OPINION AND ORDER
On March 17, 2011, a grand jury returned an indictment against defendant Alejandro Figueroa-Lugo (“defendant Figueroa”). (Docket No. 1.) The indictment charged him with one count of knowingly possessing images and movie files containing child pornography in violation of 18 U.S.C. § 2252(a)(4)(B). Id. The indictment also contains a forfeiture allegation pursuant to 18 U.S.C. § 2253, which seeks forfeiture of any property used or intended to be used in the possession, receipt, distribution, or transportation of child pornography. Id.
On July 2, 2012, a jury trial commenced as to the charges against defendant Figueroa. (Docket No. 53.) At the close of the government’s case, defendant Figueroa moved for acquittal pursuant to Federal Rule of Criminal Procedure 29
On July 10, 2012, a petit jury found defendant Figueroa guilty of knowingly possessing child pornography. (Docket No. 63.) On July 24, 2012, defendant Figueroa again filed a motion for judgment of acquittal pursuant to Rule 29. (Docket No. 67.) On August 30, 2012, the government responded to defendant’s motion. (Docket No. 70.)
DISCUSSION
1. BACKGROUND
The Court will not rehash the entire trial here. Background information or facts will be recounted as needed in the Court’s legal analysis of particular issues. See United States v. Stierhoff,
In January 2010, Special Agent Harold Julsrud (“Agent Julsrud”), a criminal investigator for Immigration and Customs Enforcement Homeland Security Investigations (“ICE HSI”) established communications with Lieutenant Glenn Lang (“Lieutenant Lang”), the supervisor of the Maine State Police Computer Crimes Unit (“MSPCCU”), regarding internet protocol (“IP”) addresses
During trial, Lieutenant Lang explained that the vast majority of child pornography cases he handles are peer-to-peer sharing network
Using one of these databases, Lieutenant Lang found that one particular IP address, which belonged to defendant Figueroa’s home, was listed as a top offender for downloading and sharing child pornography in Puerto Rico. (Day 1 at pp. 28, 30; Day 2 at p. 13.) Lieutenant Lang reviewed one video that was listed in the database as connected to the particular IP address and he confirmed it to be child pornography. (Day 1 at p. 57.) Lieutenant Lang mailed a copy of the video along with the particular IP address and a list of other IP addresses that were suspected of sharing child pornography to Agent Julsrud in Puerto Rico. Id. at p. 58.
On May 12, 2010, Agent Julsrud and his team executed the search warrant on defendant Figueroa’s home and seized about eight or nine computers, eight loose hard drives, other media that included DVDs and CDs, and a number of cell phones. (Day 2 at pp. 45, 75-76.) In total, the team seized twenty-six media devices. Id. Special Agent Luis Manuel Colon (“Agent Colon”), a forensic examiner, was part of the evidence collection team that was primarily responsible for the media devices seized; he conducted a forensic examination on the media devices. Id. at pp. 52, 74-75.
During his forensic examination of the computer, Agent Colon found that, aside from the default accounts that came with the computer in defendant Figueroa’s room, there was only one account on the computer and it was named “Alejandro.” Id. at p. 89. Agent Colon also found p2p network software known as LimeWire installed on the computer; the software was installed in September 2009 and remained on the computer until May 2010, when it was seized. Id. at pp. 89-91. Agent Colon found child pornography on the hard drive
Agent Colon testified that he found eighteen still images and seven videos that “contained minors in lascivious exhibition of the genitalia” saved within folders that were related to LimeWire. Id. at p. 92. The images were not deleted from the computer’s hard drive; they were accessible to the user. Id. at pp. 92, 131. Each of the images had file names that contained phrases that were typical of child pornography descriptions. (Day 1 at pp. 35, 55-56; Day 2 at pp. 94, 98-106, 108.) Agent Colon discovered that some of the images were actually accessed before the hard drive of the computer was seized. Id. at pp. 94-107. Agent Colon also testified that pursuant to his investigation, he found that none of the seven videos had been deleted from the computer and that they were accessible to the user. Id. at p. 108, 131. Like the images, each of videos had file names that contained phrases that were typical of child pornography descriptions. (Day 1 at pp. 35, 55-56; Day 2 at pp. 109, 110, 116-17, 120, 122.) During trial proceedings, the government showed some of the still images and portions of the videos to Agent Colon, who confirmed that all of the files shown were found on defendant Figueroa’s computer. Id. at pp. 94-122. Agent Colon also confirmed that several of the images had been accessed and that someone attempted to access at least one of the videos using Windows Explorer on April 17, 2010. Id. at p. 130.
