NOT RECOMMENDED FOR PUBLICATION
File Name: 20a0150n.06
No. 19-5686
UNITED STATES COURT OF APPEALS
FOR THE SIXTH CIRCUIT
FILED
UNITED STATES OF AMERICA, ) Mar 13, 2020
) DEBORAH S. HUNT, Clerk
Plaintiff-Appellee, )
)
ON APPEAL FROM THE
v. )
UNITED STATES DISTRICT
)
COURT FOR THE WESTERN
DENNIS AMMONS, )
DISTRICT OF KENTUCKY
)
Defendant-Appellant. )
)
Before: MERRITT, THAPAR, and LARSEN, Circuit Judges.
LARSEN, Circuit Judge. A jury convicted Dennis Ammons of knowingly accessing child
pornography with intent to view it. The district court sentenced him to 110 months in prison. On
appeal, Ammons challenges both his conviction and his sentence. We AFFIRM.
I.
In 2014, the FBI began investigating a website known as “Playpen.” Playpen was an online
forum that advertised and distributed child pornography. Once logged in, users could view an
extensive collection of pictures and videos containing child pornography.
Playpen was not accessible through traditional internet browsers. Instead, the site could
only be accessed through what is colloquially referred to as the “dark web.” See United States v.
Tagg, 886 F.3d 579, 582 (6th Cir. 2018). Users had to download special software known as “The
Onion Router” or “Tor,” which allowed them to anonymously access a network of hidden
websites. Through the Tor software, users then had to input an intricate web address consisting of
random, algorithm-generated characters to reach Playpen’s site. This web address was not linked
No. 19-5686, United States v. Ammons
to traditional search engines like Google; it had to be obtained through other means, such as direct
communication with pre-existing users.
With help from a foreign government, the FBI located a server containing a copy of
Playpen’s website. In January of 2015, agents obtained a search warrant and seized a copy of that
server. Agents then identified and apprehended Playpen’s administrator the following month. At
that point, the FBI assumed control over Playpen. But even having control did not allow the FBI
to identify the website’s users; the Tor software masked their IP addresses.
The government sought a warrant from a magistrate judge in the Eastern District of
Virginia—where the FBI had transported Playpen’s server—to deploy what is known as a
“Network Investigative Technique” (NIT). An NIT is a form of “government-created malware.”
United States v. Werdene, 883 F.3d 204, 206 (3d Cir. 2018). It unmasks a user’s IP address by
embedding instructions within the website’s code that force the user’s computer to transmit its IP
address to a government-controlled server. The magistrate judge issued the warrant on February
20, 2015 (the Virginia Warrant).
Using the NIT, the government obtained an IP address associated with the username
“H8RL3Y.” This user had accessed several child-pornography images on Playpen over a six-hour
period in early March 2015. The user had also responded to a post titled “Pthc 14Y Lil Zinaida
13Y Boy (51.15),” asking “What’s the password?” The post contained a link to an external website
where visitors could download child pornography.
The FBI ultimately traced H8RL3Y’s IP address to a home in Muldraugh, Kentucky, where
Ammons lived with his sister and her two minor children. The government sought and obtained a
warrant to physically search Ammons’ residence for evidence of child pornography (the Kentucky
Warrant). The application for the Kentucky Warrant relied on the information obtained through
-2-
No. 19-5686, United States v. Ammons
the NIT to establish probable cause. The subsequent search and seizure of Ammons’ computer
revealed 220 child-pornography images (113 non-duplicates) stored in the cache of his Chrome
web-browser. The metadata attached to these images indicated that they had been accessed on
October 22, 2015.
Following the search, the FBI interviewed Ammons. He waived his Miranda rights and
agreed to answer the agents’ questions. Ammons told the agents that he was the primary user of
the computer in his household. He also explained that he had installed a password protected
wireless router in the house a few months earlier. Finally, after initially denying ever seeing child
pornography, Ammons admitted that he came across child pornography while exploring the “dark
web.” He named multiple sites where he had seen child pornography and described the images to
the agents—though he claimed he was not a “collector” of these images.
The FBI also interviewed Ammons’ 16-year-old niece, who lived in his Kentucky home.
She told agents that Ammons had previously taken nude photographs of her. She described an
incident in which Ammons had caught her taking nude pictures of herself. She stated that Ammons
confronted her, confiscated the phone on which she had taken the pictures, and threatened to tell
her mother unless she agreed to pose nude for Ammons. She claimed that Ammons then took
nude photographs of her, forcing her to pose with her legs spread apart exposing her genitals.
These photographs were never found.
A grand jury indicted Ammons on two counts: (1) production of child pornography, in
violation 18 U.S.C. § 2251(a) and (e); and (2) knowingly accessing child pornography with intent
to view it, in violation of 18 U.S.C. § 2252A(a)(5)(B). Prior to trial, Ammons moved to suppress
the evidence obtained from his computer through both the NIT and the physical search of his home.
