NOT RECOMMENDED FOR FULL-TEXT PUBLICATION
File Name: 12a0842n.06
No. 11-3392 FILED
Aug 06, 2012
UNITED STATES COURT OF APPEALS
FOR THE SIXTH CIRCUIT LEONARD GREEN, Clerk
UNITED STATES OF AMERICA, )
)
Plaintiff-Appellee, ) ON APPEAL FROM THE
) UNITED STATES DISTRICT
v. ) COURT FOR THE NORTHERN
) DISTRICT OF OHIO
ALLEN L. KEEFER, )
)
OPINION
Defendant-Appellant. )
_______________________________________)
Before: MOORE, SUTTON, and STRANCH, Circuit Judges.
KAREN NELSON MOORE, Circuit Judge. Defendant-Appellant Allen Keefer
(“Keefer”) appeals for the second time his sentence of 210 months of imprisonment for distributing
and possessing child pornography. For the following reasons, we AFFIRM the district court’s
judgment.
I. BACKGROUND
On January 30, 2009, Keefer pleaded guilty to one count of distributing material involving
the sexual exploitation of minors in violation of 18 U.S.C. § 2252(a)(2), one count of distributing
child pornography in violation of 18 U.S.C. § 2252A(a)(2)(A), and one count of possessing child
pornography in violation of 18 U.S.C. § 2252A(a)(5)(B). He was sentenced to a total of 210 months
of imprisonment, based in part on a five-level enhancement under the U.S. Sentencing Guidelines
(“U.S.S.G.”) applied for offenses involving 600 or more images after the police discovered 1,215
No. 11-3392
United States v. Keefer
images in the “unallocated space” on his computer. U.S.S.G. § 2G2.2(b)(7)(D) (2010). Keefer
appealed the procedural reasonableness of applying this enhancement based on the presence of
images in the unallocated space on his computer, arguing that he had only 39 images on his hard
drive and no knowledge of the images in the unallocated space. We agreed that the evidence at
sentencing did not show knowledge of all the images and remanded for resentencing. United States
v. Keefer, 405 F. App’x 955, 959 (6th Cir. 2010) (“Keefer I”) (unpublished opinion).
On remand, the government presented testimony from Special Agent Michael Dobeck from
the United States Secret Service, a forensic computer examiner with twenty years of experience who
had examined Keefer’s hard drive in this case. Agent Dobeck testified that his examination of
Keefer’s computer revealed that 1,062 of the 1,215 images in Keefer’s unallocated space had been
viewed in their full size at some point on Keefer’s computer and were therefore, in his opinion,
previously viewed or downloaded as a full-sized image. R. 29 (Resent. Hr’g Tr. at 22). The district
court again applied the enhancement, finding “that the 1062 images found in the unallocated space
on the defendant’s computer were at some time opened and viewed in full size by the defendant, and
that they were either saved and deleted by the defendant, or held in a temporary internet file without
being saved.” R. 25 (D. Ct. Order at 1). Keefer was resentenced to 210 months of imprisonment.
Keefer appeals on the same grounds as before, arguing that the enhancement was wrongly applied
and that his sentence is therefore procedurally unreasonable.
2
No. 11-3392
United States v. Keefer
II. STANDARD OF REVIEW
We review claims that a sentence was procedurally unreasonable for abuse of discretion.
United States v. Lapsins, 570 F.3d 758, 772 (6th Cir. 2009) (citing Gall v. United States, 552 U.S.
38, 51 (2007)). We review de novo a district court’s application of the sentencing guidelines and
its findings of fact for clear error. United States v. Hunt, 487 F.3d 347, 350 (6th Cir. 2007).
III. APPLICATION OF SECTION 2G2.2 ENHANCEMENT
Section 2G2.2 instructs a district court to increase the base offense level by five levels “[i]f
the offense involved 600 or more images.” U.S.S.G. § 2G2.2(b)(7)(D) (2010). Whether an offense
“involves” the requisite number of images is determined by looking to the defendant’s relevant
conduct under U.S.S.G. § 1B1.3 (2010). Keefer I, 405 F. App’x at 958; see also United States v.
Lewis, 605 F.3d 395, 403 (6th Cir. 2010) (considering defendant’s conduct during commission of
offense when determining whether § 2G2.2 enhancement should apply). We held in Keefer I that
the mere presence of 1,215 images in Keefer’s “unallocated space” on his computer was insufficient
relevant conduct to justify the enhancement because the PSR’s sole explanation of the unallocated
space was an “unverified, unexplained website definition” that “images are stored in unallocated
space if they were present on a computer at some point.” Keefer I, 405 F. App’x at 958. Presence
does not equate to knowing possession or access given the myriad ways a person can inadvertently
encounter content on the internet. Id.
