United States v. Russell Hudson Cullen ( 2019 )


Menu:
  •          Case: 17-14913   Date Filed: 11/21/2019   Page: 1 of 11
    [DO NOT PUBLISH]
    IN THE UNITED STATES COURT OF APPEALS
    FOR THE ELEVENTH CIRCUIT
    ________________________
    No. 17-14913
    ________________________
    D.C. Docket No. 4:16-cr-10043-KMM-1
    UNITED STATES OF AMERICA,
    Plaintiff–Appellee,
    versus
    RUSSELL HUDSON CULLEN,
    Defendant–Appellant.
    ________________________
    Appeal from the United States District Court
    for the Southern District of Florida
    ________________________
    (November 21, 2019)
    Case: 17-14913        Date Filed: 11/21/2019      Page: 2 of 11
    Before MARTIN, TJOFLAT, and PARKER, * Circuit Judges.
    PER CURIAM:
    Appellant Russell Hudson Cullen appeals from a judgment of conviction in
    the United States District Court for the Southern District of Florida. We assume
    familiarity with the facts, procedural history, and issues on appeal.
    BACKGROUND
    The Department of Homeland Security (“DHS”) uses the Child Protection
    System (“CPS”) investigative software to search the internet for computers that
    contain child pornography. CPS uses keywords associated with child pornography,
    searches the internet, and downloads files that it finds. It then keeps a large database
    of known child pornography videos’ “hash values,” which are unique indicators
    associated with each individual video. According to expert testimony at trial, CPS
    identified hundreds of hash values corresponding to child pornography that had been
    downloaded through Shareaza—a peer-to-peer sharing software—to multiple IP
    addresses associated with Cullen.           Some of these files had been downloaded
    completely while others had been downloaded only partially. In January 2016,
    Special Agent Elliott Graves requested an image of child pornography from Cullen’s
    IP address and the associated computer automatically sent him the file. In March
    *
    Honorable Barrington D. Parker, United States Circuit Judge for the Second Circuit,
    sitting by designation.
    2
    Case: 17-14913     Date Filed: 11/21/2019   Page: 3 of 11
    2016, DHS obtained a warrant and searched Cullen’s residence.             The agents
    retrieved an Asus laptop computer and a LaCie external hard drive.
    When the Cyber Crimes Center extracted the contents of the LaCie hard drive,
    they found various documents bearing Cullen’s name as well as child
    pornography—specifically a video of two young girls displaying their genitalia. The
    video had been found in “unallocated space” in the hard drive, which means that it
    had been previously deleted. Special Agent Daniel Kenney was able to play the
    recovered video and, at trial, two screenshots from the video were introduced into
    evidence. A forensic analyst determined that the Asus laptop had been reformatted
    multiple times, relegating certain files to unallocated space on the laptop. From this
    space, Lumbert retrieved four images depicting child pornography. Lumbert found
    an additional 14 images in a “cache file” that had been created after a thumb drive
    was inserted into the computer to upload files.
    Cullen was charged with one count of accessing with intent to view, two
    counts of possession, and one count of distribution of child pornography. Cullen
    proceeded to and testified at trial. His defense was that he had been addicted to adult
    pornography for many years but had never searched for child pornography on any
    of his computers. He testified that he would download thousands of video files in
    bulk, searching only for adult pornography, and then open them later to sift through
    potential options. He admitted that he downloaded and viewed child pornography
    3
    Case: 17-14913    Date Filed: 11/21/2019    Page: 4 of 11
    but explained that he had done so by accident. When that occurred, he would delete
    the files, and in instances where the pornography was particularly shocking, he
    would immediately reformat his computer to remove any trace of the files from his
    computer. Cullen also testified that he had never allowed any type of sharing of
    pornography from his computer and that he had “deselected” all files that could be
    shared, thus ensuring that none of them were available for download by other
    Shareaza users. He testified that he had no idea how agents were able to obtain child
    pornography from his computer.
    During trial, Agent Kenney identified the LaCie hard drive that was seized
    from Cullen’s home, but he noted that the hard drive serial number he recalled
    differed from the serial number noted on the Government’s exhibit list.           He
    nevertheless testified that he “absolutely” recognized it both by the serial number on
    the hard drive itself and the external case that accompanied it. The court, over
    Cullen’s objection, admitted the hard drive. In February 2017, the jury found Cullen
    guilty on all counts.
    Probation determined that Cullen’s base offense level was 22.                 It
    recommended a multitude of enhancements, increasing the offense level to 37. In
    particular, two levels were added for the knowing distribution of child pornography
    and five levels were added because the offense involved 600 or more images of child
    pornography. Because Cullen had no criminal history points, his offense level of 37
    4
    Case: 17-14913     Date Filed: 11/21/2019   Page: 5 of 11
    corresponded to a guidelines range of 210 to 262 months. He also faced a mandatory
    minimum sentence of five years and an authorized maximum sentence of 80 years.
    Cullen argued that he did not knowingly distribute child pornography. He also
    argued that only one video (which corresponded to 75 images) and 18 photographs—
    93 images in total—were involved in his offense conduct, and thus only a two-level
    and not a five-level enhancement was warranted. The District Court rejected both
    arguments and sentenced Cullen to 240 months’ imprisonment, adopting the
    recommendation of the Probation Office. In addition, the Court stated on the record
    that it would have imposed the same sentence had only the two-level and not the
    five-level enhancement properly applied.
    DISCUSSION
    Sufficiency of Evidence
    The reversal of a conviction for insufficient evidence is warranted only if no
    reasonable jury could find proof of guilt beyond a reasonable doubt. United States
    v. Thomas, 
    8 F.3d 1552
    , 1556 (11th Cir. 1993).
    Possession and Access
    The evidence that Cullen possessed and accessed child pornography was
    overwhelming. Child pornography was found in unallocated space on his computer
    and hard drive and an investigation of Cullen’s computer indicated that a thumb
    drive had been used to upload additional pornographic images onto his computer.
    5
    Case: 17-14913    Date Filed: 11/21/2019    Page: 6 of 11
    Further, full and partial downloads of hundreds of child pornography videos and
    images were linked to a series of IP addresses all associated with Cullen. We find
    this evidence sufficient to support his convictions.
    Distribution
    In United States v. Carroll, 
    886 F.3d 1347
     (11th Cir. 2018), which involved
    peer-to-peer sharing software, a jury convicted the defendant of distributing child
    pornography after he had downloaded hundreds of images and videos from a peer-
    to-peer sharing platform called Ares. 
    Id. at 1349
    . Ares functions in the same way
    as Shareaza, the peer-to-peer software in this case:
    When downloaded, Ares sets up a shared folder on the computer where,
    by default, it automatically places all subsequent downloads. Once a
    file is placed in the shared folder, it is immediately available for further
    dissemination. Unless an Ares user changes the default settings or
    deliberately moves files out of the shared folder, downloaded files will
    remain freely accessible to anyone else on the Ares network . . . .
    