He argued that the Virginia Warrant was invalid because the issuing magistrate judge lacked
-3-
No. 19-5686, United States v. Ammons
jurisdiction over Kentucky, where Ammons’ computer was located when the government
implemented the NIT. Because the subsequent Kentucky Warrant was obtained with information
from the NIT, Ammons contended that evidence from both searches must be suppressed. The
district court denied Ammons’ motion, and the case proceeded to trial.
After trial, the jury rendered a split verdict, acquitting Ammons of producing child
pornography but convicting him of knowingly accessing child pornography with intent to view it.
Ammons moved for a judgment of acquittal, arguing that the evidence was insufficient to support
his conviction. The district court denied his motion.
Ammons’ conviction carried a maximum prison sentence of ten years. See 18 U.S.C.
§ 2252A(b)(2). At sentencing, the district court concluded that the appropriate Guidelines range
was 108 to 120 months. Ammons argued that his Guidelines range was unreasonable.
Specifically, he contended that the enhancements contained in U.S.S.G. § 2G2.2 resulted in nearly
all child-pornography offenders receiving the maximum sentence; as a result, Ammons argued,
the court should ignore those enhancements and issue a below-Guidelines sentence. The district
court disagreed, sentencing Ammons to 110 months in prison—10 months shy of the statutory
maximum. Ammons appealed.
II.
A.
Ammons argues first that the district court erred by denying his motion to suppress.
Evidence obtained in violation of the Fourth Amendment may be subject to suppression at trial.
See United States v. Fisher, 745 F.3d 200, 203 (6th Cir. 2014). But not all Fourth Amendment
violations result in suppression. Id. The exclusionary rule’s “sole purpose” is to deter Fourth
Amendment violations. See Davis v. United States, 564 U.S. 229, 236 (2011). Thus, when officers
-4-
No. 19-5686, United States v. Ammons
“conduct a search in objectively reasonable reliance on a warrant later held invalid,” the
exclusionary rule does not apply. Id. at 238–39 (quotation marks omitted). This is known as the
“good-faith exception” to the exclusionary rule. Fisher, 745 F.3d at 203.
The district court denied Ammons’ suppression motion because it concluded that the good-
faith exception applied. Ammons challenges that conclusion on appeal. He argues that the good-
faith exception is categorically inapplicable to warrants that are void ab initio for lack of
jurisdiction.1 And, even if the good-faith exception could apply, he argues that the agents’ reliance
on the Virginia Warrant was objectively unreasonable.
The Virginia Warrant “has implicated more than a hundred defendants across the United
States,” United States v. Horton, 863 F.3d 1041, 1045–46 (8th Cir. 2017) (collecting cases), so it
is perhaps unsurprising that this is not our first encounter with a suppression claim like Ammons’.
Indeed, in United States v. Moorehead, 912 F.3d 963, 967 (6th Cir. 2019), we rejected the same
objections to good-faith reliance on the Virginia Warrant that Ammons raises here. See id. at 968,
970. Moorehead, therefore, forecloses both of Ammons’ arguments. In his reply brief, Ammons
asks us to disregard Moorehead and rely instead on our earlier decision in United States v. Scott,
which held that the good-faith exception does not apply “whe[n] a warrant is issued by a person
lacking the requisite legal authority.” 260 F.3d 512, 515 (6th Cir. 2001). But Moorehead rejected
that argument as well. See 912 F.3d at 969 (recognizing that Scott’s holding had been modified
1
Ammons’ argument that the Virginia Warrant is void ab initio for lack of jurisdiction is based,
in part, on the Federal Rules of Criminal Procedure as they existed at the time of the search.
Because we conclude that the good-faith exception applies, we need not decide whether the
warrant was invalid. We note, however, that the Rules were later amended to expressly authorize
warrants like the Virginia Warrant. See Fed. R. Crim. P. 41(b)(6) (“[A] magistrate judge having
authority in any district where activities related to a crime may have occurred has authority to issue
a warrant to use remote access to search electronic storage media and to seize or copy electronically
stored information located within or outside that district . . . .”).
-5-
No. 19-5686, United States v. Ammons
by our decision in United States v. Master, 614 F.3d 236, 242–43 (6th Cir. 2010), due to
intervening Supreme Court precedent). Accordingly, we affirm the district court’s denial of
Ammons’ suppression motion.
B.
Ammons’ sentencing challenge is likewise foreclosed by our precedent. He argues that the
enhancements outlined in U.S.S.G. § 2G2.2 are so broadly applicable in child-pornography cases
that a sentence premised on those enhancements is substantively unreasonable. He concedes,
however, that this argument is directly foreclosed by our decision in United States v. Lynde, 926
F.3d 275 (6th Cir. 2019); he nonetheless wishes to preserve this argument for further review.
Ammons is right that Lynde controls and forecloses his claim to sentencing relief here. See 926
F.3d at 279–80.
