not reasonably presume it to be valid. See United States v. Potts, 586 F.3d 823, 834 (10th Cir.2009) (applying Leon good-faith exception where reasonable officers could have read the warrant's multiple references to child pornography in attachment to apply to the entire warrant). The affidavit set forth why it was necessary to image the server. Hence, this is not a situation where "even a cursory reading of the warrant . . . would have revealed a glaring deficiency that any reasonable police officer would have known
Next, Richards contends that the government's initial refusal to identify the pornographic images embraced by the charges, and its subsequent identification of over 20,000 images, constitutes an obfuscation of the letter and intent of Federal Rule of Criminal Procedure 16(a)(1)(E), which requires the government, upon a defendant's request, to permit the defendant to inspect, inter alia, documents and photographs that the government intends to use in its case-in-chief at trial or that are material to preparation of the defense. Fed.R.Crim.P. 16(a)(1)(E)(i) and (ii).
Rule 16 "is intended to prescribe the minimum amount of discovery to which the parties are entitled, and leaves intact a court's discretion to grant or deny the broader discovery requests of a criminal defendant." United States v. Jordan, 316 F.3d 1215, 1249 n. 69 (11th Cir.2003) (citation and internal quotation marks omitted). If a party fails to comply with Rule 16, the district court has discretion to impose a number of sanctions—it may order discovery, grant a continuance, exclude the undisclosed evidence, or enter any other order that is just under the circumstances. United States v. Jordan, 544 F.3d 656, 667 (6th Cir.2008) (citing Fed. R.Crim.P. 16(d)(2)). We review an alleged violation of Rule 16 for abuse of discretion. Warshak, 631 F.3d at 296; United States v. Clark, 385 F.3d 609, 619 (6th Cir.2004).
On April 5, 2006, pursuant to the district court's order granting defendant's motion to compel production of discovery, the government provided Richards with copies of the hard drives seized from his computers and from the BlackSun and Hurricane Electric servers. On May 19, 2006, Richards moved for an order requiring the government to identify the images it would use in its case-in-chief. The district court granted the motion, ordering the government to identify the images by August 25, 2006. The government complied, identifying 20,429 computer files.
This information was provided in a flexible digital format, Microsoft Excel, and included the corresponding file path and file source for each identified file. The government also provided Richards with a "hash" value for each file and a database of the hash values of all the images on the servers in Microsoft Access database format, which could be used to identify duplicate images. Counsel for the government consulted with Richards' attorney on August 25, August 28, and again on August 30, 2006, and provided detailed explanations and guidance about the images and the evidence anticipated for trial. The government identified the child victims, previewed the nature of the charges in the impending superseding indictment, and responded to defense counsel's queries about specific files.
On August 30, 2006, the defense filed a motion to compel the government to comply with the identification order, complaining that the government had provided a list of over 20,000 files, rather than what the defense believed was required— "a list of a dozen or so files/images with a corresponding representation of which files/images relate[d] to each count in the Indictment." In response, the government offered to answer defense counsel's future questions about specific files and stated that it did not intend to show 20,000 images at trial, but planned to introduce "restored websites, each of which require[d] the use of thousands of the files listed," and to display some images and identify the multiple places where the images were found. The district court denied
The issue arose again on the second day of the October 2006 trial, when a federal agent testified about the images and videos found on the BlackSun server. Defense counsel objected that it was impossible to know, in advance, whether the images had been previously identified by the government. The district court ordered the government to preview with defense counsel the images it would show to the jury. Consequently, during a recess, the parties reviewed the exhibits and the government provided an exhibit list. When the trial resumed, defense counsel successfully objected to the introduction of several exhibits that were not included on the August list, but again expressed frustration about the sheer volume of images and being "swamped with trying to pick the needle out of the haystack. . . ."
