United States Court of Appeals
For the First Circuit
No. 11-1275
UNITED STATES OF AMERICA,
Appellee,
v.
JAMES M. CAMERON,
Defendant, Appellant.
APPEAL FROM THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF MAINE
[Hon. John A. Woodcock, U.S. District Judge]
Before
Torruella, Howard, and Thompson,
Circuit Judges.
Peter Charles Horstmann, with whom Partridge, Ankner &
Horstmann, was on brief for appellant.
Anthony Vitarelli, Assistant United States Attorney, Criminal
Division, Appellate Section, with whom Lanny A. Breuer, Assistant
Attorney General, John D. Buretta, Acting Deputy Assistant Attorney
General, Thomas E. Delahanty II, United States Attorney, and
Margaret D. McGaughey, Assistant United States Attorney, was on
brief for appellee.
November 14, 2012
TORRUELLA, Circuit Judge. Following a bench trial in the
U.S. District Court for the District of Maine, Defendant-Appellant
James M. Cameron ("Cameron") was convicted of thirteen counts for
crimes involving child pornography. Cameron now appeals,
challenging various rulings by the district court before and after
the trial. The challenged rulings include: (1) the denial of a
motion to dismiss the indictment for insufficiency and for improper
venue, United States v. Cameron (Cameron I), 662 F. Supp. 2d 177
(D. Me. 2009); (2) the denial of a motion to suppress evidence
allegedly seized in violation of the Fourth Amendment, United
States v. Cameron (Cameron II), 729 F. Supp. 2d 418 (D. Me. 2010);
(3) the denial of a motion in limine to exclude certain evidence on
Confrontation Clause grounds, United States v. Cameron (Cameron
III), 733 F. Supp. 2d 182 (D. Me. 2010); and (4) the calculation of
the number of child pornography images attributable to Cameron for
sentencing purposes.
This case presents complex questions of first impression
in this Circuit regarding the admissibility of evidence in the wake
of the Supreme Court's recent Confrontation Clause jurisprudence.
After careful review, we conclude that the admission of certain
evidence violated Cameron's Confrontation Clause rights. We
further conclude that the admission of this evidence was harmless
as to some counts of conviction (Counts Six, Seven, Nine, Ten,
Twelve, Thirteen, and Fifteen), but not as to others (Counts One,
-2-
Three, Four, Five, Eleven, and Fourteen). We thus reverse
Cameron's convictions on certain counts and remand for re-
sentencing, or a new trial if the government wishes to so proceed.
I. Background
A. Business and Regulatory Background
Before delving into the particular facts of Cameron's
case, we recite some background facts regarding the technologies,
business practices, and regulations at issue here.
During 2006 and 2007, Yahoo!, Inc. ("Yahoo!") offered a
service (which has since been discontinued) called "Yahoo! Photo"
that allowed users to upload photographs to the Internet. Users
could then share photographs with other Yahoo! Photo users. Each
Yahoo! Photo album was linked to a particular Yahoo! "user" or
"account." In turn, each "account" was designated by a "Login
Name" (sometimes referred to as a "username" or "screen name"),
such as "lilhottee00000," one of the screen names at issue in this
case. A Yahoo! user might use multiple other Yahoo! services in
addition to Yahoo! Photo, such as email.
Whenever a person created a Yahoo! account, Yahoo!
recorded certain information, some of which was captured
automatically and some of which was entered by the person who
created the account. One piece of information that was
automatically collected was the "Registration IP Address," which
was the Internet Protocol ("IP") address from which the account was
-3-
created.1 Yahoo! also automatically recorded the date and time at
which the account was created. Yahoo! recorded this information in
an "Account Management Tool," which it maintained for the life of
a Yahoo! account. Further, whenever a user logged into a Yahoo!
account, Yahoo! automatically recorded the date and time of the
login as well as the IP address from which the login occurred.
Yahoo! stored this information in a "Login Tracker." The record
indicates that, during the relevant time period, Yahoo! kept login
records in its Login Tracker for sixty days.
During the same time period, Google, Inc. ("Google")
provided a service (also since discontinued) called "Google Hello."
Google Hello allowed users to sign in with a username and then chat
and trade photos with other users over the Internet. Google
automatically maintained records indicating the times at which a
user logged into and out of Google Hello, as well as the IP address
from which the user accessed the service ("Google Hello Connection
Logs").
At the relevant time, businesses such as Google and
Yahoo! had (and still have to this day) a duty to report any
apparent violation of federal child pornography laws to the
National Center for Missing and Exploited Children ("NCMEC"). See
1
"An IP address is the unique address assigned to every machine
on the internet. An IP address consists of four numbers separated
by dots, e.g., 166.132.78.215." United States v. Kearney, 672 F.3d
81, 84 n.1 (1st Cir. 2012) (quoting United States v.
Vázquez-Rivera, 665 F.3d 351, 354 n.5 (1st Cir. 2011)).
-4-
42 U.S.C. § 13032(b)(1) (1998) (creating a reporting duty for any
entity "engaged in providing an electronic communication service or
a remote computing service to the public, through a facility or
means of interstate or foreign commerce") (current version at 18
U.S.C. § 2258A(a)(1) (2012)). NCMEC is a non-profit organization
that receives an annual grant from Congress to perform various
functions related to preventing the exploitation of children. See
42 U.S.C. § 5773(b) (2012). Among these functions is the operation
of a "cyber tipline to provide . . . electronic service providers
an effective means of reporting" child pornography and other
Internet-related crimes targeting children. Id. § 5773(b)(1)(P).
NCMEC's "cyber tipline" is called the "CyberTipline." Once NCMEC
receives a report of a possible child pornography crime via the
CyberTipline, it determines "the appropriate international,
Federal, State or local law enforcement agency for investigation"
and forwards the report to that agency. Id.
B. Yahoo! Reports to NCMEC
On March 15, 2007, Yahoo! received an anonymous report
that child pornography images were contained in a Yahoo! Photo
account belonging to a user with the username "lilhottyohh." The
record does not indicate that Yahoo! knew, or ever attempted to
find out, who made the anonymous report. In response to the
anonymous tip, Yahoo! personnel searched the "lilhottyohh" account
-5-
and discovered images that they believed to be child pornography.
It is not known which Yahoo! employee conducted the search.
Yahoo! had an established process for dealing with
reports of child pornography. If Yahoo! learned of child
pornography in an account, an employee in Yahoo!'s Customer Care
Department temporarily removed the content from public view and
reviewed it. If he or she determined that the account contained
child pornography, Yahoo! deactivated the account and notified the
Legal Department. Meanwhile, the Customer Care Department created
an archive of all the images associated with the account, including
the date and time each image was uploaded and the IP address from
which it was uploaded. If the Legal Department agreed that any
images were child pornography, it then sent an electronic report to
NCMEC via the CyberTipline. Each report ("Yahoo! CP Report" or "CP
Report") listed a "Suspect Screen Name," a "Suspect Email Address,"
a "Suspect URL,"2 and a "Suspect IP Address." The "Suspect IP
Address" was the IP address that Yahoo! "associated" with the user;
it is not clear from the record whether this IP address was the
"Registration IP Address" stored in the Account Management Tool, or
2
For the purposes of this case, we understand a Uniform Resource
Locator ("URL") to be the string of characters that specifies the
location of a document on the Internet. For example, the URL for
the First Circuit's website (at the time of this writing) is
"http://www.ca1.uscourts.gov". URLs are distinct from IP
addresses. An IP address identifies a particular computer on the
Internet, but that computer might host multiple documents, each of
which might have their own URL.
-6-
if it was some other IP address. One could argue, as the
government seemed to do at trial, that it is the IP address from
which the last image was uploaded onto the account, as in some CP
Reports the "Suspect IP Address" is different from the
"Registration IP Address" contained in the Account Management Tool
for the same account. The "Suspect Email Address" was the Yahoo!
email address of the Yahoo! user the CP Report pertained to, and
the "Suspect URL" was the Internet location where the user's photos
could be found.
Each CP Report also included a table listing the child
pornography images being sent with the report. Yahoo! attached to
each report the suspected child pornography images. For each child
pornography image, Yahoo! listed the date and time at which the
image was uploaded and the IP address from which it was uploaded
("Image Upload Data"). In addition, Yahoo attached data from the
Account Management Tool and Login Tracker to each CP Report.
Whenever Yahoo! sent a CP Report to NCMEC, Yahoo! automatically
stored a receipt. The receipt included a unique number assigned to
the report by NCMEC and a record of what Yahoo! reported to NCMEC,
including the attachments to the CP Report.
In this case, Yahoo! sent a CP Report of the child
pornography in the "lilhottyohh" account to NCMEC. Subsequently,
Yahoo! sent additional CP Reports to NCMEC of child pornography
found in the accounts of the users "lilhottee0000" and
-7-
"harddude0000." All three CP Reports listed the same "Suspect IP
Address": 76.179.26.185.
C. ICAC Seizes Cameron's Computers
On August 3, 2007, NCMEC sent a report ("CyberTipline
Report") of child pornography found in the "lilhottee00000" Yahoo!
account to the Maine State Police Internet Crimes Against Children
("ICAC") unit. NCMEC later sent another CyberTipline Report to
ICAC, this time regarding child pornography found in the Yahoo!
Photo account of user "harddude0000." Both CyberTipline Reports
listed the same IP Address, 76.179.26.185, in the "Suspect
Information" section. Each report also noted that "[t]he IP
included in this report is the most recent file or image upload IP
available," and then listed the date and time of the most recent
upload.3
ICAC detective Laurie Northrup ("Northrup") determined
that the IP address 76.179.26.185 was part of a pool of IP
addresses that Time Warner, an Internet Service Provider ("ISP"),
distributed to its Internet access customers. Through a subpoena
to Time Warner, Northrup determined that the IP address
3
Moreover, the IP Address contained in each of the CyberTipline
Reports matched the "Suspect IP Address" contained in its
corresponding Yahoo! CP Report, although we do not know whether
this is by pure coincidence or if both IP Addresses really refer to
the computer that originated the most recent image upload. As we
mentioned earlier, the Yahoo! CP Reports did not state whether the
"Suspect IP Address" contained therein was the one from which the
most recent image had been uploaded, a representation which was in
fact made by in the CyberTipline Reports.
-8-
76.179.26.185 had been assigned to the Cameron residence in
Hallowell, Maine during the relevant time periods. On December 21,
2007, Maine police executed a search warrant at the Cameron
residence. Officers found four computers at the residence: a
Compaq desktop, a Dell laptop, an HP desktop with an external hard
drive, and an eMachines desktop with an external hard drive. ICAC
also executed a search warrant at Cameron's workplace and seized
his office computer. ICAC's preliminary examination of the
computers in Cameron's home (conducted on site) indicated possible
child pornography on the HP desktop. This examination also
indicated that certain Yahoo! accounts had been accessed from the
eMachines computer. Northrup later requested information from
NCMEC related to these accounts.
In March of 2008, forensic examiner Scott Bradeen
("Bradeen") examined Cameron's five computers and external hard
drives. For each computer, Bradeen determined the IP addresses
from which the computer had accessed the Internet. Bradeen found
evidence that someone had accessed seventeen different Yahoo!
accounts, including those that were the subject of the reports that
NCMEC originally sent to ICAC, from various computers in Cameron's
home. In addition, Bradeen found child pornography images and
transcripts indicating that someone using Cameron's computers had
signed into Google Hello using one or more usernames to send and
receive child pornography images. Bradeen found child pornography
-9-
images on Cameron's Dell laptop and on his HP desktop. Bradeen
found no child pornography on the Compaq desktop or on the
eMachines desktop. However, the Internet history stored on the
eMachines desktop showed that someone had executed Internet
searches for terms related to child pornography.
D. ICAC Search Warrants to Yahoo! and Google
ICAC subsequently served search warrants on Yahoo! for
information about the Yahoo! accounts that had been accessed from
Cameron's computers. The data produced by Yahoo! in response to
the search warrants included emails that had been sent to and from
those accounts. The emails indicated that on at least one
occasion, someone using the "harddude0000" Yahoo! account sent
child pornography to another individual via email and received
child pornography via email in response. Yahoo! also produced the
receipts of its Yahoo! Reports to NCMEC, the "Account Management
Tool," and the "Login Tracker" for each account; however, it is not
clear if Yahoo! produced the Image Upload Data. In addition,
Yahoo! produced disks containing images of child pornography found
in the accounts in question.
ICAC also served search warrants on Google for
information regarding the Google Hello accounts accessed from
Cameron's computers. In response, Google provided the Google Hello
Connection Logs for the specified user accounts.
