United States v. Kain
UNITED STATES of America, Plaintiff-Appellee, v. Andrew Charles KAIN, Defendant-Appellant
Attorneys
Frank K. Carlson, Sarah K. Tupper, Union, MO, for appellant., Tiffany G. Becker, AUSA, St. Louis, MO, for appellee.
Full Opinion (html_with_citations)
Andrew Charles Kain was convicted after a bench trial of possessing marijuana with intent to distribute in violation of 21 U.S.C. §§ 841(a)(1) and 860(a), and possession of child pornography in violation of 18 U.S.C. § 2252A(a)(5)(B). The district court 1 sentenced Kain to concurrent 78-month prison sentences on each count. He appeals the child pornography conviction, arguing the government failed to prove essential elements of the charge and the district court erred in admitting testimony that one image depicted a minor child, and raising one sentencing issue. We affirm.
I. Sufficiency of the Evidence
A. The Relevant Statute. In the Child Pornography Prevention Act of 1996, Congress found that âprohibiting the possession and viewing of child pornographyâ will help âto protect the victims of child pornography and to eliminate the market for the sexual exploitative use of children.â Pub.L. No. 104-208, Tit. I, § 121, subsec. 1(12), 110 Stat. 3009-27 (1996). The Act added 18 U.S.C. § 2252A to the arsenal of federal statutes prohibiting the sexual exploitation and abuse of children. Kain was convicted of violating § 2252A(a)(5)(B), which as amended provides that any person who âknowingly possesses, or knowingly accesses with intent to view, any ... computer disk, or any other material that contains an image of child pornographyâ that has been transported or produced in interstate commerce âby any means, including by computer,â shall be fined or imprisoned not more than ten years. 2
âChild pornographyâ includes a âvisual depictionâ whose production âinvolves the use of a minor engaging in sexually explicit conduct.â 18 U.S.C. § 2256(8)(A). âVisual depictionâ includes âdata stored on computer disk or by electronic means which is capable of conversion into a visual image.â § 2256(5). âSexually explicit conductâ includes the âlascivious exhibition of the genitals or pubic area of any person.â § 2256(2)(A)(v). A âminorâ is âany person under the age of eighteen years.â § 2256(1). Kain asserts, and the government does not contest, that a defendant to be convicted under § 2252A(a)(5)(B) must know both that the material viewed is sexually explicit, and that the individuals depicted are actual minors. Cf. United States v. X-Citement Video, 513 U.S. 64, 78, 115 S.Ct. 464, 130 L.Ed.2d 372 (1994).
B. Background. Police seized Kainâs laptop computer during a warrant search of his home for evidence of marijuana trafficking. Officers obtained a separate warrant to search the computer, made an exact copy of the hard drive, conducted a *948 forensic examination, and found one hundred or more images of suspected child pornography. Count II of the indictment charged Kain with knowing possession of child pornography, beginning at a time unknown and including the date on which the computer was seized. Count II individually identified twenty-seven images of alleged child pornography. After a bench trial, the district courtâs verdict found Kain âguilty of the offense of possession of child pornographyâ charged in Count II.
On appeal, Kain argues that the government failed to prove (i) that he knowingly possessed images of child pornography found on his computer; (ii) that the images depicted actual children under the age of eighteen, and that he knew those facts; and (in) that twenty-two of the twenty-seven images depicted lascivious exhibition of the genitals, and that Kain knew that any of the images were child pornography. We review the sufficiency of the evidence after a bench trial in the light most favorable to the verdict, upholding the verdict if a reasonable factfinder could find the offense proved beyond a reasonable doubt, even if the evidence ârationally supports two conflicting hypotheses.â United States v. McArthur, 573 F.3d 608, 614 (8th Cir.2009) (quotation omitted). Kainâs conviction for violating 18 U.S.C. § 2252A(a)(5)(B) must be upheld if the government proved all the elements of the offense as to any one of the twenty-seven images. See United States v. Wallenfang, 568 F.3d 649, 658 (8th Cir.2009).
