United States v. Heller
3:10-cr-00161 | E.D. Va. | Nov 30, 2010
lN 'l`l~llE UNl'I`l:`D S'l`A'l`liS l)lS'l`RlC'l` C()UR'I`
FOR 'l`l~lli l:`AS'l`ERN DISTRICT OF VlRGINIA
Alcxandria Division
UNlTED S'l`A'l`l;`S OI~` AMl-leC/\. §
v. § No. 3:10-cr-161
ANDRI:`W .|ARED l‘lELLl;`R. §
Det`endant. §
)
MEMORANDUM OPlNl()N
On .lune 9, 2007, the defendant Andrew J. llcller ("llcller") sold a Compaq Presario laptop
computer (the "Compaq laptop") to his neighbor at a yard sale. 'l`lte neighbor discovered a
collection ol` pornography on the hard drive ol` the Compaq laptop. Al`tcr discovering the
pornography collection, the neighbor contacted authorities who inspected the Compaq laptop and
alter locating images oi`ehild pornography, obtained a search warrant l`or defendant`s home.
Pursuant to the search warrant executed on July 12, 2007, authorities seizcd, at defendant`s
home. three computers, live external hard drives and nearly 400 additional CDs and DVDs, three
media cards and other digital media. Approximately 318 of the seized CDs and DVDs were in
two separate binders. One was a black binder containing 207 CDs and the other was a tan-
colored Cl) binder containing l l l Cl)s and l)Vl)s. Authorities later determined that thc entire
collection 01` 207 CDs in the black binder and all but 26 ol` the l l l CDs and DVDs in the tan-
colored binder contained only adult pornography. The 26 CDs and DVDs in the tan-colored
binder contained both child pornography and adult pomography. Authorities also determined
that none oi`the three computers seized at the defendant`s home contained any child pomography
or any digital evidence that any ol`the 26 Cl)s and l)VDs containing child pornography had been
viewed from those computers. On .lune l. 20l0, an indictment was returned against thc
defendant charging him with one count of possession ol` child pornography in violation of 18
U.S.C. 2252A(a)(5)(B). Specil`tcally. the government alleges that the defendant knowingly
possessed certain images ofchild pornography that appeared on the 26 CDs and DVDs in the
tan-colored binder. 'l`hc defendant has not been charged with any crime based on the child
pornography found on the sold Compaq laptop.
'l`he United States seeks to admit evidence at trial that child pornography was found on the
Compaq laptop. including certain specific images o|` child pomography. lt also seeks to
introduce evidence that a hard drive from another laptop computer, an l'lP Pavilion laptop ("HP
laptop"), that was issued to the defendant by his employer (and was not among the equipment
seized at del`endant`s home on luly 12, 2007). had been "wiped clean" before the defendant
turned it over to authorities in May 2008. On November 24, 2010, this Court conducted an
evidentiary hearing concerning these motions, following which it took the matter tinder
advisement. For the reasons stated below, the Court concludes that the evidence that is the
subject of these motions should not be admitted at trial and that the United States` motions
should be denied.
l. The government’s motion under Rule 404(b) (l)oc. No 16).
'l`he forensic evidence presented to the C ourt showed that the Compaq laptop sold at the yard
sale had been used from 2001 until December 2002, and then again after it had been sold on June
9. 2007. 'l`he pornography found on the Compaq laptop was in a folder entitled "Pl"l`." which
contained twenty separate PowerPoint presentations (the "PowerPoint lilcs"). l€ighteen of those
liles contain only adult pornography 'l`wo ol`the twenty l`tles contain both adult and child
pornography. Specilically. out of approximately 570 images on those two liles approximately
200 are images of child pomography, in no particular grouping or order.l Based on forensic
evidence. it appears that the Powerl’oint liles first came into existence around May 2002 when
images were taken from an unknown source, using an unidentifiable computer and placed into a
PowerPoint presentation using Microsol`t PowerPoint 97/98 software, or Version 8, registered to
the del`endant. Then on September 7. 2002, between 3:39 p.m. and 3:4\ p.m., the PowerPoint
files were "created" or copied onto the Compaq laptop, containing Version 9 of the Microsoft
PowerPoint program. also registered to the defendant. 'I`here is no evidence that the two
Po\verPoint liles containing child pornography were ever accessed on the Compaq laptop after
they had been transferred to the Compaq laptop on September 7, 2009 and before the Compaq
laptop was sold in June 2007.
