NOT RECOMMENDED FOR PUBLICATION
File Name: 21a0104n.06
Nos. 19-2151/2153
UNITED STATES COURT OF APPEALS
FOR THE SIXTH CIRCUIT
FILED
UNITED STATES OF AMERICA, ) Feb 25, 2021
) DEBORAH S. HUNT, Clerk
Plaintiff-Appellee,
)
)
v. ON APPEAL FROM THE
) UNITED STATES DISTRICT
)
ADAM CHRISTOPHER COLLARD (19-2151); COURT FOR THE WESTERN
)
JOSEPH ALAN COLLARD (19-2153), DISTRICT OF MICHIGAN
)
Defendants-Appellants. )
BEFORE: BATCHELDER, MOORE, and ROGERS, Circuit Judges.
ROGERS, Circuit Judge. Defendants Adam and Joseph Collard appeal their convictions
for various charges related to possession of child pornography and challenge their prison
sentences. Most of defendants’ claims are meritless, but defendants raise colorable challenges
based on the district court’s admission of Adam’s prior conviction and evidence that Joseph
possessed a sex toy. Any error in the admission of this evidence was harmless error, however.
Defendants were indicted in 2018 on various child pornography-related charges stemming
from an FBI investigation based in the Eastern District of Virginia. In February and March of
2015, the FBI had been investigating Playpen, a child-pornography sharing website on the dark
web. To access Playpen, users must download and use The Onion Router (Tor) browsing software,
which masks users’ IP addresses by routing users’ signals through computers worldwide. While
law enforcement can generally review user logs to identify a website’s users, because Playpen
users “mask” their IP addresses, such logs would show the IP address of the most recent computer
the user was routed through, not the originating IP address. To track down the true IP addresses
Nos. 19-2151/2153, United States v. Collard, et al.
of Playpen users, the FBI sought and obtained authorization to use a network investigative
technique (“NIT”) from a federal magistrate judge in Virginia.1 The NIT allowed the FBI to learn
the actual IP addresses of the website’s users, which in turn enabled law enforcement to identify
computers and their locations.
During the investigation, the FBI traced a user’s log-on name and IP address to defendant
Adam Collard and learned his home address. The FBI determined that Adam lived with his parents
and brother in Eaton Rapids, Michigan, and discovered that Adam was a registered sex offender,
who had previously been convicted for possession of child pornography. Law enforcement then
obtained two search warrants: one for Adam’s home, and another for a camper and vehicle at a
campground that Adam was staying at. Both search warrants were executed on the same day. At
the campsite, law enforcement seized a laptop, smart phone, external hard drive, thumb drives, and
a flash drive. During the residential search, Adam’s father Douglas was present and informed
agents that Adam and his brother Joseph had separate rooms. The agents searched both rooms,
each with its own computers and storage media, which were ultimately seized. Investigators
conducted a forensic examination of the devices and concluded that both Adam’s and Joseph’s
computers contained child pornography and a file-sharing program. Adam’s devices had tens of
thousands of images of child pornography (including images depicting bestiality, bondage, and
torture), more than one thousand pornography movies, and a “Pedophile Sex Manual.” Most of
the content on Adam’s devices involved female minors. Joseph’s computers and storage media
contained hundreds of images and more than seventy videos containing sex acts or male
masturbation; Joseph’s child pornography collection primarily involved male minors.
1
The FBI learned of Playpen’s true IP address from a foreign law enforcement agency and executed a search warrant
at the hosting company. The FBI seized the computer server and covertly operated the site from Virginia.
-2-
Nos. 19-2151/2153, United States v. Collard, et al.
