United States v. Clarke ( 2020 )


Menu:
  •      18-1569
    United States v. Clarke
    1                             UNITED STATES COURT OF APPEALS
    2                                 FOR THE SECOND CIRCUIT
    3
    4                                       August Term, 2019
    5
    6             (Argued: October 3, 2019                   Decided: October 29, 2020)
    7
    8                                      Docket No. 18-1569-cr
    9                             _____________________________________
    10
    11                                UNITED STATES OF AMERICA,
    12
    13                                            Appellee,
    14
    15                                               v.
    16
    17                                     FERNANDO CLARKE,
    18
    19                                      Defendant-Appellant.
    20                              _____________________________________
    21
    22   Before:
    23                             WALKER, LEVAL, and CARNEY, Circuit Judges.
    24
    25          Defendant Fernando Clarke appeals his criminal convictions following
    26   a jury trial in the United States District Court for the Eastern District of New
    27   York (Spatt, J.) on four counts of receipt of child pornography, one count of
    28   possession of child pornography, and two counts of transportation of child
    29   pornography. The evidence showed that Clarke downloaded child
    30   pornography files on a peer-to-peer file sharing network, thus making those
    31   files available to be downloaded by other users on the network, and that
    32   government agents downloaded two video files from his computer. Clarke
    33   was convicted on all counts and sentenced to a 120-month prison term.
    34   AFFIRMED.
    35
    36                                               ALLEGRA GLASHAUSSER, Federal
    37                                               Defenders of New York, Inc., New York,
    1                                           NY, for Defendant-Appellant Fernando
    2                                           Clarke.
    3
    4                                           ALLEN L. BODE (Jo Ann M. Navickas, on
    5                                           the brief), for Seth DuCharme, United
    6                                           States Attorney for the Eastern District
    7                                           of New York, Brooklyn, NY.
    8
    9   LEVAL, Circuit Judge:
    10         Defendant Fernando Clarke appeals from a judgment of conviction
    11   entered by the United States District Court for the Eastern District of New
    12   York (Spatt, J.) after a jury trial finding him guilty of several child
    13   pornography offenses. The evidence showed that Clarke downloaded child
    14   pornography files to his computer, employing BitTorrent, an Internet peer-to-
    15   peer file-sharing network, and kept those files in a folder where they were
    16   available to be downloaded by other users of the network. Government
    17   agents identified Clarke’s computer on the network, downloaded child
    18   pornography from his computer to theirs, and on that basis obtained a search
    19   warrant. The search of his computer revealed thousands of images of child
    20   pornography. Clarke was charged with four counts of receipt of child
    21   pornography, one count of possession of child pornography, and two counts
    22   of transportation of child pornography on the Internet, a means or facility of
    2
    1   interstate commerce. The two counts of transportation were based on two
    2   instances in which government agents downloaded a video file from the
    3   defendant’s computer. After trial, Clarke was convicted of all counts and
    4   sentenced to a 120-month prison term.
    5         On appeal, Clarke challenges (1) the evidentiary basis and jury
    6   instructions for his conviction on the transportation counts; (2) the district
    7   court’s denial of discovery of the Government’s law enforcement software
    8   used to identify him and to download child pornography from his computer;
    9   (3) the procedural and substantive reasonableness of his sentence. We affirm
    10   his conviction and sentence.
    11                                   BACKGROUND
    12         In 2015, federal agents of the Department of Homeland Security’s
    13   Homeland Security Investigations (“HSI”) unit were investigating child
    14   pornography crimes on Long Island. Using a software developed for law
    15   enforcement use called “Torrential Downpour,” the agents sought to identify
    16   people who were sharing particular files known to contain child pornography
    17   on the BitTorrent peer-to-peer file sharing network. The investigation
    18   revealed hundreds of illicit files that were downloaded using an Internet
    3
    1   Protocol (“IP”) address that they traced to Fernando Clarke’s residence. On
    2   that basis, the agents obtained a warrant to search Clarke’s home, where, on
    3   Clarke’s computer, they found thousands of images and videos depicting the
    4   sexual exploitation of minors.
    5         Clarke had been downloading child pornography on the Internet since
    6   at least 2012, using uTorrent, a program that runs on the BitTorrent peer-to-
    7   peer file sharing network. A peer-to-peer network allows a user to download
    8   files directly from the computers of other users in the network. In order to
    9   facilitate faster downloads, a peer-to-peer program often downloads
    10   fragments of the desired file from many different computers on the network.
    11   By using such a program to obtain the files of others on the network, a user
    12   makes it possible for others to obtain his files. See App’x at 54 (Testimony of
    13   Richard Branda) (BitTorrent is “a peer-to-peer network where a person’s
    14   computer is able to share files that are on other people’s computer drives and
    15   hard drive[s]. And in doing so, you’re opening up your computer to be
    16   shared from as well.”). On uTorrent, as on most BitTorrent programs, any file
    17   a user has downloaded to his computer is automatically accessible to others
    18   on the network when the user’s computer is connected to the Internet. A
    4
    1   user’s downloaded files are placed in a folder on his computer where other
    2   users of the online network can download and view them.1
    3         HSI executed the search warrant at Clarke’s home on July 28, 2015 and
    4   arrested him that same day. While agents searched the house, Clarke waived
    5   his Miranda rights and was interviewed by HSI investigator Richard Branda.
    6   The interview was not audio or video recorded, but Branda and another HSI
    7   agent, Debra Gerbasi, took notes. According to testimony at trial, Clarke
    8   admitted that his computer contained child pornography files, including
    9   videos and still images involving children between the ages of seven and ten.
    10   Clarke and Branda also discussed the functioning of uTorrent. Branda asked
    1 For a general description of peer-to-peer networks, see Metro-Goldwyn-Mayer
    Studios Inc. v. Grokster, Ltd., 
    545 U.S. 913
    , 919–20 (2005) (In a peer-to-peer
    network, “users’ computers communicate directly with each other, not
    through central servers. . . . Because they need no central computer server to
    mediate the exchange of information or files among users, the high-
    bandwidth communications capacity for a server may be dispensed with, and
    the need for costly server storage space is eliminated. Since copies of a file
    (particularly a popular one) are available on many users’ computers, file
    requests and retrievals may be faster than on other types of networks, and
    since file exchanges do not travel through a server, communications can take
    place between any computers that remain connected to the network without
    risk that a glitch in the server will disable the network in its entirety. Given
    these benefits in security, cost, and efficiency, peer-to-peer networks are
    employed to store and distribute electronic files by universities, government
    agencies, corporations, and libraries, among others.”).
    5
    1   Clarke “if he knew that by using that peer-to-peer program, that he was
    2   essentially sharing files of child pornography,” because “his computer was
    3   open to others.” App’x at 55, 87. According to Branda, Clarke responded that
    4   “he knew that that was the case, but it wasn’t his intent and he knew how the
    5   peer-to-peer programs work.”
    Id. at 55.
