United States v. Schene

                                                                     FILED
                                                         United States Court of Appeals
                                                                 Tenth Circuit

                                                             September 29, 2008
                                   PUBLISH                  Elisabeth A. Shumaker
                                                                Clerk of Court
                  UNITED STATES COURT OF APPEALS

                               TENTH CIRCUIT



 UNITED STATES OF AMERICA,

       Plaintiff-Appellee,
 v.                                                    No. 07-6177
 JAY MARTIN SCHENE,

       Defendant-Appellant.



        APPEAL FROM THE UNITED STATES DISTRICT COURT
           FOR THE WESTERN DISTRICT OF OKLAHOMA
                    (D.C. No. CR–06-282-HE)


Robert L. Wyatt, IV, Wyatt Law Office, Oklahoma City Oklahoma, for
Defendant-Appellant.

Randal A. Sengel, Assistant U. S. Attorney (John C. Richter, United States
Attorney, with him on the brief), Oklahoma City, Oklahoma, for Plaintiff-
Appellee.


Before BRISCOE, SEYMOUR, and HARTZ, Circuit Judges.


BRISCOE, Circuit Judge.



      Defendant Jay Martin Schene was convicted by a jury of five counts of

knowingly possessing material that contained an image of child pornography that
was produced using materials that had been mailed, shipped, or transported in

interstate commerce, in violation of 18 U.S.C. § 2252A(a)(5)(B). Schene

contends that: (1) the evidence was insufficient to show that the images of child

pornography were produced using materials that had been mailed, shipped, or

transported in interstate commerce; (2) the evidence was insufficient to show that

Schene committed the crime; (3) the district court abused its discretion by

admitting into evidence certain testimony regarding gender and homosexuality;

and (4) the district court abused its discretion by admitting into evidence images

of child pornography, and related exhibits. We have jurisdiction under 28 U.S.C.

§ 1291 and affirm.

                                         I.

      In February 2005, the Federal Bureau of Investigation (“FBI”) in

Allentown, Pennsylvania, searched the computer of an individual suspected of

having child pornography. In the process, they discovered emails from a second

individual, whose screen name with America Online (“AOL”) was “skitie33.”

The FBI served a subpoena on AOL, and AOL disclosed that skitie33 was Donald

Black, of Duncansville, Pennsylvania. In April 2005, the FBI executed a search

warrant on Black’s residence and seized four computers. Black admitted trading

child pornography with a number of individuals online, although he could not

remember any of their names or screen names.

      The FBI performed a search of Black’s computer, and one of the screen

                                          2
names that they uncovered was “outdoorguy104166.” 1 The FBI served another

subpoena on AOL, and AOL disclosed that the screen name corresponded to the

account of Defendant Schene, who lived in Edmond, Oklahoma. Several other

screen names were associated with Schene’s account, including “ccarlin317,”

“myebayshades,” “ebayshades,” and “okseecat.” The FBI referred this

information to its Oklahoma City office.

      In Oklahoma City, FBI special agent William Weaver performed a search

of public records and determined that Schene’s home address was in Edmond,

Oklahoma. Agent Weaver stopped by Schene’s home several times to investigate,

and eventually, near the end of May 2006, a woman answered the door. Agent

Weaver left his business card with her, and he requested that Schene contact him.

Later that morning, Schene called Agent Weaver, who asked Schene to come to

the FBI office for an interview. Schene agreed.

      At the interview, Schene stated that he had never used, or heard of,

outdoorguy. Schene admitted, however, that he used two of the other screen

names: ccarlin317 and okseecat. He stated that he worked as a financial advisor

for Chase Bank, and that he was married to Cathy Carlin, whose email address

was carlincathy@yahoo.com. When asked, Schene consented to a search of his

home computer, and FBI agents accompanied him to his house to perform the


      1
       All parties refer to this screen name as “outdoorguy,” without including
the numbers. We will use the same reference.

                                           3
search. During the search, Schene told the agents that there were no children in

the house, and only he and his wife used the computer.

      The FBI agents searched Schene’s computer using a software tool called

“Presearch,” which finds all of the images on the computer’s hard drive and

shows them one-by-one. At first, the agents only saw images of homes and other

generic images from the internet, but eventually, images of child pornography

began to appear. Schene denied that the images were his, and he stated that he

had no idea how the images had come to be on his computer. The agents seized

the computer.

      At the FBI office, Bryan Carter, a computer forensics expert, examined the

computer in detail. Mr. Carter focused on the hard drive because everything on

the computer was stored there, and any visual images came from information on

the hard drive. He used several software tools to look for images, and these tools

enabled him to search for specific file types—such as images and emails—and to

uncover a lot of information about each file. The tools even enabled him to find

files that the user had attempted to delete.

      Mr. Carter discovered two operating systems on Schene’s computer:

Windows XP Professional and Windows XP Home Edition. The user had to

choose between the two operating systems immediately after starting the

computer. Within each operating system were two user names—one for Jay

Schene and another for Cathy Carlin—and none of the user names required a

                                           4
password. The email service on the computer was AOL, and Mr. Carter found all

of the screen names that AOL had listed in its response to the FBI’s subpoena.

