UNITED STATES OF AMERICA, Appellee, v. FERNANDO CLARKE, Defendant-Appellant.
Docket No. 18-1569-cr
UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT
October 29, 2020
August Term, 2019 (Argued: October 3, 2019)
Before: WALKER, LEVAL, and CARNEY, Circuit Judges.
Defendant Fernando Clarke appeals his criminal convictions following a jury trial in the United States District Court for the Eastern District of New York (Spatt, J.) on four counts of receipt of child pornography, one count of possession of child pornography, and two counts of transportation of child pornography. The evidence showed that Clarke downloaded child pornography files on a peer-to-peer file sharing network, thus making those files available to be downloaded by other users on the network, and that government agents downloaded two video files from his computer. Clarke was convicted on all counts and sentenced to a 120-month prison term.
AFFIRMED.
ALLEGRA GLASHAUSSER, Federal Defenders of New York, Inc., New York, NY, for Defendant-Appellant Fernando Clarke.
ALLEN L. BODE (Jo Ann M. Navickas, on the brief), for Seth DuCharme, United States Attorney for the Eastern District of New York, Brooklyn, NY.
Defendant Fernando Clarke appeals from a judgment of conviction entered by the United States District Court for the Eastern District of New York (Spatt, J.) after a jury trial finding him guilty of several child pornography offenses. The evidence showed that Clarke downloaded child pornography files to his computer, employing BitTorrent, an Internet peer-to-peer file-sharing network, and kept those files in a folder where they were available to be downloaded by other users of the network. Government agents identified Clarke‘s computer on the network, downloaded child pornography from his computer to theirs, and on that basis obtained a search warrant. The search of his computer revealed thousands of images of child pornography. Clarke was charged with four counts of receipt of child pornography, one count of possession of child pornography, and two counts of transportation of child pornography on the Internet, a means or facility of interstate commerce. The two counts of transportation were based on two instances in which government agents downloaded a video file from the defendant‘s computer. After trial,
On appeal, Clarke challenges (1) the evidentiary basis and jury instructions for his conviction on the transportation counts; (2) the district court‘s denial of discovery of the Government‘s law enforcement software used to identify him and to download child pornography from his computer; (3) the procedural and substantive reasonableness of his sentence. We affirm his conviction and sentence.
BACKGROUND
In 2015, federal agents of the Department of Homeland Security‘s Homeland Security Investigations (“HSI“) unit were investigating child pornography crimes on Long Island. Using a software developed for law enforcement use called “Torrential Downpour,” the agents sought to identify people who were sharing particular files known to contain child pornography on the BitTorrent peer-to-peer file sharing network. The investigation revealed hundreds of illicit files that were downloaded using an Internet Protocol (“IP“) address that they traced to Fernando Clarke‘s residence. On that basis, the agents obtained a warrant to search Clarke‘s home, where, on Clarke‘s computer, they found thousands of images and videos depicting the sexual exploitation of minors.
Clarke had been downloading child pornography on the Internet since at least 2012, using uTorrent, a program that runs on the BitTorrent peer-to-peer file sharing network. A peer-to-peer network allows a user to download files directly from the computers of other users in the network. In order to facilitate faster downloads, a peer-to-peer program often downloads fragments of the desired file from many different computers on the network. By using such a program to obtain the files of others on the network, a user makes it possible for others to obtain his files. See App‘x at 54 (Testimony of Richard Branda) (BitTorrent is “a peer-to-peer network where a person‘s computer is able to share files that are on other people‘s computer drives and hard drive[s]. And in doing so, you‘re opening up your computer to be shared from as well.“). On uTorrent, as on most BitTorrent programs, any file a user has downloaded to his computer is automatically accessible to others on the network when the user‘s computer is connected to the Internet. A user‘s downloaded files are placed in a folder on his computer where other users of the online network can download and view them.1
HSI executed the search warrant at Clarke‘s home on July 28, 2015 and arrested him that same day. While agents searched the house, Clarke waived his Miranda rights and was interviewed by HSI investigator Richard Branda. The interview was not audio or video recorded, but
The Government also introduced circumstantial evidence tending to show that Clarke, when using the uTorrent program, could have seen information on his screen showing him that his files were being downloaded by others. For example, the analysis of Clarke‘s laptop showed that Clarke could have clicked on an “Info” tab while downloading files and seen how many users were simultaneously receiving the file from him. There is no evidence, however, that Clarke accessed the pages displaying such information about the sharing of his files, nor that uTorrent warned its users that under the default program settings, the sharing of downloaded files was automatic.
