UNITED STATES OF AMERICA v. CHARLES CARROLL
No. 16-16652
United States Court of Appeals, Eleventh Circuit
April 5, 2018
D.C. Docket No. 3:15-cr-00012-TCB-RGV-1
WILSON, Circuit Judge
Appeal from the United States District Court for the Northern District of Georgia
(April 5, 2018)
Before WILSON and DUBINA, Circuit Judges, and GOLDBERG,* Judge.
WILSON, Circuit Judge:
This appeal requires us to determine whether a lawful warrant supported the search of Carroll‘s home, whether the government put forth sufficient evidence to sustain his convictions, and whether the district court properly enhanced his sentence. Upon thorough review of the record and with the benefit of oral argument, we affirm in part, but we reverse Carroll‘s distribution conviction because the government failed to put forth any evidence that Carroll knew downloaded files were automatically placed into a shared folder accessible to the Ares peer-to-peer network.
I.
On October 22, 2014, the Georgia Bureau of Investigation (GBI) seized two laptops and an external hard drive from Carroll‘s Newnan, Georgia home. Forensic analysis later revealed that one of the laptops, a Dell, held 314 images and 65 videos of child pornography in its “unallocated space“—a place where deleted files can still be retrieved using special software. Those files were downloaded
Peer-to-peer networks like Ares are “so called because users’ computers communicate directly with each other, not through central servers.” Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 919–20, 125 S. Ct. 2764, 2770 (2005). This decentralized system allows users to search for files across the peer-to-peer network and then to download files directly from the computers of other users. Ares, like many peer-to-peer programs before it,1 is available for free over the internet and is commonly used to share music and videos. When downloaded, Ares sets up a shared folder on the computer where, by default, it automatically places all subsequent downloads. Once a file is placed in the shared folder, it is immediately available for further dissemination.
Unless an Ares user changes the default settings or deliberately moves files out of the shared folder, downloaded files will remain freely accessible to anyone else on the Ares network—including the GBI Internet Crimes Against Children
Eight months later, a federal grand jury charged Carroll with one count of knowingly distributing a visual depiction of a minor engaged in sexually explicit conduct,
II.
We review de novo whether a search warrant is supported by probable cause, accepting the factual findings of the district court unless clearly erroneous. United States v. Brundidge, 170 F.3d 1350, 1352 (11th Cir. 1999) (per curiam). Likewise, we review de novo whether a warrant lacked the particularity required by the Fourth Amendment. United States v. Bradley, 644 F.3d 1213, 1258–59 (11th Cir. 2011). “We review the sufficiency of evidence to support a conviction de novo, viewing the evidence in the light most favorable to the government and drawing all reasonable inferences and credibility choices in favor of the jury‘s verdict.” United States v. Taylor, 480 F.3d 1025, 1026 (11th Cir. 2007).
We review the district court‘s application of the Guidelines de novo and its findings of fact for clear error. United States v. Smith, 231 F.3d 800, 806 (11th Cir. 2000). Because Carroll argues for the first time on appeal that the district court erred in applying a sentencing enhancement for possession of more than 600
III.
Our discussion is divided into three parts. First, we address whether the warrant authorizing the search of Carroll‘s home met the requirements of the Fourth Amendment. Next, we consider the sufficiency of the evidence to support his possession and distribution convictions. Third, and finally, we review his sentence.
A.
We turn first to Carroll‘s claim that the district court erred in denying his motion to suppress the evidence obtained from his home. Carroll argues both that the warrant was unsupported by probable cause and that it abridged the Fourth Amendment‘s particularity requirement.
“Probable cause to support a search warrant exists when the totality of the circumstances allow[s] a conclusion that there is a fair probability of finding contraband or evidence at a particular location.” Brundidge, 170 F.3d at 1352.
We find that the evidence contained in the affidavit supporting the warrant, in conjunction with the testimony of the investigating agents, strongly supported a conclusion that evidence of child pornography would be found at Carroll‘s home. The affiant, GBI Agent Sara Thomas, had seven years of experience in the GBI and was specially trained in computer investigations involving crimes against children. In the affidavit, she explained how the file sharing program Ares works and detailed how the GBI used Ares to download two files of interest—identified by their SHA-1 values as known child pornography files—from an IP address traced to Carroll‘s internet service provider. Agent Thomas then testified that she
- !new pthc dark studio]227.mpg !
- new ! (pthc) veronika little sister bj and cum inside mouth.wmv
She then explained how the acronym “PTHC,” contained in both file names, stands for “pre-teen hard core,” and is commonly used in searches to identify child pornography files.
Carroll contends that the Superior Court wholly abandoned its role in accepting these allegations without further scrutiny of the content of the files. We disagree. The Supreme Court has made it clear that an issuing magistrate is not required to personally view obscene material in order to make a probable cause determination. See New York v. P.J. Video, Inc., 475 U.S. 868, 874 n.5 (1986); see also United States v. Smith, 459 F.3d 1276, 1291 n.15 (11th Cir. 2006). And Agent Thomas, who possessed advanced technical proficiency and extensive experience investigating child exploitation, supported her testimony about the content of the videos with evidence of the matching SHA-1 values and graphic file names. While it may have been prudent to provide a more specific description of the content of the videos, we find that under these
We also conclude that the warrant satisfied the Fourth Amendment‘s particularity requirement. The warrant detailed the types of items to be seized at Carroll‘s home, all of which were reasonably tailored to the child pornography investigation. Carroll contends that the warrant permitted a general search of his home, but the warrant afforded the officers little latitude when it authorized the seizure of computers, related storage devices, and other media which might contain evidence of child pornography. The warrant was supported by probable cause, and the warrant reasonably described the place to be searched and the items to be seized. Accordingly, we affirm the denial of the motion to suppress the evidence seized during its execution.