He also found the email address book that AOL automatically created for

outdoorguy. Included within the address book was the screen name skitie33,

which the FBI had previously determined to be the AOL screen name for Donald

Black of Duncansville, Pennsylvania, who had admitted trading child

pornography with a number of individuals online.

      During his search of the computer, moreover, Mr. Carter found over 1900

images of child pornography, about half of which the user had attempted to

delete. He discovered most of the images in emails associated with outdoorguy

and ccarlin317. He also found pornographic movies involving children, as well as

a history of movies that had been “created” and viewed on the computer. Some

legitimate emails—i.e., emails not containing child pornography—had been sent

from ccarlin317 with Jay Schene’s signature at the bottom. There was also a

wiper/shredder program on the computer, 2 scheduled to run daily on Cathy

Carlin’s user profile but accessible from either of the user profiles.

      At Schene’s trial, the government presented the evidence described above,

including the images of child pornography that pertained to each of the five

counts in the indictment. In addition, the government read into evidence a


      2
        A wiper/shredder program is a program that attempts to erase the tracks of
internet activity or confidential information.

                                          5
stipulation to which all parties had agreed, which stated:

      The parties to this case stipulate and agree that the following fact
      may be accepted as proven:

             The hard drive from the defendant’s computer is a Seagate 20
             gigabyte hard drive. This hard drive was manufactured in the
             country of Singapore.

Stip., ROA, Vol. I, at 62; Tr. at 104.

      The government then called as a witness Jeffrey Elliott, a captain with the

Oklahoma Highway Patrol who had been assigned to the FBI cyber crimes task

force to investigate crimes involving computers and the sexual exploitation of

children. Officer Elliott testified, without contemporaneous objection from

Schene, about the content of the images:

      A      I would say probably 90 to 95 percent of the images that were
             child pornography were images of young boys. They may be
             nude by themselves in a sexually provocative position, they
             may be engaged in a homosexual act with another young boy
             or an adult male.

      Q      And in your experience in working with cyber crimes and
             these types of investigations, have you ever seen a woman who
             trafficked in child pornography showing homosexual acts
             between males?

      A      I have not.

Tr. at 107. Officer Elliott also described an exchange of emails between

outdoorguy and an individual using the screen names “butwhoishe” and

“handsomehorn.” The emails contained images of child pornography, and

outdoorguy sent and received several such emails within an hour-long period on

                                           6
the evening of April 28, 2006. Officer Elliott explained further that outdoorguy

had sent an email to himself, with seventy-six images of child pornography

attached, which would have enabled outdoorguy to access these images on other

computers. Finally, on redirect examination, Officer Elliott testified:

      Q       Now, on the internet history, were there instances you could
              find where websites with homosexual themes had been visited?

      A       Yes, sir. I saw repeatedly, I saw the user under the Jay Martin
              Schene account visit www.menforsexnow.com,
              www.menforrentnow.com, www.cruisingforsex.com. And
              there was an address at library.gaycafe.com that was visited
              very frequently.

      Q       And did you look at a few of these websites?

      A       I did. I visited each of those. Each of them are gay oriented
              for males. They all offered child pornography to view. They
              are kind of a social networking site where you can post your
              profile or post an ad requesting to meet with someone and that
              kind of thing.

Tr. at 126.

      As his defense, Schene tried to show that the government had not proven

that it was he who had knowingly possessed the pornography. On cross

examination, Agent Weaver admitted that he did not know the identity of the

woman who first answered the door at Schene’s address. He admitted that he

never attempted to interview Schene’s wife; he never searched her business

computer; he never searched Schene’s work computer; and he never put together a

time-line of Schene’s computer usage. Further, Agent Weaver agreed that Schene


                                          7
contacted him very quickly after Agent Weaver left his business card at the

residence, and Schene cooperated fully with the investigation—answering all

questions and granting the FBI access to his computer. Agent Weaver agreed that

families commonly share an AOL screen name and email account, and that neither

Jay Schene’s nor Cathy Carlin’s user name required a password. Schene also

questioned Agent Weaver about whether the FBI had unduly focused on

Schene—rather than his wife—because Schene was a man:

      A      I believe we asked if he had any children in the home and he
             said no. And then it was asked whether he had any nephews or
             nieces that would have access.

      Q      You would agree, though, that in your report there’s nothing
             that mentions nieces?

      A      Correct.

      Q      Your report only mentions there were no nephews in the
             teenage years?

      A      Correct.

      Q      You never considered the possibility of a woman viewing these
             images, did you?

      A      We tried to consider all people in the house. In this case, the
             images were of young boys, young mostly males, and generally
             you can consider men, but we try to consider both parties.

Tr. at 52. Shortly thereafter, Agent Weaver testified:

      A      You just assumed that a man looked at these images?

      Q      Yes.


                                         8
Tr. at 53. On redirect examination, the following exchange occurred:

      Q         Has your training with the FBI taught you about the frequency
                with which women traffic in child pornography?

                MR. WYATT:         Your Honor, I’m going to object. Calls for
                                   speculation, and there’s no foundation for
                                   this, and it’s beyond Daubert and Kumho
                                   Tire.

                THE COURT:         Overruled.

      Q         (By Mr. Sengel)    You may answer the question.

