United States Court of Appeals
For the First Circuit
No. 18–1561
UNITED STATES,
Appellee,
v.
WILLIAM POTHIER,
Defendant, Appellant.
APPEAL FROM THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF NEW HAMPSHIRE
[Hon. Joseph A. DiClerico, Jr., U.S. District Judge]
Before
Kayatta, Circuit Judge,
Souter, Associate Justice,
and Selya, Circuit Judge.
S. Amy Spencer, with whom William E. Christie and Shaheen &
Gordon, P.A. were on brief, for appellant.
Seth R. Aframe, Assisted United States Attorney, with whom
Scott W. Murray, United States Attorney, and Cam T. Le, Assistant
United States Attorney, were on brief, for appellee.
March 26, 2019
Hon. David H. Souter, Associate Justice (Ret.) of the
Supreme Court of the United States, sitting by designation.
KAYATTA, Circuit Judge. Police learned that someone
using an IP address1 registered to William Pothier at an apartment
in Exeter, New Hampshire, downloaded child pornography from a peer-
to-peer file-sharing network. They also learned that two people
in addition to Pothier received mail at that residence. While
executing a search warrant, police found in the living room a
laptop computer that was not password-protected. Pothier admitted
that he owned the laptop, which contained a handful of documents
and innocuous chat histories in his name. It also contained child
pornography, i.e., videos of "minor[s] engaging in sexually
explicit conduct." 18 U.S.C.A. § 2252(a)(4)(B)(i). That was more
or less enough for the police and the United States Attorney. In
short order, a grand jury indicted Pothier for "knowingly
possess[ing]" child pornography in violation of 18 U.S.C.
§ 2252(a)(4)(B), and then a jury found him guilty. He now appeals,
claiming that the evidence was insufficient to prove beyond a
reasonable doubt that he -- as opposed to the other people who may
have had access to the computer -- downloaded the pornography.
For the following reasons, we agree and reverse the conviction.
1
"An IP address, or Internet Protocol address, 'is the unique
address assigned to every machine on the internet.'" United States
v. McLellan, 792 F.3d 200, 204 n.1 (1st Cir. 2015) (quoting United
States v. Cameron, 699 F.3d 621, 627 n.1 (1st Cir. 2012)).
- 2 -
I.
A preliminary investigation revealed that the U.S.
Postal Service delivered mail to three people at the Exeter
residence associated with the IP address registered to Pothier:
Pothier, Josephine Pritchard, and someone named Balis. On
March 30, 2016, police officers executed a warrant to search for
child pornography at the residence. For approximately fifteen
minutes, police officers repeatedly knocked on the door, and called
and texted Pothier's cell phone. Though Pothier was inside the
residence, he did not answer until the fire department arrived and
began to pry open the door. When asked if he had heard the police
outside, he answered that he had, and said that neighbors had told
him that police had been canvassing the area.
The ensuing search surfaced numerous computers and
electronic storage devices, including an Asus laptop found in the
living room. Pothier admitted that he owned the laptop, which was
not password-protected and had a generic "Asus" profile rather
than a user-generated profile. The police were therefore able to
access the computer's contents on-site. Among the applications on
the Asus laptop were a file-sharing program called Shareaza and an
electronic file-shredding program called Evidence Eliminator.
Also on the computer were six videos depicting children engaging
in sexual acts. In addition, the on-site review revealed that a
- 3 -
Skype user called "wdpothier" had engaged in a few innocuous Skype
chat exchanges in March 2016.
The police later conducted a full forensic investigation
of the Asus laptop. The child pornography discussed above was
saved in a temporary folder associated with the Shareaza
application. In addition, one more video depicting child
pornography was in the laptop's recycle bin. Police also found
that a user had searched on both Google and Shareaza using terms
consistent with child pornography. Finally, police found
thumbnail images that were remnants of child pornography that had
been downloaded and deleted.
The computer contained a handful of documents associated
with two people. First, police found two mortgage interest
statements and a restaurant voucher, all associated with Pothier.