The superseding indictment that was in effect at trial, filed on July 19, 2017, charged Clarke in seven counts, including two counts of “knowingly transport[ing]” child pornography, in violation of
Before trial, pursuant to
The Government opposed the discovery motion, arguing that the defense expert‘s claims were premised on a misunderstanding of how Clarke‘s uTorrent program worked. The Government submitted an affidavit from a detective who had helped develop Torrential Downpour which stated that when a user downloads files on uTorrent, “each and every location [on the computer] where a user downloads file(s) . . . becomes ‘publicly shared‘,” including when files are downloaded to external hard drives. Gov. App‘x at 97. The Government also submitted an affidavit from a law enforcement analyst who tested uTorrent
The case proceeded to trial and, after both sides rested, Clarke moved for a judgment of acquittal pursuant to
The jury returned guilty verdicts on all counts. The court sentenced Clarke to 120 months in prison, followed by five years of supervised release.3 It also imposed a fine of $13,682.43, representing the costs that the district court incurred when Clarke failed to show up for the first day of trial, along with a $5,000 special assessment required of nonindigent defendants by statute. See
DISCUSSION
On appeal, Clarke challenges (1) the sufficiency of the evidence supporting his conviction on the transportation counts, as well as the related jury instructions; (2) the district court‘s refusal to compel disclosure of the Torrential Downpour software; and (3) the procedural and substantive reasonableness of his sentence.
I. The Transportation Counts
Clarke challenges his convictions on Counts One and Two for transporting illicit files in violation of
knowingly transport[] . . . using any means or facility of interstate or foreign commerce . . . by any means including by computer or mails, any visual depiction,
if . . . the producing of such visual depiction involves the use of a minor engaging in sexually explicit conduct; and . . . such visual depiction is of such conduct.
The two counts correspond to two instances in which government agents, using the Torrential Downpour software, downloaded a video file from Clarke‘s computer in April 2015 (Count One) and February 2015 (Count Two). In both cases, the agents testified that they downloaded the entirety of the video file from the single IP address that was then traced to Clarke‘s residence.
Clarke‘s challenge is on three grounds. In his initial appellate briefs, Clarke raised two challenges. First, he argued that the Government did not adduce sufficient evidence to allow a jury to conclude beyond a reasonable doubt that Clarke knew he was making child pornography files available to other users on BitTorrent. See
Second, Clarke argued that the district court erred in refusing his request to instruct the jury that, to establish Clarke‘s guilt for knowingly transporting child pornography, the Government needed to prove that he “actively intended” to transport the files.
Third, following oral argument, the Court directed the parties to submit supplemental briefing on a related question:
Whether the government agent‘s action in downloading to a government computer a file, which the defendant had placed in a folder on his computer that was accessible to other users of a peer-to-peer file sharing network, constituted a “transport[ing]” by the defendant within the meaning of
18 U.S.C. § 2252(a)(1) ?
See Dkt. No. 83. Clarke argued in response that the files were transported from his computer to the government agents’ computer only by the agents’ conduct, without participation on his part, and that such transportation of files by government actors does not satisfy the statutory requirement of transportation by the defendant.
For the reasons discussed below, we conclude that sufficient evidence supported the jury‘s finding of Clarke‘s knowledge, that the jury instructions were not erroneous, and that, given Clarke‘s prior actions in downloading child pornography on the BitTorrent file-sharing network and knowingly making those files available to be acquired by others, Clarke cannot escape liability for the transportation of his files merely because the movement of the files was effectuated in part by government actors requesting downloads from his computer to theirs.
a. Sufficiency of the Evidence of Clarke‘s Knowledge
We turn first to whether the Government‘s evidence was sufficient to show that Clarke knew that, in downloading the files to his computer, he was enabling the sharing of his files with other users. We review challenges to sufficiency of the evidence de novo, United States v. Leslie, 103 F.3d 1093, 1100 (2d Cir. 1997), drawing all reasonable inferences in favor of the Government, United States v. Kozeny, 667 F.3d 122, 139 (2d Cir. 2011).