    Id. at 1350
    .
    We reversed the conviction in Carroll based on insufficient evidence because
    “[n]othing in the record demonstrate[d] that Carroll intended to share files or that he
    was even aware that the contents of his Ares folder were automatically distributed
    to the peer-to-peer network.” 
    Id. at 1353
    . We rejected the Government’s argument
    that the defendant “was guilty of knowing distribution simply because he was using
    a peer-to-peer file sharing program and ‘that is what it is.’” 
    Id. at 1353
    . We
    explained that “the fact that files were automatically shared from [the defendant’s]
    6
    Case: 17-14913     Date Filed: 11/21/2019    Page: 7 of 11
    Ares folder, without some evidence of his awareness of it, cannot carry the
    government’s burden to prove knowing distribution beyond a reasonable doubt.” 
    Id.
    at 1353–54. The basis of our reasoning was that “Ares, by default, installs a shared
    folder, automatically places downloaded files into that folder, and distributes all
    contents of the shared folder to anyone else on the Ares network without prompting
    the user—even when the user is away from his computer.” 
    Id. at 1354
    . In response
    to the Government’s argument that “it would be impossible for an individual to use
    a peer-to-peer file sharing program and lack a full understanding of its operations,”
    we noted that it was “unwise to adopt such a sweeping rule in this fact-sensitive
    context, where the mechanics of each peer-to-peer program may bear on the issue of
    knowledge in different ways.” 
    Id.
    Generally, courts should be cautious in their approach to distribution charges
    brought in the peer-to-peer software context. Peer-to-peer software runs on the
    sharing of downloaded files. If users do not proactively disable all sharing upon
    installing the software, their files will be shared indefinitely without their awareness
    and even when they have stepped away from their computer. The software also
    intentionally makes it difficult for the average user to manage which of their files
    are being shared at any given moment, often obscuring instructions for disabling
    sharing, as is the case with Shareaza. Given the nature of this software, courts should
    7
    Case: 17-14913     Date Filed: 11/21/2019   Page: 8 of 11
    focus with particular care on whether distribution on peer-to-peer software was done
    knowingly.
    In this case, however, Carroll does not compel a reversal because Cullen
    testified that he understood how Shareaza’s automatic sharing function operated.
    Specifically, the Government, in cross-examination, asked Cullen: “You talked
    about—I know you have used file-sharing for a long time, and you’ve talked about
    when you first used file-sharing devices all that time ago. You learned that when
    you set it up you had to deselect folders? Do you remember that?” In response,
    Cullen answered, “Absolutely, have to, have to.” Furthermore, without prompting,
    Cullen stated: “But always, always, always make sure . . . [to] deselect every
    [downloaded file] because if you leave even one up, there are people with software
    [who] will be able to access all of your computer. This is what I was told.” Based
    on Cullen’s statements evincing an understanding of Shareaza’s automatic sharing
    features and the testimony from Graves that he successfully downloaded child
    pornography from Cullen’s IP address, we find the evidence sufficient to support
    Cullen’s conviction.
    Admissibility of LaCie Hard Drive
    We review for an abuse of discretion the District Court’s rulings on the
    admissibility of evidence. United States v. Shabazz, 
    887 F.3d 1204
    , 1216 (11th Cir.
    2018). “To satisfy the requirement of authenticating or identifying an item of
    8
    Case: 17-14913     Date Filed: 11/21/2019    Page: 9 of 11
    evidence, the proponent must produce evidence sufficient to support a finding that
    the item is what the proponent claims it is.” Fed. R. Evid. 901.
