United States of America v. Beau Brandon Croghan
No. 18-3709
United States Court of Appeals For the Eighth Circuit
August 28, 2020
Before SMITH, Chief Judge, MELLOY and SHEPHERD, Circuit Judges.
A jury convicted Beau Brandon Croghan of receipt or attempted receipt of child pornography, in violation of
I. Background2
A. The Tor Network
Croghan‘s offense occurred using the Tor network.3 The Tor network is “a network that runs on top of the regular Internet” and operates as “a series of different computers that are all around the world.” Trial Tr., Vol. I, at 41, United States v. Croghan, No. 1:15-cr-00048-SMR-HCA-1 (S.D. Iowa Aug. 20, 2018), ECF No. 127. When a user connects to a website through the Tor network, the user‘s Internet Protocol (IP) connection is bounced through multiple computers. The user‘s IP address appears as the last computer funneled through the series of interconnected computers. A user must download special software and install the Tor browser on his or her computer to access
“[T]he Tor network [also] has a feature which is known as Tor hidden services.” Id. at 44. This feature allows the user to host a website with the same anonymity by protecting the website administrator‘s IP address. The website‘s physical location is unknown. In addition, Tor hidden services also allow the users who are accessing the website‘s location to be hidden. As a result, these users are “able to communicate with each other through the Tor network without ever revealing to each other where the other is in the real world.” Id. at 45.
“Tor hidden services are very heavily utilized for all types of criminal activity.” Id. at 50. For example, “Tor hidden services [are used] to create child pornography websites.” Id. With Tor hidden services, the uniform resource locator used to access a website is “16 randomly generated letters and numbers.” Id. at 46. “Within the Tor network, a user generally has to know the 16-digit or character string for a hidden service that [he or she] want[s] to access.” Id. at 48–49.
B. Playpen
In August 2014, the FBI became aware of a Tor hidden service website called Playpen and began monitoring it. “Playpen was a message board-type website where people would distribute and share images
FBI Special Agent Daniel Alfin (“SA Alfin“) was one of the agents charged with monitoring Playpen from August to December 2014. SA Alfin set up user accounts on Playpen to surveil the activity on the website. He testified that a user needed to install the Tor browser, navigate to Playpen via the 16-digit random code, and register a user account with Playpen. A user registered with Playpen by entering an e-mail address, user name, and password. Playpen encouraged anonymity by warning new users to use a fake e-mail address during the registration process. Once logged in, the user was taken to the website‘s index page “contain[ing] links to all of the different parts of the Playpen website, and those links were all broken down by categories like boys, girls, toddlers, incest, [etc.]” Id. at 59. The user then clicked on one of the categories displayed on the index page and was taken to the category‘s subforum. The subforum contained a listing of different postings that Playpen‘s members had created. Each of the “postings . . . ha[d] titles indicative of the types of images or videos that that user was sharing.” Id. at 65. After clicking on one of the topics, the user “would enter that actual posting, and at that point typically . . . would see images of child pornography on [his or her] computer screen and links to download full videos.” Id. SA Alfin testified that “[w]hen the image is displayed on [the user‘s] computer screen, that means it‘s been downloaded to [the user‘s] computer over the Internet, and now it‘s there on [the user‘s] computer screen for [the user] to see.” Id. at 66. SA Alfin confirmed that when the image appears on the user‘s computer screen, the user has “received whatever image [the user] clicked on.” Id. In summary, SA Alfin explained, the child-pornography
images were embedded within [the] post so when the user clicked on that particular post, these full-sized images were within that post and would have been downloaded to [the user‘s] computer and displayed on the computer screen without additional action being taken. The action to view the images was clicking on [the] post.
Trial Tr., Vol. II, at 111, United States v. Croghan, No. 1:15-cr-00048-SMR-HCA-1 (S.D. Iowa Aug. 21, 2018), ECF No. 128. The computer downloaded the file to the temporary storage of the user‘s computer, and the image displayed on the computer.
In December 2014, Playpen‘s administrator misconfigured the website. As a result, when the user entered a valid e-mail address, the user received a confirmation e-mail sent over the regular Internet, not the Tor network. The confirmation e-mail showed the actual IP address for Playpen. The FBI identified Playpen‘s administrator and arrested him. Following the administrator‘s arrest, the FBI assumed administrative control of Playpen via a court order. The FBI continued operating the website in an attempt to identify Playpen‘s users.