Adam and Joseph were tried together and were represented by the same privately retained
counsel. Each defendant consented to the joint representation, and the district court found there
was no actual or potential conflict of interest. At trial, the Government relied on the testimony of
an FBI agent and a computer forensics expert to elicit evidence that the brothers were in the
computer repair business and were sophisticated computer users. The Government also introduced
evidence against Adam of Adam’s prior conviction for possession of child pornography. In
addition, the Government introduced against Joseph evidence that Joseph purchased and possessed
an anal dildo, which the Government submitted for the purpose of linking Joseph to a computer
seized from his room that contained a record of the purchase and child pornography. Adam was
convicted of two counts of receipt of child pornography, in violation of
18 U.S.C. § 2252A(a)(2)(A) and (b)(1), and one count of possession of child pornography, in
violation of § 2252A(a)(5)(B) and (b)(2). His brother Joseph was convicted of one count of
attempted receipt of child pornography and one count of receipt of child pornography, both in
violation of § 2252(a)(2)(A) and (b)(1), and one count of possession of child pornography in
violation of § 2252A(a)(5)(B) and (b)(2).
Adam and Joseph timely appealed. They first argue that the district court improperly
denied their motion to suppress evidence seized under the NIT, which they argue was an illegal
warrant. They further contend that the district court erred by denying their motion to compel the
Government to produce certain information related to NIT technology used to track Adam’s online
activity. Adam and Joseph both challenge the admission of Adam’s prior conviction for possession
of child pornography, and Joseph challenges the admission of evidence that he possessed a sex
toy. Finally, they appeal their sentences, arguing that the district court incorrectly found that they
engaged in distribution or trafficking of child pornography.
-3-
Nos. 19-2151/2153, United States v. Collard, et al.
NIT Warrant
Defendants’ first claim, that the computers and digital property seized by the Government
should have been suppressed, was properly denied by the district court. Defendants argue that the
initial NIT warrant in the Eastern District of Virginia was not sufficiently particularized and thus
violated the Fourth Amendment. According to defendants, evidence seized pursuant to the second
warrant (which authorized the search and seizure of the Collard home and camper) were fruits of
the poisonous tree and should have been suppressed. This court has already heard and rejected a
similar challenge to the NIT warrant’s particularity in United States v. Harney, 934 F.3d 502,
505–06 (6th Cir. 2019), another case that stemmed from the investigation in Virginia. That
decision is controlling here.
Without addressing Harney, defendants maintain the warrant was not sufficiently
particularized, pointing to recent testimony (in a separate case) that the FBI was able to “monitor[]”
and “capture[] the activity associated with each individual user on the Playpen Web site.” Given
these capabilities, defendants argue, the FBI could have obtained individual NIT warrants against
specific users who had accessed child pornography. Such a “targeted approach” would have
excluded from the Government’s search those users “who simply logged into the site—even if
[they] logged out immediately without viewing any child pornography.” This argument ignores
the “reality of web-based searches” and is not persuasive. Id. at 505.
Defendants’ arguments about the breadth of the warrant appear to be animated by concerns
that it would sweep up innocent bystanders seeking access to Playpen’s legal content. But as we
have previously explained, the notion that innocent users would be on Playpen (and thus subject
to government monitoring) is hardly plausible. See United States v. Tagg, 886 F.3d 579 (6th Cir.
2018); United States v. Bateman, 945 F.3d 997 (6th Cir. 2019). Websites on the dark web cannot
-4-
Nos. 19-2151/2153, United States v. Collard, et al.
be accessed by just anyone on the Internet or through a typical search browser. Tagg, 886 F.3d at
583. Rather, users must use Tor to get on those sites, which typically consist of a randomized
URL containing a 16-digit string of numbers and letters, such as upf45jv3bziuctml.onion. See id.
Such a URL ensures that “[a]bsent some statistically impossible stroke of luck,” an Internet user
cannot accidentally happen upon the site.2 Tagg, 886 F.3d at 583. On the off chance that Internet
users accidentally came across Playpen’s homepage in particular, they would then encounter
suggestive images involving prepubescent girls, alerting them to the website’s content. Bateman,
945 F.3d at 1002 & n.9. We have held that because of the numerous affirmative steps Playpen
users had to take to access the site, there was probable cause to conclude that those who did so
acted knowingly and with the intention to view child pornography, itself a criminal act. Tagg, 886
F.3d at 587. The NIT warrant is thus “[f]ar from the kind of general warrant at which the
particularity requirement takes aim.” Harney, 934 F.3d at 505.