'l`he total collection of approximately 318 CDs and DVDs in the two binders seized at
defendant’s home contain 7,143 video liles that were copied or "burned" onto those CDs and
DVDs between September 8, 1999 and August l. 2006. Thc images of child pornography on
the 26 CDs and DVDs in the tan-colored binder appear in approximately 50 to 60 video liles, or
less than l% ol`the total video liles found at dcfcndant`s residencc.2 'l`hese videos were
downloaded onto some. unidentifiable computer between May 20. 2003 and .luly 5, 2003. and
then copied or "burned" from that computer onto the 26 CDs and l)Vl)s between .lune 14, 2003
and January l, 2004. Both the government`s and the defendant`s forensic examiner agree that
there is no forensic evidence linking the child pornography on the 26 CDs and DVDs to any of
' 'l`he government initially identified only approximately 85 ol`the 570 images on the two Power
Point files as containing child pornography
2 ln defendant’s brief, the defendant stated that approximately 60 video liles were found to
contain child pomography. At the hearing, the government’s expert testified that 54 video liles
were found to contain child pornography.
the computers or external hard drives seized from defendant's residence. or from other
computers that defendant used at his of lices. There is also no evidence that the CDs and DVDs
seized from defendant`s home were ever on or accessed through the Compaq laptop sold at the
yard sale or that the l’owerl’oint liles on that Compaq laptop was ever on any of the computers or
hard drives found at del`cndant`s residence or elsewhere.
Although the defendant has not been charged with any crime pertaining to the images of
child pornography in the two PowerPoint liles on the Compaq laptop, the govemment seeks their
admission on thc grounds that these l’owchoint liles are (1) intrinsic to the crime chargcd. or (2)
admissible under Rule 404(b) to show the defendant`s intent, knowledge. plan or absence of
mistake with respect to the possession ofchild pornography found on the 26 CDs and DVDs.
a. The evidence is not intrinsic to the crime charged
"Other acts" are intrinsic to the crime charged when they are “incxtrieably intertwined or
both acts are part of a single criminal episode or the other acts were necessary preliminaries to
the crime charged." United Slales v. l.ighty. 616 l`~`.3d 321, 352 (4th Cir. 2010). Evidence is
intrinsic ifit is necessary to "provide context relevant to the criminal charges." United Slates v.
Cr)oper. 482 F.3d 658" date_filed="2007-03-28" court="4th Cir." case_name="United States v. D.J. Cooper">482 F.3d 658, 663 (4th Cir. 2007). and forms an integral and natural part of the
witness`s accounts of the circumstances surrounding the offenses for which the defendant was
indicted, U)tile¢/Slales t'. l:`douarc/. 485 l".3d 1324, 1344 (l lth Cir. 2007). 'I`he govemment
argues that the 1’owerPoint presentations are intrinsic because (l) they give context to how the
defendant was discovered by law cnforcement; (2) are inextricably linked to the CDs and DVDs
because they contain images ol`the same exact nature created within a year from each other; and
(3) demonstrate a pattern of illegal activity and intent to possess child pornography. None of
these positions establish that the I’owerPoint liles are intrinsic to the crime charged.
First, the elements ol`the crime charged do not require proof that the Compaq laptop
contained child pornography; nor is the possession or existence of the child pornography on the
Compaq laptop a necessary preliminary or follow-on step in connection with the commission of
the crime charged. Second. there is insufficient evidence to establish that the assemblage and
possession of both pornography collections -the PowerPoint files on the Compaq laptop and the
collection on the 26 CDs and DVDs found in defendant’s home - were part and parcel of the
same course of conduct or a single criminal episode. Based on the forensic evidence, the
creation dates for the two collections took place during different and distinct time periods, with
no overlap in dates. 'l`he government emphasizes that the "crcation dates" of both collections are
within a year of each other, but even a much shorter interval would eliminate any inference that
one collection was part of the context for the other or that both were being created or assembled
as part ol`one inseparable el`fort. These findings are further supported by the lack of other
similarities between the two collections. For example, there is no evidence that both collections
came into defendant`s possession from the same source or were viewed via a common computcr.
