-
United States Court of Appeals For the Eighth Circuit ___________________________ No. 15-1209 ___________________________ United States of America lllllllllllllllllllll Plaintiff - Appellee v. Timothy DeFoggi lllllllllllllllllllll Defendant - Appellant ____________ Appeal from United States District Court for the District of Nebraska - Omaha ____________ Submitted: November 19, 2015 Filed: October 6, 2016 ____________ Before RILEY, Chief Judge, BEAM and KELLY, Circuit Judges. ____________ KELLY, Circuit Judge. Timothy DeFoggi was convicted of multiple child pornography-related offenses following a jury trial. On appeal, he challenges several pretrial and trial rulings, argues there was insufficient evidence to support his convictions, and asserts his 300-month sentence was imposed in violation of the Eighth Amendment. We affirm in part and reverse in part. I. Background The FBI began an investigation in 2012 into a computer server in Bellevue, Nebraska, that was hosting child-pornography websites on the “Tor” network. The Tor network is designed to keep a user’s identity anonymous by requiring special software that obscures a user’s physical location. The network routed communications through a network of other computers, making traditional IP identification techniques ineffective. One of the hosted websites was called “PedoBook.” The website operated from March 2012 until December 2012, advertising and distributing child pornography and hosting discussions about the sexual abuse of children. On November 18, 2012, the FBI seized the computer server hosting PedoBook, but continued to operate the website for investigatory purposes until shutting it down completely on December 8, 2012. As part of this investigation, the FBI obtained an order from the United States District Court for the District of Nebraska allowing it to monitor electronic communications of PedoBook users. Both before and after its seizure by law enforcement, agents viewed, examined, and documented the contents of PedoBook, which contained thousands of photos and videos depicting images of child pornography. PedoBook had over 8,100 members, each registered with a username and password. Once registered, a member could set up a profile with a picture, could request access to private groups, and could use a messages feature not available to other users. Members with profiles were able to set up groups based on specific interests and subcategories for posting distinct types of child pornography. Timothy DeFoggi, the former acting director of cyber security at the United States Department of Health and Human Services, was a registered member and user of PedoBook. He used the username “fuckchrist” and the display name “Ptasseater.” He registered on March 2, 2012. DeFoggi and other PedoBook members occasionally shared personal information, including e-mail addresses, in private messages so they -2- could communicate with other PedoBook members and distribute child pornography on a one-to-one basis. Evidence showed that DeFoggi joined 32 groups on PedoBook between March 2, 2012, and December 8, 2012. Between April 19, 2012, and December 5, 2012, he exchanged numerous private messages with other PedoBook members expressing, among other things, an interest in the rape and murder of infants and toddlers. DeFoggi moved to suppress evidence obtained through the interception of electronic communications and evidence obtained during a search of his residence. He also moved to preclude the government from introducing at trial what he termed “fantasy chat private messages” sent to and from his username, arguing the messages were not relevant and were overly prejudicial. The district court denied these motions. After a jury trial, DeFoggi was convicted on all counts: knowingly engaging in a child exploitation enterprise in violation of 18 U.S.C. § 2252A(g) (Count 1), conspiracy to advertise child pornography in violation of
18 U.S.C. § 2251(d)(1) and (e) (Count 2), conspiracy to distribute child pornography in violation of 18 U.S.C. § 2252A(a)(2) and (b)(1) (Count 3), and knowingly accessing a means or facility of interstate commerce to view child pornography in violation of 18 U.S.C. § 2252A(a)(5)(B) (Counts 4–7). The district court granted DeFoggi’s motion for judgment of acquittal in part by vacating the convictions on Counts 2 and 3 as lesser included offenses of Count 1, and denied his motion for a new trial. On January 5, 2015, the court sentenced DeFoggi to 300 months’ imprisonment on Count 1, and lesser amounts for all other counts of conviction (Counts 4–7), to run concurrently. DeFoggi timely appealed. -3- II. Discussion A. Application for Interception of Electronic Communication DeFoggi argues that the district court erred in denying his motion to suppress evidence obtained through the interception of electronic communications, because the application to intercept his communications was not properly authorized. At the suppression hearing, however, the magistrate judge found to the contrary, and DeFoggi did not object to this finding. Noting DeFoggi’s lack of objection, the district court affirmed the magistrate judge’s finding. Because DeFoggi filed no objection to the magistrate judge’s report and recommendation on this issue, “we review the findings of fact underlying his appeal for plain error and the admissibility of [the evidence obtained through the interception of his electronic communications] de novo.” United States v. Lockett,
393 F.3d 834, 837 (8th Cir. 2005). An application to intercept electronic communications must contain the identity of the authorized official who approved it. See
18 U.S.C. § 2518(1).1 Intercepted electronic communications may be suppressed upon a showing that, as relevant here, “the order of authorization or approval under which it was intercepted is insufficient on its face,” or “the interception was not made in conformity with the order of authorization or approval.”