Our holding that the NIT warrant was constitutional did not rest on whether the FBI was
technologically capable of employing a narrower approach. In fact, while the court in Harney
understood the warrant to permit searches of any computers that logged on to Playpen, id., the
record here reflects that the NIT was deployed more narrowly. The NIT was “only used against
users accessing certain portions of the site (e.g. the preteen hardcore photos/videos section, as
opposed to general discussion boards),” further ameliorating concerns about the breadth of the
warrant. (Emphasis added). New evidence that the FBI could have narrowed its search, without
more, does not take this case outside of the scope of previous rulings; nor does it render the NIT
warrant constitutionally infirm.
2
Because of a misconfiguration that does not appear to be at issue here, before February 20, 2015, Playpen was
“occasionally accessible through the traditional Internet.” A user would have still needed to know the IP address of
the server that hosted Playpen, information which was not publicly available.
-5-
Nos. 19-2151/2153, United States v. Collard, et al.
Defendants’ argument that the NIT warrant exceeded the territorial limits in Federal Rule
of Criminal Procedure 41 is also unavailing because the good-faith exception applies. We have
previously assumed that the NIT warrant may have exceeded the scope of Rule 41, see, e.g., United
States v. Moorehead, 912 F.3d 963, 969 (6th Cir. 2019); Harney, 934 F.3d at 506. But because
“reasonable jurists have come to different conclusions about whether the NIT Warrant was valid”
under Rule 41(b)’s territorial limits, we have concluded that we cannot “expect officers to have
known that this type of warrant was invalid at the time it was sought” and have thus applied the
good-faith exception. Moorehead, 912 F.3d at 970 (citing cases). Defendants have not pointed to
anything that should compel the court to reach a different result here. Instead, without addressing
any of the Sixth Circuit opinions on point, they cite only district court decisions that predate the
relevant precedent, such as United States v. Martin, No 15-20544-02, 2016 WL 4493675 (E.D.
Mich. 2016).
To the extent that defendants rely on new evidence about the FBI’s capabilities to argue
that the good-faith exception should not apply, such a claim also fails. Although defendants do
not clearly spell out their argument, it appears they contend that, because the NIT warrant violated
the particularity requirement, and because FBI officers knew they could have narrowed their
search, the good-faith exception should not apply. As discussed above, defendants have not shown
that the warrant violated the Fourth Amendment, which should end the matter. Defendants also
have not shown how a search that would have narrowed the number of users being surveilled
affects the question of whether the magistrate judge exceeded any territorial limits. The
exclusionary rule should not apply where, as here, “an objectively reasonable officer could have
believed the seizure valid.” United States v. McClain, 444 F.3d 556, 566 (6th Cir. 2006). There
is no evidence here that the officers had any reason to believe that the seizure was invalid, even if
-6-
Nos. 19-2151/2153, United States v. Collard, et al.
they knew the FBI could have used a narrower approach. “To trigger the exclusionary rule, police
conduct must be sufficiently deliberate that exclusion can meaningfully deter it, and sufficiently
culpable that such deterrence is worth the price paid by the justice system.” Herring v. United
States, 555 U.S. 135, 144 (2009). Here, however, defendants do not allege any such misconduct.
They never argue that the FBI misrepresented its technological abilities to the magistrate judge or
point to any police misconduct, much less any conduct that is “deliberate, reckless, or grossly
negligent.” The evidence was also seized pursuant to a second warrant, thus weakening the link
between the evidence and any misconduct related to the NIT warrant. To be sure, the second
warrant was born out of the first, but courts should be wary of applying the exclusionary rule where
the connection between alleged police misconduct and relevant evidence becomes “sufficiently
attenuated” so as to “dissipate[e] . . . the taint,” and where, as here, the “flagrancy of the police
misconduct” is hardly an issue. United States v. Leon, 468 U.S. 897, 911 (1984) (citations
omitted).
