3:10-cr-00161 | E.D. Va. | Nov 30, 2010

lN 'l`l~llE UNl'I`l:`D S'l`A'l`liS l)lS'l`RlC'l` C()UR'I` FOR 'l`l~lli l:`AS'l`ERN DISTRICT OF VlRGINIA Alcxandria Division UNlTED S'l`A'l`l;`S OI~` AMl-leC/\. § v. § No. 3:10-cr-161 ANDRI:`W .|ARED l‘lELLl;`R. § Det`endant. § ) MEMORANDUM OPlNl()N On .lune 9, 2007, the defendant Andrew J. llcller ("llcller") sold a Compaq Presario laptop computer (the "Compaq laptop") to his neighbor at a yard sale. 'l`lte neighbor discovered a collection ol` pornography on the hard drive ol` the Compaq laptop. Al`tcr discovering the pornography collection, the neighbor contacted authorities who inspected the Compaq laptop and alter locating images oi`ehild pornography, obtained a search warrant l`or defendant`s home. Pursuant to the search warrant executed on July 12, 2007, authorities seizcd, at defendant`s home. three computers, live external hard drives and nearly 400 additional CDs and DVDs, three media cards and other digital media. Approximately 318 of the seized CDs and DVDs were in two separate binders. One was a black binder containing 207 CDs and the other was a tan- colored Cl) binder containing l l l Cl)s and l)Vl)s. Authorities later determined that thc entire collection 01` 207 CDs in the black binder and all but 26 ol` the l l l CDs and DVDs in the tan- colored binder contained only adult pornography. The 26 CDs and DVDs in the tan-colored binder contained both child pornography and adult pomography. Authorities also determined that none oi`the three computers seized at the defendant`s home contained any child pomography or any digital evidence that any ol`the 26 Cl)s and l)VDs containing child pornography had been viewed from those computers. On .lune l. 20l0, an indictment was returned against thc defendant charging him with one count of possession ol` child pornography in violation of 18 U.S.C. 2252A(a)(5)(B). Specil`tcally. the government alleges that the defendant knowingly possessed certain images ofchild pornography that appeared on the 26 CDs and DVDs in the tan-colored binder. 'l`hc defendant has not been charged with any crime based on the child pornography found on the sold Compaq laptop. 'l`he United States seeks to admit evidence at trial that child pornography was found on the Compaq laptop. including certain specific images o|` child pomography. lt also seeks to introduce evidence that a hard drive from another laptop computer, an l'lP Pavilion laptop ("HP laptop"), that was issued to the defendant by his employer (and was not among the equipment seized at del`endant`s home on luly 12, 2007). had been "wiped clean" before the defendant turned it over to authorities in May 2008. On November 24, 2010, this Court conducted an evidentiary hearing concerning these motions, following which it took the matter tinder advisement. For the reasons stated below, the Court concludes that the evidence that is the subject of these motions should not be admitted at trial and that the United States` motions should be denied. l. The government’s motion under Rule 404(b) (l)oc. No 16). 'l`he forensic evidence presented to the C ourt showed that the Compaq laptop sold at the yard sale had been used from 2001 until December 2002, and then again after it had been sold on June 9. 2007. 'l`he pornography found on the Compaq laptop was in a folder entitled "Pl"l`." which contained twenty separate PowerPoint presentations (the "PowerPoint lilcs"). l€ighteen of those liles contain only adult pornography 'l`wo ol`the twenty l`tles contain both adult and child pornography. Specilically. out of approximately 570 images on those two liles approximately 200 are images of child pomography, in no particular grouping or order.l Based on forensic evidence. it appears that the Powerl’oint liles first came into existence around May 2002 when images were taken from an unknown source, using an unidentifiable computer and placed into a PowerPoint presentation using Microsol`t PowerPoint 97/98 software, or Version 8, registered to the del`endant. Then on September 7. 2002, between 3:39 p.m. and 3:4\ p.m., the PowerPoint files were "created" or copied onto the Compaq laptop, containing Version 9 of the Microsoft PowerPoint program. also registered to the defendant. 'I`here is no evidence that the two Po\verPoint liles containing child pornography were ever accessed on the Compaq laptop after they had been transferred to the Compaq laptop on September 7, 2009 and before the Compaq laptop was sold in June 2007. 