UNITED STATES of America, Plaintiff-Appellee, v. Bret A. DUNNING, Defendant-Appellant.
No. 16-5164
United States Court of Appeals, Sixth Circuit.
Argued: October 20, 2016. Decided and Filed: May 18, 2017
857 F.3d 342
ALICE M. BATCHELDER, Circuit Judge.
And even if the list of eight included the two men mentioned during the proffer, Brown‘s statements do not establish obstruction of justice for two reasons. The first is that Brown did not lie. The emailed list of eight names, supplied by his lawyer to investigators, responded to a question posed by investigators and came with the caveat that it was “not furnished as being exculpatory.” App. R. 34 at 209. The trial established that six of the eight people had indeed been to Brown‘s house and thus had “access” to Brown‘s computer. As for the two individuals on the list who had never been to Brown‘s house, they were added to the list by Brown‘s wife, not Brown.
The second reason is that the email did not “hurt or retard [the] investigation.” United States v. Williams, 952 F.2d 1504, 1516 (6th Cir. 1991). Brown‘s defense was that he didn‘t do it and that these eight people had access to his computer and thus may have committed the crime. All the investigators had to do in response was investigate the eight people on the list. The investigators interviewed each one. They called each one at trial. And when each of the persons on this discrete list denied using Brown‘s computer, that helped the government, as it undermined Brown‘s credibility, bolstered the government‘s case, and eliminated one of the few remaining ways in which this crime could have been committed. Brown‘s statements to prosecutors thus did not “significantly obstruct[] or impede[] the government‘s investigation” and thus cannot suffice for an obstruction of justice enhancement. Carter, 510 F.3d at 598; see
For these reasons, we affirm Brown‘s convictions, vacate his sentence, and remand for resentencing consistent with this opinion.
Before: MERRITT, BATCHELDER, and ROGERS, Circuit Judges.
BATCHELDER, J., delivered the opinion of the court in which ROGERS, J., joined. MERRITT, J. (pp. 351-53), delivered a separate dissenting opinion.
OPINION
ALICE M. BATCHELDER, Circuit Judge.
Bret Dunning was indicted for knowingly receiving and possessing child pornography in violation of
Dunning argues on appeal that the district court erred by denying his motion to suppress evidence, that
I. Facts
A Kentucky State Police Detective twice used Nordic Mule, a program that is part of a law enforcement software package known as the Child Protection System (CPS), to search for IP addresses that had recently shared child pornography on the peer-to-peer file-sharing network eDonkey (a.k.a. eMule). The software locates specified files on public peer-to-peer networks and records the IP addresses that have downloaded and made available for sharing files containing child sexual exploitation. When the software finds shared materials on these public networks, it logs the “date, time, hash values, filename, and IP address.” After the second CPS inquiry and report, the detective obtained a search warrant for Dunning‘s residence.
During the execution of the search warrant, the police seized numerous electronic devices, including computers, iPhones, and iPads, which contained over 22,000 images and videos depicting the sexual exploitation of minors. Some images showed prepubescent children engaged in sexually explicit conduct with adults.
The program [the] Detective [] used when conducting his search for CP images is part of the Child Rescue Coalition, which is a private non-profit organization. The source code and program are proprietary and are not in the possession of the United States. The data base [sic] used in this case evolved from the program formerly known as the Wyoming tool.
The court then denied without prejudice Dunning‘s motion for discovery. Dunning also moved to suppress evidence that the police seized from his home, arguing that the warrant application was not supported by probable cause because the detective used software of uncertain reliability and accuracy to obtain the warrant, and that he had a reasonable expectation of privacy in the files stored on his computer. The district court denied Dunning‘s motion to suppress.
Dunning then pled guilty to a violation of
II. Motion to Suppress
“The Fourth Amendment requires that search warrants be issued only ‘upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.‘” Dalia v. United States, 441 U.S. 238, 255 (1979). To establish probable cause, the issuing judge must “make a practical, common-sense decision whether, given all the circumstances set forth in the affidavit before him, ... there is a fair probability that contraband or evidence of a crime will be found in a particular place.” Illinois v. Gates, 462 U.S. 213, 238 (1983).