Recently, in Warshak, we rejected the defendants' contention that the district court abused its discretion under Rule 16 by allowing the government to turn over millions of pages of electronic discovery evidence in an allegedly "disorganized and unsearchable format":
Warshak, 631 F.3d at 296-97 (footnotes, citation, and internal quotation marks omitted); see also United States v. Prince, 618 F.3d 551, 561-62 (6th Cir.2010) (rejecting the defendant's claim under Rule 16(a)(1)(E)(ii) that the district court abused its discretion by not requiring the government to specifically identify the exhibits it intended to introduce at trial from among the estimated 70,000 pages of discovery materials that were provided to the defendant); Jordan, 316 F.3d at 1253 (rejecting the defendant's Rule 16 challenge that the government's discovery was so
Similarly, we find no abuse of discretion in the district court's denial of Richards' motion to compel identification of evidence under Rule 16. Richards conceded in his pretrial motion for identification of images that Rule 16(a)(1)(E)(ii) does not require separate identification of the government's case-in-chief evidence. Moreover, there is no evidence that the government acted in bad faith and "attempted to obfuscate the relevant documents by burying them without direction under an avalanche of irrelevant materials." United States v. Perraud, No. 09-60129-CR, 2010 WL 228013, at *11 (S.D.Fla. Jan. 14, 2010) (unpublished) (holding that further identification of the government's proffered 5,000 documents was not required under Rule 16(a)(1)(E) where the government separately directed the defendants to materials it deemed most relevant, provided an indexed searchable database, and offered to provide its exhibit list and hard copies of the exhibits prior to the start of trial).
Richards also appeals, on hearsay grounds, the district court's ruling admitting into evidence certain age-labeled discs containing pornographic images of Lombardi when he was allegedly a minor. The images and videos of Lombardi, produced by Richards during their relationship, were placed on separate discs by the government. In preparation for trial, a federal agent interviewed Lombardi as to his age and the location where each image or video was filmed. The discs were then labeled accordingly with Lombardi's age at production ("16-17" and "17") and the location, and each disc was initialed by Lombardi and the agent. The images and videos were shown to the jury during the agent's testimony.
Defense counsel objected to both the premature admission and display of the images and the labeling on the discs. The government responded that the labels would be authenticated by Lombardi's subsequent testimony and explained that it showed the videos when the agent testified so that Lombardi would not have to view the pornography of himself in front of the jury. The district court provisionally admitted the images, but ordered that the
On direct examination, Lombardi identified his handwriting on ten discs, the content of and his age in each image, and confirmed that he had reviewed each image with the agent. Defense counsel then cross-examined Lombardi about his age in particular images and videos. At the conclusion of Lombardi's testimony, the district court opined that the labels had been adequately authenticated and allowed the labeled discs to be admitted and submitted to the jury during deliberations. In doing so, the court overruled defense counsel's objection to the purported "imprimatur. . . of seeing those ages written on there" and his fear that the jury "may attach too much significance" to the labels, noting that defense counsel had cross-examined and impeached Lombardi.
Richards now argues that the labeling on the discs was inadmissible hearsay, emphasizing that he was convicted on several child-pornography counts directly related to Lombardi's testimony that he was underage at the time the videos were made. Richards concedes, however, that a hearsay objection to the contents of the labels was never raised below and, therefore, our review of this issue is limited to plain-error analysis. See United States v. Knowles, 623 F.3d 381, 385 (6th Cir.2010) ("A district court's decision to admit evidence in a jury trial that is objected to for the first time on appeal is subject to plain error review."). The plain error exception to the contemporaneous-objection rule is to be used solely in those circumstances in which a miscarriage of justice would otherwise result. Id. "For us to correct an error not raised at trial: (1) there must be error; (2) the error must be plain; and (3) the error must affect substantial rights." Id. (citations omitted). If these conditions are met, we "may then exercise [our] discretion to notice a forfeited error, but only if (4) the error seriously affect[s] the fairness, integrity, or public reputation of judicial proceedings." Id. at 385-86 (citation and internal quotation marks omitted). Here, we find no such plain error in the district court's determination that redaction of the labels was unnecessary.