'l`he total collection of approximately 318 CDs and DVDs in the two binders seized at defendant’s home contain 7,143 video liles that were copied or "burned" onto those CDs and DVDs between September 8, 1999 and August l. 2006. Thc images of child pornography on the 26 CDs and DVDs in the tan-colored binder appear in approximately 50 to 60 video liles, or less than l% ol`the total video liles found at dcfcndant`s residencc.2 'l`hese videos were downloaded onto some. unidentifiable computer between May 20. 2003 and .luly 5, 2003. and then copied or "burned" from that computer onto the 26 CDs and l)Vl)s between .lune 14, 2003 and January l, 2004. Both the government`s and the defendant`s forensic examiner agree that there is no forensic evidence linking the child pornography on the 26 CDs and DVDs to any of ' 'l`he government initially identified only approximately 85 ol`the 570 images on the two Power Point files as containing child pornography 2 ln defendant’s brief, the defendant stated that approximately 60 video liles were found to contain child pomography. At the hearing, the government’s expert testified that 54 video liles were found to contain child pornography. the computers or external hard drives seized from defendant's residence. or from other computers that defendant used at his of lices. There is also no evidence that the CDs and DVDs seized from defendant`s home were ever on or accessed through the Compaq laptop sold at the yard sale or that the l’owerl’oint liles on that Compaq laptop was ever on any of the computers or hard drives found at del`cndant`s residence or elsewhere. Although the defendant has not been charged with any crime pertaining to the images of child pornography in the two PowerPoint liles on the Compaq laptop, the govemment seeks their admission on thc grounds that these l’owchoint liles are (1) intrinsic to the crime chargcd. or (2) admissible under Rule 404(b) to show the defendant`s intent, knowledge. plan or absence of mistake with respect to the possession ofchild pornography found on the 26 CDs and DVDs. a. The evidence is not intrinsic to the crime charged "Other acts" are intrinsic to the crime charged when they are “incxtrieably intertwined or both acts are part of a single criminal episode or the other acts were necessary preliminaries to the crime charged." United Slales v. l.ighty. 616 l`~`.3d 321, 352 (4th Cir. 2010). Evidence is intrinsic ifit is necessary to "provide context relevant to the criminal charges." United Slates v. Cr)oper. 482 F.3d 658" date_filed="2007-03-28" court="4th Cir." case_name="United States v. D.J. Cooper">482 F.3d 658, 663 (4th Cir. 2007). and forms an integral and natural part of the witness`s accounts of the circumstances surrounding the offenses for which the defendant was indicted, U)tile¢/Slales t'. l:`douarc/. 485 l".3d 1324, 1344 (l lth Cir. 2007). 'I`he govemment argues that the 1’owerPoint presentations are intrinsic because (l) they give context to how the defendant was discovered by law cnforcement; (2) are inextricably linked to the CDs and DVDs because they contain images ol`the same exact nature created within a year from each other; and (3) demonstrate a pattern of illegal activity and intent to possess child pornography. None of these positions establish that the I’owerPoint liles are intrinsic to the crime charged. First, the elements ol`the crime charged do not require proof that the Compaq laptop contained child pornography; nor is the possession or existence of the child pornography on the Compaq laptop a necessary preliminary or follow-on step in connection with the commission of the crime charged. Second. there is insufficient evidence to establish that the assemblage and possession of both pornography collections -the PowerPoint files on the Compaq laptop and the collection on the 26 CDs and DVDs found in defendant’s home - were part and parcel of the same course of conduct or a single criminal episode. Based on the forensic evidence, the creation dates for the two collections took place during different and distinct time periods, with no overlap in dates. 'l`he government emphasizes that the "crcation dates" of both collections are within a year of each other, but even a much shorter interval would eliminate any inference that one collection was part of the context for the other or that both were being created or assembled as part ol`one inseparable el`fort. These findings are further supported by the lack of other similarities between the two collections. For example, there is no evidence that both collections came into defendant`s possession from the same source or were viewed via a common computcr. 