United States v. Ethan Larman ( 2013 )


Menu:
  •      Case: 12-50855      Document: 00512440480         Page: 1    Date Filed: 11/13/2013
    IN THE UNITED STATES COURT OF APPEALS
    FOR THE FIFTH CIRCUIT
    No. 12-50855
    United States Court of Appeals
    Fifth Circuit
    FILED
    UNITED STATES OF AMERICA,                                               November 13, 2013
    Lyle W. Cayce
    Plaintiff - Appellee           Clerk
    v.
    ETHAN NATHANIEL LARMAN,
    Defendant - Appellant
    Appeal from the United States District Court
    for the Western District of Texas
    USDC No. 3:11-CR-1007-1
    Before JOLLY, JONES, and BARKSDALE, Circuit Judges.
    PER CURIAM:*
    Ethan Larman appeals his conviction on one count of Receipt of Child
    Pornography, one count of Attempted Distribution of Child Pornography, both
    under 18 U.S.C. § 2252A(a)(2), and two counts of Possession of Child
    Pornography under 18 U.S.C. § 2252A(a)(4)(B). Larman not only challenges
    the sufficiency of the evidence to convict him, but further asserts errors in jury
    instructions, an error in an evidentiary ruling, and errors in the application of
    * Pursuant to 5TH CIR. R. 47.5, the court has determined that this opinion should not
    be published and is not precedent except under the limited circumstances set forth in 5TH
    CIR. R. 47.5.4.
    Case: 12-50855      Document: 00512440480        Page: 2    Date Filed: 11/13/2013
    No. 12-50855
    two sentencing enhancements. We consider and reject his arguments, and, for
    the reasons that follow, we AFFIRM his conviction and sentence on all counts.
    I.
    On October 23, 2010, an Internet Protocol address (“IP address”) in El
    Paso, Texas, made available for sharing child sexual abuse images over a peer-
    to-peer network (“P2P”) between 8:12 and 8:57 a.m. 1                Law enforcement
    monitoring software created an activity report identifying the internet service
    provider (“ISP”) and the amount of images, categorized as “child notable,”
    associated with child abuse.        Nicholas Marquez, a special agent with the
    Homeland Security Investigations Cyber Crimes Group (“HSI”), first observed
    this report on November 23, 2010, exactly one month after the incident of
    sharing. The software identified these images as “child notable” because of
    unique indicators called hash values, contained within the images’ source code.
    Hash values, specific to the makeup of a particular image’s data, allow law
    enforcement to compare suspected child sexual abuse images to ones already
    present in law enforcement media libraries.            This comparison allows law
    enforcement to identify child pornography with almost absolute certainty,
    regardless of the name associated with a file.
    Using this process, Marquez confirmed that thirteen images from the
    October 23 incident were indeed verified child sexual abuse images. After this
    confirmation, Marquez sent a summons to the ISP, Time-Warner Cable,
    requesting the subscriber information for that particular IP address.                He
    received notice that the IP address belonged to Ethan Larman, a member of
    the U.S. military, at his El Paso, Texas address. Once Marquez confirmed that
    Larman resided at that address, he obtained a search warrant for Larman’s
    1  P2P programs allow computers to exchange information by connecting with one
    another without having to go through an IP server. On a P2P network, any data placed in a
    shared folder on a user’s computer can be accessed by anyone else using P2P software.
    2
    Case: 12-50855    Document: 00512440480    Page: 3   Date Filed: 11/13/2013
    No. 12-50855
    residence. Two days later, Marquez and other agents executed the warrant.
    While executing the warrant, agents took Larman and his roommate Benjamin
    Morgan outside while officers conducted a search of the apartment.
    Once outside, Marquez and Dustin Sletner, a special agent in the U.S.
    Army Criminal Investigation Division, interviewed Larman inside a
    government vehicle.    Sletner took detailed notes during this interview,
    although the purpose of his presence was to serve as a witness. Marquez and
    Sletner testified that Larman told them he owned a computer and that he was
    the only individual who used the computer. Larman described his expertise
    with computers as “low,” but he acknowledged that he knew how to move,
    delete, and rename files. Most importantly, Larman admitted downloading
    child pornography through the Limewire P2P program approximately 50 times
    beginning in June of 2010. Larman informed the two agents that there were
    incriminating images in the “My Pictures” folder on his computer, on his
    PlayStation 3, and on two thumb drives he owned.         In addition to these
    admissions, Larman informed agents as to why he was attracted to underage
    girls and described the manner in which he ordinarily viewed the images.