-10-
E. Indictment and Pre-Trial Proceedings
On February 11, 2009, a federal grand jury indicted
Cameron on sixteen counts of child pornography-related crimes. The
counts included ten counts of knowingly transporting child
pornography in violation of 18 U.S.C. §§ 2252A(a)(1) and
2256(8)(A); four counts of knowingly receiving child pornography in
violation of 18 U.S.C. §§ 2252A(a)(2) and 2256(8)(A); and two
counts of knowingly possessing child pornography in violation of 18
U.S.C. §§ 2252A(a)(5)(B) and 2256(8)(A). Each of the counts
recited a specific date on which Cameron allegedly transported,
received, or possessed child pornography. Of the ten counts of
transporting child pornography, seven alleged the uploading of
child pornography images to Yahoo! Photo accounts; two alleged the
sending of child pornography via Google Hello; and one alleged both
the uploading of child pornography to Yahoo! Photos and the sending
of child pornography via Google Hello. Of the four counts of
receiving child pornography, three alleged that Cameron had
received child pornography via Google Hello, and one alleged that
Cameron had received child pornography via a Yahoo! email account.
All of the transportation counts alleging uploads to Yahoo! Photo
specified the Yahoo! usernames Cameron allegedly used. The
indictment further alleged that all of the crimes charged occurred
in the District of Maine.
-11-
Cameron filed three motions prior to trial that are
relevant to this appeal. First, on May 18, 2009, Cameron moved to
dismiss all counts of the indictment. See Cameron I, 662 F. Supp.
2d at 179. Cameron made a host of arguments, two of which demand
our attention here. The first was that all counts of the
indictment should be dismissed for insufficient pleading.
Specifically, Cameron argued that dismissal was warranted because
the indictment did not specify the images that were alleged to be
child pornography. Id. at 180. The district court rejected this
argument, holding that the indictment satisfied the First Circuit's
specificity requirement because each count of the indictment
tracked the statutory language and set forth the elements of the
offense. Id. at 181 (citing United States v. Sepúlveda, 15 F.3d
1161, 1192 (1st Cir. 1993); United States v. Serino, 835 F.2d 924,
929 (1st Cir. 1987)). Cameron also argued that venue in Maine was
improper for three counts because he was not in Maine on the dates
of the alleged offenses. Id. at 182-183. The court found that
venue was proper because the indictment alleged that the child
pornography images on which those counts were based had moved into
Maine at some point. Id. at 183. See also 18 U.S.C. § 3237(a)
(venue is proper in any district where the offense was started,
continued, or completed).
Second, on July 2, 2010, Cameron moved to suppress all
evidence resulting from Yahoo!'s searches for child pornography in
-12-
Yahoo! Photo accounts that occurred before Yahoo! received search
warrants from ICAC. See Cameron II, 729 F. Supp. 2d at 419.
Cameron contended that Yahoo! acted as an agent of the government
when it searched password-protected accounts for child pornography
before reporting to NCMEC. Therefore, Cameron argued, the searches
violated his Fourth Amendment rights. Furthermore, Cameron
contended that because these allegedly illegal searches were the
basis of Yahoo!'s CP Reports to NCMEC, and because NCMEC's
resulting CyberTipline Reports to ICAC started the government's
investigation, all evidence seized by ICAC should be suppressed as
well.
The district court rejected Cameron's argument because it
found that Yahoo! had not acted as a government agent. See id. at
422-23. Relying on this court's three-part test from United States
v. Silva, 554 F.3d 13, 18 (1st Cir. 2009), to be discussed further
infra, the district court held that because Yahoo! voluntarily
searched the accounts for its own interests and without direction
by the government, it did not act as a government agent. Cameron
II, 729 F. Supp. 2d at 423-24. The court noted that in a similar
case, the Fourth Circuit held that an online email provider did not
act as a government agent when it searched the defendant's emails
for child pornography and reported it to NCMEC. Id. (citing United
States v. Richardson, 607 F.3d 357, 363-67 (4th Cir. 2010)).
-13-
Finally, also on July 2, 2010, Cameron filed a motion in
limine to exclude all images and other material provided by Yahoo!,
Google, and NCMEC. Cameron III, 733 F. Supp. 2d at 183. The
government had indicated that it did not intend to call as
witnesses the original authors of the Yahoo! Reports to NCMEC,
NCMEC's CyberTipline Reports to ICAC, or the Yahoo! records that
were attached to the Yahoo! Reports (and then forwarded to ICAC
with the CyberTipline Reports) or produced in response to search
warrants. Based on this absence of witnesses, Cameron argued that
the introduction of this evidence would violate his rights under
the Confrontation Clause of the Sixth Amendment. Id. at 185.4
The district court denied Cameron's motion without
prejudice. The court noted that the Confrontation Clause was
implicated only if the prosecution sought to introduce
"testimonial" statements without making the declarant available for
cross-examination. Id. at 186 (citing United States v. Figueroa-
Cartagena, 612 F.3d 69, 84 (1st Cir. 2010)). However, in Crawford
v. Washington, the Supreme Court suggested that "business records"
were not considered "testimonial." 541 U.S. 36, 56 (2004). Thus,
the court considered whether the records in question could be
admitted as "business records" under Fed. R. Evid. 803(6). The
4
The government made a similar representation with respect to the
Google records, and Cameron raised a similar challenge. Because
Cameron's argument regarding the Google records was identical to
his argument for the Yahoo! records, the district court focused its
discussion on the Yahoo! records. See id. at 185 n.3.
-14-
court held that as long as the government could successfully
authenticate the Yahoo! records and establish that they were kept
in the ordinary course of business, they would be admissible as
business records, and, therefore, the Confrontation Clause would
not be implicated. Cameron III, 733 F. Supp. 2d at 188-89. The
court also ruled that the NCMEC reports and attached images were
admissible as business records because NCMEC simply forwarded
information it received from Yahoo!, information which itself
consisted of business records. Id. at 189.
F. Trial
Cameron requested a bench trial, which began on August
16, 2010. The government voluntarily dismissed one of the two
possession counts before trial. At trial, the government
introduced evidence from Yahoo! via the testimony of Christian Lee
("Lee"), a Yahoo! employee. Lee was a Legal Assistant in Yahoo!'s
Legal Compliance Department who had no technical training, but who
testified that he was knowledgeable about Yahoo!'s data retention
and legal procedures. Lee testified about the information that
Yahoo! kept about its users. See Part I.A. In particular, Lee
stated that Yahoo! automatically recorded the data in the Account
Management Tool and the Login Tracker in the regular course of its
business in order to "provide reliable and accurate data about its
customer accounts." Lee also testified that, as part of its
ordinary business practice, Yahoo! automatically stored a receipt
-15-
of each CP Report it sent to NCMEC, as well as the attachments,
including the Image Upload Data.
Moreover, despite Cameron's objection, the government
introduced the Account Management Tool data, the Login Tracker
data, and the receipts of Yahoo's CP Reports to NCMEC. The
government also introduced compact discs containing the child
pornography found in various accounts and other data, including
emails, produced in response to the search warrants. However, it
does not appear from the record that the government introduced the
Image Upload Data (or that the government even had this data).5
The government introduced the Google Hello Connection
Logs through the testimony of Google employee Colin Bogart
("Bogart"). Bogart was an employee in Google's Legal Compliance
Department and, like Lee, had no technical training. Bogart
testified that he retrieved the Google Hello Connection Logs by
using an internal Google program that allowed him to enter a
username and retrieve the Logs for that username. Bogart testified
that Google recorded this login information automatically and that
it relied on this information for its regular business activities.
5
The information contained in the Image Upload Data, which
reflected the date and time each child pornography image was
uploaded onto the internet, was central to the government's
case-in-chief, as it was the only evidence it could have relied on
to prove that Cameron uploaded those images on the specific dates
and times alleged in the indictment. The only other piece of
evidence that partially contained this information was the NCMEC
CyberTipline Reports.
-16-
The government introduced the NCMEC CyberTipline Reports
through the testimony of John Shehan ("Shehan"), the executive
director of NCMEC. Shehan testified that once a report is received
through the CyberTipline, NCMEC's staff reviews the suspected
images and conducts an online search regarding the provided suspect
information. According to him, this query is aimed at identifying
the appropriate law enforcement agency with jurisdiction to
investigate the suspected child pornography activity. Although
NCMEC does not alter the information it receives via the
CyberTipline in any way -- other than to record a unique "report
ID" and an "entry date," -- Shehan noted that sometimes NCMEC
employees would annotate the CyberTipline Reports with their own
analysis regarding the information contained therein.6
In the instant case, each time a NCMEC employee finished
processing the information contained in a Yahoo! CP Report, he or
she would create a CyberTipline Report and forward it to the
appropriate law enforcement agency, here the ICAC Unit belonging to
the Maine State Police. As we briefly described earlier, the
CyberTipline Reports received by ICAC contained several sections,
among them a "Reporting Person Information" section which reflected
Yahoo!'s contact information, as well as a "Suspect Information"
section, which provided the user name, e-mail and IP Address of the
6
The record reflects that these analyses were apparently blocked
out, redacted or deleted from the CyberTipline Reports that the
government introduced into evidence at trial.
-17-
account associated with the images. According to the reports
themselves, the IP Address was that of the computer that originated
the most recent image file upload. It is unclear exactly how NCMEC
extracted this IP Address or how it determined the date and time of
the last image upload, information which also appeared on the
reports. The only logical conclusion we can draw from the record
is that someone at NCMEC analyzed the Image Upload Data attached to
the Yahoo! CP Reports and selected the IP address from which the
most recent image had been uploaded, along with the date and time
of the upload, and included this information in the CyberTipline
Report. As we will see later on, this is of particular import to
Cameron's argument that the admission of these reports violated his
rights under the Confrontation Clause.
Armed with these CyberTipline Reports, ICAC detectives
were eventually able to obtain several search warrants against
Cameron's home and office. The government introduced evidence
regarding what ICAC found through these searches via the testimony
of Bradeen and Northrup. Bradeen testified about the child
pornography he found on Cameron's computers and about the evidence
he found showing that various Yahoo! and Google Hello accounts had
been accessed from those computers. Bradeen also testified about
the IP addresses from which Cameron's computers had accessed the
Internet. Some of these IP addresses matched the IP addresses
included in the CyberTipline Reports that NCMEC had created for the
-18-
different Yahoo! accounts. For example, there was evidence that
all four computers seized at Cameron's home had accessed the
Internet at some point through IP address 76.179.26.185, which was
the IP address listed on CyberTipline Reports for "lilhottee00000"
and "harddude0000." Bradeen also testified that Cameron's HP
desktop had accessed the Internet through IP address 24.198.90.108,
which the Google Hello evidence showed was an IP address from which
a Google Hello user had logged in to trade child pornography.
Additionally, the government introduced evidence showing
that, on the specific dates of the transportation and receipt
crimes charged in the indictment, Cameron's computers had been
assigned the IP addresses from which those crimes had been
committed. For example, through a witness from Time Warner,
Cameron's ISP, the government introduced records showing that the
Time Warner account for Cameron's residence had been assigned
certain IP addresses on certain dates. To show that child
pornography had actually been uploaded on the dates alleged in the
indictment, and to show that it had been uploaded from the IP
address that Cameron had on those dates, the government relied on
the CyberTipline Reports; it does not appear from the record that
the government introduced the Image Upload Data into evidence (or
even that it had this information in the first place). The
government also introduced extensive evidence to show that no one
else living in Cameron's household at the time (Cameron lived with
-19-
his wife and two minor children) could have committed the offenses
in the indictment.
To show that the images alleged to be child pornography
did in fact depict minors, the government relied on the testimony
of Dr. Lawrence Ricci ("Ricci"), a physician and child abuse
expert. Ricci analyzed the images by determining into which
"Tanner Stage" the persons depicted in the images fell. There are
five "Tanner Stages" of "secondary sexual development," the first
being Stage I, at which there is no evidence of such development.
Ricci analyzed the images recovered from Cameron's computers "very
conservatively" and identified as minors only those persons whom he
considered to be at Stage I, even though children generally reach
Stage II between the ages of ten and fourteen.
G. Conviction and Sentencing
Following the bench trial, the district court found
Cameron guilty of eight counts of transporting child pornography,
four counts of receiving child pornography, and one count of
possessing child pornography. The court found Cameron not guilty
on two of the transportation counts -- one related to the uploading
of photos to Yahoo! Photo and one relating to the sending of photos
over Google Hello -- because the court could not conclusively find
that the persons in the images connected to those counts were
minors. Cameron filed a motion for new trial, in which he renewed
his Confrontation Clause arguments, but the district court rejected
-20-
that motion. See United States v. Cameron (Cameron IV), 762 F.
Supp. 2d 152, 159-60, 165 (D. Me. 2011).
The court sentenced Cameron to 192 months in prison,
followed by ten years of supervised release. The sentence was
based in part on the court's calculation that Cameron's offenses
involved "at least 300, but fewer than 600" images of child
pornography, which triggered a sentence enhancement under the
United States Sentencing Guidelines ("Guidelines"). See U.S.S.G.
§ 2G2.2(b)(7)(C) (2012).
Cameron now appeals his conviction and sentence.
II. Discussion
On appeal, Cameron again raises many of the challenges he
made in his pre-trial motions. First, he argues that the district
court erred in not dismissing all counts of the indictment for lack
of specificity. Second, he argues that the District of Maine was
not the proper venue for two of the counts of conviction. Third,
he argues that the district court erred in failing to suppress all
evidence derived from Yahoo!'s allegedly illegal search of
password-protected Yahoo! accounts. Fourth, he argues that the
admission of evidence from Yahoo!, Google, and NCMEC violated his
Confrontation Clause rights. Finally, he argues that his sentence
was erroneous because the district court erred in finding that at
least 300 images were involved. We address Cameron's arguments in
turn.