'l`he collections are contained on different media. one is in PowerPoint on a hard drive, the other in videos on CDs or DVDs and not found on any hard drive. None ol`the titles in one collection are the same as those in the other: and while both collections have graphic and horrific images of both adult and child pornography, the specific content is different. 3 'l`here is no witness whose relevant testimony would require mention of the l’owerPoint files. At most, the existence of the child pornography found on the Compaq laptop is only part of the circumstances that led to the discovery of the child pornography with which the defendant has been charged. ln sum, there is ’ 'l`he government advised the Court during its hearing that some ol`the same children appear in both collections. 'l`hc government also acknowledges, however. that the children depicted have appeared widely in available child pornography and their presence in both collections does not establish a single source for the child pornography in both collections 5 no evidence that the images in the l’owerl’oint files and the Cl)s and DVDs are part ol`the same collection or are inextricably intertwined with or related to each other, The only commonality is that both collections are predominantly adult pornography with child pornography interspersed in a small portion of it and both have a connection to the defendant. albeit in different ways. ln support ofits position. the government relies heavily on United Slates \'. Kennedy, United Slales v. l.octyza, and United Slates v. Chin to support their argument In each ol`those cascs, the other act was actually connected to and gave context and understanding to the events ol`the underlying charged crime. For instance, in Kennedy, the intrinsic evidence explained the common source through which the defendant supplied his co-conspirator with cocaine in a larger, charged conspiracy. United Slales v. Kemted_v, 32 l?.3d 876, 885-86 (4th Cir. 1994). ln l.oay:cn the intrinsic evidence related to the defendant`s participation in a common scheme. United Slates v. Loayza. 107 l".3d 257, 263-64 (4th Cir. 1997). ln ('hin. the evidence was intrinsic because it occurred dttring the charged offense. United Smtes v. Chin. 83 l~`.3d 83. 87 (4th Cir. 1996). Therefore, for the reasons stated. the l’owerPoint presentations are not intrinsic to the crime charged and cannot be admitted on that basis. b. 'I`he PowerPoint Files should not be admitted tinder Rule 404(b) The government argues that if the evidence of child pornography on the Powerl’oint liles is not intrinsic to the crime charged, it is “extrinsic” evidence that is admissible under Rule 404(b) to demonstrate defendant’s intent, knowledge. motive and absence of mistake. Evidence of prior "bad acts" under Rule 404(b) are admissible when the following criteria are metz (1) the evidence must be relevant to an issue. such as an element of an offense. and must not be offered to establish the general character of the defendant; (2) the evidence must be necessary in the sense that it is probative of an essential claim or an element ol`the ofl`ense; (3) the evidence must be reliable proof that the defendant in fact committed the other act: and (4) the evidence`s probative value must not be substantially outweighed by its unfair prejudicial effect or by other considerations pertaining to the trial process, such as the confusion of issues, the availability ofother non-404(b) evidence, unwarranted distractions or time considerations See United Stales v. Johnson, 617 l".3d 286, 296-97 (4th Cir. 2010) (citing United $'Iule.s' v. Queen. 132 F.3d 991" date_filed="1997-12-29" court="4th Cir." case_name="United States v. Roland Demingo Queen, A/K/A Mingo">132 F.3d 991, 997 (4th Cir. 1997)); United Stales v. Lightly, 616 F.3d 321" date_filed="2010-08-11" court="4th Cir." case_name="United States v. Lighty">616 F.3d 321, 352 (4th Cir. 2010); UnitedSlates v. Myers, 589 F.3d l 17, 124 n. 8 (4th Cir. 2009). Although a rule ofinclusion, Rule 404(b) does not authorize the admission of evidence of other wrongs solely to prove a defendant`s bad character, propensity or disposition toward criminal conduct. See Queen, 132 l".3d at 994-95. Moreover, because such evidencc. collateral to the crime charged. will invariably be viewed by the fact finder as reflecting such a propensity, disposition or bad charactcr, the probative value must be carefully evaluated relative to other considerations necessary to preserve the integrity of the trial process and its fundamental premise that a defendant will be tried only for the crime charged. See il/lyers, 589 F.3d at 124 n. 8. l~lere. the govemment argues that the child pornography contained in the PowerPoint files is probative of defendant’s knowledge that he possessed the child pornography charged in the indictment, as well as his intent to collect the child pornography and the absence of mistake in his possession ofchild pornography. 