UNITED STATES OF AMERICA, Plaintiff-Appellee, v. Timothy Wayne BECKETT, a.k.a. chelzzz420zzz, a.k.a. 2*cute*for*school, a.k.a. yesurifnotcuter, Defendant-Appellant.
No. 09-10579
United States Court of Appeals, Eleventh Circuit.
March 9, 2010.
Kathleen M. Salyer, U.S. Attorney‘s Office, Lisa T. Rubio, Miami, FL, for Plaintiff-Appellee.
Before HULL, WILSON and ANDERSON, Circuit Judges.
PER CURIAM:
On appeal, Beckett argues, first, that the district court erred by denying his renewed motion to suppress subscriber information collected as a result of law enforcement‘s “exigent circumstances” letters to: internet service providers1 (“ISPs“) and phone companies2. Beckett alleges that these exigent circumstances letters violated the terms of the Electronic Communications Privacy Act (“ECPA“), specifically
I.
Beckett developed a scam to coerce young boys into having sexual relations with him. First, he created a fake MySpace account that appeared to belong to a 17 year old girl named Chelsea. He then contacted four underage boys through MySpace and America OnLine Instant Message (“AIM“), posing as Chelsea. After extensive online conversations as Chelsea, Beckett would send the boys nude and semi-nude photos of a young girl that was supposedly Chelsea. Beckett then convinced the boys to send nude photos of themselves. It was at this point that Beckett would tell the boys that he was actually a man and threaten to disperse the nude photos over the internet, to their friends and family, if the boys did not agree to engage with him in sexual relations.
Beckett contacted JH in the summer of 2007 when JH was 17 years old. After receiving nude photos of JH, Beckett suggested that they meet for oral sex. When JH refused Beckett told him that he was a man and offered an ultimatum: either allow Beckett to perform oral sex on him or else Beckett would send the nude photos of JH to all JH‘s friends on MySpace. In a panic, JH offered Beckett hundreds of dollars to leave him alone. Beckett continued to insist on oral sex and JH notified the authorities.
CL fell victim to the same scam and informed his parents who then contacted the Boyton Beach Police. Detective Athol opened an investigation after reading the AIM conversation between CL and Beckett. Det. Athol listened to a phone message for CL from the suspect. Det. Athol would later recognize the voice as Beckett‘s, when meeting with him after arrest.
CH was engaged by Beckett and ultimately sent nude pictures of himself after considerable coaxing. Beckett then posed as the brother of Chelsea and picked CH up at his house, with CH believing that Beckett was taking him to meet Chelsea. After driving to WalMart and cashing his paycheck, Beckett propositioned CH in his car. Beckett convinced CH to take off his shirt and expose his genitals for money. The car was stopped by the police for a traffic infraction, but Beckett threatened CH to keep him from speaking to the police. After CH returned home, Beckett continued to threaten releasing the nude photos if CH did not meet with him again.
MG engaged in a very lengthy online conversation with Beckett, who he believed to be a 17 year old girl named Chelsea. MG sent Beckett nude photos of himself and then quickly found out that Beckett was a man. Beckett threatened to send the photos to MG‘s friends if he did not meet with him for oral sex. However, MG turned the tables on Beckett, threatening to turn over his IP address to an attorney and the authorities. Beckett attempted to send the photos back to MG and then quickly disconnected from the online conversation.
Det. Athol was contacted by the National Center for Missing and Exploited Children to investigate the incident with JH. Det. Athol turned the investigation over to Det. Collins at the Palm Beach Sheriff‘s Office. While investigating the CL case, Det. Athol noticed that the suspect‘s screen name, “yesurifnotcuter“, was the same as the suspect‘s screen name in the JH case. Det. Collins and Athol sent information requests related to the screen name to America Online (“AOL“) and Comcast. They subsequently received information concerning the connection logs
A warrant was obtained for the search of Beckett‘s house, detectives seized computers and computer related media, and Beckett was taken into custody. Upon search of the computer, the police discovered a plethora of child pornography and evidence connecting the computer to conversations with CH, CL, and MG.
Beckett moved to suppress the evidence collected from written requests to the ISPs and the phone companies. The district court denied his motion. Beckett also moved to suppress the evidence discovered during the search of his home computer and the district court denied this motion as well. Beckett now appeals the denial of these motions and the sufficiency of the evidence presented at trial.
II.
A. The Motions to Suppress Were Properly Denied by the District Court
A ruling on a motion to suppress presents “a mixed question of law and fact.” United States v. Steed, 548 F.3d 961, 966 (11th Cir. 2008) (per curiam). We accept the district court‘s factual findings unless they are clearly erroneous, construing all facts in the light most favorable to the prevailing party below. Id. In order for a factual finding to be clearly erroneous, we “must be left with a definite and firm conviction that a mistake has been committed” after reviewing all of the evidence. United States v. Rodriguez-Lopez, 363 F.3d 1134, 1137 (11th Cir. 2004) (quotation omitted). The district court‘s application of the law to the facts is reviewed de novo. Steed, 548 F.3d at 966.
1. Investigators Properly Obtained Information from the ISPs and Phone Companies
The ECPA provides that law enforcement only may require disclosure of subscriber information under certain, limited circumstances, including when there is (1) a warrant, (2) a court order, (3) consent of the subscriber, or (4) an administrative subpoena.