    Larman would later testify at trial and deny telling the agents that he ever
    downloaded or possessed any child pornography.
    The search of Larman’s apartment yielded five pieces of electronic media
    belonging to Larman that authorities suspected contained child pornography.
    HSI Special Agent Joseph Byers, a forensic examiner, examined the media
    using complex forensic software that creates a mirror image of the contents of
    a media device. The first device was an E-Machines desktop computer (named
    “C1H1”), found on the upper shelf of a closet in Larman’s bedroom. The second
    and third devices were two SanDisk thumb drives labeled “TD-1” and “TD-2,”
    respectively. The fourth device was a PlayStation 3, which Byers was unable
    to examine because of the device’s encryption technology. The final device was
    3
    Case: 12-50855       Document: 00512440480          Page: 4     Date Filed: 11/13/2013
    No. 12-50855
    a CD-R with the word “Limewire” handwritten on the front of it. This CD-R
    was found in a brown CD case belonging to Larman.
    Byers’s examination of C1H1 confirmed that a P2P program called
    Frostwire had been installed four months before the sharing incident and
    remained on the computer. Byers found music and a bestiality video in the
    Frostwire shared folder, but no child pornography.                    He also found files
    indicating that Limewire previously had been installed on C1H1.                          Most
    importantly, Byers found child pornography files with hash values matching
    those identified in the earlier sharing incident. C1H1’s temporary internet
    cache folder also contained data suggesting that child pornography previously
    had been accessed on that computer. 2
    The examination of TD-1 and TD-2 revealed more child pornography.
    Many of the images on TD-1 were “series” or “known file filter” images,
    meaning these images were of known victims previously identified by law
    enforcement.      Again, several of these images matched the hash values of
    images identified in the sharing incident by the CPS software. Byers found
    that these child pornographic images were stored in a folder several levels
    down the “tree structure” of the device, meaning that the folders would have
    had to be consciously created by the user. Also contained on TD-1 were a large
    assortment of Larman’s personal photographs, including pictures of his tattoos
    and pictures of his wife. TD-2 contained fewer child pornographic images,
    although Byers was able to effectively identify three such images. The CD-R
    2 Once a computer views a webpage, “the computer automatically stores a copy of that
    webpage in a folder known as the cache.” United States v. Moreland, 
    665 F.3d 137
    , 142 (5th
    Cir. 2011). Whenever the computer user revisits that webpage, the presence of that file in
    the temporary internet cache allows the page to “load more quickly by retrieving the version
    stored in the cache.” 
    Id. In this
    case, investigators could view the hash values of the files to
    see what images were viewed. Some of these images matched known child pornographic
    images.
    4
    Case: 12-50855    Document: 00512440480     Page: 5   Date Filed: 11/13/2013
    No. 12-50855
    Byers recovered contained several files with names that indicated the images
    were child pornography, although these images were not charged in Larman’s
    indictment.
    On April 4, 2012, a federal grand jury returned a four-count, superseding
    indictment charging Larman with violating 18 U.S.C. § 2252(a)(2) in Count
    One: Receipt of Child Pornography and Count Two: Attempted Distribution of
    Child Pornography, and 18 U.S.C. § 2252(a)(4)(B) in Counts Three and Four:
    Possession of Child Pornography.     On April 16, 2012, Larman’s jury trial
    began. Four days later, a jury found Larman guilty on all four counts. The
    district court judge later sentenced Larman to concurrent 188-month terms of
    imprisonment on Counts One and Two, and concurrent 120-month terms of
    imprisonment on Counts Three and Four. Larman appeals only Counts One,
    Two, and Three of his conviction. Thus, as far as the record shows, he stands
    convicted on Count Four.
    II.