'l`he Court must. therefore, consider the extent to which the evidence that the government seeks to admit cstablishes, in the first instancc, del`endant`s knowledge with respect to the child pornography contained in the PowerPoint files and then consider the extent to which any such demonstrated knowledge is probative of his knowledge. intent. or absence of mistake with respect to the child pomography for which he has been chargcd. The defendant disputes that he knew that the PowerPoint files contained child pornography or that he was involved in their creation or copying; and the evidence is far from clear or straightforward on that issuc. Based on the forensic and other evidence presented to the Court at the hearing held on November 24, 2010, there is no direct evidence that the defendant ever viewed or accessed the two PowerPoint files that contain child pornography, or had knowledge that the PowerPoint files contained child pornography. For example, there is no evidence that after the PowerPoint files were copied onto the Compaq laptop on September 7, 2002, the two PowerPoint files containing child pornography were ever accessed until .lune, 2009, after the Compaq laptop was sold at the yard sale. The government did present evidence that in order to create the PowerPoint files in lvlay of2002, each individual image needed to be selected and placed in the presentation. that knowledge ol`the contents of the files would be obtained from such a process and that the defendant is linked to that process because the software used to create the presentation was registered to him. ()n the other hand. at the hearing. the defendant categorically denied having any knowledge ofchild pornography on the Compaq laptop or ever creating or copying any child pornography. Because the forensic evidence shows only that a computer containing software registered to the defendant was used to create and copy the PowerPoint liles, defendant presented evidence that other persons had access to the Compaq laptop during the relevant periods. ln that rcgard. he testified that the Compaq laptop was for the most part used as a group or departmental laptop at his ol`lice. that it was typically kept at his office and that a wide range of persons at his place ol`employment used or had access to the Compaq laptop, He also presented evidence that at the time the PowerPoint liles were copied onto the Compaq laptop on September 7. 2002. he was attending religious services with his wife and that on the other dates and times in September 2002 when the forensic evidence showed certain PowerPoint liles were accessed from the Compaq laptop, he was in travel to or in attendance at medical conferences As to the govcmment`s evidence that the process of creating the PowerPoint files demonstrated knowledge of`their content, the defendant presented evidence that the PowerPoint liles could have been created through the transfer of images in bulk, without the individual selection of those imagcs, which, iftrue. substantially undercuts the strength of any inference of knowledge from the process ofcrcating the PowerPoint liles. There was evidence at the hearing that such software capable of making bulk transfers to the PowerPoint files was present on the Compaq laptop, but there was no evidence that it had been used. ln short, there are numerous factual issues that would need to be considered and resolved in a certain way before a fact finder could reasonably conclude, through a series of`inferences, that the defendant did, in fact, know that the PowerPoint liles on the Compaq laptop contained child pornography. 'l`he reliability of that process as a predicate for the admission of evidence under Rule 404(b) is further clouded by issues that the defendant has raised concerning the evidentiary integrity of the PowerPoint liles themselves When law enforcement authorities first reviewed the PowerPoint liles on .l unc 14. 