The FBI administered Playpen from February 20, 2015, to March 4, 2015—a period of 13 days. The FBI obtained a search warrant authorizing a search of Playpen users’ computers through the use of a Network Investigative Technique (NIT). The NIT sent a hidden computer code to Playpen users’ computers that instructed the computers to transfer identifying information back to an FBI computer over the regular Internet. This identifying information included the IP address, operating system information, operating system username, and Media
C. Croghan‘s Conduct
During the 13-day period, the FBI successfully identified a user in Council Bluffs, Iowa. The user was “Beau2358.” The e-mail address associated with Beau2358 was cbbarscene@gmail.com, and Beau2358‘s password for the Playpen account was gargoyle62. Beau2358 registered with Playpen on September 27, 2014. Beau2358 logged in to Playpen on four dates during the FBI‘s 13-day operation: February 20, 2015; March 1, 2015; March 3, 2015; and March 4, 2015. Beau2358 was actively logged in to Playpen for over 13 hours between September 27, 2014, and March 4, 2015. Beau2358 accessed 51 topics with over 600 images of child pornography while the NIT was active.
Through the NIT, the FBI “obtained the real IP address that Beau2358 was using to access the Playpen website.” Trial Tr., Vol. I, at 77–78. The IP address associated with this user was 68.227.166.242 and was operated by Cox Communications. The IP address was registered to Croghan at his residence in Council Bluffs, Iowa. The host name for the computer was “Beaus.” The MAC address4 for the computer used to access Playpen was the 12-character unique address, 24FD523B41C0. SA Alfin confirmed that the MAC address from the NIT matched the Toshiba laptop computer seized from Croghan‘s residence on July 21, 2015.
SA Alfin confirmed that Beau2358 “accessed” or “looked at” several different sections of Playpen: Preteen HardCore, Infants and Toddlers, Incest, and Jail Bait. Trial Tr., Vol. II, at 121. SA Alfin testified that, for example, “Beau2358 went into the Pre-teen hard core section” and “clicked on a topic.”5 Id. at 113. SA Alfin confirmed that Beau2358 “received . . . child pornography” once he “click[ed] on to the next screen” where the “first image c[ame] up or a group of images.” Id. “[A]ll of the images in the posting [were] downloaded to [Beau2358‘s] computer over the Internet.” Id. at 114; see also id. at 142 (confirming that once a user “click[s] on an image and view[s] it, [the user has] received it,” “whether or not [the user] save[s] a copy to look at later“). These images “depict[ed] prepubescent children engaged in sexual activity.” Id. at 114.
Special Agent Jacob Foiles (“SA Foiles“) was assigned as the case agent for Beau2358. SA Foiles had to verify that “the subscriber, Beau Croghan, still reside[d] at [the Council Bluffs] address.” Id. at 150. SA Foiles conducted “basic database checks, employment checks, driver‘s license checks,” and “limited surveillance” and learned that Croghan and his wife still resided at the address provided by Cox Communications. Id. During the surveillance, SA Foiles located a wireless network that was password protected and associated with Croghan‘s residence and the Cox Communications subscriber subpoena.
SA Foiles also conducted an open-source internet search on Beau2358 and discovered that a user account on PrimeJailbait.com matched the user name from Playpen. Beau2358 had uploaded five images on PrimeJailbait.com. The open-source internet search also uncovered “a
In addition, SA Foiles received employment information, including Croghan‘s social security card ending in 2358. These digits matched the last four numbers of the Playpen user Beau2358. SA Foiles also obtained Croghan‘s work history and confirmed that Croghan was not at work during any of the times that Beau2358 accessed the Playpen network during the 13-day period.
Law enforcement executed a search warrant at Croghan‘s residence on July 21, 2015. In the master bedroom, law enforcement found a Toshiba laptop on a computer desk. SA Foiles identified items on the computer desk indicating that Croghan was “a computer savvy individual.” Id. at 166. First, SA Foiles found a computer fan that was either removed or purchased. Second, he discovered four internal hard drives typically found inside of a laptop or desktop computer. He noted that “the average user [does not] typically remove[] those or know[] how to remove those from a computer.” Id. at 167. Third, SA Foiles found a Linux operating system, which, “generally speaking,” “more technologically savvy individual[s]” use. Id.
Programs running on a computer store data in random access memory (RAM). A computer‘s RAM is “a small portion of storage that is used to hold information in an effort to speed up the user‘s performance on that computer.” Id. at 204. “RAM is considered volatile, which means if it loses power, then it will be flushed, and there will be no data there.” Id. At the time of the search warrant, the Toshiba laptop was on; the desktop displayed a folder and shortcut for, among other things, the Tor browser. Because the laptop was on, FBI Computer Forensic Examiner Jordan Warnock was able to retrieve the computer‘s RAM data through a forensic procedure and save that data.