II. Standard
A court may enter a judgment of acquittal of any offense for which the evidence is insufficient to sustain a conviction. Fed. R.Crim.P. 29(a). The defendant may move the court for a judgment of acquittal after
In reviewing a motion for judgment of acquittal, a district court must consider the evidence, both direct and circumstantial, “in the light most favorable to the prosecution” to determine whether the “body of proof, as a whole, has sufficient bite to ground a reasoned conclusion that the government proved each of the elements of the charged crime beyond a reasonable doubt.” United States v. Lara,
III. Defendant Figueroa’s Motion for a Judgment of Acquittal
Defendant Figueroa alleges the following: (1) the government failed to prove that he knowingly possessed child pornography in violation of 18 U.S.C. § 2252(a)(4)(B); (2) the government failed to prove that some of these images are of actual children. The Court considers both arguments and addresses each argument in turn.
A. Knowing Possession of Child Pornography
Defendant Figueroa was convicted of violating 18 U.S.C. § 2252(a)(4)(B), which makes it an offense for any person who “knowingly possesses, or knowingly accesses with intent to view, one or more books ... films ... or other matter which contain any visual depiction that has been shipped or transported using any means or facility of interstate or foreign commerce ... by any means including by computer, if (i) the producing of such visual depiction involves the use of a minor engaging in sexually explicit conduct; and (ii) such visual depiction is of such conduct.” Defendant Figueroa makes two arguments as to why the government failed to prove that he knowingly possessed child pornography. First, he argues that the government failed to prove that he knew there was child pornography on his computer. (Docket No. 67 at p. 6.) Furthermore, he argues that the government failed to prove that defendant Figueroa was the sole possessor of the child pornography because other members of his family could have accessed his computer. Id. at p. 12. The Court disagrees with defendant Figueroa’s arguments.
First, investigators found child pornography files only on the hard drive of the desktop computer in defendant Figueroa’s room but not in the other twenty-five items of electronic media that were seized. (Day 2 at p. 83.) Next, aside from the default accounts that were created by the Windows software when it was installed, there was only one user account created; the title of the account was “Alejandro,” which is defendant Figueroa’s first name. Id. at p. 89. Furthermore, the eighteen still images were found in a folder named “Saved” within LimeWire,
Additionally, the government presented evidence about other activity that occurred on the computer when the images and videos were created. For example, Agent Colon’s investigation of the hard drive and
The government also presented evidence that some of the files were accessed. At least three of the images and one of the videos had been accessed. (Day 2 at pp. 98, 99, 119.) Agent Colon also testified that a “thumbs.db” file was created for one of the videos containing child pornography. (Day 2 at p. 130.) The “thumbs.db” files, he testified, are created only when a user attempts to view an image or a video using Windows Explorer; Windows Explorer creates those files so that the system “remembers” what the image or video looks like so that it will not have to search for the file again. Id. at pp. 129-30. Therefore, Agent Colon concluded that the user accessed the file using Windows Explorer.
Defendant Figueroa argues that this evidence is insufficient for a reasonable juror to rationally conclude that he knowingly possessed child pornography. He primarily relies on United States v. Dobbs,
In Dobbs, the defendant was charged with knowing receipt of two child pornography images that were found exclusively in the computer’s cache.