    Larman’s first issue on appeal challenges the sufficiency of the evidence
    used to support Counts One, Two, and Three of his child pornography
    conviction.   Larman properly preserved this challenge by moving for a
    judgment of acquittal after the close of all evidence and thus the court’s
    decision denying his motion for judgment of acquittal is reviewed de novo.
    United States v. McDowell, 
    498 F.3d 308
    , 312 (5th Cir. 2007). In reviewing the
    evidence, this court views it “in the light most favorable to the Government
    with all reasonable inferences to be made in support of the jury’s verdict.”
    United States v. Moser, 
    123 F.3d 813
    , 819 (5th Cir. 1997). The overarching
    question is whether “any rational trier of fact could have found the essential
    elements of the crime beyond a reasonable doubt.” United States v. Jara-
    Favela, 
    686 F.3d 289
    , 301 (5th Cir. 2012) (quoting Jackson v. Virginia, 
    443 U.S. 307
    , 319 (1979)).
    5
    Case: 12-50855     Document: 00512440480     Page: 6   Date Filed: 11/13/2013
    No. 12-50855
    A.
    Larman challenges the sufficiency of the evidence in Counts One and
    Three, in which he was found knowingly to have received and possessed child
    pornography, respectively. The direct evidence of knowing receipt in Count
    One was the testimony of Agents Marquez and Sletner that Larman had
    admitted to downloading child pornography on Limewire, a P2P program,
    approximately fifty times since June 2010.       At trial, Larman consistently
    denied ever having told the agents that he downloaded child pornography on
    Limewire.      Larman argues that the Government’s reliance on the files
    contained within his temporary internet cache cannot form the sole basis of his
    receipt conviction because the Government failed to show that Larman
    “knowingly” received these images and that he exerted dominion and control
    over them.
    Determining “[t]he weight and credibility of the evidence [is] the sole
    province of the jury.” United States v. Parker, 
    505 F.3d 323
    , 331 (5th Cir. 2007).
    Here, the jury apparently found credible the agents’ testimony that Larman
    admitted to the downloading of child pornography on Limewire and found not
    credible Larman’s testimony that he made no such admission to the agents.
    Our court assesses the credibility of witness testimony only to the extent that
    it may be “incredible or patently unbelievable.” United States v. Lopez, 
    74 F.3d 575
    , 578 (5th Cir. 1996). The agents’ testimony is neither. On this evidence
    alone, Larman’s conviction of receipt of child pornography on Count One can
    be affirmed.
    The Government also presented circumstantial evidence that Larman
    received child pornography from the Internet. Hash values for several of the
    child pornographic images found on both C1H1 and TD-1 matched those that
    were shared via the P2P network on October 23, 2010. Although it was not
    charged, the CD-R containing child pornography was found in a brown CD case
    6
    Case: 12-50855      Document: 00512440480      Page: 7    Date Filed: 11/13/2013
    No. 12-50855
    that Larman admitted was his at trial. All of this evidence is enough, with
    respect to the receipt count, to support the jury’s finding that the Government
    proved “the essential elements of the crime beyond a reasonable doubt.” Jara-
    
    Favela, 686 F.3d at 301
    .
    Larman also challenges his conviction in Count Three for possession of
    child pornography in violation of 18 U.S.C. § 2252(a)(4)(b). As evidence of
    Larman’s knowing possession, the Government presented the files found on
    C1H1, TD-1, and TD-2. At trial, and at oral argument, Larman contended that
    the jury lacked a legal basis to find him guilty of possession of the illegal images
    under a constructive possession theory because his roommate, Benjamin
    Morgan, could have accessed, downloaded, and possessed the material himself
    rather than Larman. 3 Possession, under this statute, may be either actual or
    constructive; actual possession “means the defendant knowingly has direct
    physical control over a thing at a given time.” United States v. Moreland, 
    665 F.3d 137
    , 150 (5th Cir. 2011). Constructive possession, on the other hand, “is
    the ownership, dominion or control over an illegal item itself or dominion or
    control over the premises in which the item is found.” 
    Id. Larman relies
    heavily on Moreland to argue that the Government was
    required to prove “something else (e.g., some circumstantial indicium of
    possession) . . . besides mere joint occupancy [to] support[] a plausible inference
    that the defendant had knowledge of and access to the . . . contraband.” 