      A         Yes. It’s usually men.

      Q         It’s very rarely found to be women who traffic in child
                pornography?

                                           ***

      Q         So in this instance, that’s one of the reasons you were
                focusing on Jay Schene as you go out there?

      A         Right. Another reason was when we did the search, the
                computer was kind of -- there was an account for the wife and
                an account for the husband. When the images came up the
                first images that I saw I could see the path where they were
                stored, and it was in the wife’s account and they were pictures
                of real estate and different things that she was interested in.
                There were family, I think, trips to a river rafting trip. And I
                could see on the path it was still in her account. And soon as
                that switched to show Jay’s account, that’s when the images of
                child pornography started popping up.

Tr. at 55-56.

      Likewise, on cross examination, Bryan Carter admitted that neither Jay

Schene’s nor Cathy Carlin’s user name required a password. A person could have


                                             9
accessed the outdoorguy screen name from either of the user names, and there

was no way to determine that Schene was the individual sitting at the computer,

viewing the images of child pornography. In addition, Officer Elliott admitted

that law enforcement had not conducted a sting to catch Schene in the act of

looking at child pornography, and only through the use of a camera could he

prove that Schene was the person sitting at the computer looking at the images of

child pornography. Officer Elliott further admitted that he never interviewed

Cathy Carlin because she refused to talk with him, and he never examined

Schene’s work computer.

      Schene moved for a mistrial at several points. The first time, he argued:

      Your Honor, also the government has advised the Court that it is to
      show homosexual activity but they have no evidence of homosexual
      acts or homosexual nature of the defendant. In absence of that I
      suggest to the Court that it is unduly unfairly discriminatory and an
      improper suggestion, and even based on previous testimony, I would
      state that I did not object, but I’m going to now and move for a
      mistrial on the grounds that you can’t assume that someone is
      homosexual because of information that involves homosexuality or
      bisexuality that a man looked at it.

Tr. at 82-83. The court denied the motion. Later, after Officer Elliott testified

about the images recovered from Schene’s computer, the following exchange

occurred:

      MR. WYATT:          I ask the Court for a limiting instruction. There’s
                          no evidence to be presented of any homosexual
                          activity by my client of Jay Martin Schene, no
                          evidence from anyone of any evidence they have
                          provided to me, no discovery that he is

                                         10
                           homosexual, gay, bisexual, and I ask the jury be
                           instructed on that.

      THE COURT:           What would be the basis for me instructing them
                           what the evidence hasn’t shown?

      MR. WYATT:           Well, I’ve objected to the fact that they have
                           attempted to introduce this without any Daubert
                           showing and without any, it’s just opinions of lay
                           people once you get to that point. For a witness
                           to stand up here and say that we’ve never seen a
                           woman look at pictures of homosexual men, that
                           is totally beyond the scope of the expertise of
                           these people, whether he has seen that or not. It
                           doesn’t establish whether it does or does not exist
                           or who might have been looking at any of the
                           images.

      THE COURT:           Insofar as the Daubert related objection, there was
                           a sufficient showing made. Beyond that I don’t
                           have any basis to give a limiting instruction on
                           what you’re asking for. You can inquire into it on
                           cross and put on your evidence, but at any rate,
                           your request will be denied.

      MR. WYATT:           For the record I move for mistrial.

      THE COURT:           Be overruled.

Tr. at 109-10.

      Schene called several witnesses to testify on his behalf. First, Jay Penrod,

a computer forensics specialist, testified that all of the AOL screen

names—outdoorguy, okseecat, ccarlin317, and myebayshades—were originally

set up under Cathy Carlin’s user profile. 3 He also testified that it was impossible

      3
          On cross examination, Mr. Penrod admitted that images containing child
                                                                     (continued...)

                                           11
to identify who was sitting at the keyboard looking at the images of child

pornography; that outdoorguy was not necessarily a man; and that family

members commonly share one AOL account and often view inappropriate

material without other family members knowing. Schene then called three

character witnesses, who testified to their opinion of Schene’s high character as

an honest and law-abiding individual.

      Pursuant to Rule 29 of the Federal Rules of Criminal Procedure, Schene

moved for a judgment of acquittal—which the district court denied—at the close

of the government’s case, at the close of Schene’s case, and at the close of the

government’s rebuttal evidence. Ultimately, the jury returned a verdict of guilty

on all five counts. The district court sentenced Schene to sixty months’

imprisonment, followed by two years of supervised release.

                                         II.

A.    Sufficiency of the evidence: the interstate commerce element of 18 U.S.C. §

      2252A(a)(5)(B)

      Schene appeals the sufficiency of the evidence as to the “interstate

commerce” element of 18 U.S.C. § 2252A(a)(5)(B). He did not raise this issue in


      3
        (...continued)
pornography had been opened and viewed under Schene’s user profile. The
government also countered Mr. Penrod’s testimony by introducing rebuttal
testimony from Bryan Carter, who testified that the AOL version on which the
screen names were originally installed was older than the version on which many
of the images were viewed.