'l`he collections are contained on different media. one is in PowerPoint on a hard drive, the other
in videos on CDs or DVDs and not found on any hard drive. None ol`the titles in one collection
are the same as those in the other: and while both collections have graphic and horrific images of
both adult and child pornography, the specific content is different. 3 'l`here is no witness whose
relevant testimony would require mention of the l’owerPoint files. At most, the existence of the
child pornography found on the Compaq laptop is only part of the circumstances that led to the
discovery of the child pornography with which the defendant has been charged. ln sum, there is
’ 'l`he government advised the Court during its hearing that some ol`the same children appear in
both collections. 'l`hc government also acknowledges, however. that the children depicted have
appeared widely in available child pornography and their presence in both collections does not
establish a single source for the child pornography in both collections
5
no evidence that the images in the l’owerl’oint files and the Cl)s and DVDs are part ol`the same
collection or are inextricably intertwined with or related to each other, The only commonality is
that both collections are predominantly adult pornography with child pornography interspersed
in a small portion of it and both have a connection to the defendant. albeit in different ways.
ln support ofits position. the government relies heavily on United Slates \'. Kennedy,
United Slales v. l.octyza, and United Slates v. Chin to support their argument In each ol`those
cascs, the other act was actually connected to and gave context and understanding to the events
ol`the underlying charged crime. For instance, in Kennedy, the intrinsic evidence explained the
common source through which the defendant supplied his co-conspirator with cocaine in a
larger, charged conspiracy. United Slales v. Kemted_v, 32 l?.3d 876, 885-86 (4th Cir. 1994). ln
l.oay:cn the intrinsic evidence related to the defendant`s participation in a common scheme.
United Slates v. Loayza. 107 l".3d 257, 263-64 (4th Cir. 1997). ln ('hin. the evidence was
intrinsic because it occurred dttring the charged offense. United Smtes v. Chin. 83 l~`.3d 83. 87
(4th Cir. 1996). Therefore, for the reasons stated. the l’owerPoint presentations are not intrinsic
to the crime charged and cannot be admitted on that basis.
b. 'I`he PowerPoint Files should not be admitted tinder Rule 404(b)
The government argues that if the evidence of child pornography on the Powerl’oint liles is
not intrinsic to the crime charged, it is “extrinsic” evidence that is admissible under Rule 404(b)
to demonstrate defendant’s intent, knowledge. motive and absence of mistake.
Evidence of prior "bad acts" under Rule 404(b) are admissible when the following criteria
are metz (1) the evidence must be relevant to an issue. such as an element of an offense. and must
not be offered to establish the general character of the defendant; (2) the evidence must be
necessary in the sense that it is probative of an essential claim or an element ol`the ofl`ense; (3)
the evidence must be reliable proof that the defendant in fact committed the other act: and (4) the
evidence`s probative value must not be substantially outweighed by its unfair prejudicial effect
or by other considerations pertaining to the trial process, such as the confusion of issues, the
availability ofother non-404(b) evidence, unwarranted distractions or time considerations See
United Stales v. Johnson, 617 l".3d 286, 296-97 (4th Cir. 2010) (citing United $'Iule.s' v. Queen.
