United States v. Edward M. Stulock

United States Court of Appeals FOR THE EIGHTH CIRCUIT ___________ No. 02-1401 ___________ United States of America, * * Appellee, * * Appeal from the United States v. * District Court for the * Eastern District of Missouri. Edward M. Stulock, * * Appellant. * ___________ Submitted: September 10, 2002 Filed: October 25, 2002 ___________ Before WOLLMAN, HEANEY, and BYE, Circuit Judges. ___________ WOLLMAN, Circuit Judge. After Edward M. Stulock was convicted on one count of knowingly receiving child pornography, the district court1 sentenced him to a term of imprisonment of 72 months. Stulock appeals his sentence, arguing that the court erred when it assessed enhancements under the sentencing guidelines for use of a computer in connection with the transmission or advertisement of child pornography, for obstruction of justice, and for possession of child pornography depicting violence. We affirm. 1 The Honorable Catherine D. Perry, United States District Judge for the Eastern District of Missouri. I. In 1999, federal and state law enforcement officers raided a company engaged in distributing child pornography on the internet. Using a list of customer names and email addresses recovered from that company, the agents emailed offers to sell pornographic materials to Stulock and many other individuals included in the list. Stulock responded to the offer with a request for a list of materials containing “mostly girls, age 7-14, hardcore.” After receiving a list of videos, Stulock mailed a personal check in payment for a videotape entitled “No Way,” described as “Daddy fucks 10 year old daughter.” Federal agents made a controlled delivery of the tape and shortly thereafter executed a search warrant. During the search of Stulock’s home, the agents found the tape hidden in a bedroom closet and seized a personal computer. Examination of Stulock’s computer revealed evidence of his involvement with child pornography. Numerous images of children younger than 18 engaged in sexual acts were recovered from several locations on the computer. In addition, the web browser history indicated that Stulock had visited several web sites having names associated with child pornography, including www.hairless-lolita.com, www.preteenlinks.com, www.littlepussy.com, www.peachfuz.com, and www.lolitahardcore.com. The agent who examined the computer explained to the district court that when a computer file is deleted, the contents of the file are not irretrievably lost. The space occupied by the file is flagged as available, and until new data is stored in that location the deleted file can be recovered using an undelete tool. In addition to the contents of the file, information about when the file was created, last modified, and last accessed can be recovered. Thousands of previously deleted files were recovered from the temp directory on Stulock’s primary hard disk and from a secondary hard disk designated by the computer as the F drive. The temp directory is where a -2- program such as an image viewer or a word processor will store a duplicate of a file that is opened for use. Any changes are made to the copy and only applied to the original when the user saves the file. The copy in the temp directory is deleted when the user closes the file. More than 3,000 deleted files were recovered from the temp directory, including numerous examples of child pornography. Stulock’s computer was configured to use the temp directory as the location where downloaded files that had been packaged in the ZIP file format would be stored. A ZIP file can contain hundreds of images or other files, thus allowing a user to download many files without having to save each one individually. Thus, the presence of an image in the temp directory indicated that Stulock had either purposely downloaded the image in a ZIP file or had opened an image stored elsewhere on the disk using a viewer that created a temporary copy. Among the 1,007 deleted files recovered from the F drive were three identified as portraying a minor female in bondage. Three images were located in the internet browser cache. The browser cache contains images automatically stored by the computer when a web site is visited so that upon future visits the images need not be downloaded again, thereby improving the response time. Unlike the other files recovered, the images in the browser cache had not been deleted and then recovered. Stulock was charged with knowingly receiving child pornography in violation of 18 U.S.C. § 2252A(a)(2) and knowingly possessing child pornography in violation of § 2252A(a)(5)(B). After a bench trial, Stulock was convicted of knowingly receiving the child pornography videotape, but he was acquitted on the charge of knowingly possessing child pornography. The possession charge specified only the images found in the browser cache. The district court explained that one cannot be guilty of possession for simply having viewed an image on a web site, thereby causing the image to be automatically stored in the browser’s cache, without having purposely saved or downloaded the image. -3- II. In sentencing guidelines cases, we review the district court’s findings of fact for clear error and its interpretation of the guidelines and their application to the facts de novo. United States v. Hunt, 171 F.3d 1192, 1195-96 (8th Cir. 1999). The district court applied three sentencing enhancements resulting in a combined increase of 8 levels. Stulock appeals the application of each of these enhancements. First, Stulock argues that the enhancement for use of a computer in connection with the transmission or advertisement of child pornography was improper because his use of a computer was peripheral to his receipt of a video in the mail. U.S.S.G. § 2G2.2(b)(5) provides for a two-level enhancement “[i]f a computer was used for the transmission of the material or a notice or advertisement of the material.” Stulock argues that the enhancement does not apply because he used his computer to receive rather than to send a “notice or advertisement.” We find the analysis in United States v. Richardson persuasive. 