    Clarke also told Branda that he
    6   “thought if a file was complete that he downloaded, that it was not sent back
    7   out,”
    id. at 59,
    a statement which the Government portrayed to the jury as
    8   demonstrating that Clarke knew, at the very least, that he was sharing files
    9   while in the process of downloading them.
    10         The Government also introduced circumstantial evidence tending to
    11   show that Clarke, when using the uTorrent program, could have seen
    12   information on his screen showing him that his files were being downloaded
    13   by others. For example, the analysis of Clarke’s laptop showed that Clarke
    14   could have clicked on an “Info” tab while downloading files and seen how
    15   many users were simultaneously receiving the file from him. There is no
    16   evidence, however, that Clarke accessed the pages displaying such
    17   information about the sharing of his files, nor that uTorrent warned its users
    6
    1   that under the default program settings, the sharing of downloaded files was
    2   automatic.
    3         The superseding indictment that was in effect at trial, filed on July 19,
    4   2017, charged Clarke in seven counts, including two counts of “knowingly
    5   transport[ing]” child pornography, in violation of 18 U.S.C. § 2252(a)(1)
    6   (Counts One and Two); four counts of receipt of child pornography, in
    7   violation of 18 U.S.C. § 2252(a)(2) (Counts Three through Six); and one count
    8   of possession of child pornography, in violation of 18 U.S.C. § 2252(a)(4)(B)
    9   (Count Seven). The two counts of transportation of child pornography are
    10   based on downloads by government agents of two videos from Clarke’s
    11   computer in February and April 2015.
    12         Before trial, pursuant to Rule 16 of the Federal Rules of Criminal
    13   Procedure, Clarke requested production of the Torrential Downpour software
    14   used to identify his files. He sought a copy of the computer software program
    15   or its source code for testing and evaluation. In support of his discovery
    16   motion, Clarke attached a forensic report and affidavit from an expert, Tami
    17   Loehrs. Loehrs stated that she had investigated the Toshiba laptop that the
    18   HSI agents seized, and found files in a folder on Clarke’s external hard drive
    7
    1   that she believed was not accessible to the public via the BitTorrent network.
    2   According to Loehrs, without having a copy of the software or its source
    3   code, she could not determine whether Torrential Downpour allowed law
    4   enforcement to access non-public information on Clarke’s computer.
    5         The Government opposed the discovery motion, arguing that the
    6   defense expert’s claims were premised on a misunderstanding of how
    7   Clarke’s uTorrent program worked. The Government submitted an affidavit
    8   from a detective who had helped develop Torrential Downpour which stated
    9   that when a user downloads files on uTorrent, “each and every location [on
    10   the computer] where a user downloads file(s) . . . becomes ‘publicly shared’,”
    11   including when files are downloaded to external hard drives. Gov. App’x at
    12   97. The Government also submitted an affidavit from a law enforcement
    13   analyst who tested uTorrent and attested that files which he downloaded to
    14   an external hard drive were shared with other users. Ruling that Loehrs’s
    15   expert report was “insufficient to create an issue as to the software’s
    8
    1   reliability,” the district court denied Clarke’s discovery request. App’x at 34–
    2   35. 2
    3           The case proceeded to trial and, after both sides rested, Clarke moved
    4   for a judgment of acquittal pursuant to Federal Rule of Criminal Procedure
    5   29, arguing, with respect to the transportation counts, that he “indicated in his
    6   postarrest statements that he didn’t intend to transport child pornography,
    7   that he didn’t know he was transporting child pornography, and there was no
    8   evidence from which the jury could infer such knowledge.” App’x at 423–24.
    9   The district court denied the motion. The court also denied the defense’s
    10   request for a jury instruction that, in order to convict Clarke on the
    11   transportation counts, it must find not only that Clarke knew he was
    12   transporting visual depictions, but also that he “actively intended” to do so.
    13
    Id. at 434, 440.
    The district court instructed the jury that it could find Clarke
    14   guilty on the transportation counts “if the Government proves that the
    15   defendant . . . knowingly allowed others to access his computer equipment to
    16   obtain the visual depiction via the internet or file sharing,” Gov. App’x at 230,
    2Although the Government did not disclose Torrential Downpour or its
    source code, it provided Clarke with a forensic report and data logs with
    details of the government agents’ downloads, and provided a demonstration
    of the software to Clarke and his counsel.
    9
    1   defining “knowingly” as “voluntarily and intentionally and not because of
    2   accident, mistake or some other innocent reason.”
    Id. at 229
    –30. “It is not
    3   necessary,” the district court emphasized, “for the Government to show that
    4   the defendant personally transported or shipped the depiction.”
    Id. at 230. 5
            The jury returned guilty verdicts on all counts. The court sentenced
    6   Clarke to 120 months in prison, followed by five years of supervised release. 3
    7   It also imposed a fine of $13,682.43, representing the costs that the district
    8   court incurred when Clarke failed to show up for the first day of trial, along
    9   with a $5,000 special assessment required of nonindigent defendants by
    10   statute. See 18 U.S.C. § 3014. Clarke then brought this appeal.
    11                                    DISCUSSION
    12         On appeal, Clarke challenges (1) the sufficiency of the evidence
    13   supporting his conviction on the transportation counts, as well as the related
    3 Clarke’s 120-month sentence consists of (1) two concurrent 60-month terms
    for the transportation counts pursuant to 18 U.S.C. § 2252(a)(1); (2) four
    concurrent 60-month terms for the receipt counts pursuant to 18 U.S.C.
    § 2252(a)(2), which together run consecutively to the sentence on the
    transportation counts; and (3) a concurrent 36-month term on the possession
    count pursuant to 18 U.S.C. § 2252(a)(4)(B). Transportation and receipt of
    child pornography each carry a mandatory minimum sentence of five years,
    but do not require that the sentences run consecutively. See 18 U.S.C. §
    2252(b)(1).
    10
    1   jury instructions; (2) the district court’s refusal to compel disclosure of the
    2   Torrential Downpour software; and (3) the procedural and substantive
    3   reasonableness of his sentence.
    4         I.     The Transportation Counts
    5         Clarke challenges his convictions on Counts One and Two for
    6   transporting illicit files in violation of 18 U.S.C. § 2252(a)(1). That section
    7   makes it a crime to
    8         knowingly transport[] . . . using any means or facility of interstate or
    9         foreign commerce . . . by any means including by computer or mails,
    10         any visual depiction, if . . . the producing of such visual depiction
    11         involves the use of a minor engaging in sexually explicit conduct;
    12         and . . . such visual depiction is of such conduct.
    13
    14   The two counts correspond to two instances in which government agents,
    15   using the Torrential Downpour software, downloaded a video file from
    16   Clarke’s computer in April 2015 (Count One) and February 2015 (Count
    17   Two). In both cases, the agents testified that they downloaded the entirety of
    18   the video file from the single IP address that was then traced to Clarke’s
    19   residence.