-21-
A. Sufficiency of the Indictment
Cameron argues that the indictment is insufficient
because it fails to identify the specific images that each offense
was based on. Federal Rule of Criminal Procedure 7(c)(1) states
that an indictment "must be a plain, concise, and definite written
statement of the essential facts constituting the offense charged."
Fed. R. Crim. P. 7(c)(1). "When grading an indictment's
sufficiency, we look to see whether the document sketches out the
elements of the crime and the nature of the charge so that the
defendant can prepare a defense and plead double jeopardy in any
future prosecution for the same offense." United States v.
Guerrier, 669 F.3d 1, 3 (1st Cir. 2011). The sufficiency of an
indictment is a question of law which we review de novo. Id.
(describing question of sufficiency as a "legal issue" to which de
novo review applies).
We conclude that the indictment was sufficient. As the
district court correctly noted, each count of the indictment
included the following information: a description of the offense
that tracks the language of the relevant statute, the date of the
offense, the type of child pornography involved (digital images),
and the means by which Cameron either transported (for example, by
uploading to a specified Yahoo! Photos album), received, or
possessed the child pornography in question. See Cameron I, 662 F.
Supp. 2d at 180-81. Cameron's argument that the indictment is
-22-
insufficient because it failed to identify the specific images that
each offense was based on is unavailing. As the district court
correctly noted, neither the statutes under which Cameron was
charged nor Rule 7(c)(1) itself requires such specificity. See id.
at 180. Thus, we agree with the district court that the indictment
in this case satisfies Fed. R. Crim. P. 7(c)(1)'s requirements.
B. Venue
Cameron argues that venue in Maine was improper for
Counts Twelve and Thirteen of the indictment because he was in New
York on the dates alleged. Counts Twelve and Thirteen alleged that
on August 11, 2007, Cameron transported and received child
pornography, respectively, using Google Hello. Cameron argues that
since he and his computer were physically located in New York,
venue was only proper in New York.
"The right to be tried in the appropriate venue is one of
the constitutional protections provided to defendants by the Sixth
Amendment." United States v. Scott, 270 F.3d 30, 34 (1st Cir.
2001). As such, "[t]he burden of showing proper venue is on the
government, which must do so by a preponderance of the evidence."
Id. However, "[w]e review the evidence on venue in the light most
favorable to the government." Id. at 35. We review legal
conclusions de novo. Id. at 34.
Under 18 U.S.C. § 3237(a) (2012), a crime involving
interstate commerce can be "prosecuted in any district from,
-23-
through, or into which such commerce, mail matter, or imported
object or person moves." Transporting and receiving child
pornography via Internet services such as Google Hello are both
crimes involving interstate commerce. See id. § 2252A(a)(1)
(making it illegal to "transport[]" child pornography "using any
means or facility of interstate or foreign commerce or in or
affecting interstate or foreign commerce by any means, including by
computer"); id. § 2252A(a)(2)(A) (making it illegal to receive "any
child pornography that has been mailed, or using any means or
facility of interstate or foreign commerce shipped or transported
in or affecting interstate or foreign commerce by any means,
including by computer"). In addition, the district court found
from the evidence at trial that the child pornography images
Cameron sent and received while in New York were stored on
Cameron's Dell Laptop, which he later brought back to Maine. Thus,
because the objects of Cameron's commerce moved into the District
of Maine, venue there was proper.
We further note that finding venue in Maine is consistent
with the purpose of the Constitution's venue protection, which is
to "ensure[] that a criminal defendant cannot be tried in a
distant, remote, or unfriendly forum solely at the prosecutor's
whim." United States v. Salinas, 373 F.3d 161, 164 (1st Cir.
2004). Since Cameron lives in Maine, the District of Maine cannot
-24-
be "distant" or "remote" for him, and there is no evidence that the
District Court was an "unfriendly" forum.
C. Motion to Suppress
Cameron argues that the district court erred in denying
his motion to suppress evidence. He posits that Yahoo!'s search
for child pornography in password-protected accounts violated the
Fourth Amendment because Yahoo! acted as an agent of the
government. Cameron further contends that, because the Yahoo! CP
Reports to NCMEC were the result of Yahoo!'s search, and because
NCMEC sent CyberTipline Reports to ICAC after receiving Yahoo!'s
reports, all subsequent searches executed by ICAC at Cameron's home
or executed via search warrants served on Yahoo! and Google derived
from Yahoo!'s original illegal searches. Thus, Cameron argues, all
evidence obtained as a result of searches conducted during ICAC's
investigation should have been suppressed.
In reviewing the denial of a motion to suppress evidence,
this court reviews the facts "in the light most favorable to the
district court's ruling," and will review any "findings of fact and
credibility determinations for clear error." United States v.
Camacho, 661 F.3d 718, 723 (1st Cir. 2011) (internal quotation
marks and citation omitted). "'A clear error exists only if, after
considering all the evidence, we are left with a definite and firm
conviction that a mistake has been made.'" Id. (quoting United
States v. McCarthy, 77 F.3d 522, 529 (1st Cir. 1996)). "[W]e will
-25-
uphold a denial of a motion to suppress if any reasonable view of
the evidence supports it." Id. (internal quotation marks and
citation omitted). However, "[w]e review de novo the district
court's conclusions of law, including its application of the law to
the facts." Id. at 724. "The appellant bears the burden of
showing a violation of his Fourth Amendment rights." Id.
The Fourth Amendment states that the "right of the people
to be secure in their persons, houses, papers and effects, against
unreasonable searches and seizures, shall not be violated." U.S.
Const. amend. IV. "The Supreme Court has consistently construed
the Fourth Amendment protection as limiting only governmental
action." United States v. Momoh, 427 F.3d 137, 140 (1st Cir. 2005)
(internal quotation marks and citation omitted). The Fourth
Amendment does not apply "to a search or seizure, even an
unreasonable one, effected by a private individual not acting as an
agent of the Government or with the participation or knowledge of
any governmental official." United States v. Jacobsen, 466 U.S.
109, 113 (1984) (emphasis added) (internal quotation marks and
citation omitted).
A private search only implicates the Fourth Amendment if
the private party acts as a "government agent." Silva, 554 F.3d at
18. In Silva, we established that in determining whether a private
party has acted as a government agent, courts must consider three
factors: (1) "the extent of the government's role in instigating or
-26-
participating in the search"; (2) "[the government's] intent and
the degree of control it exercises over the search and the private
party"; and (3) "the extent to which the private party aims
primarily to help the government or to serve its own interests."
Id. (internal quotation marks and citation omitted). We will not
find that a private party has acted as an agent of the government
"simply because the government has a stake in the outcome of a
search." Id.
Here, as to the first Silva factor, there is no evidence
that the government had any role in instigating or participating in
the search. Yahoo! began searching Cameron's accounts after it
received an anonymous tip regarding child pornography in the Yahoo!
Photo album of user "lilhottyohh." There is no evidence that the
person who sent this tip to Yahoo! was a government employee.
Cameron contends that the Yahoo! employees who searched his
accounts likely had "strong connections to law enforcement."
However, this contention is rank speculation on Cameron's part,
with no support in the record.
As to the second Silva factor, there is no evidence that
the Government exercised any control over Yahoo! or over the
search. As discussed above, Yahoo! employees conducted the search
pursuant to Yahoo!'s own internal policy. Furthermore, there is no
evidence that the Government compelled Yahoo! in any way to
maintain such a policy. Cameron points to the fact that Yahoo had
-27-
a duty under federal law to report child pornography to NCMEC in
August of 2007. See 42 U.S.C. § 13032(b)(1) (repealed 2008).
However, the statute did not impose any obligation to search for
child pornography, merely an obligation to report child pornography
of which Yahoo! became aware.
Finally, as to the third Silva factor, it is certainly
the case that combating child pornography is a government interest.
However, this does not mean that Yahoo! cannot voluntarily choose
to have the same interest. As discussed above, there is no
evidence that the government instigated the search, participated in
the search, or coerced Yahoo! to conduct the search. Thus, if
Yahoo! chose to implement a policy of searching for child
pornography, it presumably did so for its own interests. The
record does not reflect what Yahoo!'s interests might have been,
but it is Cameron's burden to show that Yahoo! did what it did to
further the government's interest, and he can point to no evidence
to carry this burden.
Having applied the Silva factors, we conclude that Yahoo!
was not acting as an agent of the government; therefore, its
searches of Cameron's accounts did not violate the Fourth
Amendment. Because there was no Fourth Amendment violation, there
was no reason to suppress any evidence that may have derived from
Yahoo!'s initial searches. For this reason, we hold that the
-28-
district court properly denied Cameron's motion to suppress
evidence.
D. Confrontation Clause
Cameron next argues that the district court's admission
of evidence obtained from Yahoo!, Google, and NCMEC violated his
Confrontation Clause rights. Although Cameron's brief does not
make clear which specific records he believes should not have been
admitted, he does specify that he is not challenging the admission
of those child pornography images that Yahoo provided in response
to search warrants. We thus presume that Cameron's challenge is to
the following categories of evidence: (1) the Yahoo! Account
Management Tool and Login Tracker data -- this data was attached to
the CP Reports and was also produced in response to search
warrants; (2) electronic receipts of Yahoo's CP Reports to NCMEC --
these receipts were produced by Yahoo! in response to search
warrants; (3) NCMEC's CyberTipline Reports to ICAC; and (4) the
Google Hello Connection Logs.7
7
Cameron makes no coherent challenge to the admission of the
emails produced in response to the search warrants served on
Yahoo!. Cameron appears to lump these in with the other Yahoo!
records. However, as the district court recognized, the emails may
be in a legally distinct category from the other records, because
they could be viewed as statements attributable to Cameron
directly. See Cameron III, 733 F. Supp. 2d at 185 (noting
government's argument that "statements attributable to the
defendant in the Yahoo! records and emails are not hearsay because
a party's own statement is directly admissible against him")
(internal quotation marks and citation omitted). Cameron has not
explained to this court how any of his Confrontation Clause
arguments relate to the emails; for this reason, we deem any
-29-
We review de novo a district court's decision that the
admission of various exhibits did not violate the Confrontation
Clause. See United States v. Mitchell-Hunter, 663 F.3d 45, 49 (1st
Cir. 2011).
1. Confrontation Clause Principles
"The Sixth Amendment's Confrontation Clause confers upon
the accused in all criminal prosecutions . . . the right . . . to
be confronted with the witnesses against him." United States v.
Phoeun Lang, 672 F.3d 17, 21 (1st Cir. 2012) (quoting Bullcoming v.
New Mexico, 131 S. Ct. 2705, 2713 (2011)) (internal quotation marks
omitted). In Crawford, the Supreme Court held that the
Confrontation Clause bars the admission of "testimonial statements
of witnesses absent from trial," unless the witness is unavailable
to testify and the defendant had a prior opportunity for
cross-examination. 541 U.S. at 59. Two years later, in Davis v.
Washington, the Court held that Crawford's prohibition "applies
only to testimonial hearsay." Davis v. Washington, 547 U.S. 813,
823-24 (2006) (emphasis added).8 Thus, "the threshold question in
challenge to the emails waived. See Rodríguez v. Municipality of
San Juan, 659 F.3d 168, 175 (1st Cir. 2011) ("[W]e consider waived
arguments confusingly constructed and lacking in coherence . . .
Judges are not mind-readers, so parties must spell out their issues
clearly, highlighting the relevant facts and analyzing on-point
authority.") (internal quotation marks and citations omitted).
8
Hearsay is defined as a statement made out of court, by a
person, which is offered into evidence to prove the truth of the
matter asserted. Fed. R. Evid. 801(c); United States v. Benítez-
Ayala, 570 F.3d 364, 367 (2009).
-30-
every case is whether the challenged statement is testimonial. If
it is not, the Confrontation Clause has 'no application.'"
Figueroa-Cartagena, 612 F.3d at 85 (quoting Whorton v. Bockting,
549 U.S. 406, 420 (2007)).
The Supreme Court has yet to supply a "comprehensive
definition of 'testimonial.'" Lang, 672 F.3d at 22 (quoting
Crawford, 541 U.S. at 822); see also Davis, 547 U.S. at 822
(deciding narrow issues before the Court "[w]ithout attempting to
produce an exhaustive classification of all conceivable statements
. . . as either testimonial or nontestimonial"). The Court in
Crawford, however, provided an "illustrative list of the 'core
class of testimonial statements.'" Lang, 672 F.3d at 22 (quoting
Crawford, 541 U.S. at 51). This list included "statements that
were made under circumstances which would lead an objective witness
reasonably to believe that the statement would be available for use
at a later trial." Crawford, 541 U.S. at 52 (internal quotation
marks omitted). On the other hand, the Court also indicated that
certain types of statements "by their nature [are] not testimonial
-- for example, business records or statements in furtherance of a
conspiracy," and therefore do not implicate the Confrontation
Clause. Crawford, 541 U.S. at 56.