    Id. Larman is
    correct when he asserts that where “a residence is jointly occupied,
    the mere fact that contraband is discovered at the residence will not, without
    more, provide evidence sufficient to support a conviction based upon
    constructive possession against any of the occupants.” 
    Id. Although evidence
    3 Testimony at trial established that Larman’s router, modem and WiFi connection
    were password protected. Morgan was the only other individual with the credentials to
    access Larman’s network.
    7
    Case: 12-50855    Document: 00512440480     Page: 8   Date Filed: 11/13/2013
    No. 12-50855
    of mere occupancy is not enough, “additional evidence of the defendant’s
    knowing dominion or control of the contraband, besides the mere joint
    occupancy of the premises” can support a reasonable inference that the
    defendant had knowledge of and access to the child pornography. 
    Id. To be
    sure, the Government presented ample “additional evidence” of
    Larman’s knowing possession. Larman’s roommate, Morgan, testified that he
    did not know the two seized thumb drives existed. He further testified that he
    had never used Larman’s PlayStation 3 outside of the few occasions they
    played it together and that he had never used Larman’s desktop computer.
    Morgan described his knowledge of computer technology as being limited to
    surfing the Internet. Morgan was adamant that he had never seen or viewed
    child pornography. There was no evidence to suggest Morgan had ever used
    any of the media devices outside the presence of Larman. When Special Agent
    Byers ran a forensics check on Morgan’s personal laptop, he did not find any
    child pornography, P2P software, or cleanup software to suggest data had been
    deleted.
    There is a notable dearth of evidence linking Morgan to use of any of the
    media containing child pornography. On the other hand, there is compelling
    evidence linking Larman to use of the media devices. First, Larman admitted
    that only he used those media devices, an admission he recanted at trial. Agent
    Byers testified that the file structure of C1H1 was intentionally configured to
    send and receive data through P2P software; law enforcement found P2P
    software on Larman’s computer, and Larman testified that he knew how to
    create, delete, and move files electronically. The presence of child pornography
    on Larman’s multiple media devices, along with the CD-R containing child
    pornography in Larman’s brown CD case, a case that Morgan testified he had
    never seen before, all constitute additional evidence necessary to support
    Larman’s conviction for possession on Count Three. For the reasons above, we
    8
    Case: 12-50855      Document: 00512440480   Page: 9     Date Filed: 11/13/2013
    No. 12-50855
    find the evidence sufficient to support Larman’s convictions on Counts One and
    Three, that is for receipt and possession of child pornography, respectively.
    B.
    On Count Two of his conviction, the jury found that Larman attempted
    to distribute child pornography on October 23, 2010, when the CPS system
    indicated that a computer using his IP address was sharing child pornographic
    images. At trial, Larman contested the Government’s assertion that he was
    the individual sharing the files. Larman’s alibi was that he was on duty at the
    local army base from 9 a.m. until 9 p.m. on October 23. Larman argues that
    he could not have started sharing the files at 8:12 a.m. and stopped sharing
    them at 8:57 a.m. because he was not present at his house during this time.
    Although Larman appears to have been at work during this incident of sharing,
    the Government put on ample evidence that Larman did not need to be
    physically present at the house to allow the files’ transmission to other
    computers.
    The Government compared the act of sharing of files on a P2P network
    to the operation of a self-service gas station where the sharer merely provides
    access to the files and the recipient “helps himself” to the files by downloading
    them. United States v. Richardson, 
    713 F.3d 232
    , 236 (5th Cir. 2013) (citing
    United States v. Shaffer, 
    472 F.3d 1219
    , 1223-24 (10th Cir. 2007)). At oral
    argument, the Government cleared up any confusion regarding the duration of
    the sharing by explaining that the CPS system began pinging, or sending a
    signal to, P2P users’ folders at 8:12 and ceased at 8:57; the sharing ceased
    because the CPS system quit searching, not because of some activity from
    Larman’s IP address while Larman was at work.