Trooper Scott Haugaard of the Nebraska State Patrol, an investigator specializing in computer forensics, forensically examined an exact copy of Croghan‘s hard drive and “RAM dump.” Id. at 207. Based on his examination, Trooper Haugaard was able to identify characteristics of the Toshiba laptop. He identified the MAC address and host name associated with the Toshiba laptop as being the same one that the FBI obtained with the NIT and provided to him. Trooper Haugaard conducted a keyword search for Beau2358 and found that the keyword was “used hundreds of times over and over again.” Id. at 238. Additionally, he conducted a keyword search for gargoyle62—Beau2358‘s password on Playpen—and discovered that it was also the password for a flight simulator game linked to the Gmail account Beau2358@gmail.com.
Trooper Haugaard‘s forensic exam revealed that the Tor network was last accessed on the Toshiba laptop on July 19, 2015. A VideoLAN Controller (VLC) was downloaded on Croghan‘s hard drive. A VLC is a third-party program downloadable from the Internet that plays videos without discriminating against file extensions. Once someone downloads a VLC, “it create[s] . . . subfiles in the computer that track the activity of the VLC.” Id. at 244. The VLC creates a log of its recent history. According to Trooper Haugaard, Croghan‘s recent history included the video
Trooper Haugaard was not surprised that he did not find any child pornography on Croghan‘s Toshiba laptop. In his experience, “people who use Tor or networks like Tor want to be anonymous.” Id. at 262. While Trooper Haugaard did not locate any child pornography on the computer, he did locate “some child pornography artifacts” through, for example, the VLC. Id. at 276.
D. Procedural History
Croghan was charged in a one-count indictment with accessing and attempting to access child pornography, in violation of
At trial, the district court instructed the jury to deliberate on the receipt count first and to only consider the access count if it could not reach a verdict on the receipt count or found Croghan not guilty of the receipt count. The district court‘s instruction was based on its conclusion that the access count was a lesser included offense of the receipt count.
The jury found Croghan guilty of the receipt count. Croghan moved for judgment of acquittal, which the district court denied. The district court sentenced Croghan to 110 months’ imprisonment, a sentence 25 months below the advisory Guidelines range of 135 to 168 months’ imprisonment.
II. Discussion
Croghan raises three issues on appeal. First, he argues that the district court erred at trial by admitting certain evidence. Second, he asserts that the district court erroneously denied his motion for judgment of acquittal on the receipt count because no evidence exists that he “took custody of child pornography.” Appellant‘s Br. at 13. Finally, he maintains that the district court abused its discretion in sentencing him because it punished him for exercising his constitutional right to a jury trial.
A. Admission of Evidence
Croghan alleges that the district court committed three evidentiary errors. First, he argues that the district court erred by admitting images of a relative that he had uploaded to PrimeJailBait.com. Second, he argues that the district court erred by permitting SA Foiles to testify that, upon learning Croghan had children, SA Foiles was “concern[ed] . . . ‘because [the FBI‘s] primary objective . . . is trying to rescue
1. Images of Relative
At trial, SA Foiles testified that he conducted an open-source internet search on Beau2358 to confirm Croghan‘s identity and discovered that a user account on PrimeJailbait.com matched the user name from Playpen. Beau2358 had uploaded five images of what appeared to be a 14- or 15-year-old female on PrimeJailbait.com. SA Foiles explained that PrimeJailbait.com “was a website that had legal pictures of clothed . . . people, but they were generally minors, younger than 18.” Trial Tr., Vol. II, at 151. On direct examination, the government showed SA Foiles Exhibit 15—the pictures posted on PrimeJailbait.com. After SA Foiles authenticated the exhibit, the government offered Exhibit 15 into evidence. Croghan did not object to its admission. SA Foiles then testified that the FBI identified the female in the pictures as one of Croghan‘s relatives. Croghan‘s counsel also did not object to this testimony.
Croghan‘s relative who appeared in the pictures also testified. She confirmed that Exhibit 15 contained pictures of her found on PrimeJailbait.com. She testified that she did not post the pictures; in fact, she had “never heard of the website.” Id. at 221. According to Croghan‘s relative, she posted those pictures to her private Facebook account. She knew that Croghan had seen “Picture No. 3” because he had commented on the picture. Id. at 222. She testified that she found out that her pictures were posted to PrimeJailbait.com three years before trial. When asked how the posting made her feel, Croghan‘s relative responded, “Very uncomfortable and kind of scared for my life.” Id. After her response, Croghan‘s counsel objected to this question based on relevance, and the district court overruled the objection. Croghan‘s relative then explained that she was “uncomfortable and scared” “[b]ecause [she] had posted these photos for [her] family to see but not for sickos out there to see.” Id. Croghan‘s counsel did not cross-examine Croghan‘s relative.