Relying on Crawford, we have held in a number of cases
that business records -- or their close counterpart, public records
of non-law enforcement government agencies -- are admissible absent
-31-
confrontation. See, e.g., Lang, 672 F.3d at 22-23 (holding that an
immigration document was not testimonial because an objectively
reasonable person would not have understood the form to be used in
prosecuting the defendant at trial); United States v. De La Cruz,
514 F.3d 121, 133 (1st Cir. 2008) (concluding that autopsy report
was "in the nature of a business record" and thus admissible
without confrontation); United States v. García, 452 F.3d 36, 41-42
(1st Cir. 2006) (affirming admission of warrant of deportation in
defendant's immigration file).
However, although the Supreme Court seemed to indicate in
Crawford that business records are not testimonial "by their
nature," 541 U.S. at 56, the Court later indicated that this is not
necessarily the case for all business records. In Meléndez-Díaz v.
Massachusetts, the prosecutor sought to admit "certificates of
analysis" that showed that a substance found in the defendant's
possession was cocaine. 557 U.S. 305, 308 (2009). The
certificates were sworn to by analysts at a state laboratory. Id.
The trial court allowed the certificates, even though the forensic
analysts who tested the substance did not testify. Id. at 309.
The Supreme Court ruled that the admission of these certificates
violated the Confrontation Clause because they fell into the "'core
class of testimonial statements'" identified in Crawford.
Meléndez-Díaz, 557 U.S. at 310 (quoting Crawford, 541 U.S. at 51).
The Court found that the certificates were effectively affidavits,
-32-
and that they had clearly been "'made under circumstances which
would lead an objective witness reasonably to believe that the
statement would be available for use at a later trial.'" Id.
(quoting Crawford, 541 U.S. at 52).
In finding that the admission of the certificates
violated the Confrontation Clause, the majority rejected the
argument that the certificates could be admitted as business
records. Although the majority found that the certificates "[did]
not qualify as business records," they held that even if the
certificates were business records, "their authors would be subject
to confrontation nonetheless." Id. at 321. The majority observed
that although "[d]ocuments kept in the regular course of business
may ordinarily be admitted at trial despite their hearsay status,"
this would not be so "if the regularly conducted business activity
is the production of evidence for use at trial." Id. at 321
(emphasis added). As the majority explained, "[b]usiness and
public records are generally admissible absent confrontation not
because they qualify under an exception to the hearsay rules, but
because -- having been created for the administration of an
entity's affairs and not for the purpose of establishing or proving
some fact at trial -- they are not testimonial." Id. at 324
(emphasis added). Thus, because the certificates at issue in
Meléndez-Díaz had been "prepared specifically for use at
petitioner's trial," the court held that "[w]hether or not they
-33-
qualif[ied] as business records," they were inadmissible unless
their authors could be cross-examined. Id.; cf. Bullcoming, 131 S.
Ct. at 2720 ("'[D]ocuments kept in the regular course of business
may ordinarily be admitted at trial despite their hearsay status,'
except 'if the regularly conducted business activity is the
production of evidence for use at trial.' In that circumstance, the
hearsay rules bar admission of even business records.") (Sotomayor,
J., concurring) (internal citation omitted) (quoting Meléndez-Díaz,
557 U.S. at 321).
Returning to the facts of this case, even if the records
at issue here are business records, as the government argues, we
must still determine whether or not they are testimonial. See
United States v. Pursley, 577 F.3d 1204, 1223 (10th Cir. 2009),
cert. denied, ___ U.S. ___, 130 S. Ct. 1098 (2010) ("[E]ven if a
statement qualifies for an exception to the hearsay doctrine --
based upon judicially fashioned reliability principles -- the
statement's admission may violate the Sixth Amendment's mandate
for 'confrontation' if it constitutes 'testimonial' hearsay."
(citing Crawford, 541 U.S. at 61-62; Meléndez-Díaz, 129 S. Ct. at
2533)). "To rank as 'testimonial,' a statement must have a
'primary purpose' of 'establishing or proving past events
potentially relevant to later criminal prosecution.'" Bullcoming,
131 S. Ct. at 2714 n.6 (quoting Davis, 547 U.S. at 822). "In
identifying the primary purpose of an out-of-court statement, we
-34-
apply an objective test." Williams v. Illinois, 132 S. Ct. 2221,
2243 (2012) (plurality opinion).
With these principles in mind, we proceed to determine
whether the records Cameron challenges are testimonial in nature.
2. Yahoo! Account Management Tool, Yahoo! Login Tracker,
and Google Hello Connection Logs
It is clear that the admission of the Yahoo! Account
Management Tool data, the Yahoo! Login Tracker data, and the Google
Hello Connection Logs did not violate the Confrontation Clause.
Lee, the Yahoo! witness, testified that all of the data in the
Account Management Tool and the Login Tracker was data that Yahoo!
collected automatically in order to further its business purposes.
Bogart, the Google witness, testified in a similar fashion
regarding the Google Hello Connection Logs. Although "Crawford
analysis generally requires a court to consider two threshold
issues: (1) whether the out-of-court statement was hearsay, and (2)
whether the out-of-court statement was testimonial," United States
v. Earle, 488 F.3d 537, 542 (1st Cir. 2007), we dispense with the
first issue because, even assuming arguendo that the documents in
question contain hearsay statements, the same are in no way
testimonial. As the government argues, these documents squarely
conform to the requirements outlined by the Federal Rules of
Evidence for business records: (1) they were made at or near the
time of the event; (2) kept in the regular course of business; and
(3) created in the regular course of business. See Fed. R. Evid.
-35-
803(6).9 Thus, we agree with the government that the Account
Management Tools and the Login tracker were business records of
Yahoo!, and the Google Hello Connection Logs were business records
of Google.10
9
Rule 803(6) provides that "[a] record of an act, event,
condition, opinion, or diagnosis" is admissible despite its hearsay
status if:
(A) the record was made at or near the time by -- or from
information transmitted by -- someone with knowledge;
(B) the record was kept in the course of a regularly
conducted activity of a business, organization,
occupation, or calling, whether or not for profit;
(C) making of the record was a regular practice of that
activity;
(D) all these conditions are shown by the testimony of
the custodian or another qualified witness . . .; and
(E) neither the source of information or the method or
circumstances of preparation indicate a lack of
trustworthiness.
10
Rule 803(6) also requires that the records be introduced through
the testimony of a "custodian or other qualified witness," and that
neither the "source of information nor the method or circumstances
of preparation" can "indicate a lack of trustworthiness." Cameron
protests that Lee and Bogart were not engineers, had no knowledge
of the technical details of Yahoo!'s or Google's systems,
respectively, and were not the ones who prepared the records.
However, when dealing with computerized records under Rule 803(6),
"it is not required that the qualified witness be a computer
programmer . . . or that she be the person who actually prepared
the record." United States v. Moore, 923 F.2d 910, 915 (1st Cir.
1991) (internal quotation marks and citation omitted). The rule
simply requires that the witness be "one who can explain and be
cross-examined concerning the manner in which the records are made
and kept," Wallace Motor Sales v. American Motors Sales Corp., 780
F.2d 1049, 1061 (1st Cir. 1985), and Lee and Bogart satisfied this
requirement. As for the trustworthiness of the records, we have
held that "the ordinary business circumstances described [by the
qualified witness] suggest trustworthiness at least where
absolutely nothing in the record in any way implies lack thereof."
Moore, 923 F.2d at 915 (internal citation omitted). Such is the
case here, since there is no evidence in the record that Yahoo!'s
-36-
Moreover, it is clear that none of these records are the
type of "testimonial" business records that might cause
Confrontation Clause concerns under Meléndez-Díaz. Lee testified
that Yahoo! kept the Account Management Tool and Login Tracker data
in order to serve business functions that were totally unrelated to
any trial or law enforcement purpose: namely, to provide reliable
data about its customer accounts. Bogart provided similar
testimony regarding Google's need for the Google Hello Connection
Logs. Thus, applying an "objective test," Williams, 132 S. Ct. at
2243, we find that the "primary purpose" of collecting this data
was not to "establish[] or prov[e] past events potentially relevant
to later criminal prosecution." Bullcoming, 131 S. Ct. at 2714
n.6. We therefore conclude that the district court did not err in
admitting the Yahoo! Account Management Tool evidence, the Yahoo!
Login Tracker evidence, or the Google Hello Connection Logs
evidence.
3. Receipts of Yahoo! CP Reports
We are not convinced that the same can be said for the
receipts of the Yahoo! CP Reports. As Lee testified, Yahoo!
created CP Reports in the ordinary course of its business. Yahoo!
also kept receipts of those Reports, which were essentially copies
of the Reports, in the ordinary course of its business. Thus, in
analyzing whether the receipts of the CP Reports are testimonial,
or Google's data recording systems were flawed in any way.
-37-
we consider whether the CP Reports themselves -- of which the
receipts are simply computer-generated copies -- are (1) out-of-
court hearsay statements, and (2) whether these statements are
testimonial. Earle, 488 F.3d at 542.
In order to constitute hearsay, the CP Reports must be:
(1) statements made out of court, (2) by a person, and (3) offered
into evidence to prove the truth of the matter asserted. Fed. R.
Evid. 801(b) and (c). As to the first prong, we have no trouble
finding that the CP Reports are out-of-court statements, as they
are written assertions, made outside of the courtroom, containing
information on screen names that Yahoo! has associated with
potential child pornography. We also find that the second prong is
met as the CP Reports were made by a person, as Lee himself
testified that they were made by a person with knowledge of their
contents. According to Lee, someone at Yahoo!'s Legal Department
reviews an archive of the images featured in the suspect's account,
removes those that do not appear to contain child pornography, and
includes the rest in the CP Report addressed to NCMEC. Although
the receipts of the CP Reports in question do not appear to be
signed by any Yahoo! employee in particular, we believe it to be
evident from Lee's testimony that the CP Reports were authored by
an employee in the Legal Department. Lee himself testified that
part of his duties at Yahoo! included preparing these CP Reports.
Therefore, the CP Reports as a whole are statements made by a
-38-
person, who intended those statements to be taken as true, and
subsequently acted on, by NCMEC. As we will explain infra, this is
the case despite the fact that some of the information contained in
the CP Reports was generated automatically by Yahoo!'s different
retrieval tools.
Lastly, we conclude that the receipts of the CP Reports
were introduced at trial to prove the truth of at least some of the
matters asserted in them. The government sought to introduce this
evidence to establish a link between the "Suspect IP Address"
contained in the CP Reports and Cameron. The prosecution was
seemingly operating under the impression that this IP address was
the one from which the most recent image of child pornography had
been uploaded, even though, as previously explained, this
association is not readily apparent from the documents themselves.
Consequently, we can only infer that it was the government's intent
to use this evidence to link Cameron to the specific IP addresses
from which child pornography images were uploaded into the Yahoo!
accounts, and not just to support the proposition that said IP
addresses were the ones from which Cameron registered the accounts
at Yahoo!. To establish the latter, the government could have
simply relied on the Yahoo! Account Management Tool, the admission
of which we have just held did not implicate the Confrontation
Clause.
-39-
The district court apparently went along with this
characterization of the CP reports when it decided to admit their
receipts into evidence. In doing so, the court went through a
three-step logical sequence aimed at ultimately linking Cameron to
the IP addresses and the Yahoo! screen names used to upload the
images, just as the government had proposed. First, the district
court used the receipts of the CP Reports to link the Yahoo! screen
names to the IP addresses from which the suspect images were
uploaded. Second, the district court used the NCMEC CyberTipline
Reports to make the connection between these IP addresses and the
crime of uploading child pornography images, by examining the
images attached to these reports and making a preliminary finding
that they portrayed child pornography as defined in federal law.11
Lastly, the court found that the incriminating IP addresses were
linked to Cameron based on the evidence obtained from sources such
as "eBay", "PayPal" and the "Military Watch Forum" website, which
evinced that Cameron had used those same IP addresses to log in to
his personal accounts with those entities during the same time
periods that the uploads took place. From this we can soundly
conclude that the receipts of the Yahoo! CP Reports were introduced
as identifying evidence, designed to unveil Cameron as the person
responsible for uploading child pornography using the Yahoo! screen
11
It should be noted that the receipts of the Yahoo! CP Reports
introduced into evidence did not contain any actual images of child
pornography, unlike the NCMEC CyberTipline Reports, which did.
-40-
names featured in some of the counts of the indictment. Hence,
these receipts were introduced to prove the truth of the matter
asserted and as such constitute hearsay.
The next step in our inquiry calls upon us to determine
whether the receipts of the CP Reports are testimonial. We assume
that the CP Reports, and by extension the receipts, would count as
business records for the purposes of Federal Rule of Evidence
803(6). However, unlike the Yahoo! Account Management Tool, the
Login Tracker data and the Google Hello Connection Logs, there is
strong evidence that the CP Reports were prepared with the "primary
purpose of establishing or proving past events potentially relevant
to a later criminal prosecution." Bullcoming, 131 S. Ct. at 2714
n.6 (internal quotation marks and citation omitted). We also find
that the Reports are similar in purpose to the types of out-of-
court statements that the Supreme Court has described as
testimonial in recent Confrontation Clause cases. See Davis, 547
U.S. at 828-29 (statements to law enforcement in non-emergency
situation); Meléndez-Díaz, 557 U.S. at 321 (documents created in
the ordinary course of business but also for litigation purpose).