NIT Source Code
Defendants’ second claim, that the district court should have compelled the Government
to disclose the “complete source code for the [NIT], including the exploit and payload” under
Federal Rule of Criminal Procedure 16(a)(1)(E), also fails3. This court heard a similar claim in
Harney as well, and concluded that the district court did not abuse its discretion by declining to
require the government to hand over the NIT. Defendants’ contention in this case that the NIT
source code is necessary to determine whether a third party hacked their computers and placed the
pornography on their devices mirrors Harney’s arguments that the government improperly stored
3
Although Joseph raises this argument, it is not clear that he has standing to do so or how he would benefit from the
NIT source code. Law enforcement did not rely on the NIT to identify Joseph; his computer was seized once law
enforcement had used the NIT to identify Adam.
-7-
Nos. 19-2151/2153, United States v. Collard, et al.
data or made his computer susceptible to third-party access. Harney, 934 F.3d at 508. While we
were sympathetic to Harney’s concerns, we reasoned that his arguments were too generalized to
“show[] a problem . . . that overrides the government’s interest in keeping the generic components
of the technique secret.” Id. The same is true here. Defendants again do not address Harney,
much less distinguish it. To be sure, the record here reflects that—unlike in Harney—defendants’
experts did use the Government’s tools that were turned over to the defense, and their defense at
trial hinged on the possibility that third parties maliciously accessed their computers and
downloaded the content. But defendants offer only a cursory argument that they should not be
required to show third-party wrongdoing before obtaining the very tools enabling them to show
such wrongdoing. Such a conclusory argument, however, is insufficient to render Harney
inapplicable. See id.
Adam’s Prior Conviction
Defendants make a colorable argument that the district court erred in admitting Adam’s
prior conviction for possession of child pornography. Any such error, however, is harmless.
Before trial, Adam filed a motion in limine seeking to exclude evidence of his previous
conviction for possession of child pornography under Federal Rule of Evidence 404(b). The
district court granted his motion, “subject to renewal of a request by the Government based on the
proofs offered at trial.” During the trial, defense counsel cross-examined an FBI computer forensic
examiner, and suggested that the child pornography found on Adam’s computer may have been
due to malware or was downloaded by one of Adam’s employees who had access to his computer.
In response to this line of questioning, the Government argued that the defense had “put[]
knowledge squarely at issue,” and renewed its request to admit Adam’s prior conviction. The
court agreed and admitted the evidence over defendants’ objections. Through the testimony of
-8-
Nos. 19-2151/2153, United States v. Collard, et al.
FBI Agent Rodney Charles, the jury learned only that the conviction was for possession of child
sexually explicit material; the judgment of sentence was admitted as an exhibit, and the
Government offered no evidence about the circumstances involving the conviction. The district
court issued limiting instructions twice: once immediately after Charles was done testifying, and
again when it gave the jury final instructions before deliberation. The court instructed the jury that
the conviction could not be used against Joseph and could be used against Adam only as it “relates
to his knowledge, identity, or absence of mistake.”
Adam and Joseph maintain that despite the limiting instructions, the evidence should have
been excluded under Federal Rule of Evidence 404(b), which prohibits the use of prior offenses to
“prove a person’s character in order to show that on a particular occasion, the person acted in
accordance with the character.” Fed. R. Evid. 404(b)(1). Such evidence may be admissible,
however, for other purposes, including—as the district court found relevant here—proving
knowledge, absence of mistake, or identity.4 See Fed. R. Evid. 404(b)(2). Under Rule 404(b),
the district court must: (1) make a preliminary finding as to whether
sufficient evidence exists that the prior act occurred; (2) determine
whether the other act is admissible for one of the proper purposes
outlined in Rule 404(b); and (3) apply Rule 403 balancing to
determine whether the evidence’s probative value is substantially
outweighed by the danger of unfair prejudice or the other concerns
embodied in Rule 403.
United States v. Allen, 619 F.3d 518, 523 (6th Cir. 2010).5 Defendants do not meaningfully
challenge the first prong.
4
At argument, the Government conceded that the only permissible purposes were knowledge, identity, and absence
of mistake. We therefore confine our analysis to those purposes.
5
Evidentiary rulings are generally subject to an abuse of discretion standard, but this court has previously applied a
three-tier test that aligns with Rule 404’s three-part test and in which the court reviews:
(1) for clear error the district court’s determination that the “other act” took place;
(2) de novo the district court’s legal determination that the evidence was
admissible for a proper purpose; and (3) for abuse of discretion the district court’s
-9-
Nos. 19-2151/2153, United States v. Collard, et al.