18 U.S.C. § 2518(10)(a)(i)–(ii). 1 The statute states in relevant part: “Each application for an order authorizing or approving the interception of a wire, oral, or electronic communication . . . shall be made in writing upon oath or affirmation to a judge of competent jurisdiction and shall state the applicant’s authority to make such application. Each application shall include the following information: (a) the identity of the investigative or law enforcement officer making the application, and the officer authorizing the application. . . .”
18 U.S.C. § 2518(1). -4- The application submitted in this case stated that “[a] copy of the memorandum of an official specially designated by the Attorney General of the United States authorizing this application is attached to this application as Exhibit A.” DeFoggi argues that he did not receive the memorandum attachment in discovery, and that there was nothing to show that the approving judge received the required memorandum either. The government acknowledged to the district court that the memorandum may not have been included in the original discovery materials provided to DeFoggi at the start of the case. Whether or not DeFoggi received it, the relevant question for review is whether the approving judge had the document at the time she approved the application to intercept electronic communications. At the hearing on DeFoggi’s motion to suppress, the government presented an uncertified copy of a letter signed by Kenneth A. Blanco, Deputy Assistant Attorney General. During the suppression hearing, the magistrate judge requested certified copies of the application and the authorizing letter from Blanco. DeFoggi does not allege that Blanco was not authorized to sign the application. See
18 U.S.C. § 2516(1) (a Deputy Assistant Attorney General is an officer qualified to authorize the application). Rather, he asserts that the letter identifying Blanco as the authorizing officer was not attached to the application submitted to the approving judge. The failure to attach authorization documents can warrant suppression, see United States v. Lomeli,
676 F.3d 734, 741–42 (8th Cir. 2012), but here, the magistrate judge specifically found that “the Chief Judge of the U.S. District Court for the District of Nebraska authorized the interception of . . . DeFoggi’s communications,” on November 18, 2012, and “[t]he application submitted in connection with that authorization included, as an exhibit, a copy of a memorandum signed by Kenneth A. Blanco . . . .” The magistrate judge therefore concluded that “the authorizing judge . . . had the name of the actual, statutorily designated official who had indeed authorized the application,” and that DeFoggi’s motion to suppress -5- should be denied. The district court adopted this finding. DeFoggi offers no argument as to why this finding is plainly erroneous, asserting only that “there is no record to demonstrate the approving judge received [the signed letter from Blanco].” But, after examining the exhibits, the court ruled otherwise. Under these circumstances, we cannot say the district court erred in finding that the application as presented to the district court included the necessary authorization documents. Because the application was properly authorized, and the district court had this information at the time of approval, the district court did not err in denying DeFoggi’s motion to suppress. See Lockett,
393 F.3d at 837. B. Search Warrant DeFoggi also argues the district court erred in denying his motion to suppress evidence obtained during the search of his home on April 9, 2013, because the affidavit in support of the warrant did not establish probable cause. In particular, he argues that there was insufficient information linking him to PedoBook, and thus no probable cause to believe that evidence of criminal activity would be found at his residence. “We review de novo the district court’s legal determination of probable cause.” United v. Hager,
710 F.3d 830, 836 (8th Cir. 2013) (citing United States v. Coleman,
700 F.3d 329, 334 (8th Cir. 2012)). “Probable cause exists when there is a fair probability that contraband or evidence of a crime will be found in a particular place.”