Beckett argues that the government obtained information from the ISPs and phone companies in violation of
The ECPA does not statutorily provide for suppression of evidence obtained as a result of violations of the Act. United States v. Steiger, 318 F.3d 1039,
The Fourth Amendment provides that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated....”
“In order to have evidence suppressed based on a violation of the Fourth Amendment, a claimant has the burden of proving (1) that the search was unlawful and (2) that the claimant had a legitimate expectation of privacy.” United States v. McKennon, 814 F.2d 1539, 1542 (11th Cir. 1987) (per curiam) (citation omitted). To establish a reasonable expectation of privacy in the object of a challenged search, the defendant must show (1) that he manifested “a subjective expectation of privacy” in that item, and (2) a willingness by society “to recognize that expectation as legitimate.” Id. at 1543.
The U.S. Supreme Court “consistently has held that a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Smith v. Maryland, 442 U.S. 735, 743-44 (1979). Beckett could not have had a reasonable expectation of privacy in the information that was obtained from the ISPs and the phone companies.3 The investigators did not recover any information related to content. Rather, the information consisted of the identifying information transmitted during internet usage and phone calls that is necessary for the ISPs and phone companies to perform their services. It is unreasonable for Beckett to have been unaware that such information was being transmitted to the ISPs and phone companies and so he “assumed the risk that the company would reveal to police the [information].” Smith, 442 U.S. at 744 (“When he used his phone, petitioner voluntarily conveyed numerical information to the telephone company and ‘exposed’ that information to its equipment in the ordinary course of business.“). Accordingly, we affirm in this respect.
2. Investigators Did Not Exceed Their Warrant When They Searched the Contents of Beckett‘s Computer
Search warrants must be based on “probable cause, supported by Oath or af
Contrary to Beckett‘s assertions, the government did not exceed the bounds of the search warrant when they searched the contents of his computers. The affidavits attached to the application for a search warrant of Beckett‘s house and computers adequately described the objective of the search. The investigation centered around allegations that Beckett had contacted minors through the internet and on his home computer in efforts to have the minors transmit nude photographs of themselves. The search warrant affidavit explained that a computer and its drives can store thousands of pages of information and that the pertinent information can be stored in any part of the computer under any title or heading. The warrant described with adequate particularity the items to be searched and the objectives of the search. We find that the search of Beckett‘s computers did not exceed the extent of the warrant. Accordingly, we affirm in this respect.
B. The Evidence Presented at Trial Was Sufficient to Sustain All of Beckett‘s Convictions
We review the sufficiency of the evidence de novo. United States v. Garcia-Bercovich, 582 F.3d 1234, 1237 (11th Cir. 2009). We consider the evidence “in the light most favorable to the jury verdict, and draw all reasonable inferences and credibility determinations in favor of the Government.” United States v. Ellisor, 522 F.3d 1255, 1271 (11th Cir. 2008). “[I]t is not necessary that the evidence exclude every reasonable hypothesis of innocence or be wholly inconsistent with every conclusion except that of guilt, provided that a reasonable trier of fact could find that the evidence established guilt beyond a reasonable doubt.” United States v. Merrill, 513 F.3d 1293, 1299 (11th Cir. 2008) (quotation omitted).
“To sustain a conviction for the crime of attempt, the government need only prove (1) that the defendant had the specific intent to engage in the criminal conduct for which he is charged and (2) that he took a substantial step toward commission of the offense.” United States v. Murrell, 368 F.3d 1283, 1286 (11th Cir. 2004).
One is guilty under
who employs, uses, persuades, induces, entices, or coerces any minor to engage in ... any sexually explicit conduct for the purpose of producing any visual depiction of such conduct or for the purpose of transmitting a live visual depiction of such conduct ... if such person knows or has reason to know that such visual depiction will be transported or transmitted using any means or facility of interstate or foreign commerce or in or affecting interstate or foreign commerce or mailed, if that visual depiction was produced or transmitted using materials that have been mailed, shipped, or transported in or affecting interstate or foreign commerce by any means, including by computer, or if such visual depiction has actually been transported or transmitted using any means or facility of interstate or foreign commerce or in or affecting interstate or foreign commerce or mailed.
To demonstrate a violation of
We have read the briefs and examined the record and find no merit to Beckett‘s arguments regarding the sufficiency of the evidence. First, the evidence was sufficient to establish that Beckett knowingly possessed child pornography because: (1) the child pornography was on Beckett‘s computer; (2) it was contained in an organized fashion in folders titled “porn;” and (3) it was stored under the user name “Timmy” (as in Timothy Beckett). See United States v. Miller, 527 F.3d 54, 67 (3d Cir. 2008) (listing factors to determine whether a defendant knowingly possesses child pornography). Second, the evidence was sufficient to show that Beckett enticed the victims to create and send pornographic photos because Beckett employed the same tactics on all four victims and ended up receiving the same result, a nude photo of the minor. Beckett‘s planned actions show that he had specific intentions and was well aware of the type of activity his conversations with the minors implied. Third, Beckett‘s argument that there was insufficient evidence of coercion because the minors were willing to engage in the activity, is baseless. Beckett posed as a 17 year old girl in order to produce the responses from his victims. Further, after receiving the nude photos of the victims he threatened them in an effort to force them
Based on our review of the record and consideration of the parties’ briefs, we affirm the District Court‘s denial of Beckett‘s motions to dismiss and affirm Beckett‘s convictions.
AFFIRMED.