Second, they found personnel and military discharge documents
belonging to Joseph Walko. Walko testified that he worked at the
Federal Aviation Administration in New York with Pothier and that,
at some point, they had neighboring cubicles, but that he had no
idea why his personal documents were on Pothier's computer. So,
the jurors had a basis to conclude that Walko did not have access
to the laptop, notwithstanding the presence of his documents on
it.
The government was able to pin down the exact times and
dates of the illicit downloads and searches. There was no overlap
- 4 -
between the dates on which Pothier was known to have used the
laptop, the dates on which Walko's documents were saved to the
computer, and the dates of the illicit downloads and searches.
At the close of the government's case, Pothier moved
pursuant to Federal Rule of Criminal Procedure 29 for judgment of
acquittal, arguing that the government failed to prove beyond a
reasonable doubt that he knew that the Asus laptop contained child
pornography. The district court summarily denied the motion.
Pothier neither testified nor presented any evidence in his
defense, and the jury returned a guilty verdict. The district
court then denied Pothier's motion to set aside the verdict,
stating without explanation that a rational jury could find Pothier
guilty beyond a reasonable doubt. At sentencing, the district
court applied -- over Pothier's objection -- a two-level Guidelines
enhancement for "knowingly engag[ing] in distribution" of child
pornography. See U.S.S.G. § 2G2.2(b)(3)(F). The court sentenced
Pothier to six years of imprisonment and twenty years of supervised
release.
Pothier appeals to this court. He challenges both the
sufficiency of the evidence underlying the guilty verdict and the
district court's application of the sentencing enhancement for
knowing distribution of child pornography.
- 5 -
II.
We turn first to Pothier's claim that the district court
erred in denying his motion for judgment of acquittal. It goes
without saying that the "Constitution prohibits the criminal
conviction of any person except upon proof of guilt beyond a
reasonable doubt." Jackson v. Virginia, 443 U.S. 307, 309 (1979).
We give great deference to juries' application of this standard.
In reviewing Pothier's claim, we must affirm the conviction if
after a de novo review of the evidence, taken in the light most
favorable to the government, we conclude that a rational factfinder
could decide that the government carried its burden beyond a
reasonable doubt. See United States v. Figueroa-Lugo, 793 F.3d
179, 183 (1st Cir. 2015). "In conducting a sufficiency analysis,
however, some degree of intellectual rigor is required; a reviewing
court should not give credence to 'evidentiary interpretations and
illations that are unreasonable, insupportable, or overly
speculative.'" Leftwich v. Maloney, 532 F.3d 20, 23 (1st Cir.
2008) (quoting United States v. Spinney, 65 F.3d 231, 234 (1st
Cir. 1995)); see also United States v. Valerio, 48 F.3d 58, 64
(1st Cir. 1995) ("[W]e are loath to stack inference upon inference
in order to uphold the jury's verdict.").
A.
The record in this case begins like the first chapter of
a detective novel. The criminal act was clear: The laptop
- 6 -
contained child pornography. Because the laptop was not password-
protected and was found in a common area of the residence, the
possible suspects were three: Pothier, Pritchard, and Balis, all
of whom apparently had access to the residence and, therefore, to
the computer. At that point, the record becomes sketchy and the
evidence sparse. We learn very little about the possible suspects
and just a bit more about the computer.
The sole fact that the record reveals about Balis is
that he or she received mail at the residence. We have no clue
whether Balis lived there, how much time Balis spent there, or
whether Balis was there when the pornography was downloaded. We
know nothing about Balis's relationships with Pritchard or
Pothier. The detective who oversaw the investigation testified
that neither he nor his subordinates ever attempted to learn more
about Balis. As a result, we do not even know Balis's first name.
The trial record discloses only slightly more about
Pritchard. One officer testified that he believed she was
Pothier's "significant other." She was an airline flight
attendant, and she bought the Exeter residence from Pothier. She
showed up at the residence while the police were executing the
warrant, and she followed Pothier's advice not to speak to the
police without a lawyer present. Like Balis, she did not testify.