    Cullen argues that the testifying witness, Kenney, could not identify the LaCie
    hard drive seized during the execution of the search warrant. To be sure, Kenney
    noticed that the serial number on the hard drive did not include the last four digits of
    the serial number listed on the Government’s exhibit list. Notwithstanding the
    confusion as to the serial number, the District Court did not abuse its discretion in
    admitting the hard drive. Kenney was able to identify the hard drive by its external
    casing and was able to identify most of the digits on the serial number. He also
    testified that he was “absolutely” certain that the hard drive offered into evidence
    was the same hard drive as was seized from Cullen’s home. Kenney’s identification,
    taken together with the evidence that the hard drive contained child pornography
    along with Cullen’s tax form, Cullen’s resume, and Cullen’s job application,
    demonstrates that the Government produced “evidence sufficient to support a
    finding that the item is what the proponent claims it is.” See Fed. R. Evid. 901.
    Sentencing Enhancements
    “We review a district court’s choice of sentence . . . for abuse of discretion,
    determining if the sentence was procedurally in error or substantively unreasonable.
    United States v. Trapp, 396 F. App’x 671, 672 (11th Cir. 2010). “When the
    government seeks to apply an enhancement under the Sentencing Guidelines over a
    9
    Case: 17-14913    Date Filed: 11/21/2019   Page: 10 of 11
    defendant’s factual objection, it has the burden of introducing ‘sufficient and
    reliable’ evidence to prove the necessary facts by a preponderance of the evidence.”
    United States v. Washington, 
    714 F.3d 1358
    , 1361 (11th Cir. 2013).
    Knowing Distribution
    The Guidelines authorize a two-level enhancement “if the defendant
    knowingly engaged in distribution.” U.S.S.G. § 2G2.2(b)(3)(F). For the reasons
    discussed above, the District Court did not abuse its discretion in imposing a two-
    level enhancement, given that Cullen admitted to fully understanding Shareaza’s
    automatic sharing features.
    Number of Images Involved in the Offense
    The Guidelines authorize a five-level enhancement if the offense involved
    “600 or more images.” U.S.S.G. § 2G2.2(b)(7)(D). In determining the number of
    images, “[e]ach video, video-clip, movie, or similar visual depiction shall be
    considered to have 75 images.” Id. cmt. app. n. 6(B)(ii).
    Cullen argues that his offense involved only the 18 images and one video
    recovered from his laptop—a total of 93 images under the Guidelines. Cullen thus
    argues that he should have only received a two-level enhancement because his
    offense involved “fewer than 150” images. See U.S.S.G. § 2G2.2(b)(7)(A). The
    District Court, however, considered 27 videos that were fully downloaded to IP
    addresses associated with Cullen as reflected on the CPS database. These 27 videos
    10
    Case: 17-14913    Date Filed: 11/21/2019   Page: 11 of 11
    corresponded to 2,025 images under the Guidelines, but they had never actually been
    found on Cullen’s devices.       Still, the Government has demonstrated, by a
    preponderance of evidence, that these videos were involved in Cullen’s offense.
    They were linked to his IP addresses, they matched the hash values for known child
    pornography, and they had been fully downloaded into his computer. While they
    were not found on the physical devices seized from his home, the District Court
    reasonably inferred that Cullen had deleted them, especially given his testimony that
    he routinely reformatted his computer. The District Court thus did not abuse its
    discretion in imposing the five-level enhancement.
    CONCLUSION
    We have considered Cullen’s remaining arguments and find them to be
    without merit. For the foregoing reasons, the judgment is AFFIRMED.
    11
    

Document Info

Docket Number: 17-14913

Filed Date: 11/21/2019

Precedential Status: Non-Precedential

Modified Date: 11/21/2019