In United States v. Bentley, 489 F.3d 360 (D.C.Cir.2007), the jury, in a prosecution for firearm and drug possession offenses, asked to see the drug evidence during its deliberations. Id. at 362. A deputy marshal inadvertently delivered not only the drugs, which had been admitted into evidence, but also the labels attached to the bags of drug evidence, which had not been admitted. Id. The labels— pre-printed forms filled out by the police after the search of the defendant's residence—listed the defendant's name and address, his physical description, details about the charged offense, and a description of the materials inside each bag. Id. at 365. The Bentley court held that "because the labels were merely cumulative of properly admitted evidence, even if they constituted hearsay, their inadvertent delivery to the jury was harmless." Id. The court also rejected the defendant's argument that the labels were nonetheless prejudicial because they provided a "`neat condensation' of the government's theories[,]" stating: "[T]he testimony of the officer who filled in the labels made clear that he did so merely to preserve the chain of custody of their contents. The jury was therefore aware that the labels served only an administrative function, rather than as an expression of the government's theory of the defendant['s] liability." Id.
Bentley's rationale is equally applicable here. Lombardi's age at the time of production of the images was, without question, a pivotal issue in this case. However, the agent and Lombardi both
Next, Richards argues that the district court erred in denying his motion to dismiss Counts 1 and 16 as multiplicitous, in violation of the Double Jeopardy Clause of the Fifth Amendment. Counts 1 and 16 charged him with transporting child pornography via CaseyandKylesCondo.com and CaseysCondo.com, respectively, in violation of 18 U.S.C. § 2252A(a)(1). According to Richards, because CaseysCondo.com and CaseyandKylesCondo.com were simply renamed versions of the same website, and purportedly never co-existed or overlapped in operation, his separate prosecution on these counts "is tantamount to charging 2 counts of mortgage fraud involving the same house which is distinguished only by a change of paint color" and constitutes impermissible multiple punishments for the same offense. We disagree.
"Whether an indictment suffers from a problem of duplicity or multiplicity is a legal question that this Court reviews de novo." United States v. Swafford, 512 F.3d 833, 844 (6th Cir.2008). "Generally, an indictment may not charge a single criminal offense in several counts without offending the rule against `multiplicity' and implicating the double jeopardy clause." United States v. Davis, 306 F.3d 398, 417 (6th Cir.2002) (citation and internal quotation marks omitted). Where an indictment includes more than one count charging the same statutory violation, the question is whether Congress intended the facts underlying each count to constitute a separate unit of prosecution. Swafford, 512 F.3d at 844. "The inquiry as to what constitutes the correct unit of prosecution focuses in part on the identification of the key element of the federal offense." United States v. Esch, 832 F.2d 531, 541 (10th Cir.1987).
Section 2252A(a)(1) provides that it is unlawful for any person to "knowingly mail[], or transport[] or ship[] using any means or facility of interstate or foreign commerce or in or affecting interstate or foreign commerce by any means, including by computer, any child pornography[.]" 18 U.S.C. § 2252A(a)(1) (emphasis added). A reasonable interpretation of this broadly worded statute is that the transportation of child pornography through two different websites constitutes distinct violations punishable as separate offenses. Cf. United States v. Hinkeldey, 626 F.3d 1010, 1012-14 (8th Cir.2010) (holding that the defendant's rights under the Double Jeopardy Clause were not violated by the district court's refusal to treat the six counts of possession of child pornography under 18 U.S.C. § 2252A(a)(5)(B) as one for sentencing purposes, where the indictment
Consistent with the logic that the possession, receipt, or distribution of child pornography on different mediums or computer devices constitutes separate offenses, the use of distinct websites to transport child pornography likewise is not redundant for double jeopardy purposes.