    20         Clarke’s challenge is on three grounds. In his initial appellate briefs,
    21   Clarke raised two challenges. First, he argued that the Government did not
    11
    1   adduce sufficient evidence to allow a jury to conclude beyond a reasonable
    2   doubt that Clarke knew he was making child pornography files available to
    3   other users on BitTorrent. See 18 U.S.C. § 2252(a)(1) (prohibiting the
    4   “knowing[] transport[ation]” of child pornography) (emphasis added). In
    5   support of this point, he argued that Agent Branda’s testimony about Clarke’s
    6   acknowledgment of his comprehension of how peer-to-peer networks operate
    7   allowed for the possibility that Clarke came to understand the automatic
    8   sharing function of uTorrent only after Branda explained it to him.
    9         Second, Clarke argued that the district court erred in refusing his
    10   request to instruct the jury that, to establish Clarke’s guilt for knowingly
    11   transporting child pornography, the Government needed to prove that he
    12   “actively intended” to transport the files.
    13         Third, following oral argument, the Court directed the parties to submit
    14   supplemental briefing on a related question:
    15         Whether the government agent’s action in downloading to a
    16         government computer a file, which the defendant had placed in a
    17         folder on his computer that was accessible to other users of a peer-to-
    18         peer file sharing network, constituted a “transport[ing]” by the
    19         defendant within the meaning of 18 U.S.C. § 2252(a)(1)?
    20   See Dkt. No. 83. Clarke argued in response that the files were transported
    21   from his computer to the government agents’ computer only by the agents’
    12
    1   conduct, without participation on his part, and that such transportation of
    2   files by government actors does not satisfy the statutory requirement of
    3   transportation by the defendant.
    4         For the reasons discussed below, we conclude that sufficient evidence
    5   supported the jury’s finding of Clarke’s knowledge, that the jury instructions
    6   were not erroneous, and that, given Clarke’s prior actions in downloading
    7   child pornography on the BitTorrent file-sharing network and knowingly
    8   making those files available to be acquired by others, Clarke cannot escape
    9   liability for the transportation of his files merely because the movement of the
    10   files was effectuated in part by government actors requesting downloads
    11   from his computer to theirs.
    12      a. Sufficiency of the Evidence of Clarke’s Knowledge
    13         We turn first to whether the Government’s evidence was sufficient to
    14   show that Clarke knew that, in downloading the files to his computer, he was
    15   enabling the sharing of his files with other users. We review challenges to
    16   sufficiency of the evidence de novo, United States v. Leslie, 
    103 F.3d 1093
    , 1100
    17   (2d Cir. 1997), drawing all reasonable inferences in favor of the Government,
    18   United States v. Kozeny, 
    667 F.3d 122
    , 139 (2d Cir. 2011).
    13
    1         Clarke does not challenge the sufficiency of the evidence that he
    2   downloaded child pornography on the BitTorrent network, nor does he
    3   dispute that any files he downloaded would have automatically been made
    4   available to be downloaded by other users in the network. What he disputes
    5   is whether the evidence was sufficient to establish that he knew that his
    6   downloading of files to his uTorrent folder enabled other users of BitTorrent
    7   to download from his folder, such that the knowledge requirement of §
    8   2252(a)(1) was satisfied.
    9         We conclude that the evidence was sufficient. The evidence showed
    10   that Clarke had used the file sharing network for three years to download
    11   child pornography. According to Agent Branda’s testimony, when he
    12   interviewed Clarke, Clarke stated he understood that, by using the network
    13   to download child pornography from the computers of other BitTorrent
    14   users, he “was essentially sharing files of child pornography,” and that he
    15   “knew how . . . peer-to-peer programs work.” App’x at 55. He added,
    14
    1   according to Branda’s notes, that he agreed with Branda’s statement that “his
    2   computer was open to others.” App’x at 87. 4
    3         Clarke counters that the Branda testimony is insufficient evidence of
    4   Clarke’s knowledge because, especially as presented in Branda’s
    5   contemporaneous notes, it allows for the possibility that “[Branda] himself
    6   may have explained to Mr. Clarke how uTorrent worked before Mr. Clarke
    7   said anything about his own understanding of how uTorrent worked.” Def.’s
    8   Br. at 22 (emphasis in original). Clarke made the same argument to the jury in
    9   summation. Clarke is correct that one permissible inference from Branda’s
    10   testimony is that Clarke came to understand the operation of the program
    11   only after the agents explained it to him. But that is not the only permissible
    12   inference, and it is one the jury apparently rejected. We must credit inferences
    4These facts are sufficient to distinguish this case from United States v. Carroll,
    
    886 F.3d 1347
    (11th Cir. 2018), on which Clarke relies. In that case, the
    Government argued that the defendant “was guilty of knowing distribution
    simply because he was using a peer-to-peer file sharing program.”
    Id. at 1353.
         The Eleventh Circuit found insufficient record evidence to prove knowledge
    because “[n]othing in the record demonstrate[d] that Carroll . . . was even
    aware that the contents of his [peer-to-peer software] folder were
    automatically distributed to the peer-to-peer network.”
    Id. (emphasis added). Here,
    by contrast, the Government presented evidence of Clarke’s
    understanding of how uTorrent worked, evidence which the jury apparently
    credited.
    15
    1   that the jury could reasonably have drawn in the Government’s favor. United
    2   States v. Hassan, 
    578 F.3d 108
    , 126 (2d Cir. 2008). We therefore find legally
    3   sufficient evidence that Clarke had knowledge, at the time of his offense, that
    4   by downloading the files to his computer through the BitTorrent file-sharing
    5    network and maintaining them in a shared folder, he took steps that would
    6    result in the movement of the files via the Internet to the computers of others
    7    whenever network sharers downloaded them.
    8      b. Alleged Error in the Jury Instructions
    9         Clarke next urges that we find error in the district court’s jury
    10   instructions. The court refused to deliver Clarke’s requested jury charge that,
    11   to convict on the transportation counts, the jury needed to find that Clarke
    12   “actively intended to transport the visual depiction.” Def.’s Br. at 37 (emphasis
    13   added). He argues that an active-intent instruction was necessary in this case
    14   because, even if sufficient evidence established Clarke’s knowledge of how
    15   uTorrent worked, “there was no evidence that he took any active steps to
    16   share child pornography, and he told the agents that he did not intend to
    17   share it.” Def.’s Br. at 33–34.
    16
    1         “A jury instruction is erroneous if it misleads the jury as to the correct
    2   legal standard or does not adequately inform the jury on the law.” United
    3   States v. Walsh, 
    194 F.3d 37
    , 52 (2d Cir. 1999) (internal quotation marks
    4   omitted). We review a district court’s refusal to issue a requested jury
    5   instruction de novo. See United States v. Bah, 
    574 F.3d 106
    , 113 (2d Cir. 2009).
    6   We will not overturn a conviction by reason of a trial court’s failure to give a
    7   jury charge requested by the defendant unless the defendant shows both that
    8   (1) the charge he requested “accurately represented the law in every respect,”
    9   and (2) the delivered charge, when viewed as a whole, was erroneous and
    10   prejudicial. United States v. Nektalov, 
    461 F.3d 309
    , 313–14 (2d Cir. 2006)
    11   (quoting United States v. Wilkerson, 
    361 F.3d 717
    , 732 (2d Cir. 2004)). Clarke has
    12   not carried this burden.