Thus, although the CP Reports may have been created in the ordinary
course of Yahoo!'s business, they were also testimonial; the
receipts of the Reports, therefore, should not have been admitted
without giving Cameron the opportunity to cross-examine the Yahoo!
employees who prepared the CP Reports.
-41-
We start by objectively viewing the evidence to determine
the "primary purpose" of the Reports. Firstly, we note that the CP
Reports refer to a "Suspect Screen Name," a "Suspect Email
Address," and a "Suspect IP Address." A "suspect" is "one who is
suspected; esp. one suspected of a crime or of being infected."
Webster's Third New International Dictionary 2303 (2002). There
was no testimony from Lee, nor any other evidence, that Yahoo!
treated its customers as "suspects" in the ordinary course of its
business. Indeed, the word "suspect" does not appear anywhere in
the Account Management Tool or Login Tracker data. Further, Lee
testified that in order for a CP Report to initially have been
created, someone in the Legal Department had to have determined
that an account contained what appeared to be child pornography
images.
Secondly, once Yahoo! created a CP Report, it did not
merely keep it in its own files; rather, it sent the report on to
NCMEC (and kept a receipt). Although NCMEC is not officially a
government entity, it receives a grant from the government, and one
of the uses to which NCMEC puts this grant money is to operate the
CyberTipline and forward reports of child pornography to law
enforcement. See 42 U.S.C. § 5773(b)(1)(P).
Given that Yahoo! created CP Reports referring to
"Suspect[s]" and sent them to an organization that is given a
government grant to forward any such reports to law enforcement, it
-42-
is clear that under the "objective test" required by Williams, 132
S. Ct. at 2243, the primary purpose of the CP Reports was to
"establish[] or prov[e] past events potentially relevant to later
criminal prosecution." Bullcoming, 131 S. Ct. at 2714 n.6
(internal quotation marks and citation omitted). The reports
clearly "established past events," in that each one reflected the
"event" of child pornography being placed into a Yahoo! user
account at some point in the past. These "events" were clearly
"relevant to later criminal prosecution": uploading child
pornography and possessing it on the Internet are crimes, and
evidence as to the IP address, and screen name of the suspect, is
clearly relevant to prosecuting those crimes. We also find that
the CP Reports were "made under circumstances which would lead an
objective witness reasonably to believe that the statement would be
available for use at a later trial." Crawford, 541 U.S. at 52
(internal quotation marks and citation omitted). Lee testified
that it was Yahoo!'s standard practice to send CP Reports to NCMEC
and keep receipts of those Reports; thus, whoever generated the CP
Reports in this case presumably knew that the Reports would most
likely spark an investigation, and that as a result of such
investigation, the government might request the CP Reports (in the
form of the receipts) from Yahoo! for use as evidence.
Our conclusion is bolstered by a comparison of the CP
Reports at issue here with those statements the Supreme Court has
-43-
found to be testimonial or non-testimonial in recent Confrontation
Clause cases. For example, the CP Reports here are similar in many
ways to those statements that the Supreme Court found to be
testimonial in Davis. Davis concerned two consolidated cases. 547
U.S. at 817. In the first case, the former girlfriend of Adrian
Davis ("Davis") called 911 to report that Davis was assaulting her,
and narrated Davis's attack to the operator as it occurred. Id. at
817-18. At Davis's trial, the girlfriend did not testify, but the
court admitted the recording of the 911 call, and Davis was
convicted of violation of a domestic no-contact order. Id. at 818-
19. In the second case, the police responded to a domestic
disturbance at the home of Hershel Hammon ("Hammon"). Id. at 819.
The police separately questioned Hammon and his wife, the latter of
whom swore out an affidavit stating that Hammon had attacked her.
Id. at 820. Hammon's wife did not testify at his trial, but the
court introduced her affidavit, and Hammon was found guilty. Id.
at 820-21.
In Davis's case, the Court found that the recording was
not testimonial because the primary purpose of Davis's girlfriend's
statements to the 911 operator were "to enable police assistance to
meet an ongoing emergency." Id. at 828; see also id. at 827 ("A
911 call . . ., and at least the initial interrogation conducted in
connection with a 911 call, is ordinarily not designed primarily to
establish or prove some past fact, but to describe current
-44-
circumstances requiring police assistance.") (internal quotation
marks omitted). However, in Hammon's case, the Court found that
his wife's affidavit was testimonial, because "[i]t [was] entirely
clear from the circumstances that the interrogation was part of an
investigation into possibly criminal past conduct." Id. at 829.
Here, the CP Reports are more similar in purpose to
Hammon's wife's affidavit than to the recording of Davis's
girlfriend's 911 call. The CP Reports were clearly not intended
"to enable police assistance to meet an ongoing emergency" or to
"describe current circumstances requiring police assistance."
Davis, 547 U.S. at 827-28. While possession of child pornography
is a serious crime, and while discovering child pornography must
certainly have troubled Yahoo! and its employees, the presence of
child pornography in Cameron's accounts was certainly not an
"emergency" comparable to what Davis's girlfriend described to the
911 operator: an ongoing physical assault. Cf. Michigan v. Bryant,
131 S. Ct. 1143, 1166-67 (2011) (holding that statements by gunshot
victim to police identifying the shooter were not testimonial when
police had reason to believe that the shooter might still be armed
and in the area). Rather, the CP Reports were clearly intended to
lead to "an investigation into possibly criminal past conduct."
See Davis, 547 U.S. at 829. And although the Court in Davis found
it "unnecessary to consider whether and when statements made to
someone other than law enforcement personnel are 'testimonial,'"
-45-
Davis, 547 U.S. at 823 n.2, we find that in the context of this
case, NCMEC effectively acted as an agent of law enforcement,
because it received a government grant to accept reports of child
pornography and forward them along to law enforcement. Cf. id.
("If 911 operators are not themselves law enforcement officers,
they may at least be agents of law enforcement when they conduct
interrogations of 911 callers. For the purposes of this opinion .
. . we consider their acts to be that of the police.").
We recognize that both cases in Davis involved
"interrogations," see id. at 822 n.1, and that the CP Reports here
did not result from any "interrogation" of Yahoo!. However, as
noted above, Yahoo! was obligated under federal law to report any
child pornography it became aware of to NCMEC. See 42 U.S.C.
§ 13032(b)(1) (current version at 18 U.S.C. § 2258A(a)(1)).
Moreover, the Court in Davis noted that although the decision
referred to "interrogations," "[t]his [was] not to imply ... that
statements made in the absence of any interrogation are necessarily
nontestimonial." Davis, 547 U.S. at 822 n.1. "The Framers," the
Court noted, "were no more willing to exempt from cross-examination
volunteered testimony or answers to open-ended questions than they
were to exempt answers to detailed interrogation." Id. (emphasis
added). The CP Reports at issue here, we conclude, fall somewhere
in the range between "volunteered testimony" and responses to an
interrogation, and we are confident that the Framers would not have
-46-
been willing to exempt testimonial statements in this range from
cross-examination.
The situation here is also similar to that in Palmer v.
Hoffman, 318 U.S. 109 (1943), which the Court in Meléndez-Díaz
cited as an example of a case where the "regularly conducted
business activity [was] the production of evidence for use at
trial." 557 U.S. at 321 (citing Palmer, 318 U.S. 109). Palmer
involved an accident at a railroad crossing in Massachusetts. 318
U.S. at 110. The train's engineer, who died before trial, gave a
statement about the accident to a railroad official and to a
representative of the Massachusetts Public Utilities Commission.
Id. at 111. The railroad sought to introduce the engineer's
statement under the Act of June 20, 1936, 49 Stat. 1561 (current
version, as amended, at 28 U.S.C. § 1732 (2012)), which allowed the
admission in federal court of any "memorandum or record of any act,
transaction, occurrence, or event" as long as such record "was made
in the regular course of any business." Palmer, 318 U.S. at 111,
111 n. 1. The Supreme Court held that the record was properly
excluded, noting that the statement was not "a record made for the
systematic conduct of the business as a business," but rather was
"calculated for use essentially in the court, not in the business."
Id. at 113, 114; see also Meléndez-Díaz, 557 U.S. at 321
(explaining the holding of Palmer). Here, the fact that the CP
Reports were made pursuant to a standard Yahoo! business practice
-47-
does not mean they were made to advance Yahoo!'s core business
purpose, which is, as Lee testified, to offer Internet-based
services such as e-mail, search, and instant messaging. Just as
the "primary utility" of the report in Palmer was "in litigating,
not in railroading," 318 U.S. at 114, the primary utility of the CP
Reports here is in reporting crimes to law enforcement, not in
providing Internet-based services to Yahoo!'s customers.
Finally, we believe the CP Reports here are
distinguishable from the out-of-court statements that a plurality
of the Justices found to be non-testimonial in Williams, the
Supreme Court's most recent Confrontation Clause case. In
Williams, vaginal swabs from a sexual-assault kit were sent to
Cellmark Diagnostics Laboratory ("Cellmark"), which produced a DNA
profile from the semen found in the swabs. 132 S. Ct. at 2229
(Alito, J., plurality opinion). At Williams's trial, the
prosecution called as a witness Sandra Lambatos ("Lambatos"), an
expert in biology and DNA analysis. Id. Lambatos testified that
the DNA profile produced by Cellmark matched the DNA profile of
Williams, which was already in a state database as a result of a
prior unrelated arrest. Id. Although the Cellmark report was not
admitted into evidence at all, the Williams plurality held that
"[e]ven if the Cellmark report had been introduced for its truth,
we would nevertheless conclude that there was no Confrontation
Clause violation." Id. at 2242.
-48-
Based on the circumstances of the case, the plurality
concluded that "the primary purpose" of the Cellmark report,
"viewed objectively, was not to accuse [Williams] or create
evidence for use at trial." Id. at 2243. The plurality noted that
when the state sent the kit to Cellmark, the state's "primary
purpose was to catch a dangerous rapist who was still at large, not
to obtain evidence for use against [Williams], who was neither in
custody nor under suspicion at the time." Id. The plurality also
noted that "no one at Cellmark could have possibly known that the
profile it produced would turn out to inculpate [Williams] -- or
for that matter, anyone else whose DNA profile was in a law
enforcement database." Id. at 2243-44. The plurality further
noted that in DNA labs, "the technicians who prepare a DNA profile
generally have no way of knowing whether it will turn out to be
incriminating or exonerating -- or both." Id. at 2244.
This last point is critical in distinguishing the
Cellmark reports in Williams from the Yahoo! CP Reports here.
Nobody at Yahoo! who was involved in creating the CP Reports could
possibly have believed that the CP Reports could be other than
"incriminating." Recall that (1) Yahoo! created these Reports
after its own employees had already concluded that a crime had been
committed, and (2) Yahoo! then sent these Reports to an
organization that forwards such reports to law enforcement.
Yahoo!'s employees may not have known whom a given CP Report might
-49-
incriminate, but they almost certainly were aware that a Report
would incriminate somebody.
The government contends that we should focus not on the
purpose for which the CP Reports were created, but rather on the
purpose for which the records underlying the CP Reports -- such as
the record of the user's IP address, and the associations between
images and accounts -- were created. Because these underlying
records were created for a Yahoo! core business purpose, the
government contends that under the "primary purpose" test, the CP
Reports are not testimonial. The government urges us to treat the
Yahoo! CP Reports like the immigration documents we held to be non-
testimonial in Lang, 672 F.3d at 22-23, or like the types of
business records that other Circuits have found to be non-
testimonial. See, e.g., United States v. Yeley-Davis, 632 F.3d
673, 677-81 (10th Cir. 2011) (holding that neither cell phone
records nor their authenticating documents were testimonial);
United States v. Ali, 616 F.3d 745, 751-52 (8th Cir. 2010) (holding
that bank records regarding taxpayer refund anticipation checks
were not testimonial).
However, the government's argument ignores a critical
point: as explained earlier, the CP Reports are themselves
"statements," and thus their purpose must be analyzed
independently. It is not enough to analyze the purpose behind the
creation of the business records on which the CP Reports rely. If
-50-
the CP Reports simply consisted of the raw underlying records, or
perhaps underlying records arranged and formatted in a readable way
for presentation purposes, the Reports might well have been
admissible. See Lang, 627 F.3d at 22-23; Yeley-Davis, 632 F.3d at
677. Indeed, we have upheld the admission of the Account
Management Tool and Login Tracker printouts because those exhibits
simply take pre-existing records (records such as the IP addresses
from which an account was created and accessed) and put them on
paper in a readable format. But the CP Reports are a different
animal, for they do not merely present pre-existing data; instead,
they convey an analysis that was performed using pre-existing data.
