United States v. Gregory James Shiver , 305 F. App'x 640 ( 2008 )


Menu:
  •                                                          [DO NOT PUBLISH]
    IN THE UNITED STATES COURT OF APPEALS
    FOR THE ELEVENTH CIRCUIT
    ________________________                  FILED
    U.S. COURT OF APPEALS
    No. 07-15425                ELEVENTH CIRCUIT
    DECEMBER 31, 2008
    Non-Argument Calendar
    THOMAS K. KAHN
    ________________________
    CLERK
    D. C. Docket No. 05-00256-CR-C-S
    UNITED STATES OF AMERICA,
    Plaintiff-Appellee,
    versus
    GREGORY JAMES SHIVER,
    Defendant-Appellant.
    ________________________
    Appeal from the United States District Court
    for the Middle District of Alabama
    _________________________
    (December 31, 2008)
    Before BIRCH, HULL and MARCUS, Circuit Judges.
    PER CURIAM:
    Gregory James Shiver appeals from his conviction and sentence for
    knowingly possessing images of child pornography that had been transported in
    interstate commerce, in violation of 18 U.S.C. § 2252A(a)(5)(B) (2004).1                     On
    appeal, Shiver argues that the district court erred in denying his motion for
    judgment of acquittal because: (1) there was insufficient evidence that the images
    of child pornography found on his computer had traveled in interstate commerce;
    and (2) there was insufficient evidence that he “knowingly possessed” the illicit
    images. Shiver also contends that the district court erred in enhancing his sentence
    pursuant to 18 U.S.C. § 2252A(b)(2) based on his conviction for another offense
    that occurred after he committed the offense at issue in this case. After thorough
    review, we affirm Shiver’s conviction but remand for resentencing.
    We review de novo the denial of a defendant’s motion for judgment of
    acquittal. United States v. Perez-Tosta, 
    36 F.3d 1552
    , 1556 (11th Cir. 1994). We
    view “the evidence in the light most favorable to the government, with all
    1
    At the time of Shiver’s offense, § 2252A(a)(5)(B) made it a crime for anyone to
    knowingly possess[] any book, magazine, periodical, film,
    videotape, computer disk, or any other material that contains an
    image of child pornography that has been mailed, or shipped or
    transported in interstate or foreign commerce by any means,
    including by computer, or that was produced using materials that
    have been mailed, or shipped or transported in interstate or foreign
    commerce by any means, including by computer[.]
    28 U.S.C. § 2252A(a)(5)(B). As explained below, see infra note 4, Congress significantly
    amended the statute in October 2008.
    2
    reasonable inferences and credibility choices made in the government’s favor,”
    United States v. Keller, 
    916 F.2d 628
    , 632 (11th Cir. 1990), and ask whether “a
    reasonable fact-finder could conclude that the evidence established the defendant’s
    guilt beyond a reasonable doubt,” United States v. Pistone, 
    177 F.3d 957
    , 958
    (11th Cir. 1999). “It is not necessary that the evidence exclude every reasonable
    hypothesis of innocence or be wholly inconsistent with every conclusion except
    that of guilt, provided a reasonable trier of fact could find that the evidence
    establishes guilt beyond a reasonable doubt.” United States v. Henry, 
    920 F.2d 875
    , 877 (11th Cir. 1991) (quotation omitted).
    First, we reject Shiver’s claim that the evidence was insufficient to support
    the jury’s conclusion that the child pornography found on his computer had been
    “transported in interstate or foreign commerce.” 18 U.S.C. § 2252A(a)(5)(B). The
    government’s computer expert testified that the file names and resolution of certain
    of the images indicated that they had arrived on Shiver’s computer via the
    Internet.2   Since it is well-settled that “[t]he internet is an instrumentality of
    interstate commerce,” United States v. Hornaday, 
    392 F.3d 1306
    , 1311 (11th Cir.
    2004), this fact alone satisfies § 2252A(a)(5)(B)’s jurisdictional requirement.
    2
    The exact number of illegal images is not entirely clear from the record. At trial, the
    government presented evidence of 297 “suspected images” of child pornography. At Shiver’s
    sentencing, however, the parties stipulated that between 150 and 299 of the images constituted
    child pornography.
    3
    Moreover, a receipt indicating the cancellation of a subscription to an Internet web
    site called “Pure Teen Porn” was found in Shiver’s home. Regardless of whether
    the images on the site constituted child pornography, the receipt shows Shiver’s
    familiarity with making commercial transactions for pornographic images on the
    Internet.    The government also presented evidence specifically showing that the
    image of one child in particular had been produced in North Carolina. That the
    latter image ended up on Shiver’s computer in Florida strongly suggests that it
    traveled in interstate commerce.
    We likewise reject Shiver’s contention that the government’s evidence was
    insufficient to support the jury’s conclusion that he “knowingly possessed” the
    images of child pornography on his computer. Although we have interpreted the
    meaning of “knowing possession” in other contexts, see, e.g., United States v.
    Glover, 
    431 F.3d 744
    , 748 (11th Cir. 2005) (holding that “[k]nowing possession
    can be demonstrated by proof of either actual or constructive possession”)
    (quotation omitted), we have not yet had occasion to address what constitutes the
    “knowing possession” of computer images for purposes of § 2252A(a)(5)(B).3 We
    3
    Several of our sister circuits have addressed the meaning of “knowing possession”
    under § 2252A(a)(5)(B), but their interpretations have not been univocal. Compare United
    States v. Romm, 
    455 F.3d 990
    , 998 (9th Cir. 2006) (defendant knowingly possessed images
    because he “exercised dominion and control over the images in his cache by enlarging them on
    his screen, and saving them there for five minutes before deleting them”), with United States v.
