NOT RECOMMENDED FOR FULL-TEXT PUBLICATION
File Name: 13a0365n.06
No. 12-3210
UNITED STATES COURT OF APPEALS
FOR THE SIXTH CIRCUIT
FILED
UNITED STATES OF AMERICA ) Apr 11, 2013
) DEBORAH S. HUNT, Clerk
Plaintiff-Appellee, )
)
v. ) ON APPEAL FROM THE UNITED
) STATES DISTRICT COURT FOR THE
WILLIAM CONNER ) SOUTHERN DISTRICT OF OHIO
)
Defendant-Appellant. )
)
)
Before: GIBBONS, KETHLEDGE, and STRANCH, Circuit Judges.
JULIA SMITH GIBBONS, Circuit Judge. A jury convicted William Conner of four
counts of receipt of visual depictions of child pornography and one count of possession of child
pornography. The district court sentenced him to 360 months in prison. Conner argues on appeal
that the district court erred by concluding that he did not have a reasonable expectation of privacy
in files he made publicly available on the LimeWire “peer-to-peer” file-sharing service and finding
that Conner’s crimes “involved . . . distribution” under the Sentencing Guidelines because of his use
of LimeWire. For the following reasons, we affirm the district court’s judgment.
I.
A.
LimeWire is a computer file-sharing program that any user could download for free over the
Internet at the time the events in this case took place. As the Ninth Circuit recently explained,
-1-
United States v. Conner
No. 12-3210
LimeWire and similar programs connect network participants directly and allow them
to download files from one another. To download a file, a LimeWire user opens the
application and inputs a search term. LimeWire then displays a list of files that match
the search terms and that are available for download from other LimeWire users.
When a user downloads a file using the LimeWire network, he or she causes a digital
copy of a file on another user’s computer to be transferred to his or her own
computer.
United States v. Flyer, 633 F.3d 911, 913 (9th Cir. 2011) (citation omitted). This ability to download
a file directly from another user’s personal computer is known as “peer-to-peer” file sharing.
By default, LimeWire stores downloaded files in a “shared” folder that is searchable by other
LimeWire users. The user can change this default setting or manually move files out of the “shared”
folder if he does not wish to share files. LimeWire users can also view the internet protocol (“IP”)
address of the computer from which they are downloading files. The IP address is a unique identifier
assigned by an Internet service provider (“ISP”) to a subscriber that can be used to determine the
physical location of the subscriber if cross-referenced with the ISP’s records. In addition, each
installation of LimeWire is assigned a global unique identifier number (“GUID”) that other
LimeWire users can view. If one household has multiple computers that have installed LimeWire,
the GUID can be used to determine which computer in the household is sharing a particular file.
B.
Marcus Penwell, a Franklin County Sheriff’s Department deputy and a member of the
county’s multi-jurisdictional Crimes Against Children Task Force, used LimeWire on a daily basis
to monitor child pornography possession and distribution. His work computer had a modified
version of LimeWire that automatically searched for files bearing names associated with child
pornography, but the modified software did not provide him with greater access to the files of
-2-
United States v. Conner
No. 12-3210
LimeWire users than a standard user would have. On September 12, 2010, Penwell identified a
computer connected to LimeWire that was making “hundreds of files with titles indicative of child
pornography” available for download. Penwell connected to the computer, downloaded some of the
files, and found that they contained child pornography. He recorded the IP address and GUID of the
computer in question and sent a subpoena to Insight Communications (“Insight”), the ISP that issued
the IP address, to determine the location of the computer sharing the files. Insight provided Penwell
with the address of Bobby Lawwell. Penwell successfully accessed files from this computer a
second time on October 24, 2010, and obtained a warrant to search Lawwell’s home based on the
files and the information provided by Insight on November 4.