2007 and Junc 27, 2007. it accessed the two files containing child pomography and in so doing eliminated information reflecting the then existing last access date. Likcwise, when it analyzed the PowerPoint files in June 2007. it used certain software that resulted in 92 files being added to the Compaq laptop and the modification of 53 files already on the Compaq laptop.4 'l`here is no dispute that the contents ol`the PowerPoint files images were 4 According to defendant`s expert, these 92 added files contained 127 megabytes of data and the modified 53 liles contained l 17 megabytes of data. ln that regard, the defendant`s forensic expert concluded that "All together, 245 MB of data were newly created or modified on the [Compaq laptop] computer at this time. 'l`his represents 8.7% of the user partition size or 5.9% of the entire hard drive.” Report of Donald A|lison 1| 15, Exhibit l to Opposition to Government's 9 unaffected, but the defendant presented evidence through its expert that there is a possibility that the government may have overwritten data that might have provided information concerning. among other things, the source of the PowerPoint images when they were created in May of 2002 or how they were created.5 In l`act, the defendant argues that it would be unfair at this point, approaching a denial ofdue process. for the government to use the PowerPoint files as evidence because the defendant’s ability to retrieve information embedded into the PowerPoint liles has been substantially comprised through the actions of law enforcement in reviewing and analyzing the files and that such information might have allowed him to prove that he was not involved in the creation ol`these liles, 'l`his Court cannot resolve these issues at this point. nor can the C ourt determine that there is any substance to defendant’s claim that exculpatory data or data useful in establishing his innocence have been lost because of the government’s actions. The Court must acknowledge. however, that defendant’s claims of prejudice are colorable, if not substantial, and they would need to be addressed before the admission ol`the PowerPoint liles, particularly given the lack of any forensic or other direct evidence that the defendant actually viewed the images ofchild pornography that are contained on the PowerPoint liles. Notice and Memorandum Regarding Rule 404(b) lividence ("Allison Report"). 'l`he items created on the Compaq laptop included "Microsoft Explorer l~listory liles, l\/Iicrosol`t Outlook E.\'press account databases. and two Knoppix Linux swap files used for temporary caching of files associated with an operating system that was not native to the [Compaq laptop]." Allison Report 11 16. " l)efendant’s expert claims that the government’s examination of the Compaq laptop may have caused data to be overwritten including recoverable deleted liles, records of internet history use, file downloads from the internet or other network, link files showing the location ol` data that was transferred onto the Compaq laptop; and information related to other users such as remote logins to e-mail, file shares, and network shares. 10 Other issues exist. ln order to make the required findings of knowledge with respect to the PowerPoint liles, the Court would be required to conduct a “trial within the trial;" and while the concerns ol`confusion, prejudice, distraction and delay are substantially lessened without a jury. the Court must nevertheless consider whether that exercise is appropriate in this case solely for the purposes of determining whether to admit evidence under Rule 404(b) that is not otherwise rclevant. See United Smles v. l'lill. 322 1'~`.3d 301 (4th Cir. 2003) (approving excluding such evidence, even when probative. where admission of the evidence would create such an exhaustive case within a case); see also United Statcs \'. Rul)io. 87 1".3d 1309 (4th Cir. 1996) (approving exclusion ofevidence where admission would result in a mini-trial ol`the witness’ past act and not the charged crime). Equally critical to the Court’s analysis is whether any finding of knowledge of child pornography in the PowerPoint files is probative as to his knowledgc, intent or absence of mistake as to the presence ofchild pornographic images in a separate and distinct collection of predominantly adult pornography. As discussed above. there is no material commonality between the two sets ofpredominantly adult pornography collections; and any knowledge of child pornography in the PowerPoint files would have little, il`any, probative value as to whether the defendant knew that the pornography collection seized at his home contained child pornography. See Unilec/ S!ales v. ./ohn.t'rm, 617 l".3d 286 (4th Cir. 2010) (prior drug transactions not sufficiently related and similar to charged