On appeal, Croghan argues that the district court erroneously permitted “the government to elicit testimony from SA Foiles and . . . Croghan‘s female relative suggesting that [he] uploaded images of the relative to PrimeJailBait.com.” Appellant‘s Br. at 14. He also asserts that the district court erroneously admitted Exhibit 15—the pictures of the female relative posted on PrimeJailBait.com. He notes that while he “unsuccessfully objected to the female relative‘s testimony that the ordeal made her very uncomfortable and scared for her life,” he failed to “object to the evidence regarding PrimeJailBait.com.” Id. He concedes that “this [c]ourt reviews for plain error.” Id.
“The plain error test requires an (1) error, (2) that is plain, and (3) that affects substantial rights. The error may only be remedied if it seriously affects the fairness, integrity, or public reputation of judicial proceedings.” United States v. Zurheide, 959 F.3d 919, 921 (8th Cir. 2020) (cleaned up).
Croghan maintains that the district court violated
“We will reverse the district court‘s 404(b) ruling only if the evidence clearly has no bearing on the case.” United States v. Fechner, 952 F.3d 954, 961 (8th Cir. 2020).
- relevant to a material issue raised at trial;
- similar in kind and close in time to the crime charged;
- supported by sufficient evidence to support a jury finding that the defendant committed the other act; and
- its probative value is not substantially outweighed by its prejudicial value.
We recently addressed whether a district court erroneously admitted child erotica images in a defendant‘s trial for transportation of child pornography and receipt of child pornography. Fechner, 952 F.3d at 960. In that case, “[a] forensic examination of [the defendant‘s] devices showed extensive child pornography downloads and searches, with over 100 items being moved to an SD card in his phone and later deleted.” Id. at 957. At trial on the transportation and receipt charges, “[t]he government . . . introduced images of young girls and women found on [the defendant‘s] SD card that the district court described as child erotica.” Id. at 958. In doing so, “[t]he government asserted that these images were relevant to show [the defendant‘s] sexual interest in children and, based on their presence on the SD card, his knowledge of child pornography also located on the SD card.” Id. The defendant moved to exclude the images. Id. The district court denied the motion. Id. It “recognized that the possession of the child erotica was not illegal but determined that the evidence was probative to issues of knowledge, motive, and sexual interest in children and was not unduly prejudicial.” Id.
On appeal, the defendant argued that the district court erroneously admitted the child erotica images because they “were improper propensity evidence used only to establish that he acted in accordance with his alleged character.” Id. at 960. We held that the child erotica images were admissible under
We next rejected the defendant‘s argument “that the potential prejudice and the jury‘s likelihood to misuse propensity evidence outweigh[ed] any probative value.” Id. We examined two prior cases in which we held that pornographic stories were inadmissible under
Alternatively, we held that
[e]ven if there was error in admitting the child erotica images, it was harmless. While the content of the child erotica may suggest a sexual interest in children, that is not the sole purpose of the evidence. The jury saw only one image and the content of the images was not discussed at length.
Id. (citing Evans, 802 F.3d at 949 (finding the admission of propensity evidence harmless where the jury did not hear the content of the pornographic stories and “ample properly-admitted evidence” limited the stories’ likelihood of influencing the jury‘s verdict)).
We hold that the district court did not plainly err in admitting the PrimeJailBait.com evidence. As in Fechner, where the child erotica images were admitted to prove motive and rebut claims of accident or mistake, the pictures of Croghan‘s relative on PrimeJailBait.com and testimony concerning those pictures were offered for the permissible purpose of proving Croghan‘s identity as Beau2358. The PrimeJailBait.com evidence was relevant because it confirmed that Croghan was Beau2358: he used Beau2358 not only on PrimeJailBait.com to post pictures from his relative‘s private Facebook account, but also as his user name on Playpen. And, similar to the PrimeJailBait.com website, Croghan—as Beau2358—looked at a section of Playpen entitled “Jail Bait.”
“Even if there was error in admitting the [PrimeJailBait.com evidence], it was harmless.” See id. The evidence‘s “sole
2. Testimony about Croghan‘s Children
When SA Foiles was conducting the open-source internet search on Beau2358, he discovered “a blog posting that was reportedly authored by a Beau Croghan.” Trial Tr., Vol. II, at 151. In that blog post, Croghan mentioned that he had three children. SA Foiles testified that learning Croghan had three children was concerning “because [the FBI‘s] primary objective with all this is trying to rescue victims of sexual abuse. And so the first thing we want to look for is actually hands-on offenders, those that are sexually abusing children, and then possibly producing images from that sexual abuse.” Id. at 152. Croghan‘s counsel did not object. Croghan‘s failure to object to SA Foiles‘s testimony means that our review is for plain error only. See Zurheide, 959 F.3d at 921.