Id.(quotations and citations omitted). We utilize a totality of the circumstances test and a common sense approach when reviewing whether probable cause exists.
Id.(quotations and citations omitted). We “may draw reasonable inferences from the totality of the circumstances in determining whether probable cause exists to issue a warrant.”
Id.(quotation omitted). -6- The search warrant here was supported by probable cause. The warrant application included an affidavit written by Special Agent Patricia J. Teakle of the FBI, which carefully described PedoBook, the FBI’s methods of identifying its users, and the link between DeFoggi and the website. As an initial matter, the affidavit explained that because it was on the Tor network, PedoBook could not be accessed without the installation of appropriate software and knowledge of its exact web address. A user could obtain the web address for the website directly from other users, or from internet postings describing PedoBook’s content and location, but not from any type of web search. Accessing PedoBook therefore required numerous affirmative steps by the user, making it extremely unlikely that a user would stumble upon it without knowing that its purpose was to advertise and distribute child pornography and understanding the content to be found there. The affidavit also explained that, through the government’s monitoring and searches of the data logs once it had control of PedoBook, the FBI concluded that an account was created on or about April 18, 2012, with the username “fuckchrist” and display name “Ptasseater.” The affidavit included examples of activity conducted on PedoBook by that member, including the filenames of the child pornography images accessed and the private messages sent between that member and others. An FBI “online covert employee” contacted that member via the private messaging feature of PedoBook, and the member gave the FBI employee an email address (fuckchrist@tormail.org) and told him he normally accessed the Tor network from 4:00 a.m. to 6:00 a.m. and 4:30 p.m. to 6:00 p.m. The affidavit then described how the FBI connected that username and display name to DeFoggi. Several pages of the affidavit discussed how DeFoggi used these same names for multiple child pornography websites, where he made comments very -7- similar in substance and tone to those made on PedoBook. The FBI obtained an IP address associated with the account “ptasseater” from one such website – an image hosting website – which was connected to Verizon Internet Services. Verizon then provided the personal information for the individual associated with that IP address during the time period in which that user accessed child pornography on the image hosting site – and that individual was DeFoggi. Other IP addresses used to access child pornography were connected to DeFoggi in a similar manner. Moreover, the affidavit explained that a subject under FBI investigation for activities related to child exploitation material had provided the FBI with information on an individual initially identified as “Jeff,” who was a member of “boylover.net,” a known website for underage male child pornography, and used a variety of email addresses including “ptasseater@hotmail.com.” The informant also provided the FBI with a cell phone number for “Jeff” and told them of an individual who had personally met “Jeff.” “Jeff” turned out to be DeFoggi, and he told the individual (then under FBI surveillance) in-person that his real name was Tim, that he worked in the DC area, that he had a government security clearance, and that he had a domestic partner. An open source database check confirmed that DeFoggi lived at 20311 Crown Ridge Court, Germantown, Maryland. The FBI then confirmed through the United States Postal Service and visual surveillance that DeFoggi received mail at that residence and maintained a vehicle registered in his name there. The cell phone number for “Jeff” was eventually linked to DeFoggi. Finally, through surveillance with a pen register and a trap and trace obtained for DeFoggi’s internet account, the FBI learned that computers in DeFoggi’s home were connected to the Tor network at the same times that “ptasseater” claimed to be online in the private chats over PedoBook. -8- DeFoggi counters that because a Myspace profile included in the affidavit did not belong to him, the FBI had failed to link him to the accounts with the usernames “ptasseater” and “fuckchrist.” DeFoggi argues others could have used the same usernames, and that because the affidavit did not identify an IP address for DeFoggi that linked him directly to PedoBook (although the FBI connected IP addresses linked to DeFoggi to other child pornography