UNITED STATES of America, Plaintiff-Appellee, v. William CONNER, Defendant-Appellant.
No. 12-3210
United States Court of Appeals, Sixth Circuit.
April 11, 2013
711 F.3d 493
CONCLUSION
For the reasons set out above, we AFFIRM the district court‘s judgment.
ROGERS, J., concurring and dissenting.
In my view, it was clearly erroneous to conclude that the defendant, in the circumstances of this case, attempted to commit a “willful, deliberate, malicious, and premeditated killing.”
JULIA SMITH GIBBONS, Circuit Judge.
A jury convicted William Conner of four counts of receipt of visual depictions of child pornography and one count of possession of child pornography. The district court sentenced him to 360 months in prison. Conner argues on appeal that the district court erred by concluding that he did not have a reasonable expectation of privacy in files he made publicly available on the LimeWire “peer-to-peer” file-sharing service and finding that Conner‘s crimes “involved ... distribution” under the Sentencing Guidelines because of his use of LimeWire. For the following reasons, we affirm the district court‘s judgment.
I.
A.
LimeWire is a computer file-sharing program that any user could download for free over the Internet at the time the events in this case took place. As the Ninth Circuit recently explained,
LimeWire and similar рrograms connect network participants directly and allow them to download files from one another. To download a file, a LimeWire user opens the application and inputs a search term. LimeWire then displays a list of files that match the search terms and that are available for download from other LimeWire users. When a user downloads a file using the LimeWire network, he or she causes a digital copy of a file on another user‘s computer to be transferred to his оr her own computer.
United States v. Flyer, 633 F.3d 911, 913 (9th Cir.2011) (citation omitted). This ability to download a file directly from another user‘s personal computer is known as “peer-to-peer” file sharing.
B.
Marcus Penwell, a Franklin County Sheriff‘s Department deputy and a member of the county‘s multi-jurisdictional Crimes Against Children Task Force, used LimeWire on a daily basis to monitor child pornography possession and distribution. His work computer had a modified version of LimeWire that automatically searched for files bearing names associated with child pornography, but the modified software did not provide him with greater access to the files of LimeWire users than a standard user would have. On September 12, 2010, Penwell identified a computer connected to LimeWire that was making “hundreds of files with titles indicative of child pornography” available for download. Penwell connected to the computer, downloaded some of the files, and found that they contained child pornography. He recorded the IP address and GUID of the computer in question and sent a subpoena to Insight Communications (“Insight“), the ISP that issued the IP address, to determine the location of the computer sharing the files. Insight provided Penwell with the address of Bobby Lawwell. Penwell successfully accessed files from this computer a second time on October 24, 2010, and obtained a warrant to search Lawwell‘s home based on the files and the information provided by Insight on November 4.
When Penwell and a team of sheriff‘s deputies arrived at the residence to execute the warrant on November 5, Lawwell met them at the front door of the house. She explained that she lived in the house with her children, and that Conner, her uncle, lived in an apartment in the garage аt the rear of the residence. The deputies found Conner in the garage apartment, and he permitted them to walk through it to perform a protective sweep. They observed a desktop computer and monitor in the apartment. While other deputies stayed at the residence, Penwell obtained a second warrant to search the apartment due to concern that the separate residence would not be covered by the initial warrant. Penwell returned to thе house later that day to execute the new search warrant.
Deputies retrieved Conner‘s computer and numerous compact disks from the apartment. A forensic search of these items revealed numerous child pornography images. The forensic examination also indicated that the day before the deputies executed the search warrant, Conner reinstalled the operating system on his computer. This process confined the child pornography files to “unаllocated” space on the computer‘s hard drive that is inaccessible to most users, although this space can be accessed with advanced computer forensic tools used by criminal investigators. The examination also confirmed that
Lawwell also told the deputies that Conner‘s daughter and ex-girlfriend had accused him of sexual molestation. Penwell arranged to meet with the two women on November 11, 2010. The daughter told Penwell that Conner had repeatedly raped her between the ages of five and nine years old and had made a pornographic video of her using a VHS video camera when she was six years old. Penwell again contacted Lawwell, and Lawwell confirmed that Conner had VHS recording equipment and tapes in his apartment. Penwell obtained another search warrant, and sheriff‘s deputies seized a cache of VHS tapes in Conner‘s apartment. Among the tapes seized was a pornographic video of Conner‘s daughter that matched the description she gave to Penwell.