238 F.3d 837 (7th Cir.), cert. denied, 532 U.S. 1057 (2001). The Richardson court noted that the guidelines provide increased punishment for use of the internet in the child pornography trade because the increased efficiency and anonymity make both senders and receivers of this material more dangerous. Id. at 842. Section 2G2.2(b)(5) is not limited to computer use by the defendant, as is the section governing possession of child pornography, § 2G2.4(b)(3). Id. at 841. Like the Richardson court, we conclude that § 2G2.2(b)(5) applies to a defendant who receives child pornography that he received a notice or advertisement of through his use of a computer as well as to a defendant who uses a computer to advertise child pornography. An undercover officer used a computer to transmit an advertisement of the material to Stulock. Stulock received this advertisement via computer. All details of the transaction were negotiated through email. Only the final payment and delivery were, of necessity, accomplished through the postal service. Accordingly, -4- we find no error in the district court’s findings of fact or its application of § 2G2.2(b)(5). Second, Stulock argues that the district court erred in applying a two-level enhancement for obstruction of justice. An obstruction of justice enhancement for perjury is a finding of fact that we review for clear error. Hunt, 171 F.3d at 1196. A defendant who willfully gives false testimony under oath regarding a material matter has committed perjury and is subject to a § 3C1.1 enhancement. United States v. Titlbach, 300 F.3d 919, 923-24 (8th Cir. 2002). After a review of the evidence, the district court must make an “independent finding, by a preponderance of the evidence, of perjury.” United States v. Thomas, 93 F.3d 479, 489 (8th Cir. 1996). The district court found that Stulock perjured himself when he testified under oath that although he had ordered child pornography, specifically asking for girls aged 7 to 14, he did not believe that he would receive child pornography. Stulock testified that in his experience searching the internet for pornography, his use of terms describing minor females often returned the material he sought, material involving younger adult women and somewhat older men. Characterizing Stulock’s answers as “clearly phony,” the district court stated specifically: “I believe the defendant was committing perjury.” Given the weight of evidence against Stulock and the district court’s superior position from which to judge credibility, we hold that the district court did not clearly err in finding that Stulock had committed perjury. Finally, the district court applied a four-level relevant conduct enhancement pursuant to U.S.S.G. §§ 1B1.3 and 2G2.2(b)(3) based upon Stulock’s possession of child pornography images depicting violence. Among the thousands of images of child pornography recovered from Stulock’s computer, three of the files recovered portrayed a minor female in bondage held against a nude male who was holding a whip. Stulock does not dispute that these images are violent within the scope of § 2G2.2(b)(3). He contends that his possession of these images was not in the same course of conduct as his receipt of the video, the offense of which he was convicted. -5- The Seventh Circuit considered and rejected a similar challenge in United States v. Ellison, 113 F.3d 77 (7th Cir. 1997), in which the defendant’s sentence for receipt of a video containing child pornography was enhanced due to his contemporaneous possession of magazines containing violent child pornography. “Specific offense characteristics” as used in § 2G2.2(b) include “all acts and omissions committed . . . by the defendant . . . that occurred during the commission of the offense of conviction.” U.S.S.G. § 1B1.3(a); Ellison, 113 F.3d at 83. The agent who examined Stulock’s computer testified that the files he recovered had modification dates between August 2000 and November 2000. Stulock received the initial email from the undercover agent in July 2000 and placed his order for the videotape on November 22, 2000. Stulock presented evidence regarding aggressive internet porn sites that use pop-ups and other techniques to place material on a computer without the user’s knowledge or consent. Although this could account for some of the material, viewing the evidence as a whole, we cannot say it was clear error to find that Stulock’s possession of images containing violent child pornography was an act committed during his search for and receipt of the child pornography video that was the basis of the charged offense. Affirmed. A true copy. Attest: CLERK, U.S. COURT OF APPEALS, EIGHTH CIRCUIT. -6-