Even the evidence about Pothier is remarkably scant. We
know that Pothier worked for the Federal Aviation Administration
- 7 -
and that he spent at least four days a month in New York, where he
maintained an apartment. He also owned property in Newmarket, New
Hampshire, and his vehicle was registered there. He received
"some" but "not a lot" of mail at the Exeter residence, and the
mail he did receive there would sometimes sit in the mailbox for
several days. We don't know whether he left the laptop at the
Exeter residence when he was elsewhere. Although the government
knew the dates and times on which the culprit downloaded the
pornography, it did not investigate -- much less prove -- where
Pothier was on those days or at those times.
Then there is the Asus laptop that belonged to Pothier.
By not establishing a password, Pothier left the contents of the
laptop fully accessible to anyone who might turn it on. He also
left the laptop physically accessible, sitting in the living room
where the police found it. It is undisputed that Pothier used the
computer on at least a handful of occasions. There is no proof
that anyone else either did or did not use the computer.
Importantly, the evidence does not reveal whether an innocent user
of the computer would have been aware that it contained child
pornography. The seven illegal videos contained on the computer
at the time of the search were not filed in conspicuous locations,
but rather in the recycle bin and in a temporary folder only
visible to a user who overrode Microsoft's default setting.
- 8 -
B.
There is no dispute that the jurors could rationally
conclude that anyone viewing the videos would know that they
depicted child pornography. The question at hand is whether a
rational jury could find beyond a reasonable doubt that Pothier
knew that his laptop contained the videos. The government's sole
theory at trial and on appeal is that Pothier must have known that
the illicit material was on his laptop because he was the only
person who otherwise used the laptop, and therefore must have been
the person who downloaded the pornography. In assessing the extent
to which the evidence supports this argument, we begin by spelling
out the scenario the government's theory necessarily posits:
Pothier downloaded the file-sharing program Shareaza, the file-
shredding program Evidence Eliminator, and child pornography, but
decided to forgo password protection and then left the laptop in
the living room of a residence at which two other people received
mail. Furthermore, during the fifteen or so minutes when he knew
the police were at the door, Pothier did not conceal or destroy
the laptop or run the file-shredding Evidence Eliminator program
that the government presumes he had installed.
A contrary scenario consistent with the limited evidence
is that Pritchard or Balis used the readily available laptop during
Pothier's frequent absences to download the file-sharing and file-
shredding applications and the child pornography. Neither of them
- 9 -
could have put a password on the computer without alerting Pothier.
And because they were not present when the police came calling,
neither of them could have hidden or destroyed the computer, or
erased the child pornography, when the need to do so arose.
How could jurors rationally decide beyond a reasonable
doubt which scenario describes what happened? In many cases,
jurors rely on their assessments of witnesses' credibility to
select between views of the evidence. Here, though, each competing
scenario presumes the accuracy of the testimony proffered by the
government, so credibility determinations cannot explain the
conviction. Each scenario is plausible, and though one might
debate their relative merits, to settle on one beyond reasonable
doubt would require guesswork. And "[g]uilt beyond a reasonable
doubt cannot be premised on pure conjecture." See Stewart v.
Coalter, 48 F.3d 610, 615 (1st Cir. 1995).
Trying to mine the record for some additional
inculpatory inferences, the government contends that, in addition
to the evidence described above, Pothier's actions at the search
scene demonstrated consciousness of guilt. More particularly, the
government argues that Pothier's lengthy delay in responding to
the police reveals that he had "something to hide." In other
contexts, similar conduct might carry some probative weight. Here,
though, given that Pothier apparently did nothing in the available
fifteen minutes to hide the laptop or shred the evidence, his
- 10 -
conduct as a whole just as easily suggests obliviousness to the
content on his computer as it does a guilty conscience. At best,
any evidence of consciousness that one can infer from Pothier's
reaction to the police is entirely ambiguous.