When Penwell and a team of sheriff’s deputies arrived at the residence to execute the warrant
on November 5, Lawwell met them at the front door of the house. She explained that she lived in
the house with her children, and that Conner, her uncle, lived in an apartment in the garage at the rear
of the residence. The deputies found Conner in the garage apartment, and he permitted them to walk
through it to perform a protective sweep. They observed a desktop computer and monitor in the
apartment. While other deputies stayed at the residence, Penwell obtained a second warrant to search
the apartment due to concern that the separate residence would not be covered by the initial warrant.
Penwell returned to the house later that day to execute the new search warrant.
Deputies retrieved Conner’s computer and numerous compact disks from the apartment. A
forensic search of these items revealed numerous child pornography images. The forensic
examination also indicated that the day before the deputies executed the search warrant, Conner
reinstalled the operating system on his computer. This process confined the child pornography files
-3-
United States v. Conner
No. 12-3210
to “unallocated” space on the computer’s hard drive that is inaccessible to most users, although this
space can be accessed with advanced computer forensic tools used by criminal investigators. The
examination also confirmed that Conner had been using LimeWire to obtain and share child
pornography. The file paths of many of the images found on the computer indicated that Conner
downloaded them from LimeWire and that they were stored in folders searchable by other LimeWire
users. In addition, the GUID of the version of LimeWire installed on the computer matched the
GUID of the computer from which Penwell downloaded child pornography.
Lawwell also told the deputies that Conner’s daughter and ex-girlfriend had accused him of
sexual molestation. Penwell arranged to meet with the two women on November 11, 2010. The
daughter told Penwell that Conner had repeatedly raped her between the ages of five and nine years
old and had made a pornographic video of her using a VHS video camera when she was six years
old. Penwell again contacted Lawwell, and Lawwell confirmed that Conner had VHS recording
equipment and tapes in his apartment. Penwell obtained another search warrant, and sheriff’s
deputies seized a cache of VHS tapes in Conner’s apartment. Among the tapes seized was a
pornographic video of Conner’s daughter that matched the description she gave to Penwell.
C.
The government charged Conner with four counts of receipt of visual depictions of child
pornography, 18 U.S.C. § 2252(a)(2), (b)(1), and one count of possession of child pornography, 18
U.S.C. § 2252(a)(4)(B). The visual-depictions counts related to images Conner downloaded from
LimeWire, while the possession count addressed the video Conner made of his daughter. Conner
made numerous pre-trial motions, but the only motion relevant to this appeal is his motion to
-4-
United States v. Conner
No. 12-3210
suppress evidence. He argued that Penwell’s use of LimeWire constituted an unlawful, warrantless
“search” under the Fourth Amendment and that the court should suppress all evidence seized as a
result of that search. After an evidentiary hearing in which Penwell and Dan Johnson, a computer
forensic examiner working for the sheriff’s department, gave testimony, the district court denied
Conner’s motion. Conner waived his right to counsel after the court denied the suppression motion
and represented himself at trial. A jury found Conner guilty of all five counts in the superseding
indictment.
Prior to his sentencing hearing, Conner reasserted his right to counsel. The pre-sentence
report prepared for Conner calculated an offense level of 42, including a two-point enhancement for
an offense that “involved . . . [d]istribution” under Sentencing Guideline § 2G2.2(b)(3)(F). Conner
objected to this enhancement. He also argued that he should receive a two-level reduction in his base
offense level under section 2G2.2(b)(1) of the Guidelines. The district court overruled the objections
during Conner’s sentencing hearing and sentenced Conner to a within-Guidelines sentence of 360
months in prison—240 months for the visual-depictions counts and 120 months for the possession
count, to be served consecutively.
II.
When a defendant appeals the denial of a suppression motion, this court reviews the district
court’s factual findings for clear error and its legal determinations de novo. United States v. Martin,
526 F.3d 926, 936 (6th Cir. 2008). “A factual finding will only be clearly erroneous when, although
there may be evidence to support it, the reviewing court on the entire evidence is left with the
definite and firm conviction that a mistake has been committed.” United States v. Navarro-
-5-
United States v. Conner
No. 12-3210
Camacho, 186 F.3d 701, 705 (6th Cir. 1999). Because the government prevailed in the district court,
this court must “consider the evidence in the light most favorable to the government.” United States
v. Campbell, 549 F.3d 364, 370 (6th Cir. 2008).