                                         12
his Rule 29 motions for judgment of acquittal, so we review for plain error. See

United States v. Schaefer, 501 F.3d 1197, 1199-1200 (10th Cir. 2007); see also

United States v. Goode, 483 F.3d 676, 680-81 & n.1 (10th Cir. 2007). 4 “To

obtain relief under this doctrine, [Schene] must show: (1) an error, (2) that is

plain, which means clear or obvious under current law, and (3) that affects

substantial rights.” Goode, 483 F.3d at 681 (citation and internal quotation marks

omitted). “If he satisfies these criteria, this Court may exercise discretion to

correct the error if it seriously affects the fairness, integrity, or public reputation

of judicial proceedings.” Id. (citation and internal quotation marks omitted).

       The statute at issue, 18 U.S.C. § 2252A(a)(5)(B), prohibits “[a]ny person”

from

       knowingly possess[ing] any book, magazine, periodical, film,
       videotape, computer disk, or any other material that contains an
       image of child pornography that has been mailed, or shipped or
       transported in interstate or foreign commerce by any means,
       including by computer, or that was produced using materials that
       have been mailed, or shipped or transported in interstate or foreign
       commerce by any means, including by computer[.]

18 U.S.C. § 2252A(a)(5)(B). To meet the “interstate commerce” element here,


       4
        Schene argues that he preserved this argument by raising it during a jury
instruction conference. An argument during a jury instruction conference does
not preserve a sufficiency-of-the-evidence issue for appeal where a defendant
omits it from his Rule 29 motion, and our plain error standard applies here. Cf.
Goode, 483 F.3d at 681 (“When a defendant challenges in district court the
sufficiency of the evidence on specific grounds, ‘all grounds not specified in the
motion are waived.’” (quoting United States v. Kimler, 335 F.3d 1132, 1141 (10th
Cir. 2003))).

                                           13
the government has relied solely on the second prong of § 2252A(a)(5)(B)—i.e.,

that the images of child pornography were “produced using materials that have

been mailed, or shipped or transported in interstate or foreign commerce.”

       At trial, the government’s theory was that Schene’s hard drive—which was

“mailed, or shipped or transported in interstate or foreign commerce”—had

“produced” the images of child pornography when it caused them to appear

visually on Schene’s computer monitor. The parties stipulated that “[t]his hard

drive was manufactured in the country of Singapore.” Stip., ROA, Vol. I, at 62;

Tr. at 104. Also, Bryan Carter testified to the following:

       Q     In the forensic exam when you’re focusing on the hard drive,
             is that because -- for those that didn’t grow up with computers,
             like me, that’s where everything is stored?

       A     Correct.

       Q     And in the instance of like images to be seen on a computer,
             are those images going to be produced from the information
             that’s on that hard drive?

       A     Yes. It is an exact copy of that information.

Tr. at 60.

       The government’s attempt to prove production of the images by their

display on a computer monitor is foreclosed by our decision in United States v.

Wilson, 182 F.3d 737, 743 (10th Cir. 1999). In Wilson, the defendant had been




                                         14
convicted under 18 U.S.C. § 2252(a)(4)(B) (1996), 5 and we reversed the

conviction under the jurisdictional prong of that statute. We first explained that,

contrary to the government’s “extremely vague” theory at trial, and even though

“the evidence was uncontroverted that the diskettes [containing child

pornography] traveled in interstate commerce, there was an alarming lack of proof

that the diskettes were used to actually produce the graphics files.” Wilson, 182

F.3d at 742. The government’s witnesses

      did not support the conclusion that computer diskettes are used to
      actually produce graphics files. To the contrary, their testimony left
      unanswered the question of whether a computer graphics file is
      produced or created prior to being recorded on a particular storage
      media, or whether, instead, it only comes into being at or after the
      point it is recorded on the storage media. Although we have no
      doubt this question has an answer (and thus do not foreclose the
      possibility that a diskette is a “material” used to produce a graphics
      file contained thereon), we conclude the evidence produced by the
      government in this case was insufficient to allow a reasonable juror

      5
          The statute provided that any person who

      knowingly possesses 3 or more books, magazines, periodicals, films,
      video tapes, or other matter which contain any visual depiction . . .
      which was produced using materials which have been mailed or . . .
      shipped or transported [in interstate or foreign commerce], by any
      means including by computer, if—

      (i) the producing of such visual depiction involves the use of a minor
      engaging in sexually explicit conduct; and

      (ii) such visual depiction is of such conduct; shall be punished as
      provided in subsection (b) of this section.

Wilson, 182 F.3d at 740 (quoting 18 U.S.C. § 2252(a)(4)(B) (1996)) (alterations
in original).

                                         15
      to answer the question.