“In reviewing a ruling on a motion to suppress, we will uphold a district court‘s factual findings unless they are clearly erroneous, but will conduct a de novo review of a district court‘s legal determinations.” United States v. Navarro-Diaz, 420 F.3d 581, 584 (6th Cir. 2005). “When reviewing the denial of a motion to suppress evidence, the appellate court must consider the evidence in the light most favorable to the government.” Id. We review the totality of the circumstances to determine whether probable cause supported a search warrant, Gates, 462 U.S. at 230-31, and we afford great deference to the issuing judge‘s determination of probable cause, United States v. Greene, 250 F.3d 471, 478 (6th Cir. 2001) (citing United States v. Allen, 211 F.3d 970, 973 (6th Cir.), cert. denied, 531 U.S. 907 (2000)).
Dunning argues that because probable cause did not support the search warrant the district court erred by denying his motion to suppress. He claims that conclusions in the detective‘s affidavit were wholly conclusory because the detective had relied on computer software results to identify child pornography files. Although wholly conclusory statements would fail to meet the probable cause requirement, see Gates, 462 U.S. at 239, the detective‘s statements in this case were not wholly conclusory.
The detective in this case submitted an affidavit to a state circuit judge in support of his application for a warrant to search
A defendant who challenges the factual assertions in an affidavit supporting a search warrant is entitled to an evidentiary hearing if (1) the defendant makes a substantial preliminary showing that the affiant engaged in deliberate falsehood or reckless disregard for the truth in omitting information from the affidavit, and (2) a finding of probable cause would not be supported by the affidavit if the omitted material were considered to be a part of it. United States v. Fowler, 535 F.3d 408, 415 (6th Cir. 2008). This court has joined the First Circuit in rejecting the argument that a higher degree of certainty is required when the government uses software to locate IP addresses. See United States v. Schumacher, 611 Fed.Appx. 337, 340 (6th Cir.), cert. denied, 136 S. Ct. 434 (2015) (citing United States v. Chiaradio, 684 F.3d 265, 279 (1st Cir. 2012), which held that the defendant failed to establish any way in which omission of certain information in the search warrant affidavit was material to a finding of probable cause). As in Schumacher, the omission of information regarding the reliability of the CPS software does not call into question the reliability of this software and does not provide grounds for an evidentiary hearing. Furthermore, it is arguable that such information would have only strengthened the affidavit by showing that the software was reliable. See Schumacher, 611 Fed.Appx. at 340.
As the district court held, the detective was trained to use, and had previously used, software to investigate child pornography crimes, and he identified and confirmed that the files containing child pornography had been shared by Dunning‘s IP address on various dates. Moreover, Dunning failed to make even a preliminary showing that the detective knowingly, intentionally, or recklessly made false statements in his affidavit.