Conner asks us to find that he had a “legitimate expectation of privacy” in the images he
made available for sharing on LimeWire. In order to do so, we must answer two questions in the
affirmative:
First, we ask whether the individual, by his conduct, has exhibited an actual
expectation of privacy; that is, whether he has shown that “he [sought] to preserve
[something] as private.” . . . Second, we inquire whether the individual’s expectation
of privacy is “one that society is prepared to recognize as reasonable.”
Bond v. United States, 529 U.S. 334, 338 (2000) (alterations in original) (quoting Smith v. Maryland,
442 U.S. 735, 740 (1979)). Conner’s argument fails because his expectation of privacy is not “one
that society is prepared to recognize as reasonable.”
Generally speaking, computer users have a reasonable expectation of privacy in data stored
on a home computer. Guest v. Leis, 255 F.3d 325, 333 (6th Cir. 2001). Conner argues that under
United States v. Warshak, 631 F.3d 266 (6th Cir. 2010) (en banc), third-party access to information
on one’s computer is consistent with a reasonable expectation of privacy in that information. In
Warshak, we agreed that the government could not compel a commercial ISP to turn over the
contents of a subscriber’s e-mails without a warrant because subscribers “enjoy[] a reasonable
expectation of privacy in the contents of emails,” even though an ISP has the ability to view the
contents of e-mail prior to delivery. 631 F.3d at 288. In the context of e-mail, ISPs are “the
functional equivalent of a post office or a telephone company,” and like an ISP, both of these entities
have the ability to intrude on the contents of messages in the course of delivering them to their
-6-
United States v. Conner
No. 12-3210
intended recipients. Id. at 286. Since the right or ability of third parties to intrude on phone calls
and letters has not been deemed sufficient to defeat a reasonable expectation of privacy in those
modes of communication, we agreed that “it would defy common sense to afford emails lesser
Fourth Amendment protection” than telephone calls or letters. Id. at 285–86.
Warshak does not control this case because peer-to-peer file sharing is different in kind from
e-mail, letters, and telephone calls. Unlike these forms of communication, in which third parties
have incidental access to the content of messages, computer programs like LimeWire are expressly
designed to make files on a computer available for download by the public, including law
enforcement. Peer-to-peer software users are not mere intermediaries, but the intended recipients
of these files. Public exposure of information in this manner defeats an objectively reasonable
expectation of privacy under the Fourth Amendment. Katz v. United States, 389 U.S. 347, 351
(1967) (“What a person knowingly exposes to the public, even in his own home or office, is not a
subject of Fourth Amendment protection.”); see also California v. Greenwood, 486 U.S. 35, 40–41
(1988) (finding no reasonable expectation of privacy in “plastic garbage bags left on or at the side
of a public street,” which are accessible by “members of the public” and left on the curb “for the
express purpose of conveying [them] to a third party, the trash collector”).
Conner responds that he did not know the files he downloaded from LimeWire would be
publicly accessible. To prove this point, he emphasizes efforts he made to keep these files private
by moving them to compact disks and reinstalling his operating system on the computer to “wipe[]
the hard drive clean.” But these efforts only prove that he was ineffective at keeping the files he
downloaded from LimeWire from being detected. They do not establish that he was unaware of a
-7-
United States v. Conner
No. 12-3210
risk of being discovered. As the Ninth Circuit observed when confronted with a similar argument,
Conner’s “subjective intention not to share his files d[oes] not create an objectively reasonable
expectation of privacy in the face of [the] widespread public access” to his files LimeWire created.