    13         The court’s charge accurately represented the law. The court instructed
    14   the jury that the Government needed to prove beyond a reasonable doubt that
    15   the defendant “knowingly transported a visual depiction in interstate or
    16   foreign commerce,” and that “transportation . . . includes knowingly making
    17   child pornography files available to others via the internet or file sharing.”
    18   Gov. App’x at 230. The court further defined “knowingly” as “voluntarily
    17
    1   and intentionally and not because of accident, mistake or some other innocent
    2   reason.”
    Id. at 229
    –30. See Sand et al., 1 Modern Federal Jury Instructions—
    3   Criminal ¶ 3A.01 (2019) (“A person acts knowingly if he acts intentionally
    4   and voluntarily, and not because of ignorance, mistake, accident, or
    5   carelessness.”). The charge thus included a requirement of intention to
    6   transport and was consistent with the charge requested by the defendant,
    7   except for the defendant’s addition of the adverb, “actively,” as a modifier of
    8   the word “intended,” for which there is no legal basis.
    9         The sole authority on which Clarke based his proposed instruction
    10   requiring an “active” intention to transport was a subsequently vacated
    11   district court opinion concluding that distribution of child pornography
    12   under § 2252(a)(2) requires “an active intention to give or transfer a specific
    13   visual depiction to another person and . . . active participation in the actual
    14   delivery.” See United States v. C.R., 
    792 F. Supp. 2d 343
    , 355 (E.D.N.Y. 2011).5
    5The issue arose in C.R. because the district court questioned whether the
    defendant’s guilty plea should be accepted in view of the fact that, in the
    district court’s opinion, the defendant’s failure to allocute to having intended
    for any specific person to receive the child pornography, coupled with the
    fact that he had not “actively transmitted the material” to another person,
    meant that he had not committed the crime.
    Id. at 354.
    Despite having
    expressed this view, the court ultimately accepted the guilty plea, and in so
    18
    1   We vacated the decision on other grounds, see United States v. Reingold, 731
    
    2 F.3d 204
    (2d Cir. 2013), but held that for the purposes of the sentencing
    3    enhancement for distributing child pornography at U.S.S.G. § 2G2.2(b)(3)(F),
    4   “knowingly placing child pornography files in a shared folder on a peer-to-
    5   peer file-sharing network constitutes distribution.”
    Id. at 229
    (quoting United
    6   States v. Farney, 513 F. App’x 114, 116 (2d Cir. 2013) (summary order)). Clarke
    7   has pointed to no other authority supporting his formulation, and he has
    8   failed to explain his proposed distinction between “active” and “passive”
    9   intent. To the extent Clarke’s instruction would require more active
    10   participation in the transfer itself, numerous courts of appeals have held that
    11   knowingly making child pornography available to be downloaded by others
    12   constitutes “distribution” under § 2252(a)(2), with no additional requirement
    13   of any activity by the defendant to transfer illicit files or to participate actively
    14   in their transfer. See infra pt. I(c). Clarke has thus failed to carry his burden to
    15   show that his requested instruction “accurately represented the law in every
    16   respect.” 
    Nektalov, 461 F.3d at 314
    (quoting 
    Wilkerson, 361 F.3d at 732
    ).
    doing, apparently repudiated the court’s previously expressed view that
    “active intention” is required for a conviction under § 2252(a)(2).
    19
    1       c. Whether Clarke’s Actions Amounted to “Transportation”
    2           We next consider the related question discussed in the parties’ post-
    3    argument supplemental briefs: whether Clarke’s actions fell short of
    4    “transportation” within the meaning of § 2252(a)(1), even assuming that he
    5    acted knowingly, understanding that his files were accessible to other users
    6    through the BitTorrent network.
    7           Section 2252(a)(1) prohibits “knowingly transport[ing]” child
    8    pornography “using any means or facility of interstate or foreign
    9   commerce . . . by any means including by computer or mails.” 18 U.S.C. §
    10   2252(a)(1). The use of the Internet to move video files from Clarke’s computer
    11   to the government agents’ computer constituted transportation using a means
    12   or facility of interstate commerce within the meaning of § 2252(a)(1). 
    6 Cl. Ch. 6To
    “transport” means to move something from one place to another. See
    Transport, THE MERRIAM-WEBSTER DICTIONARY, http://merriam-
    webster.com/dictionary/transport (last visited Aug. 19, 2020) (defining
    “transport” as “to transfer or convey from one place to another.”). Under
    § 2252, child pornography can be “transport[ed]”—that is, moved from one
    place to another—electronically via the internet. See, e.g., United States v.
    Delmarle, 
    99 F.3d 80
    , 82 (2d Cir. 1996) (defendant who pled guilty to
    violating § 2252(a)(1) admitted sending images to others via email); United
    States v. Tenuto, 
    593 F.3d 695
    , 697 (7th Cir. 2010) (defendant transported child
    pornography by sending an email with the illicit image attached); United
    States v. Napier, 
    787 F.3d 333
    , 345-346 (6th Cir. 2015) (same).
    20
    1   argues that it was not he who transported the files, as it was government
    2   agents who caused the migration of the files. He is correct that there is neither
    3   evidence (nor allegation) that, at the time of the downloading by the
    4   government agents, Clarke took any action or was aware of the government’s
    5   downloading.
    6         We disagree, however, with the conclusion that he draws from that
    7   fact. His argument fails to take into account the role of his own actions and
    8   intentions in the transportation of his files to the computers of other users of
    9   the file-sharing network. Clarke made use of the BitTorrent peer-to-peer file-
    10   sharing network to obtain child pornography files from the computers of
    11   others, knowing that by doing so he was enabling other users to obtain the
    The interstate commerce element of the statute is satisfied by the use of the
    internet to transmit the files. See Gov. App’x at 231 (jury instructions)
    (“Transmission of photographs or video by means of the internet constitutes
    transportation in or affecting interstate commerce.”); accord. United States v.
    Harris, 548 F. App’x 679, 682 (2d Cir. 2013) (summary order); United States v.
    Chiaradio, 
    684 F.3d 265
    , 281 (1st Cir. 2012) (“The government’s proof of the
    jurisdictional element is rock solid: the illicit files traveled via
    the Internet and, thus, traveled in interstate commerce.”); United States v.
    MacEwan, 
    445 F.3d 237
    , 243–44 (3d Cir. 2006) (Section 2252’s jurisdictional
    element is satisfied when child pornography is transmitted over the internet,
    regardless of whether it actually crosses state lines, because the internet is an
    instrumentality and channel of interstate commerce).