websites), there was no probable cause. Given the cumulative information included in the search warrant application linking DeFoggi to multiple child pornography websites including PedoBook, these assertions do not detract from our conclusion that probable cause existed. The affidavit in support of the search warrant provided more than enough information to support a finding of probable cause to believe that evidence of criminal activity would be found at DeFoggi’s residence. C. Evidence of Chat Messages DeFoggi also argues that the district court erred in denying his motion to exclude evidence of his “fantasy chat messages” at trial because they were not relevant under Federal Rule of Evidence 401 and were unfairly prejudicial under Federal Rule of Evidence 403. Challenges to evidentiary rulings are reviewed for an abuse of discretion. United States v. Sewell,
457 F.3d 841, 843 (8th Cir. 2006). We will reverse only if an error “affects the substantial rights of the defendant” or has “more than a slight influence on the [jury’s] verdict.” United States v. Yarrington,
634 F.3d 440, 447 (8th Cir. 2011) (quoting United States v. Elbert,
561 F.3d 771, 775 (8th Cir. 2009)). “We will not reverse if the error was harmless.”
Id.Rule 401 states that to be relevant, evidence must tend to make a fact more or less probable or “be of consequence in determining the action.” Fed. R. Evid. 401. We have previously held that personal chats on child pornography websites are -9- admissible as circumstantial evidence associating the defendant “with the child pornography found on his computer,” and that “the district court was within its discretion to admit” such chats. United States v. Manning,
738 F.3d 937, 943 (8th Cir. 2014). As in Manning, “portions of the chats contained identifying information about [DeFoggi].”
Id.In the chats, DeFoggi wrote at length about his interest in child pornography and solicited child pornography from other members of PedoBook. DeFoggi’s chats therefore “revealed [his] identity, his preferences for different types of child pornography, and his desire to exchange child pornography with other people online.”
Id. at 944. DeFoggi was charged with knowingly accessing a means or facility of interstate commerce to view child pornography, and the chats were relevant (once DeFoggi was connected to his usernames) as a means of identifying DeFoggi as the person knowingly accessing the child pornography on his computer. The district court thus did not abuse its discretion in determining that DeFoggi’s chats were relevant evidence under Rule 401. DeFoggi argues that even if the chats were relevant, the district court nonetheless erred in admitting them because they were unfairly prejudicial due to their shocking nature. Relevant evidence may still be excluded if “its probative value is substantially outweighed by a danger of . . . unfair prejudice.” Fed. R. Evid. 403. And we agree that chats fantasizing about raping and killing children “are by their very nature disturbing,” and “highly likely to generate an emotional response.” United States v. Evans,
802 F.3d 942, 946 (8th Cir. 2015). But the disturbing nature of otherwise relevant evidence cannot be the sole reason to exclude it.
Id.(“[Rule 403] does not offer protection against evidence that is merely prejudicial in the sense of being detrimental to a party’s case,” but rather “evidence that is ‘unfairly prejudicial.’” (quoting United States v. McCourt,
468 F.3d 1088, 1092 (8th Cir. 2006))); see also United States v. Johnson,
463 F.3d 803, 809 (8th Cir. 2006). -10- While the pure volume of the chats admitted into evidence concerns us, see Evans, 802 F.3d at 946, DeFoggi makes only the most general of arguments on appeal as to how their admission prejudiced him. He does not identify any specific chats he believes are especially problematic; and he does not explain how the jury was prejudiced, how the chats may have unfairly affected their view of the charges against him, or how the chats were more disturbing than the images themselves. DeFoggi calls the chats “shocking,” but “does not articulate what unfair prejudice resulted from the publication of this evidence to the jury.” Id. (citing McCourt,
468 F.3d at 1092, for the proposition that “[t]he Supreme Court has advised that Rule 403 requires a preliminary showing of unfair prejudice before the need to balance the probative value of the evidence and its alternatives arises”). Simply characterizing the evidence in this way does not give us sufficient grounds to conclude that the district court abused its discretion in admitting the chats.2 “Without a preliminary showing of prejudice, ‘we need not consider or weigh the probative value’” of the chats.