The government also points out that Pothier advised
Pritchard not to talk to the police without a lawyer present. But
he had just seen a warrant with Pritchard's name on it. Was he
conscious of her guilt? Of Balis's? Was he just giving sound
legal advice that one could glean any evening from watching network
television? Perhaps not, but we would be guessing.
We acknowledge that Pothier could have filled many of
these evidentiary gaps, and that his decision neither to testify
nor to present any evidence likely struck the jury as suspicious.
But the government bore both the burden of persuasion and the
burden of production for the knowledge element of the crime. See
Jackson, 443 U.S. at 316 ("[N]o person shall be made to suffer the
onus of a criminal conviction except upon sufficient proof --
defined as evidence necessary to convince a trier of fact beyond
a reasonable doubt of the existence of every element of the
offense."); Sandstrom v. Montana, 442 U.S. 510, 516 n.5 (1979)
(explaining that a directed verdict for the defense results from
the government's failure to meet the production burden); see also
U.S. Const. amend. V ("No person . . . shall be compelled in any
criminal case to be a witness against himself . . . ."). So, while
- 11 -
the absence of defense evidence might explain the jury's verdict,
it cannot justify the verdict in the face of an insufficiently
supported government case.
The Sixth Circuit encountered a remarkably similar case
involving three potential suspects with access to a computer that
was unprotected by password. United States v. Lowe, 795 F.3d 519
(6th Cir. 2015). As here, the defendant owned the laptop and kept
it in a shared area of the home. Id. at 523. There as here, the
illicit files were saved in locations where innocent computer users
might not have encountered them. Id. at 524. And there as here,
the pattern of internet activity on the dates in question did not
narrow the field of possible users. Id. at 523. The Sixth Circuit
concluded that "without improperly stacking inferences, no juror
could infer from such limited evidence of ownership and use that
[the laptop owner] knowingly downloaded, possessed, and
distributed the child pornography found on the laptop." Id. at
523; see also United States v. Moreland, 665 F.3d 137, 150 (5th
Cir. 2011) (holding that the government presented insufficient
evidence of knowledge of possession of child pornography where the
computer was shared and the images were saved in unallocated "slack
space" as opposed to folders associated with a particular user).
The government attempts to distinguish both Lowe and
Moreland. It points first to Pothier's behavior when the police
came knocking. We have already explained why that conduct, viewed
- 12 -
in context, renders speculative any inference that Pothier
manifested consciousness of guilt of the relevant charges.
The government also points out that there exists no
evidence that anyone besides Pothier actually used the laptop. In
Lowe as well, though, there was no proof that the other possible
users did in fact use the laptop. 795 F.3d at 523. We also do
not see the logic in the government's unstated assumption that if
Pritchard or Balis used Pothier's laptop to download the child
pornography, he or she would also likely have used the laptop for
other purposes. One might just as easily presume that they would
avoid other uses so as not to alert Pothier. All in all, just
like the Sixth Circuit in Lowe, we are left with a surprisingly
incomplete record. It generates hunches, but it provides no tools
for rationally confirming any one of the hunches beyond a
reasonable doubt.
Finally, we address the government's warning that a
reversal on sufficiency grounds will thwart future prosecutions
for possession of child pornography. As demonstrated by Lowe, our
ruling does not make new law. Rather, we simply recognize that
Congress criminalized only the knowing possession of child
pornography, and a conviction under that law -- like any other
conviction -- cannot be based on mere guesswork. "[A] society
that values the good name and freedom of every individual should
not condemn a man for commission of a crime when there is
- 13 -
reasonable doubt about his guilt." In re Winship, 397 U.S. 358,
363–64 (1970). If Pothier is factually innocent, then he has
suffered a great wrong and the guilty person remains free.
Conversely, if Pothier is factually guilty, he goes free only
because the prosecution failed to gather and present readily
accessible evidence. In either event, it is uncharacteristic
prosecutorial torpor -- not undue judicial rigor -- that prevented
justice from being done.
III.
Having concluded that Pothier's conviction rests on
insufficient evidence, we need not reach his sentencing challenge.
For the reasons discussed above, we reverse.
- 14 -