Here, despite Richards' claim to the contrary, CaseyandKylesCondo.com and CaseysCondo.com were not the same website. Although CaseysCondo.com eventually replaced CaseyandKylesCondo.com, the government's expert, James Fottrell, emphatically disagreed that the two websites were one and the same. The domain names were different and therefore required separate acts of registration, which occurred when Richards discontinued use of the CaseyandKylesCondo.com site, first registered in January 2003, and replaced it with the CaseysCondo.com website in early 2005. Fottrell opined that, although these two websites drew content from the same folder on the BlackSun server, it did not necessarily mean they were the same website—the sites could have operated at the same time and drawn different images from the same folder because they were on different domains. Fottrell testified that e-mails recovered from customers of these websites were consistent with the sites' simultaneous operation at some point in time prior to the government's seizure.
Moreover, in his effort to attract new customers, Richards marketed CaseysCondo.com as a new and different entity. On the site, he recounted his history of operating pornographic sites, including CaseyandKylesCondo.com, and stated that his "current website was born" when, in September
Based upon this evidence, the district court did not err in denying Richards' motion to dismiss Counts 1 and 16 as multiplicitous. We agree fully with the government that punishing, through multiple offenses, a defendant who funnels child pornography through different websites is consistent with Congress's intent to halt the dissemination of such images and to stop the sexual abuse of children. See New York v. Ferber, 458 U.S. 747, 759-60, 102 S.Ct. 3348, 73 L.Ed.2d 1113 (1982) ("The distribution of photographs and films depicting sexual activity by juveniles is intrinsically related to the sexual abuse of children. . . . The most expeditious if not the only practical method of law enforcement may be to dry up the market for this material by imposing severe criminal penalties on persons selling, advertising, or otherwise promoting this product."); cf. United States v. McNerney, 636 F.3d 772, 777, 780 (6th Cir.2011) (taking note of "Congress' significant purpose in prohibiting the dissemination of child pornography" in holding that "duplicate digital images, like duplicate hard copy images, should be counted separately for purposes of calculating a sentence enhancement pursuant to [U.S.S.G.] § 2G2.2(b)(7)").
Richards' remaining arguments are also without merit. He contends that the district court violated the Confrontation Clause by precluding him from cross-examining and impeaching a prosecution witness—an adult performer and former friend—about his previous sexual acts involving minors. The district court did not abuse its discretion in determining that the witness's sexual encounters with minors were of peripheral relevance to the case. See United States v. Reid, 625 F.3d 977, 986 (6th Cir.2010) ("The district court retains wide latitude insofar as the Confrontation Clause is concerned to impose reasonable limits on such cross-examination based on concerns about, among other things, harassment, prejudice, confusion of the issues, the witness' safety, or interrogation that is repetitive or only marginally relevant.") (citation and internal quotation marks omitted).
Lastly, Richards' cursory argument alluding to cumulative error has no merit because "cumulative-error analysis is not relevant where no individual ruling was erroneous." United States v. Deitz, 577 F.3d 672, 697 (6th Cir.2009).
The government cross-appeals Richards' sentence of sixteen years' imprisonment and eight years of supervised release on the ground that it is substantively unreasonable. With a total offense level of 48 and a Category I criminal history, the advisory Guidelines range was life imprisonment.
We review the district court's sentencing decision for substantive reasonableness under a deferential abuse-of-discretion standard. United States v. Jones, 641 F.3d 706, 711 (6th Cir.2011) (citing Gall v. United States, 552 U.S. 38, 51, 128 S.Ct. 586, 169 L.Ed.2d 445 (2007)). "`A sentence is substantively unreasonable if the district court selects a sentence arbitrarily, bases the sentence on impermissible factors, fails to consider relevant sentencing factors, or gives an unreasonable amount of weight to any pertinent factor.'" United States v. Camiscione, 591 F.3d 823, 832 (6th Cir.2010) (quoting United States v. Lapsins, 570 F.3d 758, 772 (6th Cir.2009)). The Supreme Court in Gall v. United States, 552 U.S. 38, 128 S.Ct. 586, 169 L.Ed.2d 445 (2007), "reject[ed]
We "must give due deference to the district court's decision that the § 3553(a) factors, on a whole, justify the extent of the variance. The fact that the appellate court might reasonably have concluded that a different sentence was appropriate is insufficient to justify reversal of the district court." Gall, 552 U.S. at 51, 128 S.Ct. 586.