Croghan argues that the district court should have struck SA Foiles‘s testimony as “irrelevant and unfairly prejudicial.” Appellant‘s Br. at 18 (citing
We hold that the district court did not plainly err by not striking SA Foiles‘s testimony. SA Foiles‘s testimony concerned how the FBI identified Croghan as Beau2358. One of the identifiers was that Croghan had a blog, which stated that he had three children. SA Foiles never testified that he suspected Croghan of sexually abusing his children. Instead, he testified that the primary objective throughout the investigation was “to rescue victims of sexual abuse.” Trial Tr., Vol. II, at 152. The first step to accomplish this primary objective is “to look for . . . hands-on offenders, those that are sexually abusing children, and then possibly producing images from that sexual abuse.” Id. Read in context, SA Foiles was explaining the steps he took as part of his investigation and why he took those steps. His testimony briefly mentioned Croghan‘s children and did not suggest that Croghan had sexually abused them.
3. Testimony Concerning No-Knock Warrant
During his opening argument, Croghan‘s counsel discussed the manner in which law
During the direct examination of SA Foiles, the government asked why he requested a no-knock search warrant. Croghan‘s counsel did not object to this question. SA Foiles testified that the no-knock search warrant was requested “because users accessing Playpen . . . were deemed sort of a higher level of sophistication with regards to technology.” Trial Tr., Vol. II, at 159. He also cited “a high likelihood that [Croghan] was likely knowledgeable and possibly employing things like encryption” given his “interest[] in computers.” Id. As a result, SA Foiles testified, law enforcement “obtained this no-knock search warrant so that [law enforcement did not] give the potential occupant of the house time to destroy evidence.” Id. at 159–60.
On cross-examination, Croghan‘s counsel questioned SA Foiles about how law enforcement executes a no-knock search warrant. SA Foiles confirmed that there are “at least ten officers” who are armed and wearing ballistic vests. Id. at 188. During execution of the no-knock warrant on Croghan‘s home, the officers had handguns displayed. He also confirmed that law enforcement generally gains entry to the home by “tak[ing] a battering ram and break[ing] the door open“; then, officers wake people up, if necessary, and cuff them until the house is secured. Id. at 188–89. SA Foiles characterized execution of the no-knock warrant as “a little bit traumatic” on the occupants of the home. Id. at 190.
Croghan argues that the district court erred by allowing SA Foiles‘s testimony about the no-knock search warrant to suggest that Croghan posed a risk to obstruct justice by destroying evidence. He maintains that the testimony was irrelevant because the type of warrant that the FBI obtained “had no bearing on whether [he] was guilty of the charged offenses. Relatedly, the FBI‘s opinion regarding the risk that [he] may have tried to destroy evidence if given the opportunity was irrelevant to any material issue.” Appellant‘s Br. at 19–20. According to Croghan, SA Foiles‘s testimony “left the jury with the unfairly prejudicial impression that [he] was a dangerous individual with poor character for trustworthiness.” Id. at 20. Because Croghan failed to object to the government‘s question asking SA Foiles why he requested a no-knock warrant, our review is for plain error. See Zurheide, 959 F.3d at 921.6
“Relevant evidence is evidence having any tendency to make the existence
We conclude that the district court did not err in permitting SA Foiles‘s testimony about why he requested a no-knock search warrant. Croghan‘s counsel discussed how the no-knock warrant was executed in his opening statement. Based on counsel‘s opening statement, the government was entitled to explain why law enforcement requested to execute this type of warrant, which SA Foiles admitted on cross-examination is “traumatic” for the occupants. SA Foiles‘s testimony regarding the no-knock warrant was relevant because it afforded the jury a complete picture of the search of Croghan‘s residence and, ultimately, the discovery of the devices upon which the evidence against Croghan was found. SA Foiles‘s testimony was not unfairly prejudicial to Croghan because at no time did SA Foiles suggest that Croghan was dangerous or untrustworthy.
B. Sufficiency of the Evidence
Croghan argues that insufficient evidence supported the jury‘s verdict convicting him of the knowing receipt of child pornography, as opposed to the lesser included offense of knowing access of child pornography. While Croghan concedes that sufficient evidence exists that he knowingly accessed child pornography, he argues there was no evidence that he knowingly received child pornography. According to Croghan, the district court conflated the concepts of access and receipt such that there is no difference between the two separate crimes.
