UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JORY MICHAEL NANCE, Defendant - Appellant.
No. 13-6188
United States Court of Appeals, Tenth Circuit
September 23, 2014
PUBLISH
Appeal from the United States District Court for the Western District of Oklahoma (D.C. No. 5:12-CR-00267-HE-1)
Brandon T. Hale, Assistant United States Attorney (Sanford C. Coats, United States Attorney and Chris M. Stephens, Assistant United States Attorney, with him on the brief), Oklahoma City, Oklahoma, for Plaintiff-Appellee United States of America.
Before BRISCOE, Chief Judge, EBEL, and MATHESON, Circuit Judges.
EBEL, Circuit Judge.
A jury convicted Defendant-Appellant Jory Nance of multiple counts of transporting child pornography and receiving or attempting to receive child pornography. He challenges those convictions, contending 1) the district court erred in admitting evidence of his uncharged bad acts under
I. BACKGROUND
Viewed in the light most favorable to the Government, see United States v. Battles, 745 F.3d 436, 453 (10th Cir. 2014), the evidence at trial established the following. Using peer-to-peer file-sharing software, Nance downloaded child pornography on his laptop computer from sometime in 2009 through April 2012. He also used this software to share child pornography with others, including an Edmond, Oklahoma detective who was able to download eight files containing child pornography from Nance during March and April 2012. This resulted in the United States charging Nance with eight counts of transporting child pornography, in violation of
The detective turned the child pornography she had obtained from Nance over to FBI agents, who began watching Nance‘s home, where he lived with his wife, their two-year-old son, and his wife‘s five-year-old daughter. After Nance noticed one of the agents outside his home, he stopped downloading child pornography and began deleting it from his laptop; he also researched how to reformat his computer. Shortly thereafter, FBI agents seized Nance‘s laptop. At that time, Nance acknowledged that he was the only one who used the laptop, but told agents, falsely,
The FBI conducted a forensic analysis of Nance‘s laptop. Although Nance had superficially deleted most of the child pornography from the laptop, the FBI was able to recover 1,000 previously-deleted images of child pornography, mostly involving preteen girls. The FBI was also able to recover the names of a number of deleted files, although the images linked to those files were not recoverable. In addition, the computer‘s automatic logs had documented the searches Nance conducted on peer-to-peer networks using terms associated with child pornography. These logs also had chronicled when Nance downloaded the images and files of child pornography that the FBI recovered from his computer, as well as when Nance watched this pornography. Based on its forensic analysis, the United States charged Nance with multiple counts of receiving or attempting to receive child pornography, in violation of
Nance‘s defense at trial was that he did not know about the child pornography on his computer and that it must have been there as the result of computer viruses or hackers. The jury rejected that defense and convicted Nance of eight counts of transporting child pornography and forty-nine counts of receiving or attempting to receive child pornography.1 The district court sentenced Nance to a total of sixty-four months in prison on these convictions, followed by five years’ supervised release.
II. DISCUSSION
A. The district court properly admitted evidence of Nance‘s uncharged bad acts under Federal Rule of Evidence 404(b)(2)
Nance first challenges the district court‘s decision to admit evidence of his other, uncharged bad acts, including evidence that
- his laptop contained over 1,000 previously-deleted images, pictures, and videos of child pornography;
- Nance used his computer, at a time when he claimed it was inoperable, to access the website www.purenudism.com; and
- two years before the charged offenses, Nance viewed two videos with file names indicating they contained child pornography.2
1. District court‘s ruling
Nance challenges the district court‘s decision to admit this evidence under
Although “[t]he rules of evidence generally prohibit the admission of evidence for the purpose of showing a defendant‘s propensity to commit bad acts,”
Unlike
In the ruling Nance challenges on appeal, the district court determined that the evidence of his uncharged other bad acts was admissible in this case under
2. The district court did not abuse its discretion in admitting this evidence under Rule 404(b)(2)
Nance challenges the district court‘s decision to admit the evidence of his uncharged bad acts under
Nance first complains about the seeming inconsistency between the district court‘s determination that the other bad acts evidence at issue here was too unfairly prejudicial to be admitted under
In arguing that that decision was an abuse of discretion, Nance challenges only the district court‘s determination that the
The evidence at issue was clearly probative under
Despite the probative value of this evidence,
Nance goes on to contend that the only purpose for which jurors actually could have considered the Government‘s
We cannot say that the district court abused its discretion in refusing to exclude this evidence under
B. There was sufficient evidence to support Nance‘s convictions for attempting to receive child pornography
Nance next challenges his forty-two convictions for attempted receipt of child pornography, Counts 16-40 and 43-59 (the “attempt accounts“), asserting there was insufficient evidence to support them. “We review this claim de novo, asking only whether taking the evidence—both direct and circumstantial, together with the reasonable inferences to be drawn therefrom—in the light most favorable to the government, a reasonable jury could find the defendant guilty beyond a reasonable doubt.” Battles, 745 F.3d at 453 (internal quotation marks omitted).
The attempt counts were based on computer files that Nance deleted, for which the Government was able to recover the file names, but not any of the images associated with the files. For example, in support of Count 22, the Government presented evidence that, on January 22, 2012, Nance downloaded a file named “PTHC
Nance argues that a reasonable jury could not convict him on the attempt counts without the Government proving that each of the downloaded files actually contained child pornography. But Nance did not object when the district court instructed jurors that,
[i]n counts 9 through 59, to prove that defendant attempted to knowingly receive visual depictions of minors engaged in sexually explicit conduct, the government does not have to prove that defendant knew the downloaded file actually contained a visual depiction of a minor engaging in sexually explicit conduct. Rather, the government must prove beyond a reasonable doubt that the defendant believed that the downloaded file contained such a visual depiction.