Id.(quoting United States v. Worthey,
716 F.3d 1107, 1115 (8th Cir. 2013)). D. Sufficiency of the Evidence DeFoggi alleges that the government failed to adduce sufficient evidence to convict him beyond a reasonable doubt of a child exploitation enterprise and access with intent to view child pornography. We review the sufficiency of the evidence in a jury trial de novo, but examine the evidence in the light most favorable to the jury’s verdict, resolving factual disputes and accepting all reasonable inferences in support of the verdict. Manning, 738 F.3d at 945. We must uphold the jury’s verdict “if there is an interpretation of the evidence that would allow a reasonable-minded jury to 2 DeFoggi repeats his assertion that his chat messages were overly prejudicial with regard to his motion for a new trial. We reject his challenge to the denial of his motion for a new trial based on his chat messages for these same reasons. -11- conclude guilt beyond a reasonable doubt.” United States v. Thompson,
285 F.3d 731, 733 (8th Cir. 2002). 1. Count 1 DeFoggi was convicted of engaging in a child exploitation enterprise (CEE), in violation of 18 U.S.C. § 2252A(g). Section 2252A(g) provides: (1) Whoever engages in a child exploitation enterprise shall be fined under this title and imprisoned for any term of years not less than 20 or for life. (2) A person engages in a child exploitation enterprise for the purposes of this section if the person violates [certain other sections] as a part of a series of felony violations constituting three or more separate incidents and involving more than one victim,3 and commits those offenses in concert with three or more other persons. DeFoggi argues that under the proper application of the term “in concert with,” the government provided insufficient evidence for the jury to convict him of engaging in a CEE based on the predicate counts of accessing child pornography. We decide this issue on narrow grounds. The indictment alleged that DeFoggi committed four separate predicate violations as defined in § 2252A(g). Specifically, the government charged four instances of accessing with intent to view child pornography in violation of 18 U.S.C. § 2252A(a)(5)(b) (Counts 4–7). Section 2252A(a)(5)(b) is violated if a person “knowingly accesses with intent to view, any . . . computer disk, or any other 3 The parties do not dispute that the CEE offense as charged involved more than one victim. -12- material that contains an image of child pornography that has been . . . shipped or transported using any means or facility of interstate or foreign commerce or in or affecting interstate or foreign commerce by any means, including by computer.” To convict DeFoggi of a CEE, there must be evidence that he committed at least three of the predicate offenses “in concert with” three or more people. Precedential guidance on the “in concert” language in the CEE offense is limited, but in construing
21 U.S.C. § 848(c), which proscribes a criminal drug enterprise, the Supreme Court has stated that “the plain meaning of the phrase ‘in concert’ signifies mutual agreement in a common plan or enterprise” sufficient to constitute a conspiracy. Rutledge v. United States,
517 U.S. 292, 300 (1996). We agree with our sister circuits that the Supreme Court’s construction of
21 U.S.C. § 848informs our reading of § 2252A(g). See United States v. Grovo, Nos. 15-30016, 15-30027,
2016 WL 3443691, at *4 (9th Cir. Jun. 23, 2016); United States v. Daniels,
653 F.3d 399, 413 (6th Cir. 2011); United States v. Wayerski,
624 F.3d 1342, 1351 (11th Cir. 2010). It follows from Rutledge’s holding that to act “in concert with” requires the same mens rea as a conspiracy charge. Grovo,
2016 WL 3443691, at *4. In this case, however, we do not see sufficient evidence that DeFoggi committed the predicate offenses of accessing child pornography “in concert with” anyone else – even assuming for purposes of analysis that “in concert with” means no more than an agreement.4 For each predicate count, the jury was presented with 4 While DeFoggi argues, as others before him have done, that the statute requires each individual predicate felony to be committed “in concert with” three other persons, we agree with the Ninth and Sixth Circuits that “the more natural reading of § 2252A(g) is that ‘the required total of three other persons may be tallied by considering the predicate counts together.’” Grovo,