Id. at 743. We also declined to affirm the conviction under the government’s

“alternate theory”: “that the act of converting a computer graphics file stored on a

diskette into a visual image on a computer monitor could constitute ‘production’

of a visual depiction for purposes of the statute.” Id. We explained:

      Without foreclosing application of this theory under different
      circumstances, we find it of no value here. As previously noted, the
      stipulated amended superseding indictment narrowly charged
      defendant with violating § 2252(a)(4)(B) by possessing three or more
      computer diskettes that contained visual depictions, i.e., computer
      graphics files. Under § 2252(a)(4)(B), a computer graphics file is
      considered a “visual depiction” as it resides on a computer diskette in
      binary form; no act of viewing the file with software and a monitor is
      necessary. Thus, the focal point of the statute’s jurisdictional
      element, as applied to the circumstances of this case, is whether the
      graphics files were produced using materials that traveled in
      interstate commerce. In other words, in determining whether the
      jurisdictional element is satisfied, the statute requires us to focus on
      the graphics files as they reside or are contained on the diskettes, and
      to determine what materials went into producing those files. It is
      irrelevant that defendant may have actually viewed the graphics files,
      using a computer, viewing software, and a monitor, because such
      viewing did not result in production of the graphics files; instead,
      such production necessarily had to have occurred either at or prior to
      the time the graphics files were recorded on the diskettes.

Id. (citation omitted).

      The government’s argument in the instant case mirrors the government’s

“alternate theory” that we rejected in Wilson, and despite the differences in the

statutory texts at issue in the two cases, Wilson still controls here. Section

2252A(a)(5)(B) requires that the “image of child pornography . . . was produced


                                          16
using materials that have been mailed, or shipped or transported in interstate or

foreign commerce.” Although the statute does not define “image,” it defines

“child pornography” to mean “any visual depiction, including any photograph,

film, video, picture, or computer or computer-generated image or picture, whether

made or produced by electronic, mechanical, or other means . . . .” 18 U.S.C. §

2256(8). The phrase “visual depiction,” in turn, “includes undeveloped film and

videotape, and data stored on computer disk or by electronic means which is

capable of conversion into a visual image.” Id. § 2256(5). Thus, under 18 U.S.C.

§ 2252A(a)(5)(B)—as under § 2252(a)(4)(B) in Wilson—“[i]t is irrelevant that

defendant may have actually viewed the graphics files, . . . because such viewing

did not result in production of the graphics files; instead, such production

necessarily had to have occurred either at or prior to the time the graphics files

were recorded on the diskette.” Wilson, 182 F.3d at 743.

      That is not the end of our analysis, however, because, as we have noted,

Schene did not challenge the sufficiency of the evidence below and must therefore

establish his entitlement to relief under the plain error standard of review. Under

that standard, Schene must establish not only the existence of an error that is clear

or obvious under current law, but also that such error affects his substantial rights

and seriously affects the fairness, integrity, or public reputation of judicial

proceedings. For the reasons that follow, we are not persuaded that Schene can

make these latter two showings.

                                           17
      Since our decision in Wilson, both the Seventh and Ninth Circuits have

addressed the very question that we held was unanswered by the evidence

presented in Wilson, i.e., “whether a computer graphics file is produced or

created prior to being recorded on a particular storage media, or whether, instead,

it only comes into being at or after the point it is recorded on the storage media.”

182 F.3d at 743. More specifically, both the Seventh and Ninth Circuits have

held, as a matter of law, that computerized images are “produced” for purposes of

§ 2252A(a)(5)(B) when computer equipment, including both hard drives and

computer diskettes, are used to copy or download the images. United States v.

Anderson, 280 F.3d 1121, 1125 (7th Cir. 2002); United States v. Guagliardo, 278

F.3d 868, 871 (9th Cir. 2002); United States v. Angle, 234 F.3d 326, 341 (7th Cir.

2000). As the Ninth Circuit explained in Guagliardo, “[w]hen the file containing

the image is copied onto a disk” or hard drive, “the original is left intact and a

new copy of the image is created, so the process ‘produces’ an image.” 278 F.3d

at 871.

      Armed with these more recent decisions clarifying how and when a

downloaded or copied computer image is “produced,” we turn to the evidence

presented in Schene’s case. It was uncontroverted that all of the charged

materials were found on Schene’s hard drive. The government introduced the

following testimony regarding the movie at issue in Count 1 of the indictment:

      Q      Now, the date here created where it’s viewed and so on, is that

                                          18
            because someone took the file over to Real Player to look at it?

      A     Yes.

      Q     And that’s different from the temporary directory?

      A     Correct.

      Q     So it would take an intentional act of someone to move that
            movie over and play it?

      A     Yes.

Tr. at 85. The Real Player history, moreover, stated that the movie was

“[c]reated” on February 5, 2005. Gov’t Ex. 6. While some of this testimony

appears to relate to the viewing of the movie, the testimony and government’s

Exhibit 6 also support the “creation” or downloading of the movie onto the

computer hard drive. The image charged in Count 2 was “an active file” that

“had been saved to the computer from e-mail coming in.” Tr. at 87. Likewise,

the images charged in Counts 3 and 4 were “all from e-mail recovered from Jay

Schene’s computer” and were all “active on the computer.” Tr. at 89. The image

charged in Count 5 was “recovered from the defendant’s computer,” “from an e-

mail,” and was an “active file[]” on the computer. Tr. at 89-90. The government

also showed that at least two of the charged images—the images from Exhibits 10

and 13—had appeared on Exhibit 14, the email that outdoorguy sent to himself,

and an image sent in this fashion “had to be stored on [Schene’s] computer.” Tr.

at 119.