C. The Knowing Possession Element. At trial, narcotics detective Darryl Balley-dier testified that he obtained and executed a warrant to search Kainâs house and seized a laptop computer. Two days later, Kain called an investigator and said he wanted to get his computer back and âclean it out.â Detective Brian Mize testified that he received the computer, made an exact copy of the hard drive, and conducted a forensic examination. One desktop icon was a folder labeled âY,â which contained twenty-one of the images specifically described in Count II of the indictment. Based on his experience as a father and child pornography investigator, Detective Mize opined that the images depicted prepubeseent females. He found the other six images described in Count II in the computerâs âtemporary internetâ and âorphanâ files. These images included prepubescent females engaged in sexual intercourse with, performing oral sex on, and masturbating adult males. Detective Mize described âtemporary internetâ flies as locations where the computer temporarily stores web pages that were previously viewed âso they can be viewed on the computer itself.â 3 âOrphanâ files are files âthat were on the computer somewhere savedâ but were subsequently deleted, âso the computer doesnât know exactly where they came from.â
Detective Mize testified that he ran a virus scan on the hard drive and located several âTrojanâ programs. 4 However, based on the location of many images in a *949 desktop folder, Kainâs knowledge of the images in that folder, and the presence of an updated virus scanner, Mize opined that the images charged in Count II were not placed on the hard drive by a Trojan. Mize also examined the computerâs Internet Explorer browsing history, which evidenced repeated accessing of sites such as â/lolitaMids.html,â âUnderground-love, com,â and âXXX-Land.com.â
FBI Agent Patrick Cunningham testified that, when arrested, Kain admitted he owned the computer and had used it to download 40-50 images of child pornography to the âYâ file. When told investigators found 405 images, Kain responded, â[i]f they found 405 images, then there were 405 images on the computer.â Sergeant William Cawthon of the Texas Rangers testified that he interviewed a nine-year-old girl during an unrelated investigation who was the minor female in one of the images.
In defense, computer forensic examiner Joshua Restivo opined, based on Detective Mizeâs report, that the âlikely causeâ of all the images shown in court being found in the hard drive of Kainâs computer was that they were placed there by Trojan viruses. Restivo also testified that the temporary internet and orphan files were in âuser inaccessible space,â and that it was not possible to determine from Detective Mizeâs report whether the twenty-seven images depicted real children.
After receiving extensive post-trial briefs, the district court issued its written verdict, finding with respect to Count II:
There was expert testimony where the internet history of the hard drive was examined and showed that web sites associated with the pictures that were found had been visited by that computer.... Mr. Kain was the only one to use that computer ... therefore, the Government established that he exercised the dominion and control over the computer and the child pornography found thereon.
The court reviewed the testimony of defense expert Restivo and found it ânot credible.â While Restivoâs opinion that no one could say whether or not Kain or the Trojans had downloaded the child pornography âmight have been somewhat persuasive,â the court found that Restivo âdestroyed his own credibilityâ by opining that more likely than not Trojans put the child pornography on the computer. â[Y]ou canât have it both ways,â the court observed, further noting that Restivoâs opinion was contrary to Kainâs admissions to the investigating officers.
On appeal, relying heavily on the testimony of defense expert Restivo, Kain argues that the government (i) failed to prove knowing possession of the child pornography images found in the âYâ folder because Detective Mizeâs virus scan found powerful Trojans that, when executed, can take over an infected computer and place a child pornography folder on the computerâs desktop, and (ii) failed to prove knowing possession of the images found in âtemporary internetâ and âorphanâ files because they were in user inaccessible space outside Kainâs control.
The presence of Trojan viruses and the location of child pornography in inaccessible internet and orphan files can raise serious issues of inadvertent or unknowing possession. See United States v. Romm, 455 F.3d 990, 998-1001 (9th Cir.2006); United States v. Shiver, 305 Fed.Appx. 640, 642-43 & n. 4 (11th Cir.2008); Howard, Donât Cache Out Your Case: Prosecuting Child Pornography Possession Laws Based on Images Located in Temporary Internet Files, 19 Berkeley Tech. L.J. 1227 (2004). But these are issues of fact, not of law. â[AJctual or *950 constructive possession is a finding of fact we review for clear error.â United States v. Denis, 560 F.3d 872, 873 (8th Cir.2009). The presence of child pornography in temporary internet and orphan files on a computerâs hard drive is evidence of prior possession of that pornography, though of course it is not conclusive evidence of knowing possession and control of the images, just as mere presence in a car from which the police recover contraband does not, without more, establish actual or construction possession of the contraband by a passenger. See United States v. Payne, 377 F.3d 811, 815 (8th Cir.2004).
Here, the district court expressly found Restivo ânot .credible,â a finding that is âvirtually unassailable on appeal.â United States v. Sicaros-Quintero, 557 F.3d 579, 582 (8th Cir.2009). Kainâs admissions and Detective Mizeâs testimony explaining his forensic examination of Kainâs computer provided ample support for the district courtâs finding that Kain knowingly possessed the images of child pornography found on his computer. As we have said in another context, â[c]on-structive possession of contraband is established when a person has ownership, dominion or control over the contraband itself, or dominion over the premises in which the contraband is concealed.â United States v. Cortez, 935 F.2d 135, 143 (8th Cir.1991) (quotation omitted).