Pointing out that Richards' sixteen-year term of imprisonment is only one year more than the mandatory minimum sentence that he faced on the child-pornography production count alone, see 18 U.S.C. § 2251(a) and (e), the government argues that: (1) the district court's downward variance was excessive and fails to reflect the seriousness of Richards' overall offense conduct, which included not only the production of child pornography, but also its advertisement and the distribution for profit of more than 600 images through multiple websites; (2) the court unduly minimized the gravity of Richards' crimes when it noted that they involved adolescent boys, rather than younger victims or girls; (3) the court did not give appropriate consideration to uncharged conduct which entailed Richards' sexual relationship with a thirteen-year-old boy, "Doe," with whom Richards was living at the time of his arrest; (4) the court gave undue weight to certain factors in Richards' history and circumstances to the exclusion of others—for instance, finding regret in Richards when his post-arrest conduct in jail showed neither remorse nor acceptance of responsibility, and viewing Richards as a victim himself based upon Richards' claim that he had been "tricked" into pornography; and (5) the sentence does not adequately protect minors from further sexual predation by Richards.
Certainly there are troubling aspects in the district court's sentencing rationale, particularly its mitigation of the seriousness of Richards' actions, by noting that his relationship with minors was to a certain extent consensual behavior. That said, we disagree with the government that the district court abused its sentencing discretion. The sentencing record
"It is the essence of discretion that it may properly be exercised in different ways and likewise appear differently to different eyes." United States v. Andrews, 633 F.2d 449, 465 (6th Cir.1980) (en banc) (Engel, J., dissenting). As in other cases, "[w]hile we cannot say that this is the sentence we would have given, neither can we say that this variance exceeded the discretion Gall gives district court judges." United States v. Beach, 275 Fed.Appx. 529, 535 (6th Cir.2008) (holding in transportation and receipt of child pornography case that downward variance to 96 months' imprisonment from a Guidelines range of 210 to 240 months was not substantively unreasonable under the circumstances).
Here, as in Grossman, "[t]he district court never lost sight of the sentence recommended by the guidelines and gave ample reasons for reducing the sentence as far as he did." Id. at 597. Our reminder in United States v. Vonner, 516 F.3d 382 (6th Cir.2008), is apt here:
Vonner, 516 F.3d at 392; see also United States v. Guthrie, 557 F.3d 243, 256 (6th Cir.2009) ("District courts enjoy discretion in sentencing based on their ring-side perspective on the sentencing hearing and [their] experience over time in sentencing other individuals. Accordingly, we do not presume to read the mind of a sentencing judge, on a search for impropriety.") (citation and internal quotation marks omitted); Paull, 551 F.3d at 529 ("Far from being impermissible or inadequate, [the] analysis of the considerations the court found most important—the defendant's circumstances and the seriousness of the crime—is just the sort of balancing a sentencing court should be doing.").
Following our deferential review, we hold that Richards' sixteen-year sentence was not an abuse of discretion and therefore affirm it.
For the foregoing reasons, we affirm Richards' convictions and sentence.
KAREN NELSON MOORE, Circuit Judge, concurring in the judgment only.
I write separately because I would affirm the district court solely on the basis of the good-faith exception to a subsequently invalidated warrant. I agree with the majority's conclusion that the search warrant explicitly authorized the search of the entire server. I disagree, however, that the Federal Bureau of Investigation ("FBI") had probable cause to search the entire server. The majority's analysis applies our case law on searches of personal computers to searches of shared space without a moment's pause to consider the differences between the two. The rule announced by the majority would authorize the government to invade the privacy of any number of unidentified individuals or companies without any probable cause, just because they may, without their knowledge, share server space with suspected criminals.