Three separate crimes intersect in this case: possession of child pornography, receipt of child pornography, and access of child pornography. See
Although Croghan was not charged with knowing possession of child pornography, the elements of that offense are relevant to the crime for which he was convicted—receipt of child pornography. See
“The convictions for receipt and possession of child pornography turn on essentially the same requirements and evidence . . . .” United States v. Worthey, 716 F.3d 1107, 1113 (8th Cir. 2013) (internal quotation omitted) (applying
“This Court has not yet [expressly] decided whether viewing images stored in temporary internet files is sufficient to establish knowing receipt . . . of child pornography.” Ramos, 685 F.3d at 131 (emphasis added).9 However, we have recognized that
[t]he presence of child pornography in temporary internet and orphan files on a computer‘s hard drive is evidence of prior possession of that pornography, though of course it is not conclusive evidence of knowing possession and control of the images, just as mere presence in a car from which the police recover contraband does not, without more, establish actual or constructi[ve] possession of the contraband by a passenger.
Kain, 589 F.3d at 950 (finding sufficient evidence of knowing possession where defendant‘s browsing history showed repeated accessing of child pornography websites); see also United States v. Huyck, 849 F.3d 432, 443 (8th Cir. 2017) (“[T]hough the ninety-five thumbnail images on the Hitachi hard drive were not viewable without special software, they nonetheless constituted evidence of prior possession of child pornography.“). And, our sister circuits “have upheld child pornography receipt and possession convictions where a defendant viewed child pornography stored in temporary internet files on a computer.” Ramos, 685 F.3d at 131 (citing Pruitt, 638 F.3d at 766-67; Kain, 589 F.3d at 948-50; Romm, 455 F.3d at 998, 1002; United States v. Bass, 411 F.3d 1198, 1201-02 (10th Cir. 2005)).
“A person ‘knowingly receives’ child pornography under
The Second Circuit has held that sufficient evidence supported a defendant‘s conviction for knowingly receiving and possessing child pornography “even assuming he viewed the images in question only in temporary internet files and did not save them onto his hard drive.” Ramos, 685 F.3d at 131.10 First, the court explained, the defendant “clearly ‘receive[d]’ and ‘possesse[d]’ the images, even though they were only in his temporary internet files.” Id. (alterations in original). The evidence showed that the defendant
had some control over the images even without saving them—he could view them on his screen, he could leave them on his screen for as long as he kept his computer on, he could copy and attach them to an email and send them to someone, he could print them, and he could (with the right software) move the images from a cached file to other files and then view or manipulate them off-line.
Id. at 131-32 (citing Romm, 455 F.3d at 998 (relying on witness‘s testimony as to what could be done with cached files); United States v. Tucker, 305 F.3d 1193, 1204-05 (10th Cir. 2002) (same)). In total, “the evidence showed [that] an individual who views images on the internet accepts them onto his computer, and he can still exercise dominion and control over them, even though they are in cache files. In other words, he receives and possesses them.” Id. at 132. Second, the court found “ample evidence that [the defendant] intentionally searched for images of child pornography, found them, and knowingly accepted them onto his computer, albeit temporarily.” Id. The defendant‘s “browsing history on his desktop computer showed that [he] intentionally searched for child pornography on the internet” and “viewed some 140 images of child pornography, which were stored on the computer in temporary internet files.” Id.
Croghan was charged with knowingly receiving child pornography and with knowingly accessing child pornography. The jury did not return a verdict on the access count in accordance with the district court‘s instructions.
According to Croghan, the government proved, at most, that he knowingly accessed child pornography. See Appellant‘s Br. at 22 (“The evidence at trial tended to show that Mr. Croghan accessed child pornography on Playpen, but it did not prove that he received (took custody of) child pornography.“) He requests that this court “remand for entry of judgment on the lesser-included accessing offense.” Appellant‘s Reply Br. at 4 n.1 (citation omitted). Croghan, however, misunderstands the elements necessary to sustain a conviction for the access-with-intent offense and how those elements compare to the receipt offense.
To sustain a conviction under
Our cases have been viewed as “implicitly tak[ing] this broad view of the criminal liability provision of [
In summary, the access-with-intent offense is not synonymous with the
First, the government produced ample evidence of Croghan‘s knowing receipt of child pornography through evidence about its undercover operation of Playpen, a Tor hidden service website. See Ross, 948 F.3d at 247.12 Croghan had the Tor network on his computer. The NIT linked Croghan‘s IP address to the Playpen user account of Beau2358. Open-source internet searches and employment information confirmed that Beau2358 was Croghan; in addition, a search confirmed that Croghan had previously uploaded five images on PrimeJailbait.com, which bore a similar name to the Jail Bait section of Playpen. Croghan logged into his Playpen user account and searched 51 topics during the two-week period that the FBI controlled Playpen.