                                        19
      It is obvious that the government’s evidence was sufficient, under the more

recent Seventh and Ninth Circuit decisions, to show that each “image of child

pornography” had been copied or downloaded to Schene’s hard drive in one

capacity or another, and was therefore “produced using materials that have been

mailed, or shipped or transported in interstate or foreign commerce.” 18 U.S.C. §

2252A(a)(5)(B); see Anderson, 280 F.3d at 1125; Guagliardo, 278 F.3d at 871; cf.

United States v. Lacy, 119 F.3d 742, 750 (9th Cir. 1997) (reviewing for plain

error and affirming a conviction under 18 U.S.C. § 2252(a)(4)(B) because the

images “were created—‘produced’—when Lacy used his computer to download

data,” and under the statute, “it does not matter that the depictions on Lacy’s

computer were copies rather than originals”). In light of this conclusion, we

would be hard-pressed to say that the claimed insufficiency of the evidence

violated Schene’s substantial rights or seriously affected the fairness, integrity, or

public reputation of his judicial proceedings. Accordingly, we reject Schene’s

sufficiency-of-the-evidence challenge to the interstate commerce element of §

2252A(a)(5)(B).

B.    Sufficiency of the evidence: Schene committing the crime

      Schene next appeals the sufficiency of the evidence that he—and not his

wife—committed the offenses. Schene raised this issue in his Rule 29 motions

for judgment of acquittal, and it was the thrust of his defense at trial.

      The evidence was sufficient to establish that it was Schene, and not

                                           20
someone else, who committed the crimes charged. “‘Evidence is sufficient to

support a conviction if a reasonable jury could find the defendant guilty beyond a

reasonable doubt, given the direct and circumstantial evidence, along with

reasonable inferences therefrom, taken in a light most favorable to the

government.’” United States v. Nelson, 383 F.3d 1227, 1229 (10th Cir. 2004)

(quoting United States v. Wilson, 107 F.3d 774, 778 (10th Cir. 1997)). “We will

not weigh conflicting evidence or second-guess the fact-finding decisions of the

jury.” United States v. Summers, 414 F.3d 1287, 1293 (10th Cir. 2005). “Rather

than examining the evidence in ‘bits and pieces,’ we evaluate the sufficiency of

the evidence by ‘considering the collective inferences to be drawn from the

evidence as a whole.’” Nelson, 383 F.3d at 1229 (quoting Wilson, 107 F.3d at

778).

        Schene does not contest that the computer contained the charged images of

child pornography, or that the only people with access to the computer were

Schene and his wife. Government investigators found over 1900 images of child

pornography, with images appearing under both of the operating system’s user

accounts and under two AOL screen names—outdoorguy and ccarlin317. Schene

had access to both user accounts, and he admitted to using the screen name

ccarlin317.

        Also, two of the government’s witnesses testified regarding the likelihood

of Schene—rather than his wife—viewing the child pornography. One of the

                                          21
witnesses, Agent Weaver, explained that when the officers first examined

Schene’s computer, “the images of child pornography started popping up” only

after they “switched to show [Schene]’s account.” Tr. at 56. From this collection

of evidence, a reasonable jury could have found beyond a reasonable doubt that

Schene—and not his wife—knowingly possessed the child pornography, and the

evidence was sufficient to support Schene’s conviction.

C.    Testimony regarding gender and homosexuality

      Schene next argues that the government erred in admitting testimony

regarding the propensity of women to traffic in, and view, child pornography.

Specifically, Schene claims that this testimony was unreliable and failed to meet

the standards established in Daubert v. Merrell Dow Pharmaceuticals, Inc., 509

U.S. 579, 589 (1993), Kumho Tire Co. v. Carmichael, 526 U.S. 137, 152 (1999),

and Rule 702 of the Federal Rules of Evidence. Also, he claims that the

government’s witnesses violated Rule 704(b) by testifying to the “ultimate issue”

of Schene’s mental state. Finally, he claims that the government suggested that

Schene was a homosexual, which violated his right to due process and a

fundamentally fair trial. “‘We review challenges to admissibility of evidence

solely for abuse of discretion.’” United States v. Chisum, 502 F.3d 1237, 1241

(10th Cir. 2007) (quoting United States v. Reddeck, 22 F.3d 1504, 1508 (10th Cir.

1994)).




                                        22
      1.     Agent Weaver’s and Officer Elliott’s testimony regarding the

             likelihood of a woman possessing child pornography

      We discern no reversible error in admission of the testimony by Agent

Weaver and Officer Elliott about the likelihood of a woman possessing child

pornography. Agent Weaver’s testimony came on redirect examination after

Schene had cross-examined him regarding his failure to investigate Carlin with

respect to the images of child pornography. The clear purpose of the questioning

on redirect was to explain why Agent Weaver had focused his attention on

Schene. For that purpose, it was unnecessary to establish the “scientific” basis

for Agent Weaver’s testimony. The point was not that the information he

received in training was correct; it was that he was acting in accordance with his

training.