A company like BlackSun provides web hosting services to other parties by allowing them to make use of its servers. A server is a computer that provides services to other computers; web servers, for example, send web pages to a computer when a user enters a specific URL
On any given server, there can be any number of user accounts with varying levels of access. Each server has an administrative account to access the whole server; each website has an individual operator account to access just the website's directory. The government wants to analogize a server to a house with many open rooms. The appellant wants to analogize a server to an apartment with many locked units.
Two hypothetical servers may be useful to illustrate this point.
Hypothetical Server B is also owned by BlackSun, but instead BlackSun leases the entire space to Company B. Company B now maintains the administrator account itself and can set up as many websites on the server as it wants. It could use the server solely to host its own websites. It could set up six websites of its own and sublease the remaining space to a seventh, unaffiliated website. It could set up no websites of its own and sublease all the space to unaffiliated websites, just as BlackSun did with Server A. Company B as administrator maintains rights over the whole space and can access all the directories, whether the websites are operated by Company B or subleased and operated by unaffiliated companies. Server B is now more like a 30-bedroom house leased to one person, who may then choose to occupy all the rooms himself, fill them with his relatives, or sublet one or all of them to complete strangers and give them each locks on their rooms.
It should be obvious that, depending on whether a building is structured like Server A or Server B, the government may or may not have probable cause to search all the rooms when criminal activity is reasonably linked to one. The majority, however, would draw no distinction.
Neither party disputes that at the time of the seizure
Id. at ¶ 47. The affidavit does not state to whom (or to how many parties) BlackSun leased computer server #4 in cabinet # 200.02 ("Server # 4"). It does not state who the administrator of Server # 4 was. It does not state whether there were any other web sites hosted on Server # 4, or whether those web sites were in any way related to JustinsFriends or had a common operator. In short, the affidavit does not state whether Server # 4 is more like Server A in the above hypothetical or Server B.
Based on the information that the FBI knew at the time the warrant was issued, probable cause existed to search any part of the server that someone affiliated with JustinsFriends could access. But the affidavit does not indicate that the FBI had any reason to suspect that someone affiliated with JustinsFriends was the administrator of the server as opposed to someone at BlackSun. The fact that some person had universal access to the server, without more, is insufficient grounds to justify a search of the entire server. Limiting the search to only a portion of the server under these circumstances is more consistent with our prior cases on electronic searches.
"A search warrant must particularly describe the things to be seized, but the description, whose specificity will vary with the circumstances of the case, will be `valid if it is as specific as the circumstances and the nature of the activity under investigation permit.'" Guest v. Leis, 255 F.3d 325, 336 (6th Cir.2001) (quoting United States v. Henson, 848 F.2d 1374, 1383 (6th Cir.1988), cert. denied, 488 U.S. 1005, 109 S.Ct. 784, 102 L.Ed.2d 776 (1989)). General warrants that merely authorize "wide-ranging rummaging searches" violate the Fourth Amendment. United States v. Logan, 250 F.3d 350, 364-65 (6th Cir.), cert. denied, 534 U.S. 895, 122 S.Ct. 216, 151 L.Ed.2d 154 (2001). Although cases addressing particularity are often concerned with supplying enough information to the agents executing the warrant, of equal concern "is whether the category as specified is too broad in the sense that it includes items that should not be seized." United States v. Upham, 168 F.3d 532, 535 (1st Cir.), cert. denied, 527 U.S. 1011, 119 S.Ct. 2353, 144 L.Ed.2d 249 (1999); see also United States v. Greene, 250 F.3d 471, 476-78 (6th Cir.2001). Given that the individual server was clearly identified by location and name, the issue in this case stems from the breadth of the warrant—whether the warrant should have covered the entire server.