drug transaction to make it relevant to prove intent or knowledge.) ln summary, it is disputed, and there is no clear evidence, that the defendant ever viewed the PowerPoint files that contained child pornography. "l`he PowerPoint files are, therefore, not sufficiently reliable as evidence ofdcfendant`s knowledge that he possessed child pornography ll for the purposes of their admission under Rule 404(b). Moreover, fact and evidentiary issues pertaining to the proffered evidence would no doubt dominate the trial, which would be substantially affected by that evidence even were it decided that the defendant did not know that the PowerPoint files contained child pornography. ln any event. any such knowledge would have littlc, if any, probative value that the defendant knew that a separate and distinct collection ol` predominantly adult pornography contained images ofchild pornography. 'l`he Court therefore concludes that any probative value pertaining to the PowerPoint files is substantially outweighed by their unfair prejudicial effect and the otherwise unnecessary time, delay and effort needed to resolve disputed factual issues relating to that evidence, Whilc these dangers associated with this evidence are substantially reduced because the defendant has waived ajury and will be tried by the Court, the considerations pertaining to the admission ol` evidence under Rule 404(b) are intended to preserve the integrity of the fact finding process itself. The Court would not hesitate to exclude such evidence were this case to be decided by a jury; and givcn. in the end, the lack of probative value that the PowerPoint files might properly have. the Court sees l'() no reason to permit their admission in a bench tria 11. '1`he United States’ Motion in Liminc to admit evidence of the “wiped clean” hard drive. (Doc. No. 17) ln April 2008, a federal grand jury issued a subpoena to defendant`s employers for defendant`s work computers, which included two desktop computers and an HP laptop computer. 'l`he two desktop computers were turned over to the FBI in May 2008 and no evidence of child ° At the hearing held on November 24, 2010. thc govemment argued for the lirst time that the proffered evidence was also admissible under lied. R. Evid. 414. '|`hc Court has considered that position and concludes that regardless of whether this case is within the scope of Rule 414 (or whether the govemment complied with the notice requirements ol`414(b)), the same considerations that lead this Court to exclude the evidence under Rule 404(b) causes this Court to exclude the evidence under Rule 414. See UnilcclSm!es v. Kel/y. 510 l".3d 433, 437 (4th Cir. 2007). ]') pornography was found on either. 'l`here are no issues before the Court with respect to these computers. l-lowever. the government seeks to introduce evidence that the hard drive that was on the defendant`s HP laptop was "wiped clean" when defendant turned it into his employer on May 12, 2008 at his employer’s request for the purpose ol`turning it over to the FBI in response to the grand jury subpoena. Defendant acquired the Hl’ laptop. and a docking station. in March 2006 for his work. at the expense ofa private research corporation associated with one of his employers lt appears undisputed that in May 2007, lrleller was required to turn in the 1-1P laptop to his employer`s information technology department in order to have encryption software installed on the computer. lt also appears undisputed that after the return of the 1'11’ laptop computer, Heller experienced problems with its operations and returned it to his employcr. who after re~installing the operating system returned it to l‘leller several weeks later. Heller claims that after receiving the HP laptop back from the I'l` department. it never again operated, although there is no evidence that he ever again returned the computer to his employer or complained about it. 'l`his laptop was not at dcfendant’s home when searched on July 12, 2007, although a docking station for this laptop was observed at his home residence, in some proximity to the black and tan~ colored binders. Heller turned the I~lP laptop into his employer on May 12, 2008, after what the government claims was a delay on his part. On May 19. 2008. l-leller’s employer turned over the 1'11’ computer to the l"Bl without an examination 'l`he lll’ laptop was apparently not examined by the FBl until after it obtained a search warrant for that purpose in October 2008; and when the 1~`B1 actually examined the l~lP laptop it was discovered that the llP laptop did not contain a hard drive. On December 18, 2008, a federal agent confronted 1~leller about the missing disk. l~leller 13 professed not to know anything about it and immediately contacted his then counsel. who later conlirmed that it was in his possession. 