    The    evidence    supporting   the   attempted     distribution   count   is
    circumstantial in nature, but it nevertheless paints a clear picture for the jury
    to determine that Larman was the culpable individual. Larman’s modem was
    9
    Case: 12-50855       Document: 00512440480    Page: 10   Date Filed: 11/13/2013
    No. 12-50855
    password protected and, as previously discussed, there is no evidence that
    Morgan ever accessed Larman’s media devices outside of his presence. The IP
    address sharing the child pornography on October 23 matched Larman’s
    modem, and the subsequent investigation of Larman’s computer revealed that
    many of the images found on it matched those made available on the P2P
    network during the sharing incident. Even though Larman’s shared folder did
    not contain any child pornography at the moment it was seized, five months
    had passed since the sharing incident.        The Government established that
    Larman possessed the technical expertise to create, delete, and manipulate
    folders and files on his computer; a rational trier of fact could conclude that if
    Larman used Frostwire to distribute the images, he likely moved them out of
    the shared folder. On the other hand, evidence that Limewire previously had
    been installed and then deleted from C1H1 also suggests that Larman could
    have used that particular P2P program to share the files and that its
    subsequent deletion before the execution of the search warrant prevented
    another shared folder from being examined.
    In sum, we hold that there was sufficient evidence for the jury to convict
    Larman on Counts One (receipt), Two (attempted distribution), and Three
    (possession) of his child pornography conviction.
    III.
    Next, Larman raises an evidentiary issue and argues that the district
    court committed reversible error when it refused to allow him to testify as to
    his version of the incriminating statements he made to the agents in their
    interview with him, that is, unless such testimony was accompanied by a
    limiting instruction.
    Under Rule 103(a) of the Federal Rules of Evidence, a party may only
    challenge a district court’s evidentiary ruling excluding evidence if that party
    “informs the court of its substance by an offer of proof, unless the substance
    10
    Case: 12-50855        Document: 00512440480           Page: 11     Date Filed: 11/13/2013
    No. 12-50855
    was apparent from the context.” FED. R. EVID. 103(a). This court “will not even
    consider the propriety of the decision to exclude the evidence at issue, if no
    offer of proof was made at trial.” United States v. Winkle, 
    587 F.2d 705
    , 710
    (5th Cir. 1979).
    In response to the court’s exclusion of the testimony, Larman failed to
    offer the substance of the excluded testimony. When informed that Larman’s
    testimony would be subject to the limiting instruction, Larman’s attorney told
    the district court that he would not ask the question “at [that] point.” We
    understand that his testimony would have contradicted the agents’ account of
    what he told them, but what is not apparent from the record, is how it would
    have differed from the agents’ accounts. 4 In short, counsel simply made no
    offer of proof. As a result, we find that Larman’s challenge to the district
    court’s exclusion of his testimony fails due to an insufficient offer of proof.
    IV.
    Finally, Larman challenges his conviction based on two alleged errors
    with the jury instructions.          We review a district court’s decisions on jury
    instruction for abuse of discretion. United States v. Demmitt, 
    706 F.3d 665
    ,
    675 (5th Cir. 2013).
    First, Larman challenges the district court’s deliberate ignorance
    instruction on grounds that the instruction is not supported by the facts of the
    case. Even if we assume error, we have consistently held that such an error is
    “harmless where there is substantial evidence of actual knowledge.” United
    States v. Threadgill, 
    172 F.3d 357
    , 369 (5th Cir. 1999) (citation and internal
    4 Mere statements that a criminal defendant will give “his version” of a conversation
    are “not sufficient to make known to the court the substance of the evidence.” United States
    v. Winkle, 
    587 F.2d 705
    , 710 (5th Cir. 1979). Our precedent is clear that “[a] general
    description of the excluded evidence . . . [will] not preserve error.” United States v. Ballis, 
    28 F.3d 1399
    , 1406 (5th Cir. 1994).
    11
    Case: 12-50855      Document: 00512440480        Page: 12    Date Filed: 11/13/2013
    No. 12-50855
    quotation marks omitted).        The overwhelming evidence, recounted in this
    opinion, of Larman’s actual knowledge renders the error harmless. 5
    Second, Larman challenges the district court’s refusal to give a
    Pennington instruction addressing Larman’s knowledge of the illicit images on
    his media devices. 6 The instruction derives from United States v. Pennington,
    in which two truck drivers were indicted on drug possession charges after
    authorities discovered large amounts of marijuana in their tractor-trailer. 