132 F.3d 991" date_filed="1997-12-29" court="4th Cir." case_name="United States v. Roland Demingo Queen, A/K/A Mingo">132 F.3d 991, 997 (4th Cir. 1997)); United Stales v. Lightly, 616 F.3d 321" date_filed="2010-08-11" court="4th Cir." case_name="United States v. Lighty">616 F.3d 321, 352 (4th Cir. 2010);
UnitedSlates v. Myers, 589 F.3d l 17, 124 n. 8 (4th Cir. 2009). Although a rule ofinclusion, Rule
404(b) does not authorize the admission of evidence of other wrongs solely to prove a
defendant`s bad character, propensity or disposition toward criminal conduct. See Queen, 132
l".3d at 994-95. Moreover, because such evidencc. collateral to the crime charged. will
invariably be viewed by the fact finder as reflecting such a propensity, disposition or bad
charactcr, the probative value must be carefully evaluated relative to other considerations
necessary to preserve the integrity of the trial process and its fundamental premise that a
defendant will be tried only for the crime charged. See il/lyers, 589 F.3d at 124 n. 8.
l~lere. the govemment argues that the child pornography contained in the PowerPoint files
is probative of defendant’s knowledge that he possessed the child pornography charged in the
indictment, as well as his intent to collect the child pornography and the absence of mistake in
his possession ofchild pornography. 'l`he Court must. therefore, consider the extent to which the
evidence that the government seeks to admit cstablishes, in the first instancc, del`endant`s
knowledge with respect to the child pornography contained in the PowerPoint files and then
consider the extent to which any such demonstrated knowledge is probative of his knowledge.
intent. or absence of mistake with respect to the child pomography for which he has been
chargcd.
The defendant disputes that he knew that the PowerPoint files contained child
pornography or that he was involved in their creation or copying; and the evidence is far from
clear or straightforward on that issuc. Based on the forensic and other evidence presented to the
Court at the hearing held on November 24, 2010, there is no direct evidence that the defendant
ever viewed or accessed the two PowerPoint files that contain child pornography, or had
knowledge that the PowerPoint files contained child pornography. For example, there is no
evidence that after the PowerPoint files were copied onto the Compaq laptop on September 7,
2002, the two PowerPoint files containing child pornography were ever accessed until .lune,
2009, after the Compaq laptop was sold at the yard sale. The government did present evidence
that in order to create the PowerPoint files in lvlay of2002, each individual image needed to be
selected and placed in the presentation. that knowledge ol`the contents of the files would be
obtained from such a process and that the defendant is linked to that process because the
software used to create the presentation was registered to him. ()n the other hand. at the hearing.
the defendant categorically denied having any knowledge ofchild pornography on the Compaq
laptop or ever creating or copying any child pornography. Because the forensic evidence shows
only that a computer containing software registered to the defendant was used to create and copy
the PowerPoint liles, defendant presented evidence that other persons had access to the Compaq
laptop during the relevant periods. ln that rcgard. he testified that the Compaq laptop was for the
most part used as a group or departmental laptop at his ol`lice. that it was typically kept at his
office and that a wide range of persons at his place ol`employment used or had access to the
Compaq laptop, He also presented evidence that at the time the PowerPoint liles were copied
onto the Compaq laptop on September 7. 2002. he was attending religious services with his wife
and that on the other dates and times in September 2002 when the forensic evidence showed
certain PowerPoint liles were accessed from the Compaq laptop, he was in travel to or in
attendance at medical conferences
As to the govcmment`s evidence that the process of creating the PowerPoint files
demonstrated knowledge of`their content, the defendant presented evidence that the PowerPoint
liles could have been created through the transfer of images in bulk, without the individual
selection of those imagcs, which, iftrue. substantially undercuts the strength of any inference of
knowledge from the process ofcrcating the PowerPoint liles. There was evidence at the hearing
that such software capable of making bulk transfers to the PowerPoint files was present on the
Compaq laptop, but there was no evidence that it had been used. ln short, there are numerous
factual issues that would need to be considered and resolved in a certain way before a fact finder
could reasonably conclude, through a series of`inferences, that the defendant did, in fact, know
that the PowerPoint liles on the Compaq laptop contained child pornography.