'l`he disk was expeditiously delivered to the l"Bl, who upon examination determined that it contained no data and had been l`orensically "wiped clean." 'l`he parties have stipulated that at the time the hard drive was delivered to the liBl, it was in the same condition as when Heller delivered the 1-11’ laptop to his lawyer for examination by a forensic expert. Based on these facts, the govemment seeks to introduce the "wiped clean" hard drive from the l'll’ laptop as evidence of defendant`s "consciousness of guilt." Spoliation of evidence is admissible to show the defendant`s consciousness of guilt. See United Smle.s' v. l"cm Melre. 150 li.3d 339, 353 (4th Cir. 1998). To be admissible, however, such evidence must be linked to the defendant`s consciousness of guilt for the crime charged, and each link of the chain must be "sturdily supported." United States v. l'lawke.v. 753 l".2d 355, 359 (4th Cir. 1985). Although there are many factual issues surrounding the HP laptop’s hard drive, the parties appear to agree that by the time authorities received the hard drive in May 2008, it contained no data. Based on that principle fact, the government contends that the evidence establishes consciousness of guilt for the crime charged based on the following logic: (l) the docking station for the l'lP laptop was observed on July 12, 2007, during the search ofdel`endant’s home, within close proximity ofthe CDs and DVDs, among which child pornography was subsequently found, suggesting that the HI’ laptop was used to view the charged child pornography; (2) defendant knew that he was under investigation for possession ofchild pornography, (3) defendant delayed turning in the HP laptop after he learned that it had been subpoenaed from his employer; (4) he turned in the l'lP laptop without the hard drive, (3) when questioned about the missing disk in December 2008, the defendant reacted physically in a way that evidences guilt. 14 '|`hc first issue is whether the defendant committed the act that the government argues evidences consciousness ofguilt - that defendant wiped clean the hard drive. That conduct on the part of the defendant is disputed and the facts relied on do not clearly establish that the defendant did what the government claims. i`he second issue is whether there is a sufficiently compelling connection between the HP laptop and the charged of`fense. such that had defendant wiped clean the hard drive, it would sufficiently reflect consciousness of guilt for thc specific crime charged. Here. the CDs and DVDs at issue were produced between 2003 and 2004. l'lowever, the defendant did not acquire the laptop until 2006. and it could not have been used to make the charged images on those CDs and DVDs. lt could have been used to view those images. of course; and there was a docking station at Heller`s house. 'l`he l~ll’ laptop. however, was not at the house when searched, although the charged pornography was present. ln addition. the laptop was one of`three computers used for business; and there is no evidence of any connection between the CDs and DVDs and either of the other two computers or any other computer traceable to the defendant. Moreover, the government itself seems to have viewed the l~lP laptop as having an attenuated relationship to the crime charged as evidenced by the extensive delays in its obtaining and then examining the HP laptop. Many of these facts may cut both ways. but in any event, it is impossible to conclude without speculating that the defendant used the 1411’ laptop to view the charged child pornography. Based on all the facts and circumstances presented to the Court, there is simply no "sturdily supported" connection between the blank hard drive and the defendant`s consciousness of guilt concerning the crime charged. l"or the above stated reasons, the Government’s Motion in Limine as to the HP l’avilion Laptop and its hard drive is DENlED. 15 C()NCLUSI()N l"or the above reasons. the Court will deny the United States` motion to admit certain evidence under Fed. R. l':`.vid. 404(b) (Doc. No. 16) and its motion in limine to have admitted evidence concerning the hard drive of the l-lP laptop computer (Doc. No. 17). An appropriate ()rdcr will issue. Anth ry . 'l`rrf‘nga Unit d States l)istriet fudge A|cxandria. Virginia November 30, 2010 16