In contrast, the images and videos in this case were not found via a caching function that was unknown to defendant Figueroa. Rather, the files were found stored in the hard drive of defendant Figueroa’s personal computer in folders related to software that requires a user specifically to request for items to be downloaded. Defendant Figueroa admit
The standard here is whether a reasonable jury, on this record, could have rationally concluded that defendant Figueroa knew “that his own computer contained such files.” See United States v. Salva-Morales,
B. Depictions of Actual Children
Defendant Figueroa argues that the United States failed to prove that the images contain real-life minors engaged in sexually explicit conduct. (Docket No. 67 at p. 9.) He argues that the government only showed the images to the jury but presented no evidence that the images were of real, live minors. Id. at p. 10. Furthermore, he argues that some of the images do, not contain any faces. (Day 2 at p. 176.) The Court finds defendant Figueroa’s arguments unavailing.
The First Circuit Court of Appeals has held that the government is not required to prove via expert testimony that the images contain real children. United States v. Rodriguez-Pacheco,
The Court finds that the images and the videos introduced into evidence were sufficient for the jury to reach the conclusion that the files depicted real minors engaging in sexually explicit conduct. Fourteen of the images show a young female child with her legs spread apart. One of the images reveals a young child that is naked, with her arms and legs bound. Similar to the images found in Wilder, the “focal point” of many of the images is the “child’s genital area.” Id. at 12. In seventeen of the images found in this case, like the images in Wilder, the young child is either
CONCLUSION
For the reasons expressed above, the Court DENIES defendant Figueroa’s motion for a judgment of acquittal.
IT IS SO ORDERED.
Notes
. Fed.R.Crim.P. 29 states, in pertinent part: “(a) Before Submission to the Jury. After the government closes its evidence or after the close of all the evidence, the court on the defendant's motion must enter a judgment of acquittal of any offense for which the evidence is insufficient to sustain a conviction .... (b) Reserving Decision. The court may reserve decision on the motion, proceed with the trial (where the motion is made before the close of all the evidence), submit the case to the jury, and decide the motion either before the jury returns a verdict or after it returns a verdict of guilty or is discharged without having returned a verdict. If the court reserves decision, it must decide the motion on the basis of the evidence at the time the ruling was reserved, (c) After Jury Verdict or Discharge. (1) Time for a Motion. A defendant may move for a judgment of acquittal, or renew such a motion, within 14 days after a guilty verdict or after the court discharges the jury, whichever is later. (2) Ruling on the Motion. If the jury has returned a guilty verdict, the court may set aside the verdict and enter an acquittal....”
. Lieutenant Lang described an IP address as an "address on the internet that's assigned to [users] by [their] internet service provider.” (Day 1 at pp. 27-28.)
. P2P network software, like LimeWire, allows users to set up a directory or a folder on his or her computer and share anything that he or she wants with other users. (Day 1 at p. 31.) The software allows other people around the world using the same software to search for files by typing in phrases that are found in the file names and then downloading the files directly from another user’s computer. Id. at 31-32.
. Agent Colon stated that a hard drive is "an electronic device contained inside a computer that actually stores the data within the computer.” (Day 2 at p. 79.)
. In Pires, the First Circuit Court of Appeals discussed knowing receipt of child pornography, not knowing possession. As the defendant Figueroa admits, see Docket No. 67 at p. 7, n. 1, the element of knowledge or scienter is the same in both contexts. See e.g., Pires
. Unlike the still images, the videos were not located in the "Saved" folder within Lime-Wire. Agent Colon testified that these videos were still in the process of downloading and were stored in a folder linked to LimeWire and titled "Incomplete.” (Day 2 at p. 157.) Agent Colon also testified that if the files were previewed using LimeWire before the downloading completed, the word "preview” would appear in the file. None of the seven files, however, had the word "preview” associated with it. Agent Colon indicated that it is possible that none of these files were previewed using LimeWire before they were completely downloaded onto the hard drive. Agent Colon has also indicated, however, that the videos can be opened via other means, such as with Windows Explorer. Id. at p. 130.
. Agent Colon indicated that a cookie "is a small text file that the internet browser saves” in a user’s computer so that when a user comes back, the computer knows what web page the individual visited so the internet browser does not have to search again to find the location. (Day 2 at p. 127.) The cookie saves certain information about the account or file that is being used at the time.