United States v. Borowy, 595 F.3d 1045, 1048 (9th Cir. 2010) (rejecting Fourth Amendment privacy
claim of defendant who unsuccessfully attempted to use LimeWire’s privacy features “to prevent
others from downloading or viewing the names of files on his computer”).
Furthermore, Conner’s assertions of ignorance are not supported by the record. Penwell
downloaded images from Conner’s computer twice over a month-long period, meaning that the
images were available on Conner’s computer for a significant period of time. Conner’s sister,
Sandra Conner-Lewingdon, testified at trial that Lawwell had shown her and Conner how to use
LimeWire to search for music files being shared by other users. The forensic examination of
Conner’s computer confirmed that he was using LimeWire to download child pornography images
from other users and storing those images in files used for sharing over LimeWire. The sheer
number of files that were available for download—“hundreds,” according to Penwell—belies
Conner’s purported ignorance in how the software worked. Finally, Conner concedes that while he
made an effort to take some files off of his computer, he took no affirmative steps to limit the ability
of other LimeWire users to access the files in his folder, despite a reasonably high level of
competency with computers. “To argue that [Conner] lacked the technical savvy or good sense to
configure LimeWire to prevent access to his pornography files is like saying that he did not know
enough to close his drapes,” and the district court did not err by rejecting Conner’s assertions of
ignorance. United States v. Ganoe, 538 F.3d 1117, 1127 (9th Cir. 2008).
-8-
United States v. Conner
No. 12-3210
Sister circuits that have taken up this question uniformly hold that there is no reasonable
expectation of privacy in files the government obtained using peer-to-peer sharing services like
LimeWire. United States v. Stults, 575 F.3d 834, 843 (8th Cir. 2009) (“One who gives his house keys
to all of his friends who request them should not be surprised should some of them open the door
without knocking.”); Ganoe, 538 F.3d at 1127; United States v. Perrine, 518 F.3d 1196, 1205 (10th
Cir. 2008). In line with these opinions, we agree that the district court properly declined to suppress
the files Penwell downloaded from Conner’s computer and the fruits of the investigation that
emanated from those files.
III.
A district court’s sentencing decision is reviewed for both procedural and substantive
reasonableness. United States v. Bolton, 669 F.3d 780, 781 (6th Cir. 2012). Conner challenges the
calculation of his offense level under the Sentencing Guidelines, which implicates procedural
reasonableness. This court reviews the district court’s factual findings on sentencing issues for clear
error and its legal interpretation of the Sentencing Guidelines de novo. United States v. Brown, 579
F.3d 672, 677 (6th Cir. 2009). When courts interpret the Guidelines, they may apply “the traditional
canons of statutory interpretation.” United States v. Jackson, 635 F.3d 205, 209 (6th Cir. 2011).
The Sentencing Guidelines for child pornography offenses mandate a two-level increase in
the offense level if the offense conduct “involved . . . [d]istribution.” U.S. Sentencing Guidelines
Manual § 2G2.2(b)(3)(F). They also allow for a two-level reduction to the base offense level if
section 262.2(a)(2) applies and if “the defendant’s conduct was limited to the receipt or solicitation
of material involving the sexual exploitation of a minor” and “the defendant did not intend to traffic
-9-
United States v. Conner
No. 12-3210
in, or distribute, such material.” Id. § 2G2.2(b)(1). Conner raises two issues relating to these
provisions on appeal. First, he argues that the “distribution” enhancement does not apply to him.
Second, he asserts that because he “did not intend to traffic in, or distribute,” child pornography, the
district court should have awarded him a two-level reduction. Both claims lack merit.
A.
A defendant’s offense conduct “involve[s] . . . distribution” under section 2G2.2(b)(3)(F)
when it involves
any act, including possession with intent to distribute, production, transmission,
advertisement, and transportation, related to the transfer of material involving the
sexual exploitation of a minor. Accordingly, distribution includes posting material
involving the sexual exploitation of a minor on a website for public viewing but does
not include the mere solicitation of such material by a defendant.