2016 WL 3443691, at *5 (quoting Daniels,
653 F.3d at 412). -13- screenshots of other members’ profiles and the images DeFoggi clicked on that were uploaded to the profiles. But we do not understand how the single act of accessing an image with the intent to view it by clicking on it alone from behind one’s computer screen can be done “in concert with” anyone else – at least not on the facts presented here. The government argues that DeFoggi entered a “conspiracy” with three or more other people “to commit the offense of accessing with intent to view child pornography.”5 But even assuming without deciding that the CEE offense requires a conspiracy and nothing more, the evidence was insufficient here. Conspiracy requires an agreement to accomplish the specific illegal objective at issue – here, accessing child pornography. The evidence showed that many people voluntarily joined PedoBook in part to access child pornography. But that does not necessarily mean that DeFoggi, when he accessed child pornography on the specific occasions charged in the predicate counts 4–7, agreed to do so with anyone else. And the trial record is bereft of evidence of any such agreement in this case. Even if we further assume that participants in the enterprise need not act simultaneously, see id. at *5, the government failed to offer evidence that DeFoggi acted in concert with anyone concerning the underlying elements of the offense of accessing with intent to view child pornography as charged in Counts 4–7. 5 We note that this argument appears to overlook the statutory requirement that a person charged with engaging in a CEE must commit three offenses, not simply agree to commit them, in order to be convicted. See 18 U.S.C. § 2252A(g). -14- Like several of the defendants in the cases analyzed by our sister circuits,6 DeFoggi participated in interactive features of the child pornography website at issue, such as private messaging between members. Yet that conduct is separate and apart from the offenses that constituted the underlying predicates necessary to sustain the child exploitation enterprise offense, i.e., accessing with intent to view child pornography. Whether or not DeFoggi’s other PedoBook-related activities were proscribed by other statutes, the government failed to prove that DeFoggi was guilty of violation 18 U.S.C. § 2252A(g) as the offense was charged in this case. 2. Counts 4–7 DeFoggi also argues that no reasonable jury could have concluded beyond a reasonable doubt that he “intentionally” accessed PedoBook to view child pornography as charged in Counts 4–7. This is because, he asserts, (1) the government failed to provide any direct evidence that he was the person who was using the computer to view PedoBook, (2) even if he did access PedoBook, he did so because he used the Tor network for work, not so that he could view child pornography, and (3) his chats did not show an intent to access or solicit child pornography because they were “mere fantasy.”7 6 See, e.g., Grovo,
2016 WL 3443691, at *6 (“Both defendants posted hundreds of times, . . . gained admission to the upper level of the . . . board after being admitted and elevated through a vouching process, . . . [and] repeatedly accessed and distributed child pornography.”); Wayerski,
624 F.3d at 1348(defendants participated in a sophisticated group, communicated with each other, limited its membership, and “made specific requests for and purchased the production of new illicit material”). 7 DeFoggi also makes these assertions in support of his argument that there was insufficient evidence to convict him on Count 1. Given our ruling above, we consider them only as to Counts 4–7. -15- As previously discussed, evidence tied DeFoggi to the online username and display name “fuckchrist” and “Ptasseater” on the PedoBook website. The FBI’s investigation into those usernames through open source database searches, administrative subpoenas to DeFoggi’s internet service providers, and cooperation with foreign law enforcement revealed that the usernames belonged to DeFoggi. There was Tor traffic associated with those identities occurring at his residence in the early morning hours on the PedoBook website. In private chats on PedoBook, DeFoggi disclosed