As to the second prong, the district court colorably erred when it concluded that Adam’s
prior conviction is admissible for knowledge or absence of mistake where there was no evidence
that the previous offense involved the use of computers or similar technology. The Government
offered no evidence that Adam obtained the previous pornographic materials electronically, and
the court did not probe further into the circumstances of the previous offense. In fact, defense
counsel later introduced evidence that the prior conviction involved ten photographs that he
possessed in his parents’ basement.
It is also questionable that the prior conviction was admissible to show identity. Where
identity is in dispute, evidence “that the defendant previously committed a different crime using
the same or similar modus operandi as was employed in the commission of the crime charged [is
admissible] to show that the same actor committed both crimes.” United States v. Fountain, 2 F.3d
656, 668 (6th Cir. 1993), overruled on other grounds, Trepel v. Roadway Express, Inc., 194 F.3d
708, 717 (6th Cir.1999). The Government here made no showing that the previous conviction
involved similar circumstances—let alone a nearly identical method of operations.
Even assuming that the previous child pornography conviction served a proper purpose
under Rule 404, there is a colorable argument that under Rule 403, the probative value of the prior
conviction “is substantially outweighed by a danger of . . . unfair prejudice.” Here, the
Government conceded, it presented ample evidence of attribution, and the prior conviction was
substantially similar to one of the charges for which he was indicted.
determination that the probative value of the other acts evidence is not
substantially outweighed by its unfairly prejudicial effect.
United States v. Bell, 516 F.3d 432, 440 (6th Cir. 2008). There appears to be an unresolved dispute as to which
standards apply, while some panels consider the different formulations to be consistent. We need not resolve this
disagreement in this case.
-10-
Nos. 19-2151/2153, United States v. Collard, et al.
Ultimately, however, admission of Adam’s prior crime was harmless. The record reflects
that the Collard brothers ran a computer repair business and were sophisticated computer users.
The Government showed the file paths for the downloaded content, which contained Adam’s and
Joseph’s names. That Joseph had downloaded encrypted files the Government could not break
further shows his technological prowess. The Government also presented evidence refuting
defense counsel’s suggestion that the child pornography could have unwittingly been on his
computer through malware. Through the testimony of the FBI computer forensic examiner, the
jury learned it was unlikely for someone—especially someone with Adam’s computer repair
expertise—to be unaware of the existence of thousands of child pornography images on a device.
The Government further elicited testimony that there was no evidence of malware or ransomware
on the seized devices (and that malware and ransomware could not create CDs with child
pornography). In addition, evidence “that child pornography was downloaded at all hours of the
day and night . . . [and] not necessarily within business hours,” severely undercuts Adam’s
argument that an employee downloaded the content.
As to Joseph, he was clearly not harmed by the admission of his brother’s conviction.
Joseph points to the fact that that the Government painted him and his brother as “sexual deviants”
and that he was tainted by his association with Adam. Immediately after the jury heard evidence
of Adam’s conviction, the district court specifically instructed the jury that it “can consider the
evidence only as relates to [Adam’s] knowledge, identity, or absence of mistake,” but that it “must
not consider it for any other purpose as to [Adam]” and that it “may not consider it for any purpose
as to his co-defendant.” At the trial’s closing, the court again told the jury that it “cannot consider
[Adam’s previous conviction] in any way against the other defendant, Joseph Collard.”
We presume that jurors follow instructions, see United States v. Harvey, 653 F.3d 388, 396
-11-
Nos. 19-2151/2153, United States v. Collard, et al.
(6th Cir. 2011), and the presumption is particularly strong with respect to that instruction. The
jury was told unequivocally that the prior conviction could not be used as to Joseph. Even the out-
of-circuit case which Joseph cites for the proposition that a jury may draw adverse inferences based
on defendants’ associations recognized that such a risk is generally “too insubstantial in most
circumstances to survive forceful instructions.” United States v. Figueroa, 618 F.2d 934, 946
(2d Cir. 1980).