Id. § 2G2.2 cmt. 1. Conner argues that the government had to prove he either intended to distribute
child pornography or knew he would be sharing images with others by using LimeWire. The
government argues that it only needs to prove Conner knowingly used LimeWire because the
capability of the software to share files with others is self-evident.
The definition of “distribution” provided by the Guidelines is silent as to the requisite state
of mind with which the “act . . . related to the transfer of material” must be conducted. In the context
of a criminal statute, this silence would permit the court to imply that the defendant must commit
such an act knowingly. See United States v. X-Citement Video, Inc., 513 U.S. 64, 71–72 (1994)
(noting that courts may “presume a scienter requirement in the absence of express contrary intent”
when interpreting statutes “akin to the common-law offenses against the ‘state, the person, property,
or public morals’” (quoting Morissette v. United States, 342 U.S. 246, 255 (1952))). While a
- 10 -
United States v. Conner
No. 12-3210
presumption of “knowing” conduct is not always warranted when interpreting the Guidelines, it is
appropriate here. “Distribution” of contraband is “akin to common-law offenses,” and as such, a
defendant should have to knowingly perform an “act . . . related to the transfer of material” to trigger
this enhancement. The example at the end of the Guideline’s definition of “distribution” confirms
this reasoning, since a defendant who “post[s] material . . . on a website for public viewing”
performs a knowing act. We agree with the government’s position that a knowing “act . . . related
to the transfer of material” is sufficient to satisfy section 2G2.2(b)(3)(F).
Conner argues that the Guidelines require proof of an “intent to distribute,” but the language
of section 2G2.2(b)(3) does not support his position. The offense conduct only needs to “involve[]
. . . distribution” for the enhancement to apply, and “distribution” is any act “related to the transfer
of material.” This reading is confirmed by the subparagraphs immediately preceding section
2G2.2(b)(3)(F), which permit greater increases in a defendant’s offense level if the government can
prove a specific motivation behind distribution, including distribution “for pecuniary gain,”
distribution “for the receipt . . . of a thing of value,” and distribution “to a minor that was intended
to persuade . . . the minor to engage in prohibited sexual conduct.” U.S. Sentencing Guidelines
Manual § 2G2.2(b)(3)(A), (B), (E). The absence of a similar intent requirement for all crimes that
merely “involve[] . . . distribution” leads to the conclusion that it is inappropriate to read an “intent
to distribute” requirement into section 2G2.2(b)(3)(F). See Nolfi v. Ohio Ky. Oil Corp., 675 F.3d
538, 553 (6th Cir. 2012) (observing that when a statute includes a requirement in one section, and
excludes it in a neighboring section, the canon of expressio unius est exclusio alterius permits the
inference that the neighboring section does not impose the requirement).
- 11 -
United States v. Conner
No. 12-3210
We agree with the government that knowing use of LimeWire, much like the posting of a file
on a website, is sufficient to trigger section 2G2.2(b)(3)(F)’s two-level enhancement. Bolton, 669
F.3d at 781–83 (applying this standard without expressly adopting it); United States v. Dodd, 598
F.3d 449, 451–53 (8th Cir. 2010); United States v. Layton, 564 F.3d 330, 335 (4th Cir. 2009); United
States v. Carani, 492 F.3d 867, 876 (7th Cir. 2007); United States v. Todd, 100 F. App’x 248, 250
(5th Cir. 2004), vacated on other grounds, 543 U.S. 1108 (2005). While defendants in some of these
cases have argued that they had “no knowledge that [their] computer[s] [were] equipped to
distribute” child pornography, courts have not required the government to prove such knowledge.
Dodd, 598 F.3d at 452. “[T]he purpose of a file sharing program is to share, in other words, to
distribute,” and knowing use of such a program qualifies as conduct that “involve[s] . . .
distribution.” Id.