Dunning also argues that the detective‘s use of the software to find his IP address is similar to the use of the drug-sniffing dog in Florida v. Harris, 568 U.S. 237 (2013), and that he should have had the same opportunity to challenge the software‘s reliability as the defendant had in Harris “to challenge such evidence of a dog‘s reliability, whether by cross-examining the testifying officer or by introducing his own fact or expert witnesses.” Id. at 1057. But the analogy falls far short. The CPS software merely combs through large amounts of data and takes note of when and what IP address downloaded suspect material. As the Second Circuit explained in United States v. Thomas,
[t]raditionally, law enforcement officers seek to detect child pornography offenses by manually sending out search queries for illicit material over P2P [peer to peer] networks, one-by-one. CPS automates this process by canvassing these public P2P networks, identifying files that contain child pornography, cataloguing this information, and providing law enforcement officers with a list
III. Unconstitutional Vagueness
“It is elementary when the constitutionality of a statute is assailed, if the statute be reasonably susceptible of two interpretations, by one of which it would be unconstitutional and by the other valid, it is our plain duty to adopt that construction which will save the statute from constitutional infirmity.... [T]he rule plainly must mean that where a statute is susceptible of two constructions, by one of which grave and doubtful constitutional questions arise and by the other of which such questions are avoided, our duty is to adopt the latter.” United States ex rel. Attorney General v. Delaware & Hudson Co., 213 U.S. 366, 407-08 (1909). “To survive a challenge of unconstitutional vagueness in application, a penal statute must ‘define the criminal offense with sufficient definiteness that ordinary people can understand what conduct is prohibited and in a manner that does not encourage arbitrary or discriminatory enforcement.‘” United States v. Search of Music City Mktg., Inc., 212 F.3d 920, 924-25 (6th Cir. 2000) (quoting Posters ‘N’ Things, Ltd. v. United States, 511 U.S. 513, 526 (1994)). Although the [void-for-vagueness] doctrine focuses both on actual notice to citizens and arbitrary enforcement, we have recognized recently that the more important aspect of the vagueness doctrine “is not actual notice, but the other principal element of the doctrine—the requirement that a legislature establish minimal guidelines to govern law enforcement.” Where the legislature fails to provide such minimal guidelines, a criminal statute may permit “a standardless sweep [that] allows policemen, prosecutors, and juries to pursue their personal predilections.” Kolender v. Lawson, 461 U.S. 352, 357-58 (1983) (alteration in original) (citing Smith v. Goguen, 415 U.S. 566, 574-75 (1974)). Kolender held a California statute to be “unconstitutionally vague on its face because it encourages arbitrary enforcement by failing to describe with sufficient particularity what a suspect must do in order to satisfy the statute.” Id. at 361. Unlike the statutes at issue in Kolender or Goguen,
The government charged Dunning with two counts of receipt of child pornography in violation of
Dunning argues that there is no difference between “receipt” and “possession,” and
Furthermore, “while possession of child pornography is generally a lesser-included offense of receipt of child pornography, conviction under both statutes is permissible if separate conduct is found to underlie the two offenses.” United States v. Dudeck, 657 F.3d 424, 430 (6th Cir. 2011). In this case, the government charged Dunning for receipt when he downloaded images on March 9 and April 14, 2013, and with possession for those images that he possessed on April 30, 2013.
IV. Sentence
Dunning argues that his sentence is unreasonable for two reasons: (1) the two-level enhancement that he received for distribution should not apply because there is no evidence that he knew that peer-to-peer software shares files as it downloads them; (2) at sentencing, the district court did not give him an individualized determination because it “relied heavily” on a study that suggests a correlation between looking at and touching minors. Dunning‘s sentence of 165 months’ imprisonment falls within the Guidelines range of 151 to 188 months. The presentence report included a two-level enhancement for distributing material involving the sexual exploitation of minors pursuant to
“[T]he appellate court must review the sentence under an abuse-of-discretion standard.... If the sentence is within the Guidelines range, the appellate court may, but is not required to, apply a presumption of reasonableness.” Gall v. United States, 552 U.S. 38, 51 (2007).
A. Two-Level Enhancement for Distribution
The Guidelines provide for an increase of two levels if the defendant knowingly engaged in distribution.