'l`he reliability of that process as a predicate for the admission of evidence under Rule
404(b) is further clouded by issues that the defendant has raised concerning the evidentiary
integrity of the PowerPoint liles themselves When law enforcement authorities first reviewed
the PowerPoint liles on .l unc 14. 2007 and Junc 27, 2007. it accessed the two files containing
child pomography and in so doing eliminated information reflecting the then existing last access
date. Likcwise, when it analyzed the PowerPoint files in June 2007. it used certain software that
resulted in 92 files being added to the Compaq laptop and the modification of 53 files already on
the Compaq laptop.4 'l`here is no dispute that the contents ol`the PowerPoint files images were
4 According to defendant`s expert, these 92 added files contained 127 megabytes of data and the
modified 53 liles contained l 17 megabytes of data. ln that regard, the defendant`s forensic expert
concluded that "All together, 245 MB of data were newly created or modified on the [Compaq
laptop] computer at this time. 'l`his represents 8.7% of the user partition size or 5.9% of the
entire hard drive.” Report of Donald A|lison 1| 15, Exhibit l to Opposition to Government's
9
unaffected, but the defendant presented evidence through its expert that there is a possibility that
the government may have overwritten data that might have provided information concerning.
among other things, the source of the PowerPoint images when they were created in May of
2002 or how they were created.5 In l`act, the defendant argues that it would be unfair at this
point, approaching a denial ofdue process. for the government to use the PowerPoint files as
evidence because the defendant’s ability to retrieve information embedded into the PowerPoint
liles has been substantially comprised through the actions of law enforcement in reviewing and
analyzing the files and that such information might have allowed him to prove that he was not
involved in the creation ol`these liles,
'l`his Court cannot resolve these issues at this point. nor can the C ourt determine that there
is any substance to defendant’s claim that exculpatory data or data useful in establishing his
innocence have been lost because of the government’s actions. The Court must acknowledge.
however, that defendant’s claims of prejudice are colorable, if not substantial, and they would
need to be addressed before the admission ol`the PowerPoint liles, particularly given the lack of
any forensic or other direct evidence that the defendant actually viewed the images ofchild
pornography that are contained on the PowerPoint liles.
Notice and Memorandum Regarding Rule 404(b) lividence ("Allison Report"). 'l`he items
created on the Compaq laptop included "Microsoft Explorer l~listory liles, l\/Iicrosol`t Outlook
E.\'press account databases. and two Knoppix Linux swap files used for temporary caching of
files associated with an operating system that was not native to the [Compaq laptop]." Allison
Report 11 16.
" l)efendant’s expert claims that the government’s examination of the Compaq laptop may have
caused data to be overwritten including recoverable deleted liles, records of internet history use,
file downloads from the internet or other network, link files showing the location ol` data that was
transferred onto the Compaq laptop; and information related to other users such as remote logins
to e-mail, file shares, and network shares.
10
Other issues exist. ln order to make the required findings of knowledge with respect to
the PowerPoint liles, the Court would be required to conduct a “trial within the trial;" and while
the concerns ol`confusion, prejudice, distraction and delay are substantially lessened without a
jury. the Court must nevertheless consider whether that exercise is appropriate in this case solely
for the purposes of determining whether to admit evidence under Rule 404(b) that is not
otherwise rclevant. See United Smles v. l'lill. 322 1'~`.3d 301 (4th Cir. 2003) (approving excluding
such evidence, even when probative. where admission of the evidence would create such an
exhaustive case within a case); see also United Statcs \'. Rul)io. 87 1".3d 1309 (4th Cir. 1996)
(approving exclusion ofevidence where admission would result in a mini-trial ol`the witness’
past act and not the charged crime).