C.
Finally, Ammons argues that the district court erred in denying his motion for acquittal
because the evidence presented at trial was insufficient to prove his guilt beyond a reasonable
doubt. This is a question of law that we review de novo. United States v. Graham, 622 F.3d 445,
448 (6th Cir. 2010). A defendant claiming evidence insufficiency must meet “a very heavy
burden.” United States v. Abboud, 438 F.3d 554, 589 (6th Cir. 2006) (quoting United States v.
Vannerson, 786 F.2d 221, 225 (6th Cir. 1986)). We view all evidence “in [the] light most favorable
to the prosecution, giving the prosecution the benefit of all reasonable inferences from the
testimony.” United States v. McAuliffe, 490 F.3d 526, 537 (6th Cir. 2007). And we may disturb
-6-
No. 19-5686, United States v. Ammons
the jury’s verdict only if no “rational trier of fact could have found the essential elements of the
crime beyond a reasonable doubt.” Id.
Section 2252A(a)(5)(B) forbids “[a]ny person” to “knowingly access[] with intent to
view[] any . . . material that contains an image of child pornography.” Thus, to convict Ammons,
the prosecution had to prove beyond a reasonable doubt that Ammons (1) knowingly accessed with
intent to view, (2) any material, (3) that he knew contained an image of child pornography. See
United States v. Brune, 767 F.3d 1009, 1020 (10th Cir. 2014).
Ammons attempts to refute the first element. He points to the fact that the images
containing child pornography were found in his web browser’s cache. Cache is a storage drive
used by web browsers, like Google Chrome, to locally save web pages visited by a user. By storing
this information, cache allows web browsers to more quickly load web content. Importantly,
though, not all content stored in cache has necessarily been seen by the user. For example, when
a page on a website requires users to scroll down to see more content, all of the page’s content is
stored in cache even if the user never scrolls to the bottom of the page. Additionally, material
from external websites linked to the website being viewed may be stored in cache in anticipation
that the user might click on the link. Because it is technically possible that the 220 images of child
pornography found in Ammons’ cache were stored without him viewing the material, Ammons
contends that no rational juror could have found him guilty beyond a reasonable doubt.
We disagree. First, Ammons’ argument relies on a false premise. A conviction under
§ 2252A(a)(5)(B) does not require the defendant to have actually viewed the illegal images. See
Tagg, 886 F.3d at 587. “The access-with-intent offense is complete the moment that the elements
of access and intent coincide.” Id. Thus, the jury could have convicted Ammons if it found that
he knowingly accessed a child-pornography website with intent to view illicit images, but stopped
-7-
No. 19-5686, United States v. Ammons
short of actually viewing the images. Id. (“[E]ven if the person never viewed illegal child
pornography, knowingly accessing a child-pornography website with the intent to view illegal
materials is itself a criminal act.”).
Second, the government presented ample evidence at trial from which a rational juror could
find Ammons guilty—even under Ammons’ own theory of § 2252A(a)(5)(B). Agents Brian Coyt
and Virginia MacHenry, who interviewed Ammons after the search, testified that Ammons
admitted to viewing child pornography while browsing the internet. More specifically, the agents
said that Ammons admitted to installing the Tor software on his browser and encountering child
pornography on the dark web. The agents then explained that these websites on the dark web
could not be accessed through a traditional Google search, but instead had to be intentionally
sought out using the Tor software. Finally, Agent MacHenry testified that Ammons had admitted
to browsing forums on the traditional internet, such as 4chan, which “told him certain locations on
TOR to look for child pornography.” R. 125, PageID 866. While Ammons testified that the agents
were misrepresenting his statements during the interview, the jury was not required to credit his
testimony.
The prosecution also presented the testimony of Agent Amanda Rankhorn, the forensic
specialist who analyzed Ammons’ hard drive. Agent Rankhorn testified that, at 8:08 AM on
October 22, 2015, Ammons had entered a Google search for the term “jblover.” Rankhorn then
testified that the browser cache indicated that Ammons had visited the website “jblover.org,”
which included forums titled, “Jailbait forum – Stickam Captures – Omegle Captures.” And she
explained that many of the 220 images of child pornography found in Ammons’ cache contained
a logo for “omegle.com,” a video-chatting website. Finally, Rankhorn testified that most of the
images showed young girls with their legs spread apart exposing their genitals—which matched
-8-
No. 19-5686, United States v. Ammons
testimony provided by Ammons’ niece, who told the jury that Ammons had forced her to pose in
the identical position. A sealed exhibit submitted to the jury contained a sample of 10 of the 220
images found on Ammons’ hard drive. Taking this evidence in the light most favorable to the
prosecution, a “rational trier of fact” certainly could have found Ammons guilty beyond a
reasonable doubt. See Graham, 622 F.3d at 448.
***
For the foregoing reasons, the judgment of the district court is AFFIRMED.
-9-