UNITED STATES of America, Plaintiff-Appellee, v. Brett SWENSON, Defendant-Appellant.
No. 07-8097.
United States Court of Appeals, Tenth Circuit.
June 25, 2009.
751
James C. Anderson, U.S. Attorneys Office, Cheyenne, WY, for Plaintiff-Appellee.
Leon Schydlower, Schydlower Harbour, El Paso, TX, for Defendant-Appellant.
Before HENRY, Chief Judge, McWILLIAMS, Senior Circuit Judge, and GORSUCH, Circuit Judge.
ORDER AND JUDGMENT*
NEIL M. GORSUCH, Circuit Judge.
Brett Swenson appeals his convictions for receipt, possession, and attempted distribution of child pornography. The government concedes error with respect to
At trial, the government contended that Mr. Swenson used a peer-to-peer networking application, “Limewire,” to receive, possess, and distribute child pornography. Once installed on a computer, Limewire allows a user to search for, download, and share various types of files over the Internet with other users of the Limewire application. With the program, a user can input search terms, such as the name of a file or subject matter, and receive in response a list of matching files being shared by computers connected to the Limewire network. The user may then select for download a desired file from the list and connect to the computer sharing the file to obtain it. The user can also share files with others by placing files in a computer folder designated for sharing, although this sharing feature is elective and may be disabled. See generally United States v. Shaffer, 472 F.3d 1219, 1221-22 (10th Cir. 2007) (describing operation of peer-to-peer networking applications).
The evidence produced at trial showed that, in September 2006, Special Agent Flint Waters, a member of the Wyoming State Criminal Investigation Division, located a computer in Casper, Wyoming offering child pornography files for download via Limewire. In total, the computer made available for download 608 files, 16 of which were known images of child pornography and several others of which bore names consistent with child pornography. Agent Waters personally downloaded six child pornography files from the Casper computer. In the process of the download, Agent Waters was able to capture the computer‘s IP address.
With the help of a public website, Agent Waters determined that the IP address was owned by Qwest Communications. He then asked Nicole Balliett, Senior Special Agent with Immigration and Customs Enforcement, to serve a summons on Qwest asking the company to release subscriber information related to the IP address. In response to that summons, Qwest reported that the IP address was associated with Mr. Swenson and his residence in Casper. FBI Special Agent Todd Scott then obtained a search warrant authorizing a search of Mr. Swenson‘s home.
Agents executing the warrant found a computer in the office area of Mr. Swenson‘s house that was then in the process of downloading three files from Limewire. The download was in response to the search terms “sweet krissy” and “lsh,” and each of the files contained child pornography. Agents seized the computer, and a forensic examination later unearthed over 2,000 images of child pornography stored on the hard drive, including 1,988 still images and 80 video clips.
At the conclusion of trial, the jury was charged with rendering verdicts on three counts: (1) attempted distribution of child pornography (
We begin with count two, the receipt charge, because there the parties agree. The indictment charged Mr. Swenson with unlawful receipt of a single digital image. Because this case was tried under a predecessor version of
Count one, attempted distribution, is another story. The indictment on this count, unlike on count two, was not restricted to a single digital image, and thus the government was free to prove that any image of child pornography its agent had downloaded from Mr. Swenson‘s computer in September 2006 traveled in interstate or foreign commerce. See
Unlike how it proceeded under the receipt charge, on the attempted distribution charge the government did not rely on the assumption that a file downloaded from the Internet must have traveled interstate. Instead, on this count, the government provided testimony from one of its agents that at least one image Mr. Swenson made publicly available for file sharing bore the words “Photo by Carl,” and was “consistent with the Carl series that‘s being distributed out of South America” that the agent was familiar with from other child pornography investigations. Vol. IV, at 137-38. A reasonable jury could (even if it need not) conclude from this evidence that, for the image to wend its way from South America to Wyoming, it had traveled in interstate or foreign commerce—such that, in Section 2252A(a)(2)‘s then-operative terms, Mr. Swenson had attempted to distribute “child pornography that has been mailed, or shipped or transported in interstate or foreign commerce by any means, including by computer.” See, e.g., United States v. Clawson, 831 F.2d 909, 913 (9th Cir. 1987) (fact that firearm had been manufactured in Germany was sufficient to prove that it had moved in interstate commerce); United States v. Gann, 732 F.2d 714, 724 (9th Cir. 1984) (same). This case, then, is the “typical[ ]” case where “the evidence of the interstate element . . . can be gleaned from the record” evidence, and
Besides his sufficiency challenge, Mr. Swenson also challenges the district court‘s jury instructions on count one. This challenge, too, centers on the then-operative interstate commerce element of
We come finally to count three, the possession charge. Here again Mr. Swenson‘s appeal can be for plain error only, and here again no such error exists. Under the version of