Equally critical to the Court’s analysis is whether any finding of knowledge of child
pornography in the PowerPoint files is probative as to his knowledgc, intent or absence of
mistake as to the presence ofchild pornographic images in a separate and distinct collection of
predominantly adult pornography. As discussed above. there is no material commonality
between the two sets ofpredominantly adult pornography collections; and any knowledge of
child pornography in the PowerPoint files would have little, il`any, probative value as to whether
the defendant knew that the pornography collection seized at his home contained child
pornography. See Unilec/ S!ales v. ./ohn.t'rm, 617 l".3d 286 (4th Cir. 2010) (prior drug transactions
not sufficiently related and similar to charged drug transaction to make it relevant to prove intent
or knowledge.)
ln summary, it is disputed, and there is no clear evidence, that the defendant ever viewed
the PowerPoint files that contained child pornography. "l`he PowerPoint files are, therefore, not
sufficiently reliable as evidence ofdcfendant`s knowledge that he possessed child pornography
ll
for the purposes of their admission under Rule 404(b). Moreover, fact and evidentiary issues
pertaining to the proffered evidence would no doubt dominate the trial, which would be
substantially affected by that evidence even were it decided that the defendant did not know that
the PowerPoint files contained child pornography. ln any event. any such knowledge would
have littlc, if any, probative value that the defendant knew that a separate and distinct collection
ol` predominantly adult pornography contained images ofchild pornography. 'l`he Court
therefore concludes that any probative value pertaining to the PowerPoint files is substantially
outweighed by their unfair prejudicial effect and the otherwise unnecessary time, delay and effort
needed to resolve disputed factual issues relating to that evidence, Whilc these dangers
associated with this evidence are substantially reduced because the defendant has waived ajury
and will be tried by the Court, the considerations pertaining to the admission ol` evidence under
Rule 404(b) are intended to preserve the integrity of the fact finding process itself. The Court
would not hesitate to exclude such evidence were this case to be decided by a jury; and givcn. in
the end, the lack of probative value that the PowerPoint files might properly have. the Court sees
l'()
no reason to permit their admission in a bench tria
11. '1`he United States’ Motion in Liminc to admit evidence of the “wiped clean” hard drive.
(Doc. No. 17)
ln April 2008, a federal grand jury issued a subpoena to defendant`s employers for
defendant`s work computers, which included two desktop computers and an HP laptop computer.
'l`he two desktop computers were turned over to the FBI in May 2008 and no evidence of child
° At the hearing held on November 24, 2010. thc govemment argued for the lirst time that the
proffered evidence was also admissible under lied. R. Evid. 414. '|`hc Court has considered that
position and concludes that regardless of whether this case is within the scope of Rule 414 (or
whether the govemment complied with the notice requirements ol`414(b)), the same
considerations that lead this Court to exclude the evidence under Rule 404(b) causes this Court
to exclude the evidence under Rule 414. See UnilcclSm!es v. Kel/y. 510 l".3d 433, 437 (4th Cir.
2007).
]')
pornography was found on either. 'l`here are no issues before the Court with respect to these
computers. l-lowever. the government seeks to introduce evidence that the hard drive that was on
the defendant`s HP laptop was "wiped clean" when defendant turned it into his employer on May
12, 2008 at his employer’s request for the purpose ol`turning it over to the FBI in response to the
grand jury subpoena.
Defendant acquired the Hl’ laptop. and a docking station. in March 2006 for his work. at the
expense ofa private research corporation associated with one of his employers lt appears
undisputed that in May 2007, lrleller was required to turn in the 1-1P laptop to his employer`s
information technology department in order to have encryption software installed on the
computer. lt also appears undisputed that after the return of the 1'11’ laptop computer, Heller
experienced problems with its operations and returned it to his employcr. who after re~installing
the operating system returned it to l‘leller several weeks later. Heller claims that after receiving
the HP laptop back from the I'l` department. it never again operated, although there is no
evidence that he ever again returned the computer to his employer or complained about it. 'l`his
laptop was not at dcfendant’s home when searched on July 12, 2007, although a docking station
for this laptop was observed at his home residence, in some proximity to the black and tan~
colored binders.
Heller turned the I~lP laptop into his employer on May 12, 2008, after what the government
claims was a delay on his part. On May 19. 2008. l-leller’s employer turned over the 1'11’
computer to the l"Bl without an examination 'l`he lll’ laptop was apparently not examined by
the FBl until after it obtained a search warrant for that purpose in October 2008; and when the
1~`B1 actually examined the l~lP laptop it was discovered that the llP laptop did not contain a hard
drive. On December 18, 2008, a federal agent confronted 1~leller about the missing disk. l~leller
13
professed not to know anything about it and immediately contacted his then counsel. who later
conlirmed that it was in his possession. 'l`he disk was expeditiously delivered to the l"Bl, who
upon examination determined that it contained no data and had been l`orensically "wiped clean."