(Id. at 244) And Nance does not object to that instruction on appeal. In any event, that instruction was proper. “While the underlying offense in this case requires the receipt of images of real-life minors engaged in sexually explicit conduct, the government in an ‘attempt’ case has no burden to prove that the appellant knew that the downloaded file actually contained such images. Rather, the government is required to prove that the appellant believed that the received file contained such images.” United States v. Pires, 642 F.3d 1, 8 (1st Cir. 2011) (citing United States v. Bauer, 626 F.3d 1004, 1007 (8th Cir. 2010); further citation omitted).
There was sufficient evidence from which a rational jury could have found beyond a reasonable doubt that Nance believed that the files underlying the attempt counts contained child pornography. Each of the attempt counts resulted from an Internet search that Nance conducted using search terms that are connected to child pornography, including “pthc,” meaning “preteen hard core,” “stickam,” “vichatter,” “kidcam,” and “preteen.” As a result of these searches, Nance found and downloaded the files underlying the attempt counts, each with a title suggesting it contained child pornography. The title of each of those files included a girl‘s name, the terms preteen or “pthc” or “lol” (short for Lolita6), and/or a specific age between six and thirteen years old; for example, “(pthc) loli Linda 12yo” (Aplt. App. at 319 (count 16)).7 Some of the file names are much more graphic, for example, “PTHC_Tara fucked like a grownup.” (Id. (count 21).) The names of each of these files would support a reasonable jury‘s finding beyond a reasonable doubt that Nance believed the files contained child pornography. See United States v. Fabiano, 169 F.3d 1299, 1306 (10th Cir. 1999) (relying, in part, on evidence of graphic titles of files to uphold conviction for knowingly receiving child pornography).
The circumstances surrounding Nance‘s downloading these files further supports
In arguing to the contrary, Nance unpersuasively likens his case to United States v. Dobbs, 629 F.3d 1199 (10th Cir. 2011). In Dobbs, the Government failed to prove that the defendant had knowingly received or attempted to receive two images of child pornography found on the hard drive of his computer. 629 F.3d at 1200. But those two images were found only in the hard drive‘s “temporary Internet files folder, or ‘cache.‘”
[W]hen a person visits a website, the web browser automatically downloads the images of the web page to the computer‘s cache. The cache is populated with these images regardless of whether they are displayed on the computer‘s monitor. In other words, a user does not necessarily have to see an image for it to be captured by the computer‘s automatic-caching function. . . . [T]here was no evidence that Mr. Dobbs actually viewed the charged images, much less clicked on, enlarged, or otherwise exercised actual control over any of them. Furthermore, while the forensic specialist explained that a user may manipulate and control an image stored in the computer‘s cache, he repeatedly admitted that there was no evidence that Mr. Dobbs had accessed his computer‘s cache, or that he even knew it existed.
Here, unlike in Dobbs, the files underlying the attempt counts were not found in the hard drive‘s cache, nor were they “received” without Nance‘s knowledge. Instead, the evidence established that Nance obtained these files after using peer-to-peer software to search deliberately for child pornography, which he then intentionally downloaded. See United States v. Haymond, 672 F.3d 948, 955-57 (10th Cir. 2012) (distinguishing Dobbs and upholding
For these reasons, then, there was sufficient evidence to support Nance‘s convictions on the attempt counts.
III. CONCLUSION
For the foregoing reasons, we AFFIRM all of Nance‘s convictions.
Notes
1) Prior to trial, the Government notified Nance that it intended to present testimony from its computer expert that he had recovered 1,000 previously-deleted images of child pornography from Nance‘s computer. Nance objected because those images had not been linked to him. After hearing argument, the district court ruled that the Government could present this evidence to the jury under
2) Prior to trial, the Government also notified Nance that it intended to present evidence that, on May 12, 2012, after he had noticed the FBI watching his home and had stopped downloading child pornography, and at a time when he claimed that his computer was inoperable, Nance used his laptop to access the website purenudism.com. Nance objected because the content of the purenudism.com website, photos of naked children, is not pornographic. (The Government does not contend that it is.) The district court allowed this evidence under
THE COURT: [Exhibits] 104 through 110 will be admitted. But, ladies and gentlemen, I would advise you, at the outset I explained to you that there would be some types of evidence that might come in for only a limited purpose, you may consider it only for a limited purpose. I would advise you that this evidence which you‘re about to see in terms of these images to the extent that they relate to any circumstances other than those alleged in the indictment, or other than downloads or files referred to in the indictment, they are admitted for the limited purpose as they may bear on the defendant‘s intent or motive, or at least with respect to - - well, essentially with respect to intent or motive. So please evaluate the evidence only for that purpose and not for another.
(Id. at 637.) And, prior to jurors’ deliberations, the court again gave a limiting instruction:
You have heard evidence as to materials allegedly found on defendant‘s computer relating to actions or conduct not related to the specific charges in this case. As I indicated at the time that evidence was admitted, you may consider that evidence only as it bears on the defendant‘s motive, opportunity, or intent, but for no other purpose.
(Id. at 238.)
3) Prior to trial, the Government notified Nance that it intended to present evidence that, almost two years before the charged offenses occurred, he had viewed two specific files: “HotLols-Artesia 006,” viewed as early as July 5, 2010, and “stickam-2010 13 yo hot skinny bt,” viewed on September 9, 2010. (Id. at 30.) Nance objected because the laptop had not been linked exclusively to him during these times. The district court permitted the Government to present this evidence under
We would mention one final category of evidence. At one point in his opening brief, Nance seems to challenge, the admission of the Government‘s Exhibits 101 through 103, which are files recovered from his computer that contain child pornography not linked to any specific offense charged against him. At trial, defense counsel expressly told the trial judge he had no objection to the admission of these three exhibits.