Clarke does not challenge the sufficiency of the evidence that he downloaded child pornography on the BitTorrent network,
We conclude that the evidence was sufficient. The evidence showed that Clarke had used the file sharing network for three years to download child pornography. According to Agent Branda‘s testimony, when he interviewed Clarke, Clarke stated he understood that, by using the network to download child pornography from the computers of other BitTorrent users, he “was essentially sharing files of child pornography,” and that he “knew how . . . peer-to-peer programs work.” App‘x at 55. He added, according to Branda‘s notes, that he agreed with Branda‘s statement that “his computer was open to others.” App‘x at 87.4
Clarke counters that the Branda testimony is insufficient evidence of Clarke‘s knowledge because, especially as presented in Branda‘s contemporaneous notes, it allows for the possibility that “[Branda] himself may have explained to Mr. Clarke how uTorrent worked before Mr. Clarke said anything about his own understanding of how uTorrent worked.” Def.‘s Br. at 22 (emphasis in original). Clarke made the same argument to the jury in summation. Clarke is correct that one permissible inference from Branda‘s testimony is that Clarke came to understand the operation of the program only after the agents explained it to him. But that is not the only permissible inference, and it is one the jury apparently rejected. We must credit inferences that the jury could reasonably have drawn in the Government‘s favor. United States v. Hassan, 578 F.3d 108, 126 (2d Cir. 2008). We therefore find legally sufficient evidence that Clarke had knowledge, at the time of his offense, that by downloading the files to his computer through the BitTorrent file-sharing network and maintaining them in a shared folder, he took steps that would result in the movement of the files via the Internet to the computers of others whenever network sharers downloaded them.
b. Alleged Error in the Jury Instructions
Clarke next urges that we find error in the district court‘s jury instructions. The court refused to deliver Clarke‘s requested jury charge that, to convict on the transportation counts, the jury needed to find that Clarke ”actively intended to transport the visual depiction.” Def.‘s Br. at 37 (emphasis added). He argues that an active-intent instruction was necessary in this case because, even if sufficient evidence established Clarke‘s knowledge of how uTorrent worked, “there was no evidence that he took any active steps to share child pornography, and he told the agents that he did not intend to share it.” Def.‘s Br. at 33-34.
The court‘s charge accurately represented the law. The court instructed the jury that the Government needed to prove beyond a reasonable doubt that the defendant “knowingly transported a visual depiction in interstate or foreign commerce,” and that “transportation ... includes knowingly making child pornography files available to others via the internet or file sharing.” Gov. App‘x at 230. The court further defined “knowingly” as “voluntarily and intentionally and not because of accident, mistake or some other innocent reason.” Id. at 229–30. See Sand et al., 1 Modern Federal Jury Instructions—Criminal ¶ 3A.01 (2019) (“A person acts knowingly if he acts intentionally and voluntarily, and not because of ignorance, mistake, accident, or carelessness.“). The charge thus included a requirement of intention to transport and was consistent with the charge requested by the defendant, except for the defendant‘s addition of the adverb, ”actively,” as a modifier of the word “intended,” for which there is no legal basis.
The sole authority on which Clarke based his proposed instruction requiring an “active” intention to transport was a subsequently vacated district court opinion concluding that distribution of child pornography under
We vacated the decision on other grounds, see United States v. Reingold, 731 F.3d 204 (2d Cir. 2013), but held that for the purposes of the sentencing enhancement for distributing child pornography at
c. Whether Clarke‘s Actions Amounted to “Transportation”
We next consider the related question discussed in the parties’ post-argument supplemental briefs: whether Clarke‘s actions fell short of “transportation” within the meaning of
Section 2252(a)(1) prohibits “knowingly transport[ing]” child pornography “using any means or facility of interstate or foreign commerce . . . by any means including by computer or mails.”
argues that it was not he who transported the files, as it was government agents who caused the migration of the files. He is correct that there is neither evidence (nor allegation) that, at the time of the downloading by the government agents, Clarke took any action or was aware of the government‘s downloading.