    21
    1   files from his computer. Under the court’s instructions, which defined
    2   knowingly as “voluntarily and intentionally,” the jury found that the
    3   government agents’ downloads of the files Clarke had placed in his shared
    4   folder constituted knowing and intentional transportation of the files by
    5   Clarke. We agree that, in those circumstances, by knowingly and intentionally
    6   joining the file-sharing network, downloading files from the computers of
    7   other network users to his own, storing those files in a folder that was shared
    8   with other network users, and maintaining his folder’s connection to the
    9   network, Clarke himself performed actions that would constitute the crime of
    10   knowing transportation of the files when, as anticipated, another user of the
    11   file-sharing network caused the files to be downloaded and sent from his
    12   computer to the other user’s computer. Cf. 
    Chiaradio, 684 F.3d at 282
    (1st Cir.
    13   2012) (“A rational jury could conclude, as this jury did, that the defendant
    14   intentionally made his files available for the taking and that [the undercover
    15   agent] simply took him up on his offer.”).
    16         No precedents of our court have addressed the precise question before
    17   us. We have on one occasion in a brief summary order upheld a defendant’s
    18   conviction for transporting child pornography when an undercover agent
    22
    1   downloaded files from the defendant’s file servers. See United States v. Genao,
    2   224 F. App’x 39 (2d Cir. 2007) (summary order). 7 Other courts of appeals have
    3   upheld transportation convictions under § 2252(a)(1) under similar factual
    4   circumstances, but none have explicitly considered the argument made by
    5   Clarke in his supplemental briefs. 8
    6         A number of our sister circuits have rejected similar challenges to
    7   prosecutions for distributing child pornography under § 2252(a)(2), and have
    8   uniformly held that that a defendant who knowingly makes child
    7 Genao had argued that it was the Government, rather than he, who
    transported the files, noting that he was sleeping while the government agent
    completed the downloads. See Br. for the United States, United States v. Genao,
    
    2006 WL 4847015
    , at *27–28. We rejected that argument, finding it immaterial
    that the defendant “was not physically sitting in front of his computer and
    directly interacting with the undercover agent who downloaded these files
    from his server.” Genao, 224 F. App’x at 40. The Genao ruling, however,
    presented a somewhat different factual scenario from the instant case. In that
    case, Genao, unlike Clarke, had actively advertised on an internet chat room
    that he was seeking to exchange child pornography and had created and
    operated file servers from which others could download child pornography if
    they uploaded files of their own. Br. for the United States, 
    2006 WL 4847015
    ,
    at *2-4, *32.
    8See United States v. Stefanidakis, 
    678 F.3d 96
    , 98 (1st Cir. 2012); United States v.
    Schade, 318 F. App’x 91, 94–95 (3d Cir. 2009); United States v. Clifton, 587 F.
    App’x 49, 50 (4th Cir. 2014) (per curiam); United States v. Keshler, 769 F. App’x
    169, 170 (5th Cir. 2019) (per curiam); United States v. Nance, 
    767 F.3d 1037
    , 1038
    (10th Cir. 2014).
    23
    1   pornography available to be downloaded by others (including undercover
    2   law enforcement officers) on a peer-to-peer file sharing network has
    3    “distributed” within the meaning of the statute. In one of the first cases to
    4   present the issue, United States v. Shaffer, 
    472 F.3d 1219
    (10th Cir. 2007), the
    5   defendant, like Clarke, downloaded child pornography files on a peer-to-peer
    6   network and stored them in a shared folder, from which a government agent
    7   downloaded them from Shaffer’s computer.
    Id. at 1222.
    Shaffer argued that
    8   there was insufficient evidence to convict him of “distributing” child
    9   pornography because he did not “actively transfer possession to another,”
    10   and was merely a “passive participant” in the agent’s downloads.
    Id. at 1223. 11
      Writing for the panel, then-Judge Gorsuch rejected that argument, likening
    12   Shaffer to the owner of a self-serve gas station:
    13         The owner may not be present at the station, and there may be no
    14         attendant present at all. And neither the owner nor his or her agents
    15         may ever pump gas. But the owner has a roadside sign letting all
    16         passersby know that, if they choose, they can stop and fill their cars for
    17         themselves, paying at the pump by credit card. Just because the
    18         operation is self-serve, or in Mr. Shaffer’s parlance, passive, we do not
    19         doubt for a moment that the gas station owner is in the business of
    20         “distributing,” “delivering,” “transferring” or “dispersing” gasoline.
    21
    Id. at 1223–24. 24 1
            Subsequent courts have adopted Shaffer’s reasoning to uphold
    2   convictions for distributing child pornography on similar facts. See, e.g.,
    3   United States v. Budziak, 
    697 F.3d 1105
    , 1109 (9th Cir. 2012) (“[E]vidence is
    4   sufficient to support a conviction for distribution under 18 U.S.C.
    5   § 2252(a)(2) when it shows that the defendant maintained child pornography
    6   in a shared folder, knew that doing so would allow others to download it, and
    7   another person actually downloaded it.”); 
    Chiaradio, 684 F.3d at 282
    (when
    8   “an individual consciously makes files available for others to take and those
    9   files are in fact taken, distribution has occurred,” even if “the defendant did
    10   not actively elect to transmit” the files); United States v. Richardson, 
    713 F.3d 11
      232, 236 (5th Cir. 2013) (“[D]ownloading images and videos containing child
    12   pornography from a peer-to-peer computer network and storing them in a
    13   shared folder accessible to other users on the network amounts to
    14   distribution.”); see also United States v. Collins, 
    642 F.3d 654
    , 656 (8th Cir. 2011);
    15   United States v. Pirosko, 
    787 F.3d 358
    , 368 (6th Cir. 2015); United States v. Ryan,
    16   
    885 F.3d 449
    , 453 (7th Cir. 2018). 9
    9Similarly, appellate courts, including ours, have also held that a defendant
    who knowingly makes child pornography available to be downloaded by
    other users on a peer-to-peer network is eligible to receive the sentencing
    25
    1         We recognize that these distribution precedents are not squarely
    2   pertinent to the transportation statute. “Distribution” and “transportation”
    3   are different, in a manner that can be significant for Clarke’s argument, as
    4   distribution can be accomplished by mere transfer of ownership without
    5   movement from one place to another. The logic of these cases is nonetheless
    6   consistent with our conclusion that when Clarke downloaded child
    7   pornography files on a peer-to-peer file-sharing network, knowing that his
    8   own downloading of files and storing them in a shared folder enabled others
    9   to download those files to their computers, the downloading by other users of
    10   the network completed Clarke’s commission of the offense of transporting
    11   child pornography.
    12         In this case, the jury found beyond a reasonable doubt that Clarke, by
    13   using the file-sharing program, “knowingly” allowed others to access his
    14   computer to obtain child pornography, 
    see supra
    pt. I(a), and therefore
    enhancement for “distributing” child pornography under U.S.S.G.
    § 2G2.2(b)(3)(F). See, e.g., 
    Reingold, 731 F.3d at 229
    –30; United States v.
    Layton, 
    564 F.3d 330
    , 335 (4th Cir. 2009); United States v. Conner, 521 F. App’x
    493, 500 (6th Cir. 2013); United States v. Carani, 
    492 F.3d 867
    , 876 (7th Cir.
