UNITED STATES of America, Plaintiff-Appellee, v. Paul STANLEY, Defendant-Appellant.
No. 12-4572.
United States Court of Appeals, Fourth Circuit.
Submitted: June 6, 2013. Decided: July 19, 2013.
325
Before DUNCAN and WYNN, Circuit Judges, and HAMILTON, Senior Circuit Judge.
Affirmed by unpublished PER CURIAM opinion.
Unpublished opinions are not binding precedent in this circuit.
PER CURIAM.
This appeal arises from Paul Stanley‘s conviction by a jury of three counts related to child pornography—for transportation, receipt, and possession of child pornography, in violation of
I.
We first consider Stanley‘s argument that Agent Crystal Gilmer, a computer forensic examiner with the Maryland State police, should not have been permitted to testify as an expert regarding her forensic examination of Stanley‘s laptop computer. Stanley asserts that Agent Gilmer possessed insufficient specialized knowledge or skill in the software programs used to extract data from Stanley‘s computer, and failed to offer testimony regarding the reliability of the forensic tools used in the examination.
We review the district court‘s decision to admit expert testimony for abuse of discretion and will not find an abuse unless a ruling is “arbitrary and irrational.” United States v. Cloud, 680 F.3d 396, 401 (4th Cir.2012), cert. denied, U.S., 133 S.Ct. 218, 184 L.Ed.2d 112 (2012); United States v. Dorsey, 45 F.3d 809, 812 (4th Cir.1995).
During her expert testimony, Agent Gilmer explained the process she used to examine Stanley‘s laptop, utilizing multiple forensic tools. These tools included a forensic software program called EnCase, which she used to make a “mirror” image of Stanley‘s computer in order to examine its contents without risking damage to the original. Agent Gilmer‘s examination revealed that Stanley had downloaded and installed a peer-to-peer file sharing program called FrostWire onto his laptop. Agent Gilmer also discovered that the FrostWire program had been used to search for and download child pornography, as well as to view, keep, and share child pornography files.
We conclude that the district court did not abuse its discretion in admitting Agent Gilmer‘s expert testimony on these facts. Assessing the first of
As for the factual basis and reliability of the testimony, the district court acted well within the wide bounds of its discretion. During the lengthy voir dire that included several rounds of cross-examination, the district court heard considerable evidence regarding Agent Gilmer‘s education, training, experience, and knowledge of the forensic tools and procedures she utilized, as well as detailed explanations of her use of the forensic software in this particular case. Agent Gilmer also explained that the forensic tools she used to examine the contents of Stanley‘s laptop had been accepted as reliable procedures by her law enforcement agency. Having heard all of this evidence and the defense‘s objections, the district court permitted the government to proceed with its examination of Agent Gilmer as an expert in “computer examination and analysis.” J.A. 204.
We find the record more than adequately supports the district court‘s determination that Agent Gilmer‘s testimony was based on sufficient facts and data, and was reliable.
II.
We turn next to Stanley‘s arguments regarding the sufficiency of the evidence, reviewing the district court‘s denial of a motion for judgment of acquittal de novo. United States v. Penniegraft, 641 F.3d 566,
A.
Stanley first argues that the evidence presented cannot support his child pornography convictions. We disagree.
Stanley was charged and convicted of transportation, receipt, and possession of child pornography under a statute that criminalizes, in pertinent part, the following activities:
(1) knowingly ... transport[ing] ... using any means [of interstate commerce], including by computer, any child pornography;
(2) knowingly receiv[ing] ... any child pornography [or material that contains child pornography] that has been [transported in interstate commerce], including by computer; or ...
(5) ... (B) knowingly possess[ing], or knowingly access[ing] with intent to view, any ... material that contains an image of child pornography that has been [transported in interstate commerce], including by computer[.]