    20 F.3d 593
    (5th Cir. 1994). Both defendants claimed they did not know the drugs
    were in the vehicle, and that they could not be guilty because the Government
    failed to produce evidence of such knowledge. 
    Id. at 597-98.
    In response to
    their argument, this court declared that “[t]he knowledge element in a
    possession case can be inferred from control of the vehicle in some cases[,]” but
    where the illicit substance is “hidden . . . control [over the vehicle] alone is not
    sufficient to prove knowledge.”        
    Id. at 598.
       Although we found that the
    marijuana in the defendants’ tractor-trailer was indeed “hidden,” we
    nevertheless upheld the verdict because the Government had offered
    additional evidence beyond the defendants’ mere control of the vehicle, to show
    the defendants’ guilt. 
    Id. Here, Larman’s
    files were easily and quickly accessible. The fact that
    images found on TD-1 and TD-2 sat below the top level of visible folders is
    simply not enough for those images to be considered “hidden” within the
    5  Here, the Government offered ample evidence that Larman had actual knowledge of
    his receipt, attempted distribution, and possession of child pornography. Such evidence
    included the agents’ testimony regarding Larman’s admissions, the structure of the file
    folders on C1H1, TD-1, and TD-2, along with Larman’s ownership of the CD-R, which
    contained several child pornography images.
    6 As an initial matter, we have no authority that a Pennington instruction is even
    appropriate in any child pornography case. In one unpublished decision only, have we
    evaluated a claim whether a Pennington instruction was proper involving child pornography
    possession. United States v. Adams, 338 F. App’x 417, 420 (5th Cir. 2009).
    12
    Case: 12-50855    Document: 00512440480      Page: 13   Date Filed: 11/13/2013
    No. 12-50855
    meaning of Pennington. We therefore find no abuse of discretion in refusing
    Larman’s requested Pennington instruction.
    V.
    We now turn to Larman’s sentencing claims. Larman’s raises two issues,
    both involving sentencing enhancements. A “district court’s application of the
    Guidelines . . . is reviewed de novo.” United States v. Smith, 
    440 F.3d 704
    , 706
    (5th Cir. 2006).    We “accept[] findings of fact made in connection with
    sentencing unless clearly erroneous.” 
    Id. Larman first
    challenges his two-level enhancement imposed under
    § 2G2.2(b)(3)(f), reflecting an enhancement based upon distribution of child
    pornography. Our earlier finding that the evidence supported the jury’s verdict
    that Larman attempted to distribute child pornographic images–as charged in
    Count Two of the indictment–adequately supports the imposition of this
    enhancement without further discussion.
    Larman’s next challenge is to his two-level enhancement imposed under
    § 3A1.1(b)(1), on grounds that his victims were vulnerable victims. He argues
    that his specific offense guideline, under § 2G2.2(b)(2), already takes into
    account the ages of the children, and so the imposition of that particular
    vulnerable victim enhancement constitutes double counting. We rejected such
    an argument in a recent opinion. See United States v. Jenkins, 
    712 F.3d 209
    ,
    213-14 (5th Cir. 2013) (holding that an enhancement under § 3A1.1(b)(1) is still
    appropriate when the “under 12” enhancement in § 2G2.2(b)(2) is also applied).
    Thus, there is no error here.
    VI.
    In sum, we conclude, first, that there was sufficient evidence to convict
    Larman on Counts One (receipt), Two (attempted distribution), and Three
    (possession) of his indictment. Second, because Larman failed to make an offer
    of proof, he cannot challenge the district court’s evidentiary ruling excluding
    13
    Case: 12-50855     Document: 00512440480     Page: 14   Date Filed: 11/13/2013
    No. 12-50855
    part of his testimony at trial.     Third, any error concerning a deliberate
    ignorance instruction was harmless because of overwhelming evidence of
    Larman’s actual knowledge. Fourth, the district court did not err in refusing
    Larman’s Pennington instruction because the child pornography files were not
    “hidden” on his media devices. And, finally, both of the challenged sentencing
    enhancements were proper under the Guidelines. Accordingly, the judgment
    of the district court is
    AFFIRMED.
    14