    2007); United States v. Glassgow, 
    682 F.3d 1107
    , 1110 (8th Cir. 2012); United
    States v. Ramos, 
    695 F.3d 1035
    , 1041 (10th Cir. 2012).
    26
    1   necessarily found under the court’s instructions that he did so “intentionally,”
    2   
    see supra
    pt. I(b); see also Gov. App’x at 230 (defining “knowingly” and
    3   “voluntarily and intentionally”). 10 By wittingly participating in a file-sharing
    4   network and downloading files from the computers of others, Clarke
    5   implicitly invited other participants in the file-sharing network to share his
    6   files, and enabled them to do so. See App’x at 54 (Testimony of Branda)
    7   (BitTorrent is “a peer-to-peer network where a person’s computer is able to
    8   share files that are on other people’s computer drives and hard drive[s]. And
    9   in doing so, you’re opening up your computer to be shared from as well.”);
    id. 10 at 87
    (Clarke told Branda he “kn[e]w how peer to peer programs work.”).
    11         The fact that the movement of the files was effectuated in part by the
    12   Government’s downloads without Clarke’s awareness does not alter our
    13   conclusion. Clarke intentionally obtained child pornography through what he
    14   knew to be a file-sharing network, in which the transportation of child
    15   pornography from his computer to other users was an almost inevitable
    16   consequence and indeed the very objective of the network. Under these
    17   circumstances, Clarke has “transport[ed]” child pornography within the
    We do not suggest that, in all cases, “knowingly” and “intentionally” will
    10
    mean the same thing.
    27
    1   meaning of § 2252(a)(1). Cf. 
    Chiaradio, 684 F.3d at 282
    (“The fact that the
    2   defendant did not actively elect to transmit [the child pornography] files is
    3   irrelevant” to his conviction for distribution under § 2252(a)(2)); Shaffer, 
    472 4 F.3d at 1223
    (the defendant distributed child pornography in the sense of
    5   having “transferred” it to others because even though he did not “actively
    6   push[] pornography on [other] users [of the peer-to-peer network], . . . he
    7   freely allowed them access to his computerized stash of images and videos
    8   and openly invited them to take, or download, those items”).
    9         Clarke maintains that there is no evidence that he “intended” to share
    10   child pornography, pointing to Agent Branda’s testimony that Clarke had
    11   stated that it was “not his intention” to share child pornography, but only to
    12   obtain it for himself. See App’x at 86. This statement confuses motivation with
    13   intention. When one makes an agreement to buy a desired object for $100, it is
    14   likely not the buyer’s motivating objective to rid himself of $100. The
    15   motivation is rather to acquire the desired object. Nonetheless, the buyer
    16   intends that both aspects of the transaction take place—his acquisition of the
    17   object and his payment of the price. Similarly, when one avails oneself of a
    18   peer-to-peer file-sharing network to acquire files, knowing that it functions on
    28
    1   the basis of allowing users to access each other’s files, one is likely to be
    2   motivated only by the acquisition of files from the computers of others.
    3   Nonetheless, we have held that “a jury may conclude that an actor intended
    4   [the] foreseeable consequences of his actions.” United States v. Nelson, 
    277 F.3d 5
      164, 197 (2d Cir. 2002).
    6         The jury apparently found based on sufficient evidence that Clarke
    7   availed himself of the BitTorrent network knowing full well that doing so
    8   meant that he was allowing other users to download files from his computer.
    9   In storing those files on his computer in a folder that allowed other users of
    10   the network to download copies to their computers, he went far towards
    11   transporting his files to the computers of unknown others, which offense was
    12   completed when the files moved from his computer to theirs. The fact that
    13   Clarke knew neither who was downloading his files, nor when it was
    14   occurring, is irrelevant, as he knew that this was how the network functioned.
    15   We are therefore satisfied that, because Clarke knew he was sharing child
    16   pornography files on a file-sharing network, he cannot escape liability for the
    17   transportation of those files when it occurred. Under these circumstances, we
    18   conclude that when the illicit files moved from his computer to the agents’
    29
    1   upon their requests to download, that completed Clarke’s commission of the
    2   transportation offenses charged in Counts One and Two. The evidence was
    3   sufficient to prove his guilt.
    4         II.    Discovery of the Torrential Downpour Software
    5         Clarke next argues that it was an abuse of discretion for the district
    6   court to deny him production of the Torrential Downpour program and its
    7   source code because that software provided the “bulk of the evidence” for his
    8   conviction on the transportation counts and also provided the justification for
    9   the search warrant that discovered the evidence underlying all the counts.
    10   Def.’s Br. at 23, 28. We disagree.
    11         We review “a district court’s discovery rulings for abuse of discretion.”
    12   Moll v. Telesector Res. Grp., Inc., 
    760 F.3d 198
    , 204 (2d Cir. 2014). The
    13   Government must “permit the defendant to inspect” any item that is
    14   “material to preparing the defense.” Fed. R. Crim. P. 16(a)(1)(E)(i). Evidence is
    15   material “if it could be used to counter the government’s case or to bolster a
    16   defense.” United States v. Stevens, 
    985 F.2d 1175
    , 1180 (2d Cir. 1993). To obtain
    17   discovery under Rule 16, a defendant must make a prima facie showing of
    18   materiality. See United States v. Maniktala, 
    934 F.2d 25
    , 28 (2d Cir. 1991); United
    30
    1   States v. Mandel, 
    914 F.2d 1215
    , 1219 (9th Cir. 1990) (“Neither a general
    2   description of the information sought nor conclusory allegations of
    3   materiality suffice; a defendant must present facts which would tend to show
    4   that the Government is in possession of information helpful to the defense.”).
    5   We have stated that we will order a new trial on account of the denial of
    6   discovery only if there is “some indication that the pretrial disclosure of the
    7   disputed evidence would have enabled the defendant significantly to alter the
    8   quantum of proof in his favor.” 
    Stevens, 985 F.2d at 1180
    (internal quotation
    9   marks omitted).
    10         We recognize that, when a defendant’s guilt is predicated on the
    11   government offering proof that a government agent downloaded files from
    12   the defendant’s computer, information about the program by which the
    13   downloading was accomplished is likely to be “material to preparing the
    14   defense” and therefore subject to disclosure under Fed. R. Crim. P.
    15   16(a)(1)(E)(i), so as to enable the defendant to challenge the government’s
    16   proof. See 
    Pirosko, 787 F.3d at 366
    (the Government does not have “a blank
    17   check to operate its file-sharing detection software sans scrutiny”); see also
    18   Rebecca Wexler, Life, Liberty, and Trade Secrets: Intellectual Property in the
    31
    1   Criminal Justice System, 70 STAN. L. REV. 1343, 1403–07 (2018). Here, the
    2   Government did provide Clarke with considerable information about the
    3   operation of the program, short of turning over the program itself and its
    4   source code. The Government’s disclosures included copies of the files
    5   downloaded by the agents (as well as forensic images of the corresponding
    6   data recovered on Clarke’s computer equipment), over 200 pages of data logs
    7   detailing the agents’ downloads of files from his computer, a “forensic
    8   report” of the computer equipment seized from Clarke, and an in-person
    9   demonstration of how Torrential Downpour operated. This evidence showed,
    10   among other things, that the video files on the agents’ computer, purportedly
    11   downloaded from the defendant’s computer by use of the Torrential
    12   Downpour program, exactly matched files later recovered from Clarke’s
    13   computer equipment. The Government’s reason for opposing further
    14   disclosure was a substantial one—access to the material withheld would have
    15   enabled traffickers in child pornography to avoid detection by altering or
    16   avoiding the files that law enforcement was searching for. It would also
    17   enable those seeking child pornography to find those files that had been
    18   identified by the Government.