We disagree, however, with the conclusion that he draws from that fact. His argument fails to take into account the role of his own actions and intentions in the transportation of his files to the computers of other users of the file-sharing network. Clarke made use of the BitTorrent peer-to-peer file-sharing network to obtain child pornography files from the computers of others, knowing that by doing so he was enabling other users to obtain the files from his computer. Under the court‘s instructions, which defined knowingly as “voluntarily and intentionally,” the jury found that the government agents’ downloads of the files Clarke had placed in his shared folder constituted knowing and intentional transportation of the files by
The interstate commerce element of the statute is satisfied by the use of the internet to transmit the files. See Gov. App‘x at 231 (jury instructions) (“Transmission of photographs or video by means of the internet constitutes transportation in or affecting interstate commerce.“); accord. United States v. Harris, 548 F. App‘x 679, 682 (2d Cir. 2013) (summary order); United States v. Chiaradio, 684 F.3d 265, 281 (1st Cir. 2012) (“The government‘s proof of the jurisdictional element is rock solid: the illicit files traveled via the Internet and, thus, traveled in interstate commerce.“); United States v. MacEwan, 445 F.3d 237, 243-44 (3d Cir. 2006) (Section 2252‘s jurisdictional element is satisfied when child pornography is transmitted over the internet, regardless of whether it actually crosses state lines, because the internet is an instrumentality and channel of interstate commerce).
No precedents of our court have addressed the precise question before us. We have on one occasion in a brief summary order upheld a defendant‘s conviction for transporting child pornography when an undercover agent downloaded files from the defendant‘s file servers. See United States v. Genao, 224 F. App‘x 39 (2d Cir. 2007) (summary order).7 Other courts of appeals have upheld transportation convictions under
A number of our sister circuits have rejected similar challenges to prosecutions for distributing child pornography under
The owner may not be present at the station, and there may be no attendant present at all. And neither the owner nor his or her agents may ever pump
gas. But the owner has a roadside sign letting all passersby know that, if they choose, they can stop and fill their cars for themselves, paying at the pump by credit card. Just because the operation is self-serve, or in Mr. Shaffer‘s parlance, passive, we do not doubt for a moment that the gas station owner is in the business of “distributing,” “delivering,” “transferring” or “dispersing” gasoline.
Subsequent courts have adopted Shaffer‘s reasoning to uphold convictions for distributing child pornography on similar facts. See, e.g., United States v. Budziak, 697 F.3d 1105, 1109 (9th Cir. 2012) (“evidence is sufficient to support a conviction for distribution under
We recognize that these distribution precedents are not squarely pertinent to the transportation statute. “Distribution” and “transportation” are different, in a manner that can be significant for Clarke‘s argument, as distribution can be accomplished by mere transfer of ownership without movement from one place to another. The logic of these cases is nonetheless consistent with our conclusion that when Clarke downloaded child pornography files on a peer-to-peer file-sharing network, knowing that his own downloading of files and storing them in a shared folder enabled others to download those files to their computers, the downloading by other users of the network completed Clarke‘s commission of the offense of transporting child pornography.
In this case, the jury found beyond a reasonable doubt that Clarke, by using the file-sharing program, “knowingly” allowed others to access his computer to obtain child pornography, see supra pt. I(a), and therefore necessarily found under the court‘s instructions that he did so “intentionally,” see supra pt. I(b); see also Gov. App‘x at 230 (defining “knowingly” and “voluntarily and intentionally“).10 By wittingly participating in a file-sharing network and downloading files from the computers of others, Clarke implicitly invited other participants in the file-sharing network
The fact that the movement of the files was effectuated in part by the Government‘s downloads without Clarke‘s awareness does not alter our conclusion. Clarke intentionally obtained child pornography through what he knew to be a file-sharing network, in which the transportation of child pornography from his computer to other users was an almost inevitable consequence and indeed the very objective of the network. Under these circumstances, Clarke has “transport[ed]” child pornography within the meaning of
Clarke maintains that there is no evidence that he “intended” to share child pornography, pointing to Agent Branda‘s testimony that Clarke had stated that it was “not his intention” to share child pornography, but only to obtain it for himself. See App‘x at 86. This statement confuses motivation with intention. When one makes an agreement to buy a desired object for $100, it is likely not the buyer‘s motivating objective to rid himself of $100. The motivation is rather to acquire the desired object. Nonetheless, the buyer intends that both aspects of the transaction take place—his acquisition of the object and his payment of the price. Similarly, when one avails oneself of a peer-to-peer file-sharing network to acquire files, knowing that it functions on the basis of allowing users to access each other‘s files, one is likely to be motivated only by the acquisition of files from the computers of others. Nonetheless, we have held that “a jury may conclude that an actor intended [the] foreseeable consequences of his actions.” United States v. Nelson, 277 F.3d 164, 197 (2d Cir. 2002).