I agree with the majority that, in the course of a reasonable search, investigating officers may have to examine cursorily innocuous documents "in order to determine whether they are, in fact, among those papers authorized to be seized." Andresen v. Maryland, 427 U.S. 463, 482 n. 11, 96 S.Ct. 2737, 49 L.Ed.2d 627 (1976). The same is true in an electronic search. When a warrant authorizes the search of a personal computer for child pornography, the agents are not required to open only the files or folders labeled "child pornography" even though this may result in brief access of private, innocuous material. United States v. Burgess, 576 F.3d 1078, 1093-94 (10th Cir.), cert. denied, ___ U.S. ___, 130 S.Ct. 1028, 175 L.Ed.2d 629 (2009). This flexibility recognizes that the owner of the computer has access to the full hard drive and may hide criminal activity under non-criminal names. That, however, is not the situation here.
As discussed above, a server like the one at BlackSun is inherently different from a personal computer in that it may belong entirely to one person, and thus be like a
Almost all of the cases offered by the majority to justify the search of the entire server involve searches of computers or hard drives within the complete control of the individual suspected of criminal activity.
In Guest, state police had probable cause to believe that obscene material was being posted to two different electronic bulletin boards.
A more relevant comparison could be made to United States v. Adjani, 452 F.3d 1140, 1146 (9th Cir.), cert. denied, 549 U.S. 1025, 127 S.Ct. 568, 166 L.Ed.2d 420 (2006). In Adjani, the court upheld the search of someone else's computer in executing a search warrant at a suspect's residence. Upon first determining that probable cause existed to search computers found at the suspect's residence, the court next addressed whether the probable cause extended to a computer on the premises known to belong to the suspect's roommate. The court found that it did. "The agents, acting pursuant to a valid warrant to look for evidence of a computer-based crime, searched computers found in Adjani's residence and to which he had apparent access. That one of the computers actually belonged to [the roommate] did not exempt it from being searched, especially given her association with Adjani and participation (however potentially innocuous) in some of his activities as documented in the agent's supporting affidavit." Id. (emphasis added).
All of these cases emphasize that the person suspected of criminal activity, whether identifiable or anonymous, had the ability to hide the illegal files anywhere on the computers or hard drives that were ultimately searched. United States v. Mann, 592 F.3d 779, 784 (7th Cir.) (broad search reasonable because defendant "could have images of women in locker rooms virtually anywhere on his computers"), cert. denied, ___ U.S. ___, 130 S.Ct. 3525, 177 L.Ed.2d 1106 (2010); United States v. Stabile, 633 F.3d 219, 234 (3d Cir.2011) ("[A] broad seizure was required because evidence of financial crimes could have been found in any location on any of the six hard drives, and this evidence very likely would have been disguised or concealed somewhere on the hard drive."), cert. denied, ___ U.S. ___, ___ S.Ct. ___, ___ L.Ed.2d ___, No. 10-10825, 2011 WL 2182609 (Oct. 11, 2011); Adjani, 452 F.3d at 1146 (permitting search of all computers that suspect could access, even if not his); United States v. Sherman, 372 Fed.Appx. 668, 675-76 (8th Cir.2010) (unpublished opinion) ("[Defendant] fails to acknowledge he had access to all components of the computer system used in his business and that the computer data could be manipulated, stored in different formats, or stored outside of the [specific program suspected of misuse].").
Here, neither the warrant nor the supporting affidavit indicates a reason to believe that the owner of JustinsFriends had access to the entire server. The majority views the lack of knowledge regarding who
That is not to say that a warrant to search the entire server may never be "as specific as the circumstances and the nature of the activity under investigation permit." United States v. Ables, 167 F.3d 1021, 1033 (6th Cir.) (quoting Henson, 848 F.2d at 1383), cert. denied, 527 U.S. 1027, 119 S.Ct. 2378, 144 L.Ed.2d 781 (1999). Indeed, probable cause might have been established in this case had the FBI agent requesting the warrant included additional facts in the warrant or supporting affidavit known at the time. We know from the evidence presented at the suppression hearing and later at trial that BlackSun provided FBI agents at least some information regarding the structure of Server #4 at the time the warrant was issued. BlackSun indicated that they leased the entire server to one individual, last name unknown. James Fottrell testified that when a server is leased in its entirety to one person or entity, it is more likely that the websites on that server are related. Had this information been included in the supporting affidavit, there may have been sufficient probable cause to search the entire server even without knowing anything else about the internal structure of the server.