From our earlier discussion, recall that the CP Reports
and Lee's testimony clearly indicated that, to create each Report,
someone at Yahoo! analyzed Yahoo!'s data, drew conclusions from
that data, and then made an entirely new statement reflecting those
conclusions. Each report also refers to a "Suspect" who is
identified by his "Screen Name," "Email Address," "IP Address," and
"URL." This means that someone at Yahoo! analyzed Yahoo!'s
business records and concluded that (1) a crime had likely been
committed and (2) a particular user likely committed that crime.12
Thus, every Yahoo! CP Report was a new statement that conveyed an
12
We do not treat the pictures themselves as business records of
Yahoo!. However, the association between a picture and an account
is clearly a business record of Yahoo!; without keeping track of
these associations, Yahoo! could not figure out which photos on its
servers belonged to which users.
-51-
analysis that had not existed previously. The new statement was,
in effect, "someone has committed a crime, here is the evidence
that a crime was committed, and here is how to identify the
perpetrator." The primary purpose of this new statement was law
enforcement-related, even if the primary purpose of the data used
to support the statement was not. Our conclusion here is
strengthened by the fact that in preparing the CP Reports, the
Yahoo! employees removed the images they thought did not depict
child pornography, as said images would presumably not be relevant
to the prosecution of a child pornography crime.
The fact that Yahoo! attached to each CP Report the
records that justified its analysis -- the Account Management Tool,
Login Tracker, and Image Upload Data -- does not mean that the CP
Report itself was not a new statement. By creating the CP Report,
the author of the report went beyond simply furnishing pre-existing
records and crossed the line into testifying regarding the meaning
of those records; in this circumstance, Cameron had the right to
confront the author. Cf. Meléndez-Díaz, 557 U.S. at 322 (noting
that traditionally, a clerk was allowed to "'certify to the
correctness of an [official] record kept in his office,' but had
'no authority to furnish, as evidence for the trial of a lawsuit,
his interpretation of what the record contains or shows, or to
certify to its substance or effect'") (quoting State v. Wilson, 75
So. 95, 97 (La. 1917)). Indeed, the distinction between business
-52-
records and statements about those records was recognized by the
Eighth Circuit in Ali, a case on which the government relies. In
Ali, the prosecution introduced "exhibit 95," which consisted of
two parts: (1) records from a bank, HSBC, regarding three
taxpayers' refund anticipation checks; and (2) a letter from a
manager at HSBC that explained the meaning of the records. 616
F.3d at 751. The HSBC manager wrote that the letter was a "written
statement to verify that [the three taxpayers] filed 2002 income
tax returns with Cedar Tax Services and applied for Refund
Anticipation Checks." Id. The Eighth Circuit held that while the
bank records were nontestimonial, "[t]he letter was arguably
equivalent to live, in-court testimony and thus not admissible as
a business record." Id. at 752.13
13
At oral argument, the government analogized Yahoo! to a bank
that records statements of financial transactions. The government
contended that if the bank detected suspicious activity in certain
statements, and if the bank collected those statements and reported
those transactions to the authorities, the bank's financial
transaction statements would not become testimonial simply because
the bank aggregated them in order to make its report. In support
of this proposition, the Government relied on United States v.
Naranjo, 634 F.3d 1198 (11th Cir. 2011).
However, the government's analogy is inapplicable to the
analysis of the CP Reports. The bank records in the government's
example are the equivalent to the Account Management Tool, Login
Tracker, or Image Upload Data in this case. These documents, like
the bank records in the government's example, did not become
testimonial simply because they turned out to be relevant to a
prosecution. The CP Reports, however, have no equivalent in the
government's example. The Reports are documents that contain
analyses based on certain other records that were performed only
after criminal activity was detected.
-53-
It may be the case that the new statement represented in
each CP Report -- "someone has committed a crime, here is the
evidence that a crime was committed, and here is how to identify
the perpetrator" -- was an obvious conclusion based on the
underlying data. Presumably any Yahoo! employee who saw child
pornography images in a user's account would conclude that the user
is at least a "suspect" in a child pornography crime, and that the
"suspect's" IP address is the one associated with that account.
But one small analytical step for man can sometimes be one giant
leap for Confrontation Clause purposes. To hold that the CP
Reports are admissible without confrontation as business records
simply because they state obvious conclusions based on data in
other business records would be to "return to [the Supreme Court's]
over-ruled decision in [Ohio v. Roberts], which held that evidence
with 'particularized guarantees of trustworthiness' was admissible
In addition, Naranjo is of limited relevance to this case
because it is clearly distinguishable on its facts. In Naranjo,
the Eleventh Circuit held that bank records and checks could be
admitted into evidence as non-testimonial business records. 634
F.3d at 1213-14. However, the defendant's Confrontation Clause
argument on appeal was aimed not at these records, but on summary
charts based on the records that were prepared by a government
agent. The Eleventh Circuit held that the charts were admissible
because they simply summarized underlying data that was non-
testimonial. Id. at 1213. However, the defendant was able to
cross-examine the agent who prepared the summary charts, and the
district court had instructed the jury to refer to the charts "only
as an aid . . . and not for the truth." Id. (internal quotation
marks omitted). Here, Cameron had no opportunity to cross-examine
the author of the CP Reports. Moreover, we deem the CP Reports to
be more than a mere "summary" of other data; rather, they are an
analysis of other data.
-54-
notwithstanding the Confrontation Clause." Meléndez-Díaz, 557 U.S.
at 317 (quoting Ohio v. Roberts, 448 U.S. 56, 66 (1980)). See also
Crawford, 541 U.S. at 62 ("Dispensing with confrontation because
testimony is obviously reliable is akin to dispensing with jury
trial because a defendant is obviously guilty. This is not what
the Sixth Amendment prescribes.").
Because the CP Reports were testimonial, the receipts
stored by Yahoo! were necessarily testimonial as well. Thus, they
should not have been admitted without giving Cameron the
opportunity to cross-examine the Yahoo! employees who prepared the
CP Reports. We therefore conclude that the admission of the
receipts in this case violated Cameron's rights under the
Confrontation Clause.
4. CyberTipline Reports
Cameron also assails the admission of the NCMEC
CyberTipline Reports, arguing further violations of his rights
under the Confrontation Clause. The government's response is that
the CyberTipline Reports are not actually "statements" of NCMEC,
because NCMEC merely forwards Yahoo!'s CP Reports to the
appropriate law enforcement agency. We conclude, however, that
this argument is unavailing, as we have already determined that the
Yahoo! CP Reports from which the CyberTipline Reports are derived
are testimonial. By the government's logic, NCMEC would simply be
forwarding testimonial statements made by Yahoo! to law
-55-
enforcement. Therefore, the Confrontation Clause problems we find
with the admission of CP Reports taint the admission of the
CyberTipline Reports.
In any event, we are not convinced that the record
supports the government's contention that the CyberTipline Reports
"contain exactly the same information present in" the Yahoo! CP
Reports. In fact, we believe the record supports an opposite
reading, which is that NCMEC does not always send along exactly
what it receives from Yahoo! to law enforcement. Our analysis
below supports the conclusion that these reports were new
statements made by NCMEC and constituted testimonial hearsay
statements which were admitted into evidence in violation of
Cameron's Confrontation Clause rights.
First, the CyberTipline Reports were introduced into
evidence to prove the truth of the matters asserted in them. Our
previous discussion outlining the district court's reasoning in
admitting the Yahoo! CP Reports demonstrates that the CyberTipline
Reports were admitted as part of a batch of evidence aimed at
proving that Cameron had uploaded child pornography images onto
several Yahoo! accounts. In fact, without the CyberTipline Reports
the prosecution would not have been able to prove Cameron's guilt
as to Counts One, Two, Three, Four, Five, Eleven and Fourteen of
the Indictment, which exclusively charge Cameron with uploading
digital images of child pornography onto specific Yahoo! accounts
-56-
on specific dates. The only piece of evidence the government could
have relied on to establish the specific dates on which Cameron had
uploaded the offending images was the CyberTipline Reports, which
reflected the date and time on which the most recent image of child
pornography had been uploaded, as well as the IP address from which
that upload had originated.14
The receipts of the Yahoo! CP Reports alone were not
enough to sustain Cameron's convictions under the above-referenced
counts because they did not contain the specific date of each
upload, nor did they contain the actual images that were uploaded.
As mentioned earlier, a list of the IP Addresses from which each of
the images were uploaded, along with the date and time of each
14
For example, Count Eleven charged Cameron with uploading child
pornography images to the "lilhottee00000" account on July 26,
2007. The evidence from Time Warner and other sources showed that
Cameron's residence had been assigned the IP address 76.179.26.185
on that date. To show that child pornography was uploaded to the
"lilhottee00000" account on that date, the government pointed to a
CyberTipline Report for "lilhottee00000." This Report indicated
that the "most recent file or image upload available" in the data
sent from Yahoo! was uploaded from 76.179.26.185, and further
indicated that the "upload date" was July 26, 2007 at 9:37 AM
Pacific Daylight Time. We have found no other exhibit in the
record that indicates that child pornography was uploaded to the
"lilhottee00000" account on July 26, 2007. Nor is there any other
exhibit that shows that child pornography was uploaded to this
account from IP address 76.179.26.185. The CP Report that Yahoo!
sent to NCMEC for "lilhottee00000" does not show the times at which
images were uploaded or the IP addresses from which they were
uploaded (the report shows a "Suspect IP Address" of 76.179.26.185,
which is the IP address Yahoo! "associated" with the account, but
Lee did not explain how the address was "associated"). The Image
Upload Data attached to the CP Report had this information,
according to Lee, but the government does not appear to have
introduced this data into evidence.
-57-
upload, was contained in the Image Upload Data that Yahoo! sent to
NCMEC as part of each CP Report. However, from our review, it does
not appear that this data was included with the CP Report receipts
the prosecution introduced at trial, or anywhere else on the record
for that matter. Therefore, the CyberTipline Reports were
introduced -- and admitted -- into evidence to prove the truth of
the assertions contained therein, most importantly: that child
pornography images were uploaded onto a particular Yahoo! account,
and that the most recent one of those images was uploaded from a
specific IP Address on a specific date and time.
The reasoning above defeats the government's argument
that the CyberTipline Reports are not really "statements" of NCMEC
because all they do is simply convey information sent to NCMEC by
companies like Yahoo! to law enforcement. The government relies on
testimony from Shehan, the NCMEC witness, to the effect that NCMEC
does not add anything to the reports it receives via the
CyberTipline, aside from a "report ID" number and an "entry date"
for the report. However, this does not explain the fact that the
CyberTipline Reports reflect the date and time of the most recent
child pornography image upload, while the receipts of the Yahoo! CP
Reports do not. As mentioned earlier, the only reasonable
explanation we can surmise is that the NCMEC employee who created
these reports analyzed the information contained in the Image
Upload Data sent by Yahoo!, picked the IP Address from which the
-58-
most recent image was uploaded, and included this information,
along with the date and time of that upload, in the CyberTipline
Report. We note that the Yahoo! CP Reports did not specify whether
the “Suspect IP Address” was the IP Address from which the most
recent image of child pornography had been uploaded, a
representation which was in fact made in the CyberTipline Reports.
Therefore, in order to make this representation, the NCMEC employee
who prepared the CyberTipline Reports had to have analyzed the
Image Upload Data sent by Yahoo!.
In doing so, the NCMEC employee undertook a similar
exercise to the one performed by the Yahoo! employee who created
the CP Reports; they both analyzed the underlying information in
the Image Upload Data and then used that information to create a
separate, independent statement. The new statement made by NCMEC
can be characterized along these lines: "based on the Yahoo! data,
we have determined that the IP Address used by the suspect to
upload the most recent image of child pornography is X, and the
date and time of this upload is Y and Z."
Having determined that the CyberTipline Reports were
indeed new statements by NCMEC, the question now is whether they
were testimonial. The answer must be "yes," for it is clear that
the "primary purpose" of a CyberTipline Report is to "establish[]
or prov[e] past events potentially relevant to later criminal
prosecution." Bullcoming, 131 S. Ct. at 2714 n.6 (internal
-59-
quotation marks and citation omitted). Indeed, Shehan conceded as
much during cross-examination:
Q: "Mr. Shehan, the sole purpose of the
reports that are embodied by Exhibits . . .
10A through 10M [the CyberTipline Reports] is
to prove facts at trial, correct?"
A: "It's to be part of the record, yes."
In addition, the primary purpose is also reflected on the face of
the reports themselves, which state: "Law enforcement officials
please be advised: this Report is being provided solely for the
purpose of a law enforcement investigation into possible criminal
behavior." (emphasis on original removed).
Even without the above, we would have no trouble finding
that the CyberTipline Reports were testimonial. As such, they
could not have been admitted without giving Cameron the opportunity
to cross-examine their authors. Shehan admitted that he was "not
the original analyst who processed" the Yahoo! CP Reports in this
case. Thus, the admission of the CyberTipline Reports in these
circumstances violated the Confrontation Clause.
E. Harmless Error Analysis
That certain evidence was admitted in violation of
Cameron's Confrontation Clause rights does not necessarily mean
that we must reverse Cameron's convictions on any counts. Instead,
we must determine whether or not the error was harmless beyond a
reasonable doubt; if the error was harmless, we will not reverse.