      As for Officer Elliott’s testimony, we review for plain error because Schene

raised no contemporaneous objection. Under the plain-error standard, we cannot

reverse because any error in admitting the testimony was not plain. Officer

Elliott’s testimony could be justified on the same basis as Agent Weaver’s; and it

is hardly “plain” that the testimony lacked sufficient support in his training and

experience. Moreover, even assuming for purposes of argument that Schene

could establish the existence of an error that was plain, we are not persuaded that

Schene’s substantial rights were violated by the introduction of Officer Elliott’s

testimony in this regard. In particular, the jury had already heard similar

                                          23
testimony from Agent Weaver, and the other evidence of Schene’s guilt was

substantial. 6

       2.        Alleged violations of Fed. R. Evid. 704(b)

       Schene’s second argument—that the government’s witnesses violated Rule

704(b) by testifying to the “ultimate issue” of Schene’s mental state—was not

raised before the district court and is largely incomprehensible in Schene’s

appellate brief. There is no indication in the trial transcript that the government’s

witnesses violated Rule 704(b).

       3.        Alleged references to homosexuality

       Schene also claims that the government suggested that he was a

homosexual, which violated his right to due process and a fundamentally fair

trial. “When prosecutorial misconduct deprives a criminal defendant of a fair

trial, the defendant’s due process rights are violated, and reversal is warranted.”

United States v. Gabaldon, 91 F.3d 91, 93 (10th Cir. 1996) (citations omitted).

As we have explained previously, a prosecutor’s emphasis on a defendant’s

homosexuality can have “a tremendous negative impact on jurors” and is often

“designed solely to inflame the jury’s prejudices.” Neill v. Gibson, 263 F.3d

1184, 1201-02 (10th Cir. 2001) (citing cases). If a defendant “has both objected


       6
         We emphasize that Schene opened the door to this testimony and we
stress that our holding on this point is very limited, and should not be interpreted
as carte blanche to introduce this type of evidence in every case involving child
pornography.

                                            24
contemporaneously and unsuccessfully moved the district court for a mistrial”

based on alleged prosecutorial misconduct, the appropriate standard of review is

for “an abuse of discretion.” Gabaldon, 91 F.3d at 93.

       The government made two references to homosexuality during Schene’s

trial. The first was Officer Elliott’s description of the type of child pornography

found on Schene’s computer:

       A      I would say probably 90 to 95 percent of the images that were
              child pornography were images of young boys. They may be
              nude by themselves in a sexually provocative position, they
              may be engaged in a homosexual act with another young boy
              or an adult male.

       Q      And in your experience in working with cyber crimes and
              these types of investigations, have you ever seen a woman who
              trafficked in child pornography showing homosexual acts
              between males?

       A      I have not.

Tr. at 107. Contrary to Schene’s contention, the government did not accuse him

of being a homosexual in this testimony, or suggest that homosexuals are more

likely to view child pornography. The government’s use of the word

“homosexual” was solely to describe the type of child pornography found on

Schene’s computer.

       The second reference to homosexuality, however, is more problematic.

Officer Elliott testified:

       Q      Now, on the internet history, were there instances you could
              find where websites with homosexual themes had been visited?

                                         25
      A      Yes, sir. I saw repeatedly, I saw the user under the Jay Martin
             Schene account visit www.menforsexnow.com,
             www.menforrentnow.com, www.cruisingforsex.com. And
             there was an address at library.gaycafe.com that was visited
             very frequently.

      Q      And did you look at a few of these websites?

      A      I did. I visited each of those. Each of them are gay oriented
             for males. They all offered child pornography to view. They
             are kind of a social networking site where you can post your
             profile or post an ad requesting to meet with someone and that
             kind of thing.

Tr. at 126. The prosecutor’s initial question in this exchange was arguably

improper. See Neill, 263 F.3d at 1201-02.

      Nevertheless—and even assuming, arguendo, that Schene preserved this

argument for appeal by objecting and moving for a mistrial on this ground earlier

in the trial—the district court did not abuse its discretion in failing to grant a

mistrial based on the prosecutorial misconduct. The prosecutor’s question was

“singular and isolated,” United States v. Ivy, 83 F.3d 1266, 1288 (10th Cir. 1996)

(citation and internal quotation marks omitted), and Officer Elliott quickly re-

focused his testimony on the fact that the websites “all offered child pornography

to view.” Tr. at 126. Given the evidence against Schene, moreover, the alleged

prosecutorial misconduct was not “flagrant enough to influence the jury to convict

on grounds other than the evidence presented.” Ivy, 83 F.3d at 1288 (citations

and internal quotation marks omitted). Reversal is not warranted on these

grounds.

                                           26
D.    Allegedly irrelevant and prejudicial evidence

      Lastly, Schene challenges the district court’s decision to admit Exhibits 5,

6, 7, 8, 9, 10, 11, and 14. He argues that, given his willingness to stipulate that

the images were child pornography, any images were irrelevant and unfairly

prejudicial under Rules 402 and 403 of the Federal Rules of Evidence. Schene

also contends that Exhibits 8, 9, and 14—i.e., the exhibits containing images not

linked to a specific count in the indictment—were admitted in violation of Rule

404(b), as was the Real Player history in Exhibit 6. 7

      Our review of the district court’s decision to admit evidence is for an abuse

of discretion. Chisum, 502 F.3d at 1241. Under Rule 403 of the Federal Rules of

Evidence, otherwise relevant evidence “may be excluded if its probative value is

substantially outweighed by the danger of unfair prejudice, confusion of the

issues, or misleading the jury, or by considerations of undue delay, waste of time,

or needless presentation of cumulative evidence.” Fed. R. Evid. 403. In addition,

