UNITED STATES of America, Plaintiff-Appellee, v. James MCABEE, Defendant-Appellant.
No. 16-8033
United States Court of Appeals, Tenth Circuit.
Filed April 20, 2017
682
(D.C. Nos. 2:15-CV-00122-ABJ and 2:12-CR-00024-ABJ-1) (D. Wyoming)
James McAbee, Pro Se
Before HARTZ, O‘BRIEN, and PHILLIPS, Circuit Judges.
ORDER DENYING CERTIFICATE OF APPEALABILITY AND DISMISSING APPEAL
Terrence L. O‘Brien, United States Circuit Judge
James McAbee, a federal prisoner proceeding pro se,1 wants to appeal from the denial of his
I. Background
McAbee had child pornography on his computer as well as FrostWire, a peer-to-peer file-sharing program. On September 19, 2011, an agent with the Wyoming Division of Criminal Investigation used a peer-to-peer program to download one still image from McAbee‘s computer. The image showed an adult male engaging in anal intercourse with a prepubescent female. A subsequent search of McAbee‘s computer (with a warrant) on November 7, 2011, revealed 203 still images and one video of child pornography in the computer‘s “unallocated space.”2
McAbee was indicted for possession of child pornography (Count 1) and distribution of child pornography (Count 2). See
Almost three years later, on July 27, 2015, McAbee filed this
The district judge dismissed the mоtion as untimely because it was not filed within one year from the date his conviction became final.
II. Discussion
A COA is a jurisdiсtional prerequisite to our review of a petition for a writ of habeas corpus. Miller-El v. Cockrell, 537 U.S. 322, 336 (2003). We will issue a COA “only if the applicant has made a substantial showing of the denial of a constitutional right.”
About one thing there can be no reasonable debate among jurists: McAbee‘s
A. Actual Innocence
“[A]ctual innocence, if proved, serves as a gateway through which a petitioner may pass whether the impediment is a procedural bar ... оr ... expiration of the statute of limitations.” See McQuiggin v. Perkins, 569 U.S. 383, 386, 133 S. Ct. 1924, 1928 (2013). But actual innocence claims are “rarely successful.” Schlup v. Delo, 513 U.S. 298, 324 (1995); see also Perkins, 133 S. Ct. at 1928. This is particularly so in cases like this one, where McAbee knowingly and voluntarily pled guilty. In fact, this case may be the epitome of the “rarely successful” observation.
McAbee claims he is actually innocent because he lacked the requisite mens rea. He says he could not have knowingly possessed the images or video found in the unallocated space of his computer (Count 1) because this space cannot be accessed without the use of special forensic software. He relies on United States v. Schaefer, where we noted in a footnote that the district court had not convicted Schaefer (after a bench trial) for possеssing the images found in the unallocated space of his computer because (1) the government offered no evidence showing he knew the computer contained the images and therefore there was no evidence he had control over them; and (2) even if he possessed those images at one time, the government did not establish that hе possessed them during the time frame charged in the indictment. 501 F.3d 1197, 1199 n.5 (10th Cir. 2007), overruled on other grounds by United States v. Sturm, 672 F.3d 891 (10th Cir. 2012); see also United States v. Flyer, 633 F.3d 911, 919-20 (9th Cir. 2011) (reversing possession of child pornography conviction—government presented no evidence Flyer knew of the images found in his computer‘s unallocated space or that he had the forensic software required to ac-
McAbee also claims he did not knowingly distribute the image downloaded by the agent (Count 2). He relies on a news release from the Federal Trade Commission (FTC) reporting that FrostWire, the peer-to-peer file-sharing program McAbee used (at least in this case), agreed to settle FTC charges that it misled its consumers into believing their files were not being shared with others, when in fact, they were.
But unlike the defendants in Schaefer and Flyer who went to trial, McAbee pled guilty. Thus the high hurdle he faces in showing actual innocence becomes even higher. See Tollett v. Henderson, 411 U.S. 258, 267 (1973) (“When a criminal defendant has solemnly admitted in open court that he is in fact guilty of thе offense with which he is charged, ... [h]e may only attack the voluntary and intelligent character of the guilty plea....“).