See United States v. Meises, 645 F.3d 5, 24 n.26 (1st Cir. 2011)
-60-
("Constitutional errors, such as a Confrontation Clause violation,
require reversal unless shown to be harmless beyond a reasonable
doubt." (emphasis added) (citing United States v. Cabrera-Rivera,
583 F.3d 26, 36 (1st Cir. 2009))). In Cabrera-Rivera, we explained
that
[i]n evaluating harmlessness, we consider a
number of factors, including whether the
challenged statements were central to the
prosecution's case; whether the statements
were merely cumulative of other (properly
admitted) evidence; the strength of
corroborating or contradicting evidence; the
extent to which cross-examination was
permitted; and the overall strength of the
case.
583 F.3d at 36 (citing Earle, 488 F.3d at 546). The burden of
proving harmlessness is on the government. Earle, 488 F.3d at 545
(referring to "[the government's] burden of showing that any such
error was harmless beyond a reasonable doubt").
It is clear that for many of the counts of conviction,
the CP Report receipts and CyberTipline Reports were not even
relevant, much less "central," to the prosecution's case.
Cameron's guilt on the five counts related to Google Hello --
counts Six, Seven, Nine, Twelve, and Thirteen -- was provable
beyond a reasonable doubt using the Google Hello Connection Logs,
which were properly admitted. Likewise, Cameron's Yahoo! email and
the child pornography found on his computer showed beyond a
reasonable doubt that he received child pornography via email as
charged in Count Ten. Finally, Cameron's guilt on Count Fifteen,
-61-
the child pornography possession count, was proven using the child
pornography images found on his computer. Cameron argues that
"spillover" prejudice from the improperly admitted records taints
these convictions as well, but this argument is meritless.
Cameron's trial was a bench trial, and we are confident that the
district court was capable of recognizing which evidence was
relevant for each count of conviction. Cf. United States v. Zayas,
876 F.2d 1057, 1059 (1st Cir. 1989) (in the context of bench trial,
holding that "spillover effect . . . was minimal").
However, for those counts that were based solely on
Cameron's alleged uploading of child pornography images to Yahoo!
accounts -- counts One, Three, Four, Five, Eleven, and Fourteen --
we conclude that the admission of the Yahoo! CP Reports and the
CyberTipline Reports was not harmless. As we have explained, in
those counts the government charged Cameron with very specific
conduct: uploading child pornography to specified Yahoo! Photo
accounts on specified dates. The government was able to establish
which IP addresses Cameron had on the dates in question through
evidence from Time Warner and other companies. But to prove that
Cameron actually uploaded child pornography to the accounts in
question on the dates in question, the government needed to
introduce evidence showing that (1) child pornography had been
uploaded to those accounts on the specific dates in question from
the same IP addresses that Cameron had on those dates; and (2) no
-62-
one else in Cameron's household but Cameron himself could have been
the one who uploaded the images. And again, as far as we can tell
from the record, the only evidence that was introduced to
demonstrate the upload dates and the upload IP addresses was the
CyberTipline Reports. Thus, the improperly admitted reports were
"central to the prosecution's case" and were not "cumulative of
other (properly admitted) evidence." Cabrera-Rivera, 583 F.3d at
36.15
Our result might be different if the government could
point us to other admitted evidence specifically showing (1) that
child pornography had been uploaded to the accounts identified in
the indictment (2) on the dates specified in the indictment (3)
from the IP addresses that Cameron had on those dates. For
example, the government might have introduced the Image Upload Data
from Yahoo!; the government presumably could have acquired this
data, as Lee testified that Yahoo! stored it with the receipts.
However, it is not clear from the trial transcript or the parties'
briefs whether Yahoo! in fact produced this to the government; and
in any case, it appears the government did not attempt to introduce
it at trial. Since it is the government's burden to prove
harmlessness, and since we find no indication that any alternate
15
Cameron does not challenge the government's showing that neither
his wife nor his children could have been the ones who uploaded the
images.
-63-
evidence was actually admitted, we must reverse Cameron's
convictions for Counts One, Three, Four, Five, and Eleven.16
F. Sentencing Challenge
Because we must reverse Cameron's conviction with respect
to six counts, we need not reach his sentencing challenge at this
time. Upon remand, the district court may consider in the first
instance whether its original calculation of the number of photos
attributable to Cameron is still valid in light of the reversal of
the convictions on Counts One, Three, Four, Five, Eleven, and
Fourteen.
III. Conclusion
Before concluding, we pause to reiterate, for clarity's
sake, what we have (and perhaps more importantly, what we have not)
held today. Our holding today does not mean that non-testimonial
business records somehow become testimonial simply because the
government seeks to use them as evidence against a criminal
defendant. However, if business records are testimonial, then a
defendant must be given an opportunity to confront the authors of
those records. What the government did in this case was seek to
16
During oral argument, counsel for the government seemed to admit
that the admission of the Yahoo! CP Reports was harmful to several
counts of the indictment, but stated that the admission of the
CyberTipline Reports was not. We take the government at its word
that the CP Reports were harmful, but disagree with its
characterization of the CyberTipline Reports, as it is evident that
these were central in proving that Cameron had uploaded child
pornography images on the specific dates set out in the indictment.
-64-
introduce, absent confrontation of the authors, out-of-court
statements that: (1) did not exist before criminal activity was
discovered; (2) stated conclusions (though perhaps obvious ones)
about the meaning of underlying data; (3) were created for the
express purpose of reporting criminal activity and identifying the
perpetrator of that activity; and (4) were reported to a
government-funded entity that serves as a conduit for passing
information to law enforcement. This, we hold, the government
cannot do.17
We reverse Cameron's convictions on Counts One, Three,
Four, Five, Eleven, and Fourteen, and vacate his sentence as to
those counts. We affirm Cameron's convictions on the remaining
Counts. We remand to the trial court for further proceedings
consistent with this opinion, including a new trial on Counts One,
Three, Four, Five, Eleven, and Fourteen, if the government wishes
to so proceed.
AFFIRMED in part, REVERSED in part, and REMANDED.
"Dissenting opinion follows"
17
As the Supreme Court discussed recently in Williams, there are
special rules that apply to testimony by expert witnesses about the
conclusions they draw from underlying data. See 132 S. Ct. at
2233-35, 2239-41. Because there was no expert testimony at issue
in this case related to image upload times or IP addresses (the
only expert testimony, from Dr. Ricci, concerned the age of persons
depicted in the images), our analysis is not disturbed by the
Supreme Court's conclusions in Williams about expert testimony.
-65-
HOWARD, Circuit Judge (dissenting in part). I dissent
only with respect to the majority's conclusion that the district
court's decision to admit the Yahoo! reports and the NCMEC
CyberTipline reports ran afoul of the defendant's Sixth Amendment
Confrontation Clause protection. From my vantage, the majority is
taking an unjustified step beyond what current Supreme Court
precedent dictates in the developing arena of what documents
bearing the hallmarks of business records and offered as evidence
in a criminal trial constitute or contain testimonial statements
for purposes of the Confrontation Clause. Because I do not see the
documents targeted by the majority as containing a testimonial
statement in the manner advanced by the appellant, I would not
disturb the district court's decision to admit the documents.
The Sixth Amendment's Confrontation Clause confers upon
an accused in a criminal prosecution the right to be confronted
with the witnesses against him. U.S. Const. amend. VI; see
Bullcoming v. New Mexico, 564 U.S. __, 131 S. Ct. 2705, 2713
(2011); United States v. Phoeun Lang, 672 F.3d 17, 21 (1st Cir.
2012). This constitutional mandate affords a criminal defendant
procedural protection by guaranteeing that the reliability of
certain evidence, tagged "testimonial hearsay," can be tested by
cross-examining the one "bear[ing] testimony" against him.
Crawford v. Washington, 541 U.S. 36, 51, 53 (2004); accord Davis v.
Washington, 547 U.S. 813, 823–24 (2006). Of course, the
-66-
reliability of all evidence offered against a criminal defendant is
always at the forefront of a trial court's gatekeeping role, but
the Sixth Amendment guarantees the opportunity for a particular
manner of testing reliability, cross-examination, for a particular
type of evidence, testimonial out-of-court statements offered for
the truth of the matter asserted by the declarant. See Williams v.
Illinois, 567 U.S. __, 132 S. Ct. 2221, 2232-35 (2012) (plurality);
Crawford, 541 U.S. at 59-60 n.9 (citing Tennessee v. Street, 471
U.S. 409, 414 (1985)). Evidence offered by the government that is
an out-of-court testimonial witness statement cannot be admitted at
a criminal trial unless the declarant of that testimonial statement
is unavailable and the accused has had an opportunity to
cross-examine the declarant on a prior occasion. See Crawford, 541
U.S. at 59 & 60 n.9; see Lang, 672 F.3d at 22.
The Supreme Court has recited various formulations of the
"core class of 'testimonial' statements" as including
(1) "ex parte in-court testimony or its
functional equivalent—that is, material such
as affidavits, custodial examinations, prior
testimony that the defendant was unable to
cross-examine, or similar pretrial statements
that declarants would reasonably expect to be
used prosecutorially," (2) "extrajudicial
statements contained in formalized testimonial
materials, such as affidavits, depositions,
prior testimony, or confessions," and (3)
"statements that were made under circumstances
which would lead an objective witness
reasonably to believe that the statement would
be available for use at a later trial."
-67-
Lang, 672 F.3d at 22 (quoting Crawford, 541 U.S. at 51-52)
(ellipsis omitted). While the Court initially did not endorse any
particular formulation as circumscribing the bounds of testimonial
hearsay, see Davis, 547 U.S. at 822, it seems to have since
ratified the above list, at least as being illustrative. See
Melendez-Diaz v. Massachusetts, 557 U.S. 305, 309-10 (2009); Lang,
672 F.3d at 22. And in recent years, the Court has considered the
scope of "testimonial" statements, particularly in the police
interrogation setting, see Davis, 547 U.S. 813, and with respect to
scientific reports, see Bullcoming, 131 S. Ct. 2705; Melendez-Diaz,
557 U.S. 305; see also Williams, 132 S. Ct. 2221.
In this case, Cameron argued vigorously to the trial
court that the various digital images and related materials that
had been derived from Yahoo!, NCMEC and Google sources must be
excluded from evidence unless the government produced at trial the
percipient witness who found and seized the electronic contraband
and transmitted it to the government. In one pleading defense
counsel posited, "[t]he figurative elephant in the room revolves
around whether Mr. Cameron must be given an opportunity to confront
each and every witness who supplies evidence that the government
will use to prove that Mr. Cameron committed the alleged offenses."
In his motion for a new trial, the defendant insisted that the
"testimonial qualities" of the various evidence -- particularly the
Yahoo! evidence introduced by witness Lee -- was "obvious."
-68-
Failing to persuade the trial court, the defendant now
brings his constitutional plaint before us. As the majority notes,
Cameron does not parse out the testimonial nature of each of the
various pieces of digital and documentary evidence originating from
Yahoo!, NCMEC, and Google. Instead, he takes the global position
that "any report which discloses the location where evidence was
seized must be testimonial." With a sweeping stroke, Cameron
argues that because such reports attest to the location where the
digital images themselves were found, they are "clearly testimonial
statements" that are identical to a statement that "I found the
drugs in the defendant's car" or "I found the gun in the
defendant's garage." To test the veracity of these purported
statements about location that are embedded within the reports, the
appellant claims that he was entitled to cross-examine the
person(s) who found the records about how, when and where the CP
images were located.
I agree with the majority that the admission of evidence
pertaining to the Yahoo! Account Management Tool, the Yahoo! Login
Tracker data, and the Google Hello Connection logs does not
implicate the Confrontation Clause. I do not, however, view the
Yahoo! reports (presented in the form of receipts to the judge
sitting as fact finder), and by extension the NCMEC CyberTipline
-69-
reports, as amounting to testimonial statements in the manner
argued by the defendant and decided by the majority.18
To begin, I emphasize that the Sixth Amendment is
concerned with testimonial statements that are being offered for
the truth of the matter asserted. See Williams, 132 S. Ct. at
2232-35; Crawford, 541 U.S. at 59-60 n.9. And so, it is important
to look to the government's purpose in admitting the Yahoo!
reports.
While the defendant likens the Yahoo! reports to witness
testimony of the location of contraband, the government did not
offer any Yahoo! report for the truth of any averment in it that
the stored images found in the particular Yahoo! photo album
actually were contraband or even "suspected" contraband. Indeed,
the government was clear that even the illicit descriptive
"original names" of some of the image files (not assigned by a
Yahoo! employee) listed in the report's table should not be relied
on to assess the illegal nature of the actual digital images.
Rather, the government provided the testimony of an expert in child
abuse who analyzed each image in relation to the "Tanner stages" to
establish that the sexually graphic images in fact depicted
children within a certain age span.
18
For the same reasons as the majority does, I refer solely to the
Yahoo! reports when conducting the constitutional analysis here.
I also note that numerous receipts of the Yahoo! reports were
admitted into evidence and at times, I reference a report in the
singular simply for ease in exposition.