C.
The government charged Conner with four counts of receipt of visual depictions of child pornography,
Prior to his sentencing hearing, Conner reasserted his right to counsel. The presentence report рrepared for Conner calculated an offense level of 42, including a two-point enhancement for an offense that “involved ... [d]istribution” under Sentencing Guideline
II.
When a defendant appeals the denial of a suppression motion, this court reviews the district court‘s factual findings for clear error and its legal determinations de novo. United States v. Martin, 526 F.3d 926, 936 (6th Cir.2008). “A factual finding will only be clearly erroneous when, although there may be evidence to support it, the reviewing court on the entire evidence is left with the definite and firm conviction that a mistake has been committed.” United States v. Navarro-Camacho, 186 F.3d 701, 705 (6th Cir.1999). Because
Conner asks us to find that he had a “legitimate expectation of privacy” in the images he made available for sharing on LimeWire. In order to do so, we must answer two questions in the affirmative: First, we ask whether the individual, by his conduct, has exhibited an actual expectation of privacy; that is, whether he has shown that “he [sought] to preserve [something] as private.” ... Second, we inquire whether thе individual‘s expectation of privacy is “one that society is prepared to recognize as reasonable.” Bond v. United States, 529 U.S. 334, 338 (2000) (alterations in original) (quoting Smith v. Maryland, 442 U.S. 735, 740 (1979)). Conner‘s argument fails because his expectation of privacy is not “one that society is prepared to recognize as reasonable.”
Generally speaking, computer users have a reasonable expectation of privacy in data stored on a home computer. Guest v. Leis, 255 F.3d 325, 333 (6th Cir.2001). Conner argues that under United States v. Warshak, 631 F.3d 266 (6th Cir.2010) (en banc), third-party access to information on one‘s computer is consistent with a reasonable expectation of privacy in that information. In Warshak, we agreed that the government could not compel a commercial ISP to turn over the contents of a subscriber‘s e-mails without a warrant because subscribers “enjoy[] a reasonable expectation of privacy in the contents of emails,” even though an ISP has the ability to view the contents of e-mail prior to delivery. Id. at 288. In the context of e-mail, ISPs are “the functional equivalent of а post office or a telephone company,” and like an ISP, both of these entities have the ability to intrude on the contents of messages in the course of delivering them to their intended recipients. Id. at 286. Since the right or ability of third parties to intrude on phone calls and letters has not been deemed sufficient to defeat a reasonable expectation of privacy in those modes of communication, we agreed that “it would defy common sense to afford emails lessеr Fourth Amendment protection” than telephone calls or letters. Id. at 285-86.
Warshak does not control this case because peer-to-peer file sharing is different in kind from e-mail, letters, and telephone calls. Unlike these forms of communication, in which third parties have incidental access to the content of messages, computer programs like LimeWire are expressly designed to make files on a computer available for download by the public, including law enforcement. Peer-to-peer software users are not mere intermediaries, but the intended recipients of these files. Public exposure of information in this manner defeats an objectively reasonable expectation of privacy under the Fourth Amendment. Katz v. United States, 389 U.S. 347, 351 (1967) (“What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.“); see also California v. Greenwood, 486 U.S. 35, 40-41 (1988) (finding no reasonable expectation of privacy in “plastic garbage bags left on оr at the side of a public street,” which are accessible by “members of the public” and left on the curb “for the express purpose of conveying [them] to a third party, the trash collector“).
Conner responds that he did not know the files he downloaded from LimeWire would be publicly accessible. To prove
Furthermore, Conner‘s assertions of ignorance are not supported by the record. Penwell downloaded images from Conner‘s computer twice over a month-long period, meaning that the images were available on Conner‘s computer for a significant period of time. Conner‘s sister, Sandra Conner-Lewingdon, testified at trial that Lawwell had shown her and Conner how to use LimeWire to search for music files being shared by other users. The forensic examination of Conner‘s computer confirmed that he was using LimeWire to download child pornography images from other users and storing those images in files used for sharing over LimeWire. The sheer number of files that were available for download—“hundreds,” according to Penwell—belies Conner‘s purported ignorance in how the softwarе worked. Finally, Conner concedes that while he made an effort to take some files off of his computer, he took no affirmative steps to limit the ability of other LimeWire users to access the files in his folder, despite a reasonably high level of competency with computers. “To argue that [Conner] lacked the technical savvy or good sense to configure LimeWire to prevent access to his pornography files is like saying that he did not know enough to close his drapеs,” and the district court did not err by rejecting Conner‘s assertions of ignorance. United States v. Ganoe, 538 F.3d 1117, 1127 (9th Cir.2008).