identifying information such as his geographic location and the times when he frequented PedoBook and other child pornography websites. His in- person meeting with another person under investigation established that his name was Tim and let the FBI know DeFoggi had a domestic partner who was unaware of his interests (information that eventually helped the FBI determine who at DeFoggi’s address was accessing child pornography). DeFoggi had extensive knowledge of the Tor network, and PedoBook could not be discovered and accessed without it. The jury was reasonable in concluding that DeFoggi was accessing PedoBook. Moreover, it was reasonable for the jury to conclude that DeFoggi accessed PedoBook with the intent to view child pornography. The fantasy chat messages on PedoBook revealed “copious amounts of discussion concerning the exchange of child pornography with other users.” Manning, 738 F.3d at 945. DeFoggi disclosed identifying details about himself “in the context of discussing the exchange of child pornography with others.” Id. DeFoggi argues that those chats were “mere fantasy” and not indicative of solicitation or of a step toward obtaining child pornography. He argues that the chats are therefore “speech protected under the First Amendment.” However, the solicitation of child pornography can be proscribed without First Amendment concerns where a “statute penalizes speech that accompanies or seeks to induce a transfer of child pornography – via reproduction or physical delivery – from one person to another.” United States v. Williams,
553 U.S. 285, 294 (2008). -16- “[O]ffers to provide or requests to obtain child pornography are categorically excluded from the First Amendment.”
Id. at 299. DeFoggi asked other members of PedoBook where he could find certain videos and whether they had or could produce images for him. He then provided his email address to those other members. Such solicitations were not just “speech protected under the First Amendment,” as DeFoggi argues. Rather, the evidence presented at trial was sufficient to prove that he intended to access child pornography. Additional evidence also showed that DeFoggi was accessing PedoBook and illustrated his specific intent to access child pornography in doing so. For instance, when the FBI executed the search warrant at DeFoggi’s residence, he had to be forcibly separated from his laptop, which was actively downloading a child pornography video. The laptop contained evidence of the username “fuckchrist” and a Yahoo Messenger profile for “PTasseater69.” In addition, the Tor browser bundle was found on the laptop with evidence of browsing activities on multiple child pornography sites, including PedoBook. Images of child pornography were also located on the computer. DeFoggi’s actions in attempting to maintain anonymity by creating usernames, registering as a member of the website, creating a profile page, selecting or accepting other members as “friends,” joining various subcategory groups, requesting or soliciting child pornography from other members, as well as the contents of his laptop when he was apprehended are more than enough to support a jury finding of intent. The jury was free to accept or reject DeFoggi’s theory that someone else had used his computer or that he had accessed PedoBook for professional reasons. See United States v. Henley,
766 F.3d 893, 905 (8th Cir. 2014) (“In reviewing a challenge to the sufficiency of the evidence . . . ‘a jury’s credibility determinations are virtually unreviewable.’” (quoting United States v. Perez,
663 F.3d 387, 391 (8th Cir. 2011))). -17- He does no more than restate that argument here. Upon the evidence presented, we find that a reasonable jury could conclude beyond a reasonable doubt that DeFoggi accessed PedoBook and other websites with the intent to view child pornography. The offense of accessing child pornography also requires an “interstate commerce” nexus.8 DeFoggi alleges that there is no evidence that the computer disk or other material containing visual depictions of child pornography were transported in interstate commerce because “[t]he interstate nexus must be established prior to the user’s access.” “The Internet is an instrumentality and channel of interstate commerce.” United States v. Havlik,
710 F.3d 818, 824 (8th Cir. 2013) (citing United States v. Trotter,