    32
    1         Ultimately, we need not decide whether the Government’s reasons for
    2   withholding disclosure outweighed Clarke’s need for it because, even
    3   assuming a violation of Clarke’s entitlement to discovery, Clarke has not
    4   demonstrated that he suffered prejudice as a result. See 
    Stevens, 985 F.2d at 5
      1180; United States v. Sanchez, 
    912 F.2d 18
    , 21 (2d Cir. 1990) (in the event of a
    6   Rule 16 violation, “reversal will only be warranted if the nondisclosure results
    7   in substantial prejudice to the defendant”). Clarke’s argument to the district
    8   court for why disclosure of the software and its source code was necessary for
    9   his defense (in addition to the other pertinent discovery provided above) was
    10   premised on an assumption made by his expert that, because the child
    11   pornography files accessed by the government agents were located on
    12   Clarke’s external hard drive, rather than his computer’s hard drive, the files
    13   “would not have been publicly available on the BitTorrent network” and
    14   therefore that Clarke’s computer could not have shared or transported them.
    15   Gov. App’x at 38–39 (Affidavit of Tami Loehrs). Accordingly, Clarke argued,
    16   access to Torrential Downpour and its source code was necessary for him to
    17   show that the government agents could not have downloaded Clarke’s child
    18   pornography files over the open BitTorrent network.
    33
    1         The Government, however, persuasively countered Loehrs’s assertions
    2   with evidence that the district court was entitled to credit. The Government’s
    3   evidence showed that, unlike some other peer-to-peer programs, uTorrent
    4   prompts the user to choose “a location to save the downloaded files” before
    5   initiating a download. Gov. App’x at 97 (Affidavit of Robert Erdely). The
    6   “user can specify any location on a computer” or on “an external hard drive.”
    7
    Id. Critically, whatever location
    is specified by the user as the destination for
    8    the downloaded files becomes accessible to other users of the network,
    9    regardless of whether that folder is on the computer itself or on an external
    10   hard drive. 11 Additionally, the Government submitted evidence showing that
    11   files downloaded and saved to an external hard drive by a Department of
    12   Justice investigative analyst, using the same version of uTorrent used by
    13   Clarke, were accessed by other BitTorrent users. This evidence refuted
    14   Loehrs’s assumption that files saved on external hard drives were not
    15   accessible to other users of BitTorrent, and the district court reasonably
    11This description of how uTorrent operates is further supported by expert
    testimony adduced at trial. See App’x at 399 (Trial Testimony of Dero Tucker)
    (explaining that uTorrent does not have “a specific folder or one single folder
    to place complete downloads,” but rather “allow[s] the user to specify” where
    to save downloaded files).
    34
    1   concluded that Loehrs’s speculation was “insufficient to create an issue as to
    2   the [Torrential Downpour] software’s reliability.” App’x at 33. 12 There is thus
    3   no indication, given the extensive disclosures that were made to Clarke, that
    4   he was in any way prejudiced by the district court’s denial of his demand for
    5   disclosure of the program itself and its source code. See 
    Stevens, 985 F.2d at 6
      1180. If the initial denial was error, Clarke has failed to make any showing
    7   that he suffered harm as a result.
    12 In reaching this conclusion, we note that the facts of this case differ
    significantly from those presented in 
    Budziak, 697 F.3d at 1105
    , which Clarke
    invokes in support of his materiality argument and in which the Ninth Circuit
    ordered the Government to disclose a similar software program. Budziak
    involved a charge for distribution of child pornography that was premised on
    files that the Government downloaded from the defendant’s computer
    remotely, using a peer-to-peer investigative tool.
    Id. at 1107.
    The defendant in
    Budziak presented specific evidence that the investigating officer may have
    downloaded only fragments of child pornography, and those fragments came
    only from the defendant’s “incomplete” folder, making it “more likely” that
    the defendant did not transmit any complete child pornography files to
    agents.
    Id. at 1112
    . The Ninth Circuit’s holding depended on the defendant’s
    “evidence suggesting that the materials disclosed by the FBI did not resolve
    all questions relevant to his defense.”
    Id. at 1112
    n.1. Here, by contrast, Clarke
    pointed only to Loehrs’s persuasively refuted speculation about errors in the
    government software, which was insufficient to require the district court to
    compel disclosure. See 
    Pirosko, 787 F.3d at 366
    (defendant’s conclusory
    allegation that he did not know how the investigative peer-to-peer software
    worked was insufficient to “overcome the numerous facts supporting the
    government’s position that it legitimately obtained child pornography from
    Pirosko’s shared folders.”).
    35
    1         II.    Challenges to Clarke’s Sentence
    2         Clarke argues that both the term of imprisonment imposed and the
    3   monetary penalties assessed were unreasonable. When reviewing sentences,
    4   we apply “a particularly deferential form of abuse-of-discretion review,” and
    5   will not vacate a sentence unless it is either procedurally or substantively
    6   unreasonable. See United States v. Cavera, 
    550 F.3d 180
    , 187–89 & n.5 (2d Cir.
    7   2008). A district court errs procedurally when it: (1) “fails to calculate the
    8   Guidelines range”; (2) “makes a mistake in its Guidelines calculation, or treats
    9   the Guidelines as mandatory”; (3) “does not consider the [18 U.S.C.] § 3553(a)
    10   factors”; (4) “rests its sentence on a clearly erroneous finding of fact”; (5) “fails
    11   adequately to explain its chosen sentence”; or (6) deviates from the
    12   Guidelines range it calculated without explanation.
    Id. at 190.
    A sentence is
    13   substantively unreasonable “only . . . where the trial court’s decision cannot
    14   be located within the range of permissible decisions.”
    Id. at 189
    (internal
    15   quotation marks omitted).
    16         a.     Term of Imprisonment
    17         First, Clarke asserts that his sentence was procedurally unreasonable
    18   because the district court did not adequately consider that (1) the Sentencing
    36
    1   Guidelines’ child pornography enhancements are excessive, and (2) Clarke’s
    2   conduct was typical of ordinary child pornography cases. This position is
    3   inconsistent with the record and the law. The record establishes that the
    4   district court correctly calculated the Guidelines range of 210 to 262 months,
    5    considered each of the § 3553(a) factors, and explained its sentence, including
    6    its conclusion that the Guidelines range was excessive and its decision to
    7    depart downward from that range.