Dunning distinguishes Abbring by arguing that the defendant in that case admitted that he knew how the peer-to-peer software operated, thus resolving the requirement for the defendant‘s knowledge. In this case, there is no direct evidence that shows that Dunning knew how the software operated because he made no admission that he knew how the peer-to-peer software worked. The court in Abbring recognized that the Eighth Circuit had “held that offenders using peer-to-peer file-sharing software may rebut [an] inference of knowing distribution with ‘concrete evidence of ignorance.‘” Abbring, 788 F.3d at 568 (citing United States v. Durham, 618 F.3d 921, 931-32 (8th Cir. 2010), which stated that “unless a defendant presents ‘concrete evidence of ignorance,’ the fact-finder may reasonably infer the defendant utilized a file-sharing program to distribute files” (internal citation omitted)). But in Abbring we noted that while this circuit has never so held, we had not needed to reach the question in that case because Abbring had admitted that he knew how the peer-to-peer software operated. Although Dunning has not admitted that he knew how peer-to-peer file-sharing software works, neither has he presented any evidence that he did not know that file-sharing software shares—and thus distributes—files. Not only could the fact-finder have reasonably inferred that Dunning knew that his use of a file-sharing program distributed files, Dunning‘s argument that he removed the files from the software so that others would no longer have access to them undermines his argument that he did not know that the file-sharing software shares files.
Dunning‘s knowing use of peer-to-peer software justifies the distribution enhancement. Dunning used peer-to-peer software to download files, and while he was doing so, he was also sharing these files with others. He presented no evidence that he was ignorant of the software‘s sharing function, and the district court reasonably applied the two-level enhancement for distribution.
B. Substantive Reasonableness in Light of Reference to Butner Study
We presume that a within-range sentence is substantively reasonable. United States v. Vonner, 516 F.3d 382, 389 (6th Cir. 2008). And “[t]he defendant shoulders the burden of showing substantive unreasonableness.” United States v. Woodard, 638 F.3d 506, 510 (6th Cir. 2011). Dunning argues that he did not receive an individualized determination because the court allegedly improperly relied on the Butner study1 when sentencing him. The Butner study suggested that a
V. Conclusion
For the foregoing reasons, we AFFIRM Dunning‘s conviction and sentence.
MERRITT, Circuit Judge, dissenting.
DISSENT
This dissent is addressed to Section III of the Court‘s opinion concerning “receipt” and “possession” of child pornography. The opinion allows a 13¾ year sentence for “receiving” instead of a much lesser sentence for “possessing.” The disparity is the result of a curious mistake by Congress in treating them as different. Semantically, “receiving” pornography from another and “possessing” porn received from another are synonymous. That is obvious. The fact that Congress has made this mistake does not bind us to continue it.
The irrational distinction behind punishing “receipt of” differently than “possession of” child pornography should be set aside and the case remanded for resentencing. In 2012, the U.S. Sentencing Commission issued a report to Congress regarding the punishment of child pornography offenses.1 With respect to the separate crimes of “receipt” and “possession” of child pornography, the Commission found “[t]here is no rational basis to treat receipt offenses (which carry a mandatory minimum five-year term of imprisonment) and possession offenses (which do not carry a mandatory minimum term of imprisonment) differently under the guidelines or penal statutes.” Id. at 13 (emphasis added). The crime of “receipt” for first-time offenders also carries a maximum penalty of twenty years in prison, while the crime of “possession” carries a maximum of ten years. See
This Court, when reviewing the imposition of a statute, must ensure that words and phrases are not so irrational, “so vague and indefinite that any penalty prescribed for their violation constitutes a denial of due process of law.” Champlin Ref. Co. v. Corp. Comm‘n of State of Oklahoma, 286 U.S. 210, 243 (1932). Judge Posner describes
Section 2252‘s contradictions were compounded by a mistake in semantics by Senators Thurmond and Helms in 1991. See Stephen Bacon, Note A Distinction Without a Difference, 65 U. Miami L. Rev. 1027, 1034-36 (2011). On July 18, 1991, a congressional amendment was introduced that upended the sentencing scheme recommended by the Sentencing Commission and resulted in the disproportionate punishment of these two identical crimes.2 The “Helms-Thurmond Amendment,” which was proposed as an amendment to a 1991 appropriations bill, directed the Commission to reorganize “receipt” offenses under
Since then, this “receipt” versus “possession” fiction has been reflected in the Sentencing Guidelines. See
GILBERT S. MERRITT
UNITED STATES CIRCUIT JUDGE