Croghan had to take several steps to view child pornography on Playpen: log into Playpen with a user name and password, navigate to one of the various sub forums, and click on a post. The “images were embedded within that post“; therefore, when Croghan clicked on the post, the full-sized images “would have been downloaded to [his] computer and displayed on the computer screen without additional action being taken.” Trial Tr., Vol. II, at 111.
Second, the government produced sufficient evidence that Croghan received child pornography. The government was not required to prove that Croghan saved the images to his hard drive to sustain a conviction for receipt. See Pruitt, 638 F.3d at 766-67; Ramos, 685 F.3d at 131. Instead, the government‘s evidence that Croghan viewed the images is sufficient in the present case to prove receipt. See Ramos, 685 F.3d at 131. SA Alfin confirmed that Beau2358 “accessed” or “looked at” several different sections of Playpen: Preteen HardCore, Infants and Toddlers, Incest, and Jail Bait. Trial Tr., Vol. II, at 121. SA Alfin testified that, for example, “Beau2358 went into the Pre-teen hard core section” and “clicked on a topic.” Id. at 113. SA Alfin confirmed that Beau2358 “received . . . child pornography” once he “click[ed] on to the next screen” where the “first image c[ame] up or a group of images.” Id. “[A]ll of the images in the posting [were] downloaded to [Beau2358‘s] computer over the Internet.” Id. at 114; see also id. at 142 (confirming that once a user “click[s] on an image and view[s] it, [the user has] received it,” “whether or not [the user] save[s] a copy to look at later“). These
And, as in Ramos, “there was ample evidence that [Croghan] intentionally searched for images of child pornography, found them, and knowingly accepted them onto his computer, albeit temporarily.” Id. at 132. In addition to SA Alfin‘s testimony detailing what Croghan looked at on Playpen, Trooper Haugaard testified that Croghan‘s recent history included video file names of child pornography. And, Trooper Haugaard located a “bookmark” or “quick reference guide” in the computer‘s browser under Croghan‘s user name for a Russian website containing child exploitation material. Trial Tr., Vol. II, at 251. Trooper Haugaard confirmed locating “child pornography artifacts” on Croghan‘s computer. Id. at 276.
Accordingly, we hold that sufficient evidence supports Croghan‘s conviction for receipt of child pornography.13
C. Sentence
Finally, Croghan challenges his below-Guidelines sentence of 110 months’ imprisonment as substantively unreasonable.
The PSR calculated a Guidelines range of 135 to 168 months’ imprisonment. At sentencing, neither party objected to this calculation. The district court adopted the PSR‘s recommended Guidelines range. The court noted that Croghan would not receive a decrease for acceptance of responsibility because he did not plead guilty. The government recommended a Guidelines sentence, but Croghan‘s counsel requested a sentence of no more than 80 months’ imprisonment. Counsel compared Croghan and Steven Horton, another defendant identified in the Playpen investigation. Unlike Croghan, Horton had pleaded guilty to knowingly accessing child pornography. According to Croghan‘s counsel, Croghan had a “substantially higher” Guidelines range than Horton even though “the conduct is exactly the same” and “Croghan would have accessed less than [Horton].” Sent‘g Tr. at 12, States v. Croghan, No. 1:15-cr-00048-SMR-HCA-1 (S.D. Iowa Dec. 6, 2018), ECF No. 130. Counsel argued that just because Horton pleaded guilty and Croghan went to trial “d[id not] justify a sentence five levels higher.” Id.
The court sentenced Croghan to a below-Guidelines sentence of 110 months’ imprisonment. In imposing Croghan‘s sentence, the district court expressly stated that it had “considered all of the factors under [
Croghan argues that the district court imposed an unreasonable sentence that punished him severely for exercising his constitutional right to a jury trial and improperly considered the burden imposed on participants in a child pornography trial. The deferential abuse-of-discretion standard applies to a district court‘s sentencing decision. See United States v. Feemster, 572 F.3d 455, 461 (8th Cir. 2009) (en banc). “A district court abuses its discretion when it . . . gives significant weight to an improper or irrelevant factor . . . .” Id. (internal quotation omitted). “While substantive review exists, in substantial part, to correct sentences that are based on unreasonable weighing decisions, this court must give due deference to the district court‘s decision that the
In support of his argument that the district court penalized him for proceeding to trial, Croghan cites United States v. Hernandez, 894 F.3d 1104 (9th Cir. 2018), and United States v. Sales, 725 F.2d 458 (8th Cir. 1984). In Hernandez, the Ninth Circuit remanded to the district court for further explanation of the defendant‘s sentence “because the district court appear[ed] to have increased [the defendant‘s] sentence or withheld a reduction for acceptance of responsibility based on [the defendant‘s] decision to go to trial.” 894 F.3d at 1109. During the sentencing hearing, the district court had “emphasized [the defendant‘s] decision to go to trial five separate times.” Id. at 1110. “Critically . . ., the district court‘s comments regarding [the defendant‘s] decision to go to trial comprised virtually the entirety of the explanation for the sentence.” Id. at 1111 (emphasis added). The Ninth Circuit noted that “the court did not reference any particular ‘facts of this case’ or ‘particular record’ beyond [the defendant‘s] exercise of his constitutional rights.” Id. (emphasis added) (quoting United States v. Ramos-Medina, 706 F.3d 932, 941-42 (9th Cir. 2013)). Instead, it “made a passing reference to the
Enhancing a sentence solely because a defendant chooses to go to trial risks chilling future criminal defendants from exercising their constitutional rights. And imposing a penalty for asserting a constitutional right heightens the risk that future defendants will plead guilty not to accept responsibility, but to escape the sentencing court‘s wrath.