B.
Next, we address Carroll‘s sufficiency of the evidence claims. Under
1. Possession
Carroll first argues that because the child pornography files were discovered in the unallocated space of his computer when seized by the GBI, he cannot be held liable for knowingly possessing them without some further proof that he had the technological savvy to access them. He likens his case to several from our sister circuits that involved unwitting defendants whose computers automatically cached images from websites. See United States v. Dobbs, 629 F.3d 1199 (10th Cir. 2011); United States v. Kuchinski, 469 F.3d 853 (9th Cir. 2006). We are unconvinced by the comparison, and find that the evidence supports a conclusion that Carroll knowingly possessed the files found on his computer.
Child pornography was regularly downloaded to Carroll‘s Dell laptop over an eleven-month period. Carroll was home with exclusive control of his laptop during much of that time. Carroll lived alone. The only other people with access to his house were his mother and, on limited occasions, a cat sitter. The record shows that Carroll‘s Dell laptop was used to download child pornography on the same day it was used to file Carroll‘s tax return, that Carroll was travelling and without internet service during a notable gap in the sequence of child pornography downloads, and that Carroll‘s cat sitter did not know the password to the Dell laptop.
2. Distribution
The distribution conviction is another matter. Carroll argues that the government failed to present any evidence that he knew he was sharing child pornography files when they were automatically placed in a shared folder, and that
Knowingly placing or leaving files in a shared folder connected to a peer-to-peer network undoubtedly constitutes distribution under
Nothing in the record demonstrates that Carroll intended to share files or that he was even aware that the contents of his Ares folder were automatically distributed to the peer-to-peer network. See United States v. Chiaradio, 684 F.3d 265, 282 (1st Cir. 2012) (“When an individual consciously makes files available for others to take and those files are in fact taken, distribution has occurred.“). Instead, the government argues that Carroll was guilty of knowing distribution simply because he was using a peer-to-peer file sharing program and “that is what it is.” But the fact that files were automatically shared from Carroll‘s Ares folder, without some evidence of his awareness of it, cannot carry the government‘s burden to prove knowing distribution beyond a reasonable doubt. And while indicia of knowledge surely may be gleaned from the nature of a peer-to-peer program itself, here, the government failed to put on any evidence that Ares, by
In spite of this, the government asks us to hold that it would be impossible for an individual to use a peer-to-peer file sharing program and lack a full understanding of its operations. We think it unwise to adopt such a sweeping rule in this fact-sensitive context, where the mechanics of each peer-to-peer program may bear on the issue of knowledge in different ways. We recognize that in certain cases, the very design of the peer-to-peer program may foreclose any possibility that the user unwittingly shared files. It would be difficult to claim ignorance where, for example, the peer-to-peer program prompts the user during installation to choose whether or not he wants to share downloaded files, see United States v. Spriggs, 666 F.3d 1284, 1286–87 (11th Cir. 2012), requires the user to authorize file sharing for each particular peer that requests it, see United States v. McElmurry, 776 F.3d 1061, 1065 (9th Cir. 2015), or forces the user to acknowledge and accede to a licensing agreement explaining the peer-to-peer
C.
Finally, we review the application of two Guidelines enhancements to Carroll‘s sentence: the
Carroll concedes that 314 images and 65 videos amount to 5,189 images under the Guidelines. See
Next, Carroll argues that depictions of minors engaged in sex acts with adults do not amount to sadistic or masochistic conduct without some additional evidence of intentional infliction of physical abuse, and, therefore, that the application of the Section 2G2.2(b)(4) enhancement to his offense constitutes impermissible double counting. The videos found on Carroll‘s computer depicted vaginal and anal penetration of girls under the age of twelve, as well as one video of a young girl tied up. We have held that both “adult men‘s vaginal and anal penetration of children [under twelve]” and “pictures of minors in bondage are
This was not double counting. The base offense punishes possession of images containing any sexual exploitation of a minor of any age, while the enhancement applied here increased the punishment because Carroll‘s images involved particular, violent sexual acts against children less than twelve years old, including at least one depiction of bondage. United States v. Dudley, 463 F.3d 1221, 1226–27 (11th Cir. 2006) (“Impermissible double counting occurs only when one part of the Guidelines is applied to increase a defendant‘s punishment on account of a kind of harm that has already been fully accounted for by application of another part of the Guidelines.“). No doubt, these harms were not fully accounted for in the base offense. Accordingly, we affirm the application of the Section 2G2.2(b)(4) enhancement.
IV.
In conclusion, we affirm the denial of the motion to suppress the evidence seized from Carroll‘s home, we affirm his conviction for knowingly possessing a visual depiction of a minor engaged in sexually explicit conduct,
AFFIRMED IN PART, REVERSED IN PART, AND REMANDED.