'l`he parties have stipulated that at the time the hard drive was delivered to the liBl, it was in the
same condition as when Heller delivered the 1-11’ laptop to his lawyer for examination by a
forensic expert.
Based on these facts, the govemment seeks to introduce the "wiped clean" hard drive from
the l'll’ laptop as evidence of defendant`s "consciousness of guilt." Spoliation of evidence is
admissible to show the defendant`s consciousness of guilt. See United Smle.s' v. l"cm Melre. 150
li.3d 339, 353 (4th Cir. 1998). To be admissible, however, such evidence must be linked to the
defendant`s consciousness of guilt for the crime charged, and each link of the chain must be
"sturdily supported." United States v. l'lawke.v. 753 l".2d 355, 359 (4th Cir. 1985). Although
there are many factual issues surrounding the HP laptop’s hard drive, the parties appear to agree
that by the time authorities received the hard drive in May 2008, it contained no data. Based on
that principle fact, the government contends that the evidence establishes consciousness of guilt
for the crime charged based on the following logic: (l) the docking station for the l'lP laptop was
observed on July 12, 2007, during the search ofdel`endant’s home, within close proximity ofthe
CDs and DVDs, among which child pornography was subsequently found, suggesting that the
HI’ laptop was used to view the charged child pornography; (2) defendant knew that he was
under investigation for possession ofchild pornography, (3) defendant delayed turning in the HP
laptop after he learned that it had been subpoenaed from his employer; (4) he turned in the l'lP
laptop without the hard drive, (3) when questioned about the missing disk in December 2008, the
defendant reacted physically in a way that evidences guilt.
14
'|`hc first issue is whether the defendant committed the act that the government argues
evidences consciousness ofguilt - that defendant wiped clean the hard drive. That conduct on
the part of the defendant is disputed and the facts relied on do not clearly establish that the
defendant did what the government claims.
i`he second issue is whether there is a sufficiently compelling connection between the HP
laptop and the charged of`fense. such that had defendant wiped clean the hard drive, it would
sufficiently reflect consciousness of guilt for thc specific crime charged. Here. the CDs and
DVDs at issue were produced between 2003 and 2004. l'lowever, the defendant did not acquire
the laptop until 2006. and it could not have been used to make the charged images on those CDs
and DVDs. lt could have been used to view those images. of course; and there was a docking
station at Heller`s house. 'l`he l~ll’ laptop. however, was not at the house when searched, although
the charged pornography was present. ln addition. the laptop was one of`three computers used
for business; and there is no evidence of any connection between the CDs and DVDs and either
of the other two computers or any other computer traceable to the defendant. Moreover, the
government itself seems to have viewed the l~lP laptop as having an attenuated relationship to the
crime charged as evidenced by the extensive delays in its obtaining and then examining the HP
laptop. Many of these facts may cut both ways. but in any event, it is impossible to conclude
without speculating that the defendant used the 1411’ laptop to view the charged child
pornography. Based on all the facts and circumstances presented to the Court, there is simply no
"sturdily supported" connection between the blank hard drive and the defendant`s consciousness
of guilt concerning the crime charged. l"or the above stated reasons, the Government’s Motion
in Limine as to the HP l’avilion Laptop and its hard drive is DENlED.
15
C()NCLUSI()N
l"or the above reasons. the Court will deny the United States` motion to admit certain
evidence under Fed. R. l':`.vid. 404(b) (Doc. No. 16) and its motion in limine to have admitted
evidence concerning the hard drive of the l-lP laptop computer (Doc. No. 17).
An appropriate ()rdcr will issue.
Anth ry . 'l`rrf‘nga
Unit d States l)istriet fudge
A|cxandria. Virginia
November 30, 2010
16