A computer user who intentionally accesses child pornography images on a web site gains actual control over the images, just as a person who intentionally browses child pornography in a print magazine âknowingly possessesâ those images, even if he later puts the magazine down without purchasing it. Congress in enacting and later clarifying § 2252A(a)(5)(B) made clear its intent to prohibit the viewing of child pornography in order to protect its child victims. Viewed in the light most favorable to the verdict, the evidence was sufficient for the district court to reasonably find, beyond a reasonable doubt, that Kain knowingly possessed the images of child pornography found on his computer.
D. The Actual Minor Children Element. Child pornography is defined, for purposes of § 2252A(a)(5)(B), as a visual depiction of a minor engaging in sexually explicit conduct. 18 U.S.C. § 2256(8)(A) and (C). We construed that term as referring to depictions of actual children in United States v. Vig, 167 F.3d 443, 449-50 (8th Cir.), cert. denied, 528 U.S. 859 (1999), a construction no doubt mandated by the Supreme Courtâs subsequent decision in Ashcroft v. Free Speech Coalition, 535 U.S. 234, 122 S.Ct. 1389, 152 L.Ed.2d 403 (2002). But the government is not required to introduce evidence other than the images themselves to prove they depict real rather than computer-generated children. Vig, 167 F.3d at 449; accord United States v. Deaton, 328 F.3d 454, 455 (8th Cir.2003).
Defense expert Restivo testified that, based on Detective Mizeâs report, one cannot know whether the twenty-seven images are composite, ânonauthentieâ images of real children (he admitted they did not appear to be computer-generated images). Relying on that testimony, Kain argues the government produced insufficient evidence that the images on his computer depicted actual children under the age of 18. We disagree. The governmentâs evidence included the twenty seven images, Detective Mizeâs opinion the depicted females were prepubescent minors based on their physical features, and testimony by Texas Ranger William Cawthon that the girl depicted in one image was about nine years old when he interviewed her some years after the photograph was taken. Putting aside whether a real child depicted in a composite image may fall within the *951 definition of âidentifiable minorâ in 18 U.S.C. § 2256(9), in which case the visual depiction would be child pornography under § 2256(8)(C), the evidence here was more than sufficient to support the district courtâs finding that the images depicted real minors. Compare United States v. Rayl, 270 F.3d 709, 714 (8th Cir.2001) (upholding a jury verdict).
Kain further argues the evidence was insufficient to prove that he knew the images depicted actual minors. It is likely that Kainâs knowing possession of so many images of child pornography satisfied the governmentâs burden on this element. But in any event, Kainâs admissions when arrested remove all reasonable doubt.
E. The Lascivious Exhibition of Genitals Element. Kain argues that the government presented insufficient proof that twenty-two of the images included a âlascivious exhibition of the genitals or pubic area of any person,â one definition of sexually explicit conduct. See 18 U.S.C. § 2256(2)(A)(v). âA depiction of a child is a lascivious exhibition of the genitals when âthe child is nude or partially clothed, when the focus of the depiction is the childâs genitals or pubic area, and when the image is intended to elicit a sexual response in the viewer.â â Rayl, 270 F.3d at 714, quoting United States v. Horn, 187 F.3d 781, 789 (8th Cir.1999), cert. denied, 529 U.S. 1029, 120 S.Ct. 1442, 146 L.Ed.2d 330 (2000). The other five images depict sexual intercourse or masturbation, which are explicitly included in the definition of sexually explicit conduct. 18 U.S.C. § 2256(2)(A)(i) and (in). Kain argues the government failed to prove he knew that any of the twenty-seven images depicted sexually explicit conduct because these five were in user inaccessible space.
We have reviewed the twenty-seven images. The government argues the district court reasonably found that all depict lascivious exhibition of the genitals or pubic area of minor females. At least as to most of the twenty-two images challenged by Kain on appeal, we agree. They depict nude or partially clothed prepubescent girls and focus on the childâs genitals or pubic area in a way that is âdesigned to appeal to the sexual appetite.â Wallenfang, 568 F.3d at 658 (quotation omitted). We have cautioned that, in a jury trial, the district court should make a preliminary review of whether materials offered by the government depict sexually explicit conduct as a matter of law, to avoid the potential prejudice of submitting to the jury a large volume of prurient materials that could not properly be found to be child pornography. But there is no such risk in a court trial. We conclude that the district court reasonably found that one or more of the twenty-seven images depicted sexually explicit conduct as defined in § 2256(2)(A), and that Kain knew that fact based on his knowing possession of the images and his admissions when arrested.