Id. at 1112 (emphasis added).
In Sales, we vacated a defendant‘s judgment of conviction on nine counts but affirmed the defendant‘s judgment of conviction on one count. 725 F.2d at 460. In remanding for resentencing, we “express[ed] concern as to the [district] court‘s apparent motivation for the imposition of defendant‘s original sentences” because, at the original sentencing, the district “court was openly critical of the defendant for not plea bargaining and for going to trial ‘for three days with a jury on all ten counts’ in light of the substantial evidence against the defendant.” Id. The district court‘s total sentence of 55 years’ imprisonment was “[e]xplicitly in response to what the district court viewed as an abuse of the judicial process.” Id. The district court‘s “method of sentencing and . . . remarks suggest[ed] an absence of the proper exercise of judicial discretion in the sentencing process.” Id. While we recognized that “no one should abuse” his constitutional right to defend himself “by causing needless delay or otherwise hindering the judicial process,” our primary concern was “safeguard[ing] a defendant‘s right to a full and fair trial. A court may not use the sentencing process to punish a defendant, notwithstanding his guilt, for exercising his right to receive a full and fair trial.” Id.
Croghan‘s case differs materially from Hernandez and Sales for several reasons. First, unlike in Hernandez and Sales where the district courts appeared to have increased the defendants’ sentences because they exercised their trial rights, the district court here imposed a below-Guidelines sentence.
Second, the district courts in Hernandez and Sales tied their sentences to the defendants’ decision to go to trial without referencing the particular facts of the defendants’ cases. By contrast, the district court here not only stated that it had considered all of the
Third, the district court‘s comparison of Horton‘s and Croghan‘s cases was in direct response to defense counsel arguing for a more lenient sentence for Croghan based on the two defendants’ offense conduct. The district court explained that Horton‘s lesser sentence was on account of him pleading guilty to a lesser offense, while Croghan chose to go to trial on an offense with a potentially greater penalty. The record as a whole shows Croghan‘s sentence resulted from appropriate consideration of the charges, the facts, and the relevant sentencing factors required by law. The court‘s brief comments about child-pornography trial consequences to courtroom participants did not drive the sentence. The district court acknowledged that Croghan was “absolutely entitled to have a trial,” but it correctly recognized that Croghan was not entitled to “a sentence that‘s lower than what [the court] gave Mr. Horton, who did plead guilty.” Sent‘g Tr. at 16; see
As a result, we hold that the district court did not abuse its discretion in sentencing Croghan to the below-Guidelines sentence of 110 months’ imprisonment.
III. Conclusion
Accordingly, we affirm the judgment of the district court.
Notes
United States v. Myers, 355 F.3d 1040, 1042 (7th Cir. 2004). In addition, “a person who created an image [of child pornography] or found it in trash could ‘possess’ child pornography without ever receiving it.” Watzman, 486 F.3d at 1009 (citing United States v. Malik, 385 F.3d 758, 759 (7th Cir. 2004)).[A] person who seeks out only adult pornography, but without his knowledge is sent a mix of adult and child pornography, will not have violated that statutory provision. That same person, however, could be in violation of the possession provision . . . if he or she decides to retain that material, thereby knowingly possessing it.
Id. at 16.trial isn‘t an easy thing in these child pornography cases. A defendant who chooses to plead guilty in a child pornography case saves 14 jurors from looking at images of children being raped, saves marshals and court security officers and court reporters and courtroom deputies and lawyers from having to look at images of children being raped, defense attorneys from having to look at children being raped. There is traumatic injury that happens surrounding these kinds of trials.