The jury apparently found based on sufficient evidence that Clarke availed himself of the BitTorrent network knowing full well that doing so meant that he was allowing other users to download files from his computer. In storing those files on his computer in a folder that allowed other users of the network to download copies to their computers, he went far towards transporting his files to the computers of unknown others, which offense was completed when the files moved from his computer to theirs. The fact that Clarke knew neither who was downloading his files, nor when it was occurring, is irrelevant, as he knew that this was how the network functioned. We are therefore satisfied that, because Clarke knew he was sharing child pornography files on a file-sharing network, he cannot escape liability for the transportation of those files when it occurred. Under these circumstances, we conclude that when the illicit files moved from his computer to the agents’ upon their requests to download, that completed Clarke‘s commission of the transportation offenses charged in Counts One and Two.
II. Discovery of the Torrential Downpour Software
Clarke next argues that it was an abuse of discretion for the district court to deny him production of the Torrential Downpour program and its source code because that software provided the “bulk of the evidence” for his conviction on the transportation counts and also provided the justification for the search warrant that discovered the evidence underlying all the counts. Def.‘s Br. at 23, 28. We disagree.
We review “a district court‘s discovery rulings for abuse of discretion.” Moll v. Telesector Res. Grp., Inc., 760 F.3d 198, 204 (2d Cir. 2014). The Government must “permit the defendant to inspect” any item that is “material to preparing the defense.”
We recognize that, when a defendant‘s guilt is predicated on the government offering proof that a government agent downloaded files from the defendant‘s computer, information about the program by which the downloading was accomplished is likely to be “material to preparing the defense” and therefore subject to disclosure under
Ultimately, we need not decide whether the Government‘s reasons for withholding disclosure outweighed Clarke‘s need for it because, even assuming a violation of Clarke‘s entitlement to discovery, Clarke has not demonstrated that he suffered prejudice as a result. See Stevens, 985 F.2d at 1180; United States v. Sanchez, 912 F.2d 18, 21 (2d Cir. 1990) (in the event of a Rule 16 violation, “reversal will only be warranted if the nondisclosure results in substantial prejudice to the defendant“). Clarke‘s argument to the district court for why disclosure of the software and its source code was necessary for his defense (in addition to the other pertinent discovery provided above) was premised on an assumption made by his expert that, because the child pornography files accessed by the government agents were located on Clarke‘s external hard drive, rather than his computer‘s hard drive, the files “would not have been publicly available on the BitTorrent network” and therefore that Clarke‘s computer could not have shared or transported them. Gov. App‘x at 38-39 (Affidavit of Tami Loehrs). Accordingly, Clarke argued, access to Torrential Downpour and its source code was necessary for him to show that the government agents could not have downloaded Clarke‘s child pornography files over the open BitTorrent network.