During the plea colloquy, he admitted to the elements of the offenses, including that he knowingly possessed child pornography on or about November 7, 2011, and knowingly distributed child pornography on or about September 19, 2011. He was told that to act “knowingly” a person must “know what they‘re doing, acting voluntarily and not because of mistake, accident, or some innocent reason.” (D. Ct. Doc. 38 at 19.) He was also told that possession can be sole, joint, or constructive but defined each to require “the ability to control an object.” (Id.) Importantly, he admitted to having installed a file-sharing software program (FrostWire) on his computer and he offered no objection when, in detailing the factual basis for the distribution charge, the government explained: “Mr. McAbee certainly understood how the file-sharing software worked. He understood the files were being shared from his computer to other computers that were using the same type software.” (Id. at 22 (emphasis added).) Thе judge found McAbee to be competent and his guilty pleas to be knowing and voluntary. His admission of guilt to Counts 1 and 2 belie late blooming claims of not knowingly possessing and distributing child pornography. See O‘Bryant v. Oklahoma, 568 Fed. Appx. 632, 637 (10th Cir. 2014) (unpublished) (“[In addressing an actual innocence claim,] we may take into account the fact that the petitioner‘s conviction was based on a guilty plea predicated on the petitioner‘s representations of competence and voluntariness, and findings by the court.“); Johnson v. Medina, 547 Fed. Appx. 880, 885 (10th Cir. 2013) (unpublished) (“While [Johnson] claims that his guilty plea was involuntary and coerced, the state courts rejected that argument, and his plea of guilty simply undermines his claim that another individual committed the crime to which he pled guilty.“).4
Finally, “actual innocence means factual innocence, not mere legal insufficiency.” Bousley v. United States, 523 U.S. 614, 623 (1998) (quotation marks omitted). Both Schaefer and Flyer involved the latter. And neither case establishes McAbee‘s claimed innocence. Additionally, McAbee‘s claimed inability to access the images and video in his computer‘s unallocated space without special software says nothing of his ability to possess those items when they were on his computer‘s hard drive or that he did not possess them “[o]n or about November 7, 2011” or distribute them “[o]n or about September 19, 2011,” the time frames alleged in the indictment.6 (D. Ct. Doc. 1 at 1.) He makes no claim and provides no evidence of having purchased a used computer, others having had aсcess to his computer, or his computer having been infected with malware.
Similarly, the press release does not demonstrate he did not knowingly distribute child pornography—while FrostWire may have misled its consumers, McAbee has not set forth any evidence showing he was so misled. Moreover, “[a] defendant‘s placement of child pornography files into a shared folder accessible to other users [is] itself sufficient for the trier of fact to conclude that the defendant had ‘distributed’ the material.” United States v. Dunn, 777 F.3d 1171, 1175 (10th Cir. 2015); see also United States v. Shaffer, 472 F.3d 1219, 1223-24 (10th Cir. 2007) (while defendant “may not have actively pushed pornography” on other users of the file-sharing program, “he freely allowed them access to his computerized stash of images and videos and openly invited them to take, or download, those items“; this is
In the end, McAbee‘s actual innocence claim comes down to this—not that he is in fact innocent but rather that the government did not show he knowingly possessed and distributed child pornography. But while the government would have carried the burden of proof at a trial, he bears the burden to show he is in fact actually innocent by pointing to some new evidence demonstrating so. Schlup, 513 U.S. at 327 (burden is on petitioner to establish actual innocence). None of the evidence he points to is new or exculpatory and none of it overcomes his knowing and voluntary guilty plea.
B. Statutory Tolling
McAbee tells us his motion is timely filed under
McAbee‘s ineffective assistance claims are based on counsel‘s failure to alert him to Schaefer and Flyer and for not discovering the FTC‘s press release. But Schaefer and Flyer were decided in 2007 and 2011, respectively. He does not explain in his COA application why he did not discover these cases prior to July 27, 2014. Moreover, “[§ ] 2255(f)(4) speaks to discovery of facts supporting a claim, not a failure to appreciate the legal significance of those facts.” United States v. Collins, 364 Fed. Appx. 496, 498 (10th Cir. 2010) (unpublished). McAbee knew on the date of his plea that the images and video were found in the “unallocated space” of his computer. See supra n.5. While Schaefer and Flyer may have helped him understand the legal significаnce of those historical facts, that is insufficient under
As to the press release, McAbee claims that hе asked his stepfather to send him his FrostWire user agreement in early May 2015. Instead, his stepfather sent him the press release. He received it on May 26, 2015. He claims he could not have discovered it earlier because he was incarcerated. But the press release is dated a month before his arrest and incarceration. And he admits his stepfathеr was able to discover it in a 30-minute basic Internet search. Moreover, he provides no explanation for why it took him until May 2015 to request his user agreement, which led to the discovery of the press release. This is not due diligence under
So there is no misunderstanding: none of McAbee‘s arguments offer grounds upon which reasonable jurists might disagree as to the prоpriety of the result reached by the district judge. Since he
We DENY a COA and DISMISS this putative appeal.
Notes
When files are “deleted” from a computer, they are not actually erased from the hard drive. They are just reconfigured so they can be overwritten with new data. Both empty space on the hard drive and reconfigured (deleted) files make up what is called “unallocated space.”
“Unallocated space” is space on a hard drive that contains deleted data, usually emptied from the operating system‘s trash or recycle bin folder, that cannot bе seen or accessed by the user without the use of forensic software. Such space is available to be written over to store new information. Even if retrieved, all that can be known about a file in unallocated space (in addition to its contents) is that it once existed on the computer‘s hard drive. All other attributes—including when the file was creаted, accessed, or deleted by the user—cannot be recovered. United States v. Flyer, 633 F.3d 911, 918 (9th Cir. 2011); see also United States v. Haymond, 672 F.3d 948, 952 n.8 (10th Cir. 2012) (“The unallocated space of a computer‘s hard drive consists of files which do not have a formal file structure and can include deleted files. It is where deleted data is stored before it is then overwritten with new data.” (quotation marks omitted)).