We decline Stanley‘s invitation to find that downloading, storing, and sharing images using a peer-to-peer program on one‘s computer cannot establish knowing receipt, possession or transportation of child pornography. We have held that “use of a peer-to-peer file-sharing program qualifies as distribution” in the context of a sentencing enhancement for distribution of child pornography. United States v. Layton, 564 F.3d 330, 335 (4th Cir.2009). Thus, “[w]hen knowingly using a file-sharing program that allows others to access child pornography files, a defendant commits an act related to the transfer of [child pornography].” Id. (internal quotation marks omitted). The same rationale applies to transportation, receipt, and possession of child pornography as defined by
Furthermore, the evidence supports the jury‘s finding that Stanley possessed the requisite knowledge of his actions for each of the child pornography convictions. In affirming the sufficiency of the evidence to support a defendant‘s conviction for receipt of child pornography, we have reasoned that “whether a defendant knew that images viewed online would be saved to his computer is a close question only where there is some indication that the images were saved there without his knowledge.” United States v. Johnson, 523 Fed.Appx. 219, 222-23, 2013 WL 1767640, at *3 (4th Cir. Apr. 25, 2013). Here, as in Johnson, the government presented ample evidence of Stanley‘s intent and awareness of his illegal acts. According to Agent Gilmer‘s testimony, 570 files had been available for sharing at the time Stanley‘s laptop was seized, all of which were saved in the folder designated for saving and sharing files, entitled “C:/Users/Paul/shared.” J.A. 261. Upon opening the FrostWire shared folder, it prominently displayed the following warning: “You are sharing 570 files. You can control which files FrostWire shares.” J.A. 238. The government introduced evidence of common search terms associated with child pornography, which were included in many of the file names found on the laptop. Agent Gilmer also testified that dur
In addition to this abundance of evidence that Stanley had repeatedly sought and viewed child pornography, and was on notice that these files were being shared with others through the FrostWire program, the jury also heard testimony about Stanley‘s attempt to destroy his laptop by placing it under running water in the shower after officers informed him that they were investigating his involvement in child pornography activities. From this evidence, particularly when viewed in the light most favorable to the government, a rational jury could have concluded beyond a reasonable doubt that Stanley knowingly transported, received, and possessed child pornography, in violation of the charged provisions of
We thus conclude that substantial evidence supports Stanley‘s child pornography convictions.
B.
Finally, Stanley argues that insufficient evidence supports his conviction for obstruction of justice. Again, Stanley‘s argument lacks merit.
To sustain a conviction for obstructing a federal proceeding, the government was required to prove that Stanley “corruptly ... alter[ed], destroy[ed], mutilate[d], or conceal[ed] a record, document, or other object, or attempt[ed] to do so, with the intent to impair the object‘s integrity or availability for use in an official proceeding.”
The government presented evidence that the Internet Crimes Against Children Task Force (the “Task Force“) was conducting an online undercover investigation into individuals using peer-to-peer networks to traffic child pornography. In the course of this investigation, officers identified an internet protocol (“IP“) address which they linked to Stanley. When Task Force officers arrived at Stanley‘s residence, they identified themselves and informed Stanley that they were pursuing an investigation into child pornography activities. Stanley asked if he could go back into the residence to get dressed, at which point he went into the basement and woke his roommate, Brian Pease, telling him that “[t]he cops are here for my computer.” J.A. 191. When Pease got out of bed a few minutes later, he found Stanley‘s laptop in the shower under running water, and removed it. Meanwhile, Stanley returned to the door and advised the Task Force officers that he no longer had possession of the laptop because he had given it to a friend when it stopped working six months earlier. Task Force officers subsequently obtained a search warrant for Stanley‘s residence, and recovered the laptop Stanley had placed in the shower.
Again viewing this evidence in the light most favorable to the government, we find it more than sufficient to allow a reasonable juror to determine beyond a reasonable doubt that Stanley attempted to destroy or conceal his laptop in order to impair its availability for use in an official proceeding.*
III.
Accordingly, we affirm Stanley‘s convictions. We dispense with oral argument because the facts and legal contentions are adequately presented in the materials before this court and argument would not aid the decisional process.
AFFIRMED.