Unique among courts that have addressed this issue, the Eighth Circuit has held that the
presumption that users of peer-to-peer software understand they are sharing files with others can be
rebutted by the defendant. The Dodd court recognized that “[a]bsent concrete evidence of
ignorance—evidence that is needed because ignorance is entirely counterintuitive—a fact-finder may
reasonably infer that the defendant knowingly employed a file sharing program for its intended
purpose.” Id. In United States v. Durham, 618 F.3d 921 (8th Cir. 2010), the Eighth Circuit relied
on this language to reverse a district court’s imposition of the “distribution” enhancement on a
defendant that used peer-to-peer software. The defendant in Durham showed that another person
had installed file-sharing software on the defendant’s computer. 618 F.3d at 932. Moreover, he
demonstrated that he did not know how to use the program and “was not knowledgeable regarding
- 12 -
United States v. Conner
No. 12-3210
the program’s capabilities.” Id. The court found that these extenuating circumstances comprised
“concrete evidence of ignorance” under Dodd. Id. at 928–32; but see id. at 937–43 (Gruender, J.,
concurring in part, dissenting in part, and announcing the judgment of the court in part) (criticizing
the majority’s application of Dodd). No other circuit has taken up the issue of whether the section
2G2.2(b)(3)(F) enhancement is automatically imposed when a defendant knowingly uses peer-to-
peer software, or if the defendant can rebut the presumption that he understood how the software
worked by presenting “concrete evidence of ignorance.” In Bolton, this court distinguished Durham
from cases out of the Fourth and Seventh Circuits, but did not recognize the defense outlined in
Durham because the defendant did not present evidence of ignorance that would allow him to invoke
it. Bolton, 669 F.3d at 782–83.
Conner argues that we should follow Durham and reverse the district court’s imposition of
the section 2G2.2(b)(3)(F) enhancement. But like the defendant in Bolton, Conner cannot point to
“concrete evidence of ignorance” in the record that would raise the issue the Durham court
confronted. He argues that “the government did not develop the record in any way sufficient to
demonstrate any knowledge on Conner’s part that files he downloaded to his hard drive would be
accessible to others,” even though Durham places the burden of introducing evidence on the
defendant. Durham, 628 F.3d at 931 (“[U]nless a defendant presents ‘concrete evidence of
ignorance,’ the fact-finder may reasonably infer the defendant utilized a file-sharing program to
distribute files.” (emphasis added)). It is not relevant that the government may have had better
evidence in Bolton of the defendant’s understanding of the operation of peer-to-peer software than
it does in this case. See Bolton, 669 F.3d at 781 (noting that defendant had removed file-sharing
- 13 -
United States v. Conner
No. 12-3210
software from his girlfriend’s computer and read “multiple . . . advisories” about the operation of
such software prior to installing it on his computer) (internal quotation marks omitted). Finally, the
only evidence on this topic that is in the record points in the government’s favor. Conner’s sister
testified that Lawell had shown her and Conner how to use LimeWire. Conner made “hundreds” of
files available for download, and the forensic computer examiner found numerous child pornography
files on Conner’s computer with file paths indicating the images were downloaded from and being
shared on LimeWire.
Since the record only bolsters the sound presumption that users of file-sharing software
understand others can access their files, the district court properly imposed the section
2G2.2(b)(3)(F) enhancement in this case. As in Bolton, we do not reach the issue of whether the
Eighth Circuit’s Dodd / Durham rule applies in this circuit.
B.
Conner also argues that the court should have reduced his offense level by two levels under
section 2G2.2(b)(1) of the Guidelines. See Durham, 618 F.3d at 932 (ordering the district court to
consider this reduction after concluding the section 2G2.2(b)(3)(F) enhancement was inappropriate).
This reduction is inappropriate because Conner’s offense conduct also involved sexual exploitation
of minors and was therefore not “limited to the receipt or solicitation” of child pornography.
Accordingly, the district court properly denied Conner’s request for a reduction in the offense level.
IV.
For these reasons, we affirm the judgment of the district court.
- 14 -