    8         Clarke insists that the district court committed procedural error by
    9   “fail[ing] to appropriately consider the teaching of” United States v. Dorvee,
    10   
    616 F.3d 174
    (2d Cir. 2010). Def.’s Br. at 41. In that case, we criticized the child
    11   pornography Guideline as one frequently leading to “unreasonable results,”
    12
    id. at 188,
    because the application of its enhancements “routinely result[s] in
    13   Guidelines projections near or exceeding the statutory maximum, even in
    14   run-of-the-mill cases,”
    id. at 186.
    Clarke thus asserts that the district court
    15   committed procedural error in applying the child pornography enhancements
    16   provided by the Guidelines. This argument misunderstands the “teaching of
    17   Dorvee.” In Dorvee, we did not impose a heightened standard for the
    18   application of § 2G2.2 enhancements in individual cases. Rather, we were
    37
    1   concerned with the substantive reasonableness of even those sentences that
    2   resulted from adherence to the prescribed Guidelines range. Indeed,
    3   in Dorvee itself, we determined that the sentencing court had properly applied
    4   the § 2G2.2 enhancements, concluding that the court committed procedural
    5   error only in its separate error of failing to recognize that a statutory
    6   maximum limited the applicable Guidelines range.
    Id. at 180–81. 7
            Here, the district court concluded that the prescribed Guidelines
    8   calculation led to excessive results. See App’x at 498 (“The guideline range is
    9   excessive and I’m not going to use it.”). In doing so, the district court
    10   explicitly considered Dorvee. The court explained that “in the four or five
    11   cases following Dorvee, the[] [Second Circuit] ha[s] kept these guidelines and
    12   reduced the sentences.”
    Id. The district court
    then discussed Clarke’s
    13   background and personal characteristics, as well as the nature of his crimes,
    14   in accurately calculating the applicable Guidelines range, but thereafter
    15   departing downward from it.
    16         Clarke further asserts that the district court committed procedural error
    17   by “repeated[ly] emphasi[zing] that it thought Mr. Clarke’s conduct was of
    18   the ‘worst kind,’ when it was actually typical of an ordinary first-time child
    38
    1   pornography case.” Def.’s Br. at 41. In fact, the court described the child
    2   pornography content, not the defendant’s conduct, as “of the worst kind.”
    3   App’x at 493, 497. This was a justifiable conclusion: included in Clarke’s
    4   extensive collection of child pornography were sadistic videos of children
    5   being abused. Moreover, in its consideration of the § 3553(a) factors, the
    6   district court recognized that Clarke had never manufactured child
    7   pornography or had physical contact with children, and that he has no
    8   criminal record. On this record, we see no basis to conclude that the sentence
    9   was procedurally unreasonable.
    10         Next, Clarke contends that his sentence was substantively unreasonable
    11   because it failed to take into account Clarke’s history and characteristics and
    12   was greater than necessary to meet the purposes of sentencing as set forth in
    13   § 3553. This argument likewise fails. The record refutes Clarke’s contention
    14   that the district court failed to give thoughtful consideration to Clarke’s
    15   history and characteristics, or to explain why the sentence was necessary for
    16   deterrence and/or punishment. To the contrary, the record instead
    17   demonstrates that the district court considered and applied the § 3553(a)
    18   factors and took into account Clarke’s job as a corrections officer and his lack
    39
    1   of criminal history. 13 The sentence imposed—of 120 months in custody—was
    2   90 months below the bottom end of the Guidelines range. This sentence
    3   stands in marked contrast to the sentences of 240 months and 225 months,
    4   respectively, which we vacated as substantively unreasonable in Dorvee and
    5   United States v. Jenkins, 
    854 F.3d 181
    (2d Cir. 2017). 14 We see no basis to
    6   conclude that Clarke’s sentence is substantively unreasonable.
    7         b.     Monetary Penalties
    8         In addition to his prison term, Clarke was further ordered to pay a fine
    9   of $13,682, representing the costs incurred because Clarke failed to show up
    13Specifically, the district court noted that Clarke: (1) possessed “28,715
    images and 77 videos of child pornography, of the worst kind”; (2) “has some
    good things in his life,” including “no criminal history” and never having
    been “in trouble before” and “he has been a corrections officer”; (3) may have
    “ruined” the lives of “[l]ittle children”; (4) “never manufactured” child
    pornography, but created a market for it; and (5) never accepted
    responsibility for the offense. App’x at 491–508.
    14Comparison to other sentences is also instructive. In United States v. Butler,
    we affirmed an 87-month sentence on a defendant who was convicted only of
    receipt and possession of child pornography (and not of distribution or
    transportation); the defendant furthermore had engaged in that misconduct
    for only a year. 733 F. App’x 565, 566–67 (2d Cir. 2018) (summary order). And
    in United States v. Gill, we affirmed a 121-month sentence for receipt of child
    pornography using a peer-to-peer program. 739 F. App’x 75, 76–77 (2d Cir.
    2018) (summary order). Clarke’s circumstances are not of the “exceptional”
    sort that justifies our substitution of our own judgment for that of the district
    court. See United States v. Ingram, 
    721 F.3d 35
    , 37 (2d Cir. 2013) (per curiam).
    40
    1   for the first day of trial due to a purported medical need. The court also
    2   directed that Clarke pay a $5600 assessment, constituting of a mandatory
    3   $5000 penalty “on any non-indigent person or entity” under the Justice for
    4   Victims of Trafficking Act, see 18 U.S.C. § 3014, and an $100 special
    5   assessment on the remaining six counts. Clarke challenges these monetary
    6   sanctions on the grounds that Clarke is indigent, as indicated by the
    7   appointment of the federal defenders to represent him.
    8         We have observed that, “[i]f the defendant is indigent, a fine should not
    9   be imposed absent evidence in the record that he will have the earning
    10   capacity to pay the fine after release from prison.” United States v. Rivera, 971
    
    11 F.2d 876
    , 895 (2d Cir. 1992). When making an indigency determination, a
    12   district court “may consider both defendant’s present financial resources and
    13   those that may become available in the future.” United States v. Salameh, 261
    
    14 F.3d 271
    , 276 (2d Cir. 2001).
    15         The record here reflects that Clarke: (1) receives $1,100 each month in
    16   pension payments (payments that will continue even while he is in prison);
    17   (2) owns at least one home; and (3) can expect social security payments to
    18   resume upon his release from custody. While not explaining why it found
    41
    1   Clarke to be nonindigent despite his representation by the Federal Defenders,
    2    the court promised “to have a separate hearing on that, if necessary.” App’x
    3    at 462; see also App’x at 465 (stating again that, if Clarke wanted “a hearing on
    4    that [indigency] issue,” the district court would grant one post-sentence).
    5    There is no indication that Clarke sought such a hearing, nor that he
    6    requested amendment of the judgment. Accordingly, we will not disturb the
    7    monetary aspect of Clarke’s sentence.
    8                                    CONCLUSION
    9          For the foregoing reasons, we AFFIRM Clarke’s conviction and
    10   sentence.
    42