Before discussing the evidence on remand, we must acknowledge a potential point of
confusion following our prior opinion. In Keefer I, we held that the number-of-images enhancement
3
No. 11-3392
United States v. Keefer
would apply if the government could “show[] by a preponderance of evidence that at some point
Keefer knowingly possessed or knowingly accessed with intent to view each of the 600 or more
images.” Id. On remand, the district court held that the enhancement applied because the
government had proven that Keefer “possessed or accessed with intent to view” the images in his
unallocated space. R. 25 (D. Ct. Order at 1) (emphasis added). At the time of his offense in January
2008, however, federal law prohibited only the knowing possession of child pornography, not
accessing such images with the intent to view.1 Despite this potential confusion, any error would
be harmless because Ohio law prohibited both knowingly possessing and viewing child pornography
in January 2008. Ohio Rev. Code § 2907.323(A)(3) (“No person shall . . . [p]ossess or view any
material or performance that shows a minor who is not the person’s child or ward in a state of nudity,
unless [certain exceptions apply].”).2
1
Both 18 U.S.C. §§ 2252(a)(4) and 2252A(a)(5) were amended in 2008 to criminalize the
knowing access of child pornography with the intent to view it in addition to knowing possession.
Effective Child Pornography Prosecution Act of 2007, Pub. L. No. 110-358, § 203, 122 Stat. 4001
(2008). The amendments did not become effective until October 8, 2008, when they were signed
into law by the President. See Gozlon-Peretz v. United States, 498 U.S. 395, 404 (1991) (holding
law effective on date of enactment unless clear direction to the contrary).
2
Although the government did not cite § 2907.323(A)(3) on remand, we take judicial notice
of the law due to our own instructions to the parties to include proof of viewing the images and not
merely possession on remand. See United States v. Maken, 510 F.3d 654, 660 (6th Cir. 2007) (taking
judicial notice of state law). The parties were also both asked to submit letter briefs to us addressing
whether accessing images that meet the definition of child pornography under federal law would also
constitute a violation of Ohio Revised Code § 2907.323(A)(3). The government responded in the
affirmative. Keefer responded only to say that such conduct would not constitute possession under
Ohio or federal law, but Keefer made no argument with respect to the prohibition on viewing.
4
No. 11-3392
United States v. Keefer
Keefer’s sentence could not be enhanced based on conduct that does not “amount[] to an
offense for which a criminal defendant could potentially be incarcerated.” United States v. Shafer,
199 F.3d 826, 831 (6th Cir. 1999). But we make no distinction between potential incarceration
under federal law or under state law when considering whether behavior can amount to relevant
conduct. United States v. Maken, 510 F.3d 654, 657-58 (6th Cir. 2007). Although the Ohio law
differs from the federal law in two ways, the differences are immaterial in this case.
First, Ohio bans viewing instead of accessing with the intent to view. Although Ohio has not
clearly defined the scope of the word “view” in the law, at a minimum, we know the law punishes
defendants who “voluntarily reach[] out and br[ing] to [their] computer screen the images in
question.” State v. Hurst, 909 N.E.2d 653, 665 (Ohio Ct. App. 2009). This would reasonably
include accessing qualifying images with the intent to view them. The Ohio definition of child
pornography in § 2907.323(A)(3) is also potentially broader than federal law, but has been read by
both the United States Supreme Court and Ohio Supreme Court to prohibit only the “possession or
viewing of material or performance of a minor who is in a state of nudity, where such nudity
constitutes a lewd exhibition or involves a graphic focus on the genitals.” Osborne v. Ohio, 495 U.S.
103, 113 (1990) (quoting State v. Young, 525 N.E.2d 1363, 1368 (Ohio 1988)); see also United
States v. McGrattan, 504 F.3d 608, 612-13 (6th Cir. 2007). This definition at a minimum would
include the images at issue in this case, which involved “naked children” either engaged in sexually
explicit conduct or the lascivious exhibition of their genitals. R. 29 (Resent. Hr’g Tr. at 11).
5
No. 11-3392
United States v. Keefer
Therefore, although our remand may have used language resembling the federal statute, any
error in applying the enhancement based on the viewing of the images identified on Keefer’s
computer was harmless in light of Ohio law. The only issue is whether the testimony sufficiently
established that Keefer did in fact view the images found in his unallocated space.
On remand, the government presented the testimony of Agent Dobeck on the images found
in Keefer’s unallocated space. Agent Dobeck’s testimony addressed our prior concerns about the
general lack of an explanation regarding how images appear in a computer’s unallocated space.
Dobeck testified that the unallocated file space was a partitioned part of a hard drive that serves as
a temporary storage area when files are opened or deleted. R. 29 (Resent. Hr’g Tr. at 12-13). When
a computer user deletes a file from his hard drive, Dobeck explained, “[the file] is not wiped from
the hard drive itself; it is just placed in unallocated file space.” Id. at 13. Normal users could no
longer access the file, but the file is still recoverable via forensic examination. Id. Dobeck also
clarified that attachments to unsolicited email spam would not be downloaded automatically to a
user’s computer when using a web-based email system like Yahoo!, as Keefer was. Id. at 18. The
user would have to open not just the email but also click to download the attachment for the
attachment to wind up on the user’s computer. Id. at 19-20.