    Stulock, 
    308 F.3d 922
    , 925 (8th Cir. 2002) (noting district court’s holding that “one cannot be
    guilty of possession for simply having viewed an image on a web site, thereby causing the image
    4
    need not formulate a definitive interpretation of the requirement here, however,
    because we conclude that, even on Shiver’s own view, there was ample evidence
    that he knowingly possessed the images on his computer.4
    Shiver contends that merely viewing images of child pornography on a
    computer is not enough to show knowing possession of those images. Rather, he
    claims, the government must prove that he purposely downloaded, stored, or in
    some way exercised dominion and control over the images. Shiver argues that the
    to be automatically stored in the browser’s cache, without having purposely saved or
    downloaded the image”); see also United States v. Miller, 
    527 F.3d 54
    , 67 (3d Cir. 2008)
    (identifying four factors used by courts in determining whether a defendant’s possession of
    images was knowing under § 2252A(a)(5)(B): “(1) whether images were found on the
    defendant’s computer; (2) the number of images of child pornography that were found; (3)
    whether the content of the images was evident from their file names; and (4) defendant’s
    knowledge of and ability to access the storage area for the images”) (internal quotations and
    citations omitted); Ty E. Howard, Don’t Cache out Your Case: Prosecuting Child Pornography
    Possession Laws Based on Images Located in Temporary Internet Files, 
    19 Berkeley Tech. L.J. 1227
     (2004) (reviewing varying court decisions regarding whether images stored in a computer’s
    temporary Internet files is punishable under § 2252A(a)(5)(B)).
    4
    In this connection, we also note that in October 2008, Congress amended §
    2252A(a)(5)(B) by inserting “or knowingly accesses with intent to view,” after “possesses.”
    Enhancing the Effective Prosecution of Child Pornography Act of 2007, Pub. L. 110-358, Title II
    § 203(b), 
    122 Stat. 4001
    , 4003 (2008). As currently worded, therefore, the statute applies to
    anyone who
    knowingly possesses, or knowingly accesses with intent to view, any book,
    magazine, periodical, film, videotape, computer disk, or any other material that
    contains an image of child pornography that has been mailed, or shipped or
    transported using any means or facility of interstate or foreign commerce or in or
    affecting interstate or foreign commerce . . . .
    18 U.S.C. § 2252A(a)(5)(B). This amendment has essentially settled the question in this case of
    whether a defendant must exercise control or dominion over an image for purposes of §
    2252A(a)(5)(B). Under the statute’s present language, control appears unnecessary, so long as
    an individual knowingly accesses the illicit images.
    5
    government failed to show that he was aware of the images or that he exercised any
    control over them. Instead, he maintains that they were placed on his computer
    without his knowledge by a virus or by “pop-up” windows that appeared on his
    computer screen unbidden. We are not persuaded.
    To begin with, Shiver himself provided direct evidence that he knowingly
    possessed child pornography when he was interviewed by the police. Upon being
    asked by investigators, “Do you have any child pornography?” Shiver responded,
    “I had a small amount but I think I pretty much well have gotten rid of it.”
    Shiver’s claim that in answering the question he was referring only to adult
    pornography is flatly contradicted by the record.
    The government also produced substantial indirect evidence that Shiver
    knowingly possessed the images.         For example, during an interview with
    authorities, Shiver referred to himself as a “pedophile.”        In addition, the
    government’s computer expert testified that Internet searches conducted on
    Shiver’s computer used words and terms that were likely to return pornographic
    images of children, and that many of the illicit images on Shiver’s computer had
    been accessed on multiple occasions, thus belying Shiver’s contention that a virus
    had placed the images on his computer without his knowledge. The government’s
    expert also opined that, as a technological matter, the images on Shiver’s computer
    6
    could not plausibly be accounted for by pop-up windows.
    Shiver insists that since all of the images had been deleted and stored in his
    computer’s unallocated files, and since he lacked the “forensic software” to access
    or retrieve the images from that location, he consequently lacked the ability to
    exercise dominion or control over the images. But even assuming that Shiver was
    in fact unable to retrieve the images from the unallocated files, he was able to
    exercise control over the images by deleting them from his computer’s cache. See
    Romm, 
    455 F.3d 1000
    -01 (observing that deleting images is a form of exercising
    control over them). Shiver suggests that viewing images and deleting them from a
    computer’s cache cannot be sufficient to constitute knowing possession under the
    statute, for such a rule would create a perverse incentive for individuals who
    innocently discover child pornography on their computers to leave the illicit
    material in place.    Whatever concern such a prospect might raise in other
    circumstances, it presents no problem here, given the wealth of evidence indicating
    that Shiver actively sought to access child pornography.
    In short, when viewed in the light most favorable to the government, the
    evidence supports the jury’s conclusion that the images found on Shiver’s
    computer had been transported in interstate commerce and that Shiver possessed
    the images knowingly.
    7
    Although we affirm Shiver’s conviction, we conclude that the district court
    erred in applying an enhancement to Shiver’s sentence based on his prior
    conviction for another offense. A “prior” conviction for enhancement purposes
    “must occur before the conduct violating § 2252A(a)(5), and not merely before the
    § 2252A(a)(5) conviction occurs.” United States v. King, 
    509 F.3d 1338
    , 1343
    (11th Cir. 2007) (emphases added). The putative prior conviction here -- Shiver’s
    conviction in state court on sexual abuse charges -- occurred on June 2007, well
    after the conduct forming the basis for Shiver’s prosecution in the instant case
    (December 2004). Indeed, the government concedes that the enhancement was
    improper. Accordingly, we vacate Shiver’s sentence and remand for resentencing
    without the enhancement.
    AFFIRMED IN PART, VACATED AND REMANDED IN PART.
    8