Rule 404(b) provides:

      Evidence of other crimes, wrongs, or acts . . . [may be] admissible
      for other purposes, such as proof of motive, opportunity, intent,
      preparation, plan, knowledge, identity, or absence of mistake or
      accident, provided that upon request by the accused, the prosecution
      in a criminal case shall provide reasonable notice in advance of trial,

      7
         Schene also mentions Exhibit 12 in passing, but he does not explain how
this piece of evidence would violate Rule 402, 403, or 404(b). Exhibit 12 is
AOL’s disclosure of the identity of butwhoishe and handsomehorn, and the
district court did not abuse its discretion in admitting it into evidence. We will
not address Exhibit 12 in additional detail.

                                          27
      or during trial if the court excuses pretrial notice on good cause
      shown, of the general nature of any such evidence it intends to
      introduce at trial.

Fed. R. Evid. 404(b). Evidence is admissible under Rule 404(b) if the following

factors are satisfied: “(1) the evidence must be offered for a proper purpose; (2) it

must be relevant; (3) its probative value must not be substantially outweighed by

its potential for unfair prejudice under Rule 403; and (4) the court must give a

proper limiting instruction, if it is requested by the defendant.” United States v.

Moran, 503 F.3d at 1135, 1143-44 (10th Cir. 2007) (citing Huddleston v. United

States, 485 U.S. 681, 691-92 (1988)).

      The district court did not abuse its discretion in admitting the exhibits that

Schene challenges on appeal. In United States v. Campos, 221 F.3d 1143, 1148

(10th Cir. 2000), we rejected a defendant’s argument that, under Rule 403, and

“in light of his offer to stipulate that those images constituted child pornography,

there was no reason to show them to the jury and to do so was unduly

prejudicial.” We explained that, in contrast to the evidence at issue in Old Chief

v. United States, 519 U.S. 172 (1997), the offer to stipulate in Campos involved

“the gist of the government’s current case against [the defendant]—the two

pornographic images that he allegedly transported via computer.” Campos, 221

F.3d at 1149. Likewise, in the instant case, the images charged in the

indictment—and admitted as evidence in Exhibits 5, 7, 10, 11, and 13—were the

gist of the government’s current case against Schene. The government was

                                          28
entitled to prove its case, and given the charges against Schene, those images

were not unfairly prejudicial under Rule 403. See Old Chief, 519 U.S. at 186-87

(explaining that it is “unquestionably true as a general matter,” that “the

prosecution is entitled to prove its case by evidence of its own choice, or, more

exactly, that a criminal defendant may not stipulate or admit his way out of the

full evidentiary force of the case as the Government chooses to present it”). 8

      The uncharged images in Exhibits 8, 9, and 14 are a closer call, but the

district court did not abuse its discretion in admitting them into evidence.

Exhibits 8 and 9 were emails containing images of child pornography, sent from

outdoorguy to butwhoishe within minutes of other emails from butwhoishe to

outdoorguy. Exhibit 14 was an email containing seventy-six images of child

pornography that outdoorguy sent to himself. The government introduced these

emails to show intent and knowledge under Rule 404(b), and the district court

gave a limiting instruction on the matter. See Tr. at 88 (“Ladies and gentlemen,

to the extent that this evidence relates to anything other than the specific files that

are charged in the indictment, I would instruct you that it’s to be considered only

as it bears on the defendant’s knowledge or intent, and you should consider it

only for that limited purpose.”). Under 18 U.S.C. § 2252A(a)(5)(B), the

government had to prove that Schene “knowingly possess[ed]” the images of child


      8
       In his Reply Brief, Schene concedes that, under Campos, the images
charged in the indictment were appropriately admitted into evidence.

                                          29
pornography, and the district court did not abuse its discretion under Rules 403

and 404(b) in admitting these uncharged images for this limited purpose. See

United States v. Simpson, 152 F.3d 1241, 1249 (10th Cir. 1998) (affirming the

district court’s decision to admit similar evidence “to prove that (1) [the

defendant’s] possession of child pornography on his computer was not a mistake

or accident, and (2) he had knowledge of the nature of the material he was

receiving”).

      Likewise, the district court did not abuse its discretion in admitting Exhibit

6 into evidence. Exhibit 6—the Real Player history pertaining to the video

charged in Count 1—was introduced to show knowledge and intent, and the

district court gave a limiting instruction on the matter. See Tr. at 84 (explaining

that “the evidence comes in only as it bears or as it suggests intent or knowledge

on behalf of the defendant, and you should consider it only for that limited

purpose”). Exhibit 6 was not unfairly prejudicial under Rule 403. It was a

limited segment of the much broader Real Player history, and it pertained directly

to Schene’s knowing and intentional playing of the video charged in Count 1.

The district court did not abuse its discretion. 9

      AFFIRMED.


      9
       For many of the same reasons discussed above, we reject Schene’s
relevance arguments under Rules 401 and 402 as to all of the exhibits being
appealed, and we will not address them in detail. See Old Chief, 519 U.S. at 178-
79.

                                           30