Dobeck explained that images can also end up in the unallocated space from visiting a
website. When a user visits a website, Dobeck explained, the user’s computer will store information
from that website as a temporary internet file so that the page will load faster the next time the user
returns. Id. at 14-15. These temporary files reflect what was viewed on the screen. Id. at 15. For
6
No. 11-3392
United States v. Keefer
example, if a person visits a page containing numerous thumbnail3 images, those images will appear
as temporary files the size of the thumbnails, not full-sized images. Id. If, however, a person clicked
on the thumbnail to view the full-sized image, the temporary file would appear as a full-sized image.
Id. Pop-up advertisements would also create temporary internet files, but these too would reflect
only the image of the advertisement shown on the screen and not any other content from the
advertised site unless the user took further action to follow the advertisement. Id. at 17. These
temporary internet files end up in the unallocated space in one of two ways. When those temporary
files are deleted, the images would be placed in the unallocated space just like any other deleted file.
Id. at 15. Temporary internet files can also end up in the unallocated space without ever being
deleted if the computer’s allocated space for temporary files reaches its capacity, at which point the
computer starts sending the excess temporary files directly into the unallocated space. Id. at 15-16.
Agent Dobeck believed that at least 1,062 of the 1,215 images in Keefer’s unallocated space
were downloaded or viewed as full-sized images because they were greater than 13 kilobytes in size.
Id. at 21. Dobeck conceded that he could not discern other details about the files, such as who
accessed the image, when it was accessed, or how the file was accessed by the user. Id. at 24-25.
But, Dobeck testified that at a minimum, for the images to be this size, the computer’s user had to
3
“[T]humbnails are simply previews of digital images that are viewable without opening the
digital folder in which the digital images are contained.” United States v. McNerney, 636 F.3d 772,
774 n.1 (6th Cir. 2011). According to Dobeck, thumbnails are typically four kilobytes in size on the
type of operating system used by Keefer and no more than twelve kilobytes. R. 29 (Resent. Hr’g Tr.
at 20-21). In contrast, the full-size images were roughly twenty to eighty-six kilobytes. Id. at 22
(“They ranged from a low of 20,000 bytes to a high of 86,000 bytes.”).
7
No. 11-3392
United States v. Keefer
either open an email attachment, download the file, or view the full-size image on the internet. Id.
at 24-25, 29. Receiving a spam email without opening the attachment or viewing a pop-up
advertisement or thumbnail without more would not be enough. Id. at 15, 17, 19-20.
Of course, a defendant could counter the aforementioned circumstantial evidence by
explaining that he had opened full-sized email attachments with benign names only to discover and
immediately delete child pornography. Or he could explain that he downloaded a folder of
photographs believing them to be adult pornography, only to discover upon opening the files and
immediately deleting them that they contained something else. Both of these scenarios would
explain the presence of full-sized images in a defendant’s unallocated space but would be
insufficient to justify the enhancement. That situation, however, is not before us today. Here, not
only were such innocent explanations never offered, but the government also established that at least
seven of the child-pornography files in the unallocated space were sent by Keefer to someone in
Florida. Unlike our concern in Keefer I with this evidence, we now know through Dobeck’s
testimony that these seven images were the same size as 1,062 other image files in the unallocated
space, suggesting similar access. Keefer also testified at resentencing4 that upon downloading a file,
he would decide if he liked it, and if he did not, he would delete it, not that he deleted images upon
discovering their true contents. R. 29 (Resent. Hr’g Tr. at 51). This also suggests that Keefer at a
minimum viewed the files that were ultimately found on his computer. Finally, Keefer’s ex-wife
4
We are careful not to place too much emphasis on Keefer’s statements at the resentencing
hearing given that he was heavily medicated at the time for seizures and had been experiencing
memory loss and confusion. R. 29 (Resent. Hr’g Tr. at 47-49, 51).
8
No. 11-3392
United States v. Keefer
testified that the computer on which the images were found was located in the basement in a room
used only by Keefer. Id. at 38, 40.
In all of the possible scenarios identified by Dobeck for how these files appeared in Keefer’s
unallocated space, the circumstantial evidence establishes that Keefer at a minimum knowingly
viewed the images found in his unallocated space. Keefer relies solely on United States v.
Kuchinski, 469 F.3d 853 (9th Cir. 2006), but Kuchinski relates only to knowing possession. The
defendant in Kuchinski successfully argued that the presence of thousands of full-sized images first
viewed online and then stored as temporary internet files on his computer without the defendant’s
knowledge should not be used to enhance his sentence. Kuchinski, however, does not address
whether knowingly viewing child pornography was criminal under state law at the time of Keefer’s
offense. The temporary files may not have established knowing possession if Keefer was ignorant
of their existence, but at the time of his offense, Keefer’s act of viewing the images was criminal
under state law. It could therefore be considered relevant conduct in enhancing his sentence.
In light of this unrebutted testimony, the district court did not err in concluding that Keefer’s
relevant conduct included the viewing of 1,062 images of child pornography. The application of the
enhancement in U.S.S.G. § 2G2.2(b)(7)(D) was therefore not procedurally unreasonable.
IV. CONCLUSION
For the aforementioned reasons, we AFFIRM the sentence of the district court.
9