478 F.3d 918, 921 (8th Cir. 2007)). DeFoggi’s use of the internet to access and download images and videos from PedoBook is enough in this case to satisfy the interstate commerce nexus. Even if it were not, the content of PedoBook was uploaded by the website’s global users. The server that hosted the data that comprised the PedoBook website was located in Nebraska. A user accessing the website and its content from Maryland would be accessing data that was stored on and had traveled from a server located in Nebraska. A reasonable trier of fact therefore could find that DeFoggi accessed the website with the intent to view child 8
18 U.S.C. § 2252(a)(5)(B) criminalizes a person who: knowingly possesses, or knowingly accesses with intent to view, any book, magazine, periodical, film, videotape, computer disk, or any other material that contains an image of child pornography that has been mailed, or shipped or transported using any means or facility of interstate or foreign commerce or in or affecting interstate or foreign commerce by any means, including by computer, or that was produced using materials that have been mailed, or shipped or transported in or affecting interstate or foreign commerce by any means, including by computer . . . . -18- pornography that had been transported using a means or facility of interstate commerce.9 See
id.E. Jury Instructions10 DeFoggi challenges Instruction 37, which begins with the sentence “You have heard evidence that the defendant committed offenses involving child pornography that were not charged in the Indictment.” DeFoggi argues that the sentence should have read: “You have heard evidence that the defendant committed similar acts in the past that were not charged in the Indictment.” But DeFoggi himself requested an instruction that included the language he now objects to, and his objection is therefore waived. See United States v. Davis,
2016 WL 3457264, at *3 (8th Cir. Jun. 24, 2016) (“When a party expressly agrees to an instruction, the doctrine of invited error applies, and any objection to the instruction is waived.” (citations omitted)). Even if this issue were properly before us, DeFoggi fails to offer any argument as to why the objected-to language is erroneous. See United States v. Byrd,
542 F.2d 1026, 1029 (8th Cir. 1976) (citing United States v. Phillips,
522 F.2d 388, 391 (8th Cir. 1975)); see also Ahlberg v. Chrysler Corp.,
481 F.3d 630, 634 (8th Cir. 2007) (holding points not meaningfully argued in opening brief are waived); United States 9 DeFoggi alleged that because the evidence was insufficient the district court abused its discretion in denying his motion for a new trial. As discussed in our analysis of DeFoggi’s challenge to the sufficiency of the evidence, the evidence adequately supported the jury’s verdict on all but DeFoggi’s conviction for a child exploitation enterprise. 10 DeFoggi asserts various errors in the jury instructions as they relate to Count 1, including the definition of the phrase “in concert with.” He also reasserts other objections to the instructions as they relate to Count 1. Given our ruling above, we need not address these arguments. -19- v. Cruz-Zuniga,
571 F.3d 721, 725 (8th Cir. 2009) (“The district court has wide discretion in formulating instructions.” (quoting United States v. Long,
977 F.2d 1264, 1272 (8th Cir. 1992))). DeFoggi also renews his objection regarding a venue instruction, but offers no argument as to why or how the district court erred, so this objection is likewise waived. See Ahlberg,
481 F.3d at 634. III. Conclusion Because DeFoggi was improperly convicted of engaging in a child exploitation enterprise, we vacate his conviction and remand for resentencing.11 We affirm the judgments in all other respects. ______________________________ 11 DeFoggi contends that the 20-year mandatory minimum sentence for a child exploitation enterprise is a violation of the Eighth Amendment’s ban on cruel and unusual punishment. As we vacate his conviction on that count, we need not address DeFoggi’s Eighth Amendment challenge. -20-
Document Info
Docket Number: 15-1209
Citation Numbers: 839 F.3d 701, 101 Fed. R. Serv. 833, 2016 U.S. App. LEXIS 18144, 2016 WL 5846236
Judges: Riley, Beam, Kelly
Filed Date: 10/6/2016
Precedential Status: Precedential
Modified Date: 10/19/2024