At bottom, there was compelling proof linking both defendants to the child pornography
on their computers and electronic devices and ample evidence dispelling defendants’ argument
that they did not download or were unaware of the content on their computers. Defendants have
offered no persuasive argument to the contrary.
Admission of Joseph’s Possession of a Sex Toy
Joseph mounts a separate challenge to the admission of evidence that he possessed a dildo,
which also fails. During the trial, the Government elicited testimony from an FBI agent that he
found an anal dildo in Joseph’s room. The Government introduced as an exhibit a screenshot of
the Amazon order confirmation for the dildo, the purpose of which was to link Joseph as the owner
of a seized computer that contained pornography. Defense counsel objected and later requested a
mistrial, and the judge denied defense counsel’s requests both times. On appeal, Joseph argues
the district court erred by admitting the evidence, which he asserts was of limited probative value
and substantially outweighed by its prejudicial impact.
Although the dildo evidence is indeed prejudicial, the district court likely did not abuse its
discretion when it ruled the evidence admissible, and in any event, the admission would be
harmless error. A district court abuses its discretion when it “relies on clearly erroneous findings
of fact, improperly applies the law or uses an erroneous legal standard.” United States v. Dixon,
-12-
Nos. 19-2151/2153, United States v. Collard, et al.
413 F.3d 540, 544 (6th Cir. 2005) (citing Romstadt v. Allstate Ins. Co., 59 F.3d 608, 615 (6th
Cir.1995)). The district court found that the evidence connected to the dildo purchase was relevant
to the question of computer ownership. While acknowledging the evidence’s prejudicial nature,
the district court concluded that because the Government was introducing the evidence in the form
of “just a piece of a paper,” it was “not unfairly prejudicial.” (Emphasis added). This was
particularly true given the other admissible evidence in the case, which included images and screen
shots of the child pornography. Joseph is correct that there may have been other less prejudicial
evidence to tie him to the computer and the room in which it was seized. The Government admits
as much, arguably making the dildo-related evidence cumulative. The Government further
clarified at argument, however, that it chose to introduce this evidence in particular because it is
deeply personal and Joseph would have been unlikely to lend his computer to others if he was
using it for such personal purchases. While the alternative means of less prejudicial proof arguably
weakens the district court’s reasoning, it does not give rise to a “definite and firm conviction” that
there was a “clear error of judgment,” which is the standard stated in cases such as United States
v. Bartholomew, 310 F.3d 912, 920 (6th Cir. 2002). In any event, even if the admission of the
dildo evidence was error, the ample other evidence allowing the jury to attribute the computer to
Joseph makes the error harmless.
Sentencing Challenges
Finally, defendants’ claims that the district court miscalculated their sentences are also
without merit. Adam and Joseph both challenge the two-level enhancement under
U.S.S.G. § 2G2.2(b)(3)(F), which applies only if “the defendant knowingly engaged in
distribution” in certain circumstances. Their argument appears to be that because they were not
charged with trafficking or distribution, and because the Government did not establish to the jury
-13-
Nos. 19-2151/2153, United States v. Collard, et al.
that they intended to traffic in or knowingly distributed pornography, the court erred in applying
the enhancement. Their appeal is essentially a challenge to judicial fact-finding in sentencing more
generally, although they recognize this practice is permissible.6 Because defendants used file-
sharing software, under this circuit’s precedent, the district court’s findings were not erroneous.
A two-level enhancement for distribution may be applied to a defendant’s sentence when
the defendant has used file-sharing software. See, e.g., United States v. Abbring, 788 F.3d 565,
567 (6th Cir. 2015) (citing cases). This court has upheld the application of the enhancement and
has done so even where the defendant was convicted or pleaded guilty only for crimes of
possession, receipt, or attempted receipt and not for distribution. See id.; see also United States v.
Dunning, 857 F.3d 342, 346 349–50 (6th Cir. 2017). This is because the use of a file-sharing
program is directly related to the sharing and transferring of files, which in turn “equals
distribution.” Dunning, 857 F.3d at 350 (citing Abbring, 788 F.3d at 567). To be sure, previous
cases like Abbring involved a different file-sharing program and a defendant who conceded he
understood how the peer-to-peer software worked, which defendants here have not done.