FBI agents may not always be able to obtain such details about the internal structure of a server prior to imaging it. But the majority's position excuses the investigating agents from asking such simple questions as "Who leases this server?" and "What other websites are on this server?" When such answers are not forthcoming, the FBI could issue an administrative subpoena in order to gain more information about the structure of the server in question. Alternatively, the warrant itself could be structured to require computer personnel to make an initial determination based solely by looking at the user accounts as to what areas someone affiliated with the suspect site had access. Upon making such a determination, only those directories would be imaged for searching, or if already imaged due to on-site difficulties, any non-affiliated directories would be returned.
Id. at 1176. The rule advanced by the majority in this case could also jeopardize the privacy of innumerable strangers to the crime. Here, the FBI agents made no showing that they had probable cause to believe that every directory on Server # 4 was accessible to the operators of JustinsFriends. They also made no effort to determine first what directories on Server # 4 were accessible to the operators of JustinsFriends, or whether the operators were also administrators. Requiring such a preliminary showing when possible, or at a minimum requiring an initial inquiry before searching, allows legitimate interests of law enforcement to be advanced while still maintaining safeguards against the privacy of people who signed up for web hosting services and were never told that their site shared space with a child pornographer on the other side of the country.
When the government has probable cause to search for drugs in a specific apartment, we have never held that the existence of a landlord with keys to every other apartment in the building creates probable cause to search every apartment. But if the landlord happens to live in the very apartment suspected of containing drugs, his universal access may become relevant. Here, however, the warrant provided no probable cause to believe that someone connected to JustinsFriends had access to the entire server. I would therefore hold the search warrant unconstitutional because it was overly broad.
The only remaining question is whether the agents are entitled to rely on an invalid warrant under the good-faith exception in United States v. Leon, 468 U.S. 897, 914-15, 104 S.Ct. 3405, 82 L.Ed.2d 677
Whether an affidavit lacks indicia of probable cause "is a less demanding showing than the `substantial basis' threshold required to prove the existence of probable cause in the first place." United States v. Carpenter, 360 F.3d 591, 595 (6th Cir.) (en banc) (internal quotation marks omitted), cert. denied, 543 U.S. 851, 125 S.Ct. 261, 160 L.Ed.2d 84 (2004). The inquiry is whether an agent reading the warrant in a "practical, common sense manner" would be able to detect the deficiency. United States v. Van Shutters, 163 F.3d 331, 337 (6th Cir.1998) (internal quotation marks omitted), cert. denied, 526 U.S. 1077, 119 S.Ct. 1480, 143 L.Ed.2d 563 (1999). In Van Shutters, we upheld reliance on an affidavit describing both the criminal activity and a location with such particularity that a reasonable executing agent would make the "common sense inference" that the affiant had verified a nexus between the two. Id.
In this case, I disagree with the majority that the affidavit explains why it was necessary to image the entire server. Majority Op. at 542-43. The only area of the server for which the affidavit explains why a search is necessary relates to the unallocated space:
R. 87-1 (BlackSun Aff. at ¶ 55). An explanation like the one above is never offered as to why probable cause exists to image the whole server; only the details of how the server is going to be imaged are given. The remaining parts of the affidavit, however, suggest a sufficient nexus between the illegal activity and the server as a whole to support a good-faith belief in the warrant's validity even though probable cause was ultimately lacking, particularly given the level of detail in the affidavit and the technical nature of the search.
I would therefore hold that the good-faith exception in Leon justifies affirming the district court's decision to deny the motion to suppress, despite the invalidity of the underlying warrant. I therefore concur in the judgment.