-70-
Moreover, the appellant provides no record support to
show that the district court, as the trier of fact in this case,
somehow relied on the Yahoo! reports to determine whether or not
the images themselves constituted child pornography. The trial
court was quite clear that the documentary evidence was admitted
for the purpose of providing a link between the images alleged to
be child pornography that were found on the Yahoo! server, and the
particular identified user name (also sometimes referred to in the
evidence as "screen name" or "login name") and IP address that
Yahoo! associated with that user name. The trial court also
referred to the various "ISP documents" admitted into evidence in
relation to the image archives as "chain of custody evidence."
Accordingly, the constitutional analysis is properly
confined to whether an admitted Yahoo! report contains testimonial
statements that the images listed in the report and provided as
digital evidence were located in the photo album account associated
with a particular user name (such as "harddude0000") and a
particular IP address Yahoo! associated with that user name (such
as "76.179.26.185"). Certainly, the reports reflect this location
connection. But a review of both Lee's testimony explaining the
process of data storage and retrieval followed by Yahoo!, as well
as the reports themselves, leads to the conclusion that the Yahoo!
reports do not contain any testimonial statements.
-71-
For his part, the defendant generally speaks of all of
the records that accompany the digital images as "affidavits that
attest to the location" of where the images were found, but he does
not analyze each document type. Instead, he likens the sum of the
reports in this case -- including the Yahoo! reports -- to the
evidence at issue in Melendez-Diaz and Bullcoming, arguing that the
records "were admitted as computer forensic evidence obtained by
unknown persons using unknown methods and presented by substitute
witnesses" in violation of his Sixth Amendment right to
confrontation. The comparison, however, is inapt.
The heart of the testimonial hearsay in Melendez-Diaz was
a certification statement akin to an affidavit made by a state
forensic laboratory analyst attesting to the fact that the
forensically analyzed substance was cocaine; the substance had been
seized by law enforcement and delivered to the state laboratory for
analysis of its contents. 557 U.S. at 308. The certificates were
offered as substantive evidence to prove the truth of the assertion
that the nature of the substance was actually cocaine, an assertion
generated by a scientific forensic analysis specifically engaged in
to produce evidence for use at a criminal proceeding. Id. at 310-
11.
The circumstances of Bullcoming are similar. The
testimonial statement in that case consisted of a certification by
an analyst akin to a "formalized signed document" attesting to the
-72-
fact that a blood sample contained an alcohol content of "0.21
grams per hundred milliliters"; the blood had been drawn from the
defendant at a local hospital in connection with a driving under
the influence charge and delivered to the state laboratory by law
enforcement for forensic analysis of its contents. 131 S. Ct. at
2710, 2716-17. The certificate was offered as substantive evidence
to prove the truth of the assertion as to the level of alcohol
content in the blood sample, an assertion generated by a scientific
forensic analysis specifically engaged in to produce substantive
evidence for use at a criminal trial. Id. at 2711, 2713, 2716-17.
Here, the defendant is left to argue that the purported
statement in a Yahoo! report offered for its truth is that the
digital images were found in the Yahoo! photo album tied to the
identified user name and the associated IP address. For its part,
the majority seizes on the IP addresses identified in the Yahoo!
reports because in one instance a different IP address was recorded
in the Account Management Tool for the identified user name. The
majority surmises that both the government and the district court
took the IP address identified in a Yahoo! report to be the one
from which the most recent image of child pornography had been
uploaded into a Yahoo! photo album. From this the majority
concludes that the government used the Yahoo! reports to tie the
defendant to the specific IP addresses from which child pornography
images were uploaded. Even so, I part ways with the majority
-73-
because the link in any given Yahoo! report between the
incriminating images and the accompanying user name and IP address
is not a testimonial statement.19
To the extent the connection between the identified user
name, the associated IP address, and the digital images archived
from that user's photo album can be deemed a declarant statement,
that location connection existed well before Yahoo! even received
the customer complaint about the content of the images associated
with the screen name "lilhottyohh". Indeed, the thrust of Lee's
testimony was that the storage of the digital images and the
associated account data on the Yahoo! servers was an essential part
of the Yahoo! photo album service. The record indicates that the
computer systems and retrieval tools for locating images in any
given user's photo album (along with stored account information
gathered with the archive such as the associated IP address) were
the same as those Yahoo! uses to locate all information stored
about a user on the servers for its ordinary business functions.
It is helpful to amplify the record on this point.
As the majority notes, Yahoo! is an Internet Service
Provider portal which, as Lee explained, is in the business of
19
The majority begins its discussion on the testimonial nature of
the reports by examining their facial features, focusing on the
term "suspect" that is contained in some "fields" that list certain
types of information, such as "Suspect IP Address." I think it
more likely that "suspect" is used as an adjective in the reports
to delineate the suspicious address and user names, not, as the
majority says, as a noun targeting a specific person.
-74-
providing several internet services to its users, such as internet
searching, email, "messenger," and (as of the time of the criminal
conduct at issue) a photo album service. Various types of
information or data relating to Yahoo! users and the services that
each user employed are stored on servers. Such stored information
includes emails, email "address books," "friends" lists, user
registration information, and login history. Data pertaining to
the photo album service -- the stored digital images -- was handled
no differently. This service allowed a Yahoo! user to load digital
images from various sources -- such as an email attachment or an
internet site -- to an internet photo album associated with that
user's Yahoo! account. The service enabled a user to store digital
images on a Yahoo! server and then easily share the stored photo
album with other internet users by sending them the URL link to the
album's internet location. Once loaded to the photo album, the
digital images remained automatically stored on Yahoo! servers
unless and until the user deleted them (although Yahoo! also could
eliminate access to the images by deactivating a user's account).
Lee's testimony shows that each type of stored
information or data pertaining to each Yahoo! user or "screen name"
is accessed by Yahoo! employees using the same methodology. The
method consists of a Yahoo! employee, such as one in the customer
care department, inputting a user name into a particular retrieval
tool associated with certain types of stored information, such as
-75-
the Account Management Tool or Login Tracker. The computer tool
then automatically accesses the stored information related to that
tool and displays it for the Yahoo! employee to review. Some tools
compile various data; the Account Management tool, for example,
collects the IP address recorded when a user first creates an
account and the registration information provided by that user,
among other stored information. Lee testified that these systems
of data storage and retrieval are relied upon by Yahoo! to provide
reliable and accurate data on customer accounts in order to conduct
its business as an ISP. Lee explained that the same systems and
tools also are used to access stored data pertaining to users when
Yahoo! responds to a search warrant or any other legal process.
There is absolutely no indication in this record that the
archives for the digital images from photo albums associated with
the various Yahoo! user names in this case (as well as the IP
addresses and other account data included with each image archive)
were created, generated, or developed outside of this routine
administrative methodology for retrieving stored user account data
-- a process which itself necessarily links the location of the
retrieved stored data to the user name inputted. That the
retrieved digital images stored on the server were captured
electronically for purposes of transmitting them to the legal
department is no different from the location connection created
between data and user each time other types of stored data are
-76-
retrieved and printed (or otherwise transmitted) for review, such
as a user's login history, "friends" list, or email "address book."
In short, the purported location statement made by the stored image
archive itself (along with other accompanying stored user data),
and reflected in the Yahoo! reports, was not made for the primary
purpose of establishing or proving a fact or past event for
criminal prosecution, but for the very functioning of the ISP
business operations. See generally Williams, 132 S. Ct. at 2243
("the primary purpose of the [scientific] report, viewed
objectively, was not to accuse petitioner or to create evidence for
use at trial"); Bullcoming, 131 S. Ct. at 2714 n.6 ("To rank as
'testimonial,' a statement must have a primary purpose of
establishing or proving past events potentially relevant to later
criminal prosecution." (internal quotation marks and brackets
omitted)); Melendez-Diaz, 557 U.S. at 324 (noting that business
record "having been created for the administration of an entity's
affairs and not for the purpose of establishing or proving some
fact at trial . . . are not testimonial").20
Also, Lee testified that the Yahoo! reports
electronically transmitted to NCMEC comprise the same image
archives captured by a customer care employee (along with stored
account information gathered with the archive); the only difference
20
The "primary purpose" inquiry of the statement's "testimonial"
nature focuses on the declarant's purpose in making the statement.
See Davis v. Washington, 547 U.S. 813, 822-23 n.1, 826-28 (2006).
-77-
is that any images that the Yahoo! legal department employee does
not suspect as containing child pornography are not included in the
report. Thus, the location link between the images and the user's
account is simply memorialized by an administrative process when
the archive is created, which is simply repeated in the Yahoo!
report sent to NCMEC. Then, a Yahoo! report receipt is
automatically generated via computer, including the sequential list
of numeric "Legal Archive Tool" image names.
I disagree with the majority's conclusion that the Yahoo!
reports are distinct from the other documents targeted by the
defendant in this case, such as the Account Management Tool,
because "they convey an analysis that was performed using pre-
existing data" and make "an entirely new statement reflecting []
conclusions" drawn from such an "analysis." I suppose that this
could be the case if the government were using the Yahoo! reports
for the truth of an assertion that the images in fact were child
pornography or suspected child pornography. But, as I began, the
government did nothing of the sort. The conveyance of any analysis
that a Yahoo! employee performed to deem some images in certain
user photo albums to be suspect was not the purpose of the
exhibits' admission. And, I might add, it is the purported
location statement -- linking the images (and other stored data) to
the identified user name and the associated IP address -- to which
this appellant objects. The record reflects that the location
-78-
connection was not generated by a forensic analysis performed to
produce substantive evidence at a criminal trial in the manner that
was central to the testimonial nature of the certification reports
in both Melendez-Diaz and Bullcoming.
The majority emphasizes that (1) the retrieval process
for the digital images in this case began once Yahoo! received a
tip associating images of child pornography with a particular
user's account, (2) the particular Yahoo! reports at issue were
generated as part of a process that Yahoo! developed to comply with
its legal duty to report any apparent violation of federal child
pornography laws to NCMEC, (3) the reports were delivered to NCMEC,
which operates, in part, as a type of clearinghouse for ISP reports
to law enforcement regarding suspected child pornography, and (4)
the actual Yahoo! report documents (the receipts) did not exist
before the discovery of the suspected criminal activity. These
circumstances do not alter the conclusion that the putative
statement that there is a location connection between user and
stored data (including digital images and information relating to
the Account Management Tool or the Login Tracker) pre-existed any
customer complaint or other event that would trigger the retrieval
of such data, and the process for retrieving the various stored
data is not performed through a forensic analysis engaged in to
produce substantive evidence at a criminal trial. And, as I have
explained, any new statement about the content of the images
-79-
containing suspected child pornography was not offered for the
truth of the matter asserted.
In summary, while I agree with the majority that evidence
does not escape testimonial hearsay status under the Confrontation
Clause simply because it may otherwise bear the characteristics of
a business record, I do not believe that the location link
displayed in the Yahoo! reports amounts to a testimonial statement
under current Supreme Court precedent or under our own cases. I
disagree with the appellant that the holdings in Melendez-Diaz and
Bullcoming compel a conclusion that admission of the various
"accompanying reports" -- which he labels as "computer forensic
evidence" -- required an opportunity to cross-examine the person(s)
who actually located the stored digital images and created a
corresponding archive associated with each user name photo album.21
And, I see nothing in the most recent Supreme Court discourse on
the Confrontation Clause to alter my view on the import of
Melendez-Diaz and Bullcoming holdings under the facts of this
record. See generally Williams, 132 S. Ct. 2221..
21
The defendant also suggests in his brief that his Sixth
Amendment concerns would have been allayed had the government
presented live testimony of a Yahoo! computer technician to explain
and verify the accuracy of the company's software tools used to
retrieve the digital images and account data. This tack, however,
essentially concedes that the reports contain no witness testimony
whatsoever and reduces his argument to one of authentication. If
this is the appellant's strategy, then the majority's footnote
remark about Rule 803(6) probably suffices for the Yahoo! reports
as well. In the end, though, I make no judgment on authentication
because the issue before us is confined to the Sixth Amendment.
-80-
I respectfully dissent from the majority's conclusion
that admission of the Yahoo! reports and NCMEC CyberTipline
reports22 violated Cameron's rights under the Confrontation Clause,
and so I would affirm the appellant's conviction on all counts.
22
With respect to the NCMEC CyberTipline reports, the majority
concludes that the government appeared to rely on these documents
as the sole evidence establishing the upload dates and times of the
illegal images (the so-called "Image Upload Data"). The majority
also appears to assess the record evidence to determine whether the
government appropriately established through this NCMEC evidence
the transporting-by-uploading element charged in the indictment.
There is no need to consider these issues because the timing of
image uploading is not part of the appellant's Sixth Amendment
argument. There is also no need for me to separately analyze
whether the NCMEC CyberTipline reports contain a testimonial
statement that was offered for the truth of the matter asserted.
For present purposes I take the government at its word that such
evidence essentially parroted the substance of the Yahoo! reports.
Again, I note that the defendant makes no attempt to parse the two
types of documents when advancing his Sixth Amendment plaint.
-81-