Dunning, however, took Abbring further, and reinforced the conclusion that the “knowing use of
peer-to-peer software justifies the distribution enhancement” where the defendant has not
presented evidence that he was ignorant of the software’s sharing function. Id.
6
Defendants quote a Congressional Research Services article that identifies various Supreme Court justices who have
expressed that sentencing enhancements based on judicial fact-finding of uncharged conduct may pose constitutional
issues. But beyond extensively quoting the argument and offering the speculative assertion that the Supreme Court
may be inclined to visit this issue, defendants do not present any arguments in support of the proposition that judicial
fact-finding is a violation of their Sixth Amendment rights.
-14-
Nos. 19-2151/2153, United States v. Collard, et al.
Adam and Joseph make no mention of these cases but instead center their argument on the
specific features of Frostwire, presumably in an attempt to show they were ignorant of the
program’s file-sharing features. Defendants refer to a 2011 settlement between the Federal Trade
Commission (FTC) and Frostwire related to Frostwire’s deceptive practices.7 According to the
FTC, Frostwire may have misled users about the software’s file-sharing capabilities, which
resulted in users’ inadvertently sharing personal files.
Even if Frostwire’s deceptive practices were enough to nudge these cases outside
Abbring’s and Dunning’s scope, it is not apparent whether and to what extent Adam or Joseph
were impacted by those practices. Although some versions of the desktop program downloaded
before June 10, 2011, defaulted to automatic file-sharing and misled users “into believing that files
they downloaded . . . would not be shared,” Defendants do not establish they had the affected
versions. Even if defendants had downloaded those versions, it is unlikely that such tech-savvy
users would have been easily deceived or unaware that their computers were sharing files. They
offer only a conclusory assertion that “a user of [their] laptops would have been misled by [the]
software which allowed unintended file-sharing,” an argument that the district court found to strain
credulity considering defendants’ ability to access the dark web and Frostwire through a Tor.
Furthermore, because Adam accessed Playpen in 2014-2015—presumably after Frostwire
7
The FTC issued a press release announcing the settlement, which was based on
charges that [Frostwire’s] software likely would cause consumers to unwittingly
expose sensitive personal files stored on their mobile devices, and that it misled
consumers about which downloaded files from their desktop and laptop
computers would be shared with a file-sharing network. The settlement bars
Frostwire from using default settings that share consumers’ files, requires it to
provide free upgrades to correct the unintended sharing, and bars
misrepresentations about what files its applications will share.
Press Release, Federal Trade Commission, Peer-to-Peer File-Sharing Software Developer Settles FTC Charges (Oct.
11, 2011), https://www ftc.gov/news-events/press-releases/2011/10/peer-peer-file-sharing-software-developer-
settles-ftc-charges.
-15-
Nos. 19-2151/2153, United States v. Collard, et al.
upgraded the software and changed its default settings—Adam’s arguments that he was unaware
of file-sharing become more implausible.
Adam separately challenges the district court’s denial of a reduction under U.S.S.G.
§ 2G2.2b(1), which provides for a two-level reduction if “the defendant’s conduct was limited to
the receipt or solicitation of material involving the sexual exploitation of a minor[] and . . . the
defendant did not intend to traffic in, or distribute, such material.” We have previously held that
“a defendant whose sentence is enhanced under § 2G2.2(b)(3) for distribution is not entitled to a
reduction under § 2G2.2(b)(1).” Shepard, 661 F. App’x at 351 (citing Abbring, 788 F.3d at 567–
68). The district court therefore properly denied Adam’s request for a reduction.
Joseph also objects to a two-level enhancement under § 2G2.2(b)(6), which applies “[i]f
the offense involved the use of a computer or an interactive computer service for the possession,
transmission, receipt, or distribution of the material, or for accessing with intent to view the
material.” But Joseph asserts only that had the district court sustained his objection, his offense
level would have been reduced. He fails to explain how the district court erred in determining that
the conduct involved the use of computers, a remarkable assertion given the computers and
electronic devices attributed to him.
For the foregoing reasons, the convictions and sentences of Adam and Joseph Collard are
affirmed.
-16-