The Government, however, persuasively countered Loehrs‘s assertions with evidence that the district court was entitled to credit. The Government‘s evidence showed that, unlike some other peer-to-peer programs, uTorrent prompts the user to choose “a location to save the downloaded files” before initiating a download. Gov. App‘x at 97 (Affidavit of Robert Erdely). The “user can specify any location on a computer” or on “an external hard drive.” Id. Critically, whatever location is specified by the user as the destination for the downloaded files becomes accessible to other users of the network, regardless of whether that folder is on the computer itself or on an external hard drive.11 Additionally, the Government submitted evidence showing that files downloaded and saved to an external hard drive by a Department of Justice investigative analyst, using the same version of uTorrent used by Clarke, were accessed by other BitTorrent users. This evidence refuted Loehrs‘s assumption that files saved on external hard drives were not accessible to other users of BitTorrent, and the district court reasonably concluded that Loehrs‘s speculation was “insufficient to create an issue as to the [Torrential Downpour] software‘s reliability.” App‘x at 33.12 There is thus no
II. Challenges to Clarke‘s Sentence
Clarke argues that both the term of imprisonment imposed and the monetary penalties assessed were unreasonable. When reviewing sentences, we apply “a particularly deferential form of abuse-of-discretion review,” and will not vacate a sentence unless it is either procedurally or substantively unreasonable. See United States v. Cavera, 550 F.3d 180, 187-89 & n.5 (2d Cir. 2008). A district court errs procedurally when it: (1) “fails to calculate the Guidelines range“; (2) “makes a mistake in its Guidelines calculation, or treats the Guidelines as mandatory“; (3) “does not consider the [
a. Term of Imprisonment
First, Clarke asserts that his sentence was procedurally unreasonable because the district court did not adequately consider that (1) the Sentencing Guidelines’ child pornography enhancements are excessive, and (2) Clarke‘s conduct was typical of ordinary child pornography cases. This position is inconsistent with the record and the law. The record establishes that the district court correctly calculated the Guidelines range of 210 to 262 months, considered each of the
Clarke insists that the district court committed procedural error by “fail[ing] to appropriately consider the teaching of” United States v. Dorvee, 616 F.3d 174 (2d Cir. 2010). Def.‘s Br. at 41. In that case, we criticized the child pornography Guideline as one frequently leading to “unreasonable results,” id. at 188, because the application of its enhancements “routinely result[s] in Guidelines projections near or exceeding the statutory maximum, even in run-of-the-mill cases,” id. at 186. Clarke thus asserts that the district court committed procedural error in applying the child pornography enhancements provided by the Guidelines. This argument misunderstands the “teaching of Dorvee.” In Dorvee, we did not impose a heightened standard for the application of
Here, the district court concluded that the prescribed Guidelines calculation led to excessive results. See App‘x at 498 (“The guideline range is excessive and I‘m not going to use it.“). In doing so, the district court explicitly considered Dorvee. The court explained that “in the four or five cases following Dorvee, the[] [Second Circuit] ha[s] kept these guidelines and reduced the sentences.” Id. The district court then discussed Clarke‘s background and personal characteristics, as well as the nature of his crimes, in accurately calculating the applicable Guidelines range, but thereafter departing downward from it.
Clarke further asserts that the district court committed procedural error by “repeated[ly] emphasi[zing] that it thought Mr. Clarke‘s conduct was of the ‘worst kind,’ when it was actually typical of an ordinary first-time child pornography case.” Def.‘s Br. at 41. In fact, the court described the child pornography content, not the defendant‘s conduct, as “of the worst kind.” App‘x at 493, 497. This was a justifiable conclusion: included in Clarke‘s extensive collection of child pornography were sadistic videos of children being abused. Moreover, in its consideration of the
Next, Clarke contends that his sentence was substantively unreasonable because it failed to take into account Clarke‘s history and characteristics and was greater than necessary to meet the purposes of sentencing as set forth in
b. Monetary Penalties
In addition to his prison term, Clarke was further ordered to pay a fine of $13,682, representing the costs incurred because Clarke failed to show up for the first day of trial due to a purported medical need. The court also directed that Clarke pay a $5600 assessment, constituting of a mandatory $5000 penalty “on any non-indigent person or entity” under the Justice for Victims of Trafficking Act, see
We have observed that, “[i]f the defendant is indigent, a fine should not be imposed absent evidence in the record that he will have the earning capacity to pay the fine after release from prison.” United States v. Rivera, 971 F.2d 876, 895 (2d Cir. 1992). When making an indigency determination, a district court “may consider both defendant‘s present financial resources and those that may become available in the future.” United States v. Salameh, 261 F.3d 271, 276 (2d Cir. 2001).
The record here reflects that Clarke: (1) receives $1,100 each month in pension payments (payments that will continue even while he is in prison); (2) owns at least one home; and (3) can expect social security payments to resume upon his release from custody. While not explaining why it found Clarke to be nonindigent despite his representation by the Federal Defenders, the court promised “to have a separate hearing on that, if necessary.” App‘x at 462; see also App‘x at 465 (stating again that, if Clarke wanted “a hearing on that [indigency] issue,” the district court would grant one post-sentence). There is no indication that Clarke sought such a hearing, nor that he requested amendment of the judgment. Accordingly, we will not disturb the monetary aspect of Clarke‘s sentence.
CONCLUSION
For the foregoing reasons, we AFFIRM Clarke‘s conviction and sentence.