Sister circuits that have taken up this question uniformly hold that there is no reasonable expectation of privacy in files the government obtained using peer-to-peer sharing services like LimeWire. United States v. Stults, 575 F.3d 834, 843 (8th Cir.2009) (“One who gives his house keys to all of his friends who request them should not be surprised should some of them open the door without knocking.“); Ganoe, 538 F.3d at 1127; United States v. Perrine, 518 F.3d 1196, 1205 (10th Cir. 2008). In line with these opinions, we agree that the district court properly declined to suppress the files Penwell downloaded from Conner‘s computer and the fruits of the investigation that emanated from those files.
III.
A district court‘s sentencing decision is reviewed for both procedural and substantive reasonableness. United States v. Bolton, 669 F.3d 780, 781 (6th Cir.2012). Conner challenges the calculation of his offense level under the Sentencing Guidelines, which implicates procedural reasonableness. This court reviews the district court‘s factual findings on sentencing issues for clear error and its legal interpretation of the Sentenсing Guidelines de novo. United States v. Brown, 579 F.3d 672, 677 (6th Cir.2009). When courts interpret the Guidelines, they may apply
The Sentencing Guidelines for child pornography offenses mandate a two-level increase in the offense level if the offense conduct “involved ... [d]istribution.”
A.
A defendant‘s offense conduct “involve[s] ... distribution” under section
The definition of “distribution” provided by the Guidelines is silent as to the requisite state of mind with which the “act ... related to the transfer of material” must be conducted. In the context of a criminal statute, this silence would permit the court to imply that the defendant must commit such an act knowingly. See United States v. X-Citement Video, Inc., 513 U.S. 64, 71-72 (1994) (noting that courts may “presume a scienter requirement in the absence of express contrary intent” when interpreting statutes “akin to the common-law оffenses against the ‘state, the person, property, or public morals‘” (quoting Morissette v. United States, 342 U.S. 246, 255 (1952))). While a presumption of “knowing” conduct is not always warranted when interpreting the Guidelines, it is appropriate here. “Distribution” of contraband is “akin to common-law offenses,” and as such, a defendant should have to knowingly perform an “act ... related to the transfer of material” to trigger this enhancement. The example at the end of the Guideline‘s definition of “distribution” confirms this reasoning, since a defendant who “рost[s] material ... on a website for public viewing” performs a knowing act. We agree with the government‘s position that a knowing “act ... related to the transfer of material” is sufficient to satisfy section
Conner argues that the Guidelines require proof of an “intent to distribute,” but the language of section
We agree with the government that knowing use of LimeWire, much like the posting of a file on a website, is sufficient to trigger section
Unique among courts that have addressed this issue, the Eighth Circuit has held that the presumption that users of peer-to-peer software understand they are sharing files with others can be rebutted by the defendant. The Dodd court reсognized that “[a]bsent concrete evidence of ignorance—evidence that is needed because ignorance is entirely counterintuitive—a fact-finder may reasonably infer that the defendant knowingly employed a file sharing program for its intended purpose.” Id. In United States v. Durham, 618 F.3d 921 (8th Cir.2010), the Eighth Circuit relied on this language to reverse a district court‘s imposition of the “distribution” enhancement on a defendant that used peer-to-peer software. The defendant in Durham showed that another person had installed file-sharing software on the defendant‘s computer. Id. at 932. Moreover, he demonstrated that he did not know how to use the program and “was not knowledgeable regarding the program‘s capabilities.” Id. The court found that these extenuating circumstances comprised “concrete evidence of ignorance” under Dodd. Id. at 928-32; but see id. at 937-43 (Gruender, J., concurring in part, dissenting in part, and announcing the judgment of the court in part) (criticizing the majority‘s application of Dodd). No other circuit has taken up the issue of whether the section
Conner argues that we should follow Durham and reverse the district court‘s imposition of the section
Since the record only bolsters the sound presumption that users of file-sharing software understand others can access their files, the district court properly imposed the sectiоn
B.
Conner also argues that the court should have reduced his offense level by two levels under section
IV.
For these reasons, we affirm the judgment of the district court.
JULIA SMITH GIBBONS
UNITED STATES CIRCUIT JUDGE