II. The Texas Rangerâs Testimony
Texas Ranger William Cawthon testified on direct examination, without objection, that he met the girl depicted in one of the twenty-seven images as part of an unrelated child pornography investigation, and that the girl was born in 1990 and was âapproximately five years oldâ when the photograph was taken. On cross-examination, Cawthon stated that his testimony as to her age was based on reviewing the childâs birth certificate and on the child telling Cawthon, âThatâs me in the photograph.â Defense counsel then said, âJudge, itâs not personal knowledge, and I move to strike it on grounds of hearsay and Sixth Amendment confrontation.â Government counsel responded that Cawthon ârecognize[d] the girl from the photograph as the girl that he met.â Therefore, the government argued, Kainâs objection âgoes *952 to the weightâ of that testimony. The district court then overruled Kainâs objection. Cawthon testified on further cross examination that his ability to recognize the girl he interviewed as the girl in the photograph was based âin partâ on her saying, âThatâs me in the photograph.â
On appeal, Kain argues that âNone of Ranger Cawthonâs testimony should have been admitted in the face of [Kainâs] timely hearsay objectionâ and the resulting Confrontation Clause violation. Like the district court, we disagree. Kain made no contemporaneous objection to Cawthonâs testimony on direct exam â that he met the girl in the photograph and determined she was the young child depicted in the photo. Nor would an objection have been well founded. See Fed.R.Evid. 701(a) (a lay witness may express an opinion ârationally based on the perception of the witnessâ); United States v. Oliver, 908 F.2d 260, 263 (8th Cir.1990).
On cross exam, Cawthon testified that his opinion was based in part on what the child told him â âThatâs me in the photograph.â That testimony was hearsay, and an objection limited to that testimony might well have been sustained. But of course, that was not the objection made, because it would have left Cawthonâs testimony on direct exam unimpeached. Instead, the objection was to strike all of Cawthonâs testimony because it was based in part on hearsay by a declarant not shown to be unavailable who Kain did not have a prior opportunity to cross-examine. See generally Crawford v. Washington, 541 U.S. 36, 52-54, 124 S.Ct. 1354, 158 L.Ed.2d 177 (2004). Government counsel argued, correctly in our view, that Kainâs objection simply went to the weight of Cawthonâs opinion that the young girl he interviewed was the girl in the photograph. Therefore, the motion to strike was properly denied because Cawthonâs opinion based on his personal comparison of the girl and the photograph was still admissible. The district court did not abuse its substantial discretion in denying Kainâs motion to strike all of Cawthonâs testimony.
III. A Sentencing Issue
Kain argues that the district court committed procedural error at sentencing by imposing a two-level increase on the ground that the child pornography offense involved âat least 10 images, but fewer than 150.â U.S.S.G. § 2G2.2(b)(7)(A). The government must prove the facts needed to support a sentencing enhancement by a preponderance of the evidence, and we review the district courtâs fact findings for clear error. See United States v. Hansel, 524 F.3d 841, 847 (8th Cir.2008). At sentencing, the district court overruled this objection based upon its verdict âbeyond a reasonable doubt that these were depictions of child pornography.â Based on our review of the twenty-seven images, there was no clear error.
The judgment of the district court is affirmed.
. The HONORABLE RODNEY W. SIPPEL, United States District Judge for the Eastern District of Missouri.
. Congress amended § 2252A(a)(5)(B) in 2008. Although Kain's offense predated the amendment, his brief on appeal quotes the current version.
. Other cases have considered images found in a computerâs "cache files,â described as images the Web browser automatically saves to "allow visits to these pages to be processed much faster.â United States v. Tucker, 305 F.3d 1193, 1197 n. 7 (10th Cir.2002), cert. denied, 537 U.S. 1223, 123 S.Ct. 1335, 154 L.Ed.2d 1082 (2003). See Microsoft Computer Dictionary 81 (5th ed.2002) (a computer "cacheâ is a âspecial memory subsystem in which frequently used data values are duplicated for quick accessâ).
. Trojans, also known as "Trojan horses,â are "destructive program[s] disguised as a game, utility, or application,â that, when run, "do[] something harmful to the computer system while appearing to do something useful.â Microsoft Computer Dictionary at 530.