United States Court of Appeals
For the First Circuit
No. 12-1639
UNITED STATES OF AMERICA,
Appellee,
v.
BRIAN K. ROGERS,
Defendant, Appellant.
APPEAL FROM THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF MAINE
[Hon. George Z. Singal, U.S. District Judge]
Before
Lynch, Chief Judge,
Stahl and Thompson, Circuit Judges.
Robert C. Andrews for appellant.
Margaret D. McGaughey, Assistant United States Attorney, with
whom Thomas E. Delahanty II, United States Attorney, was on brief,
for appellee.
April 30, 2013
STAHL, Circuit Judge. Brian Rogers was convicted by a
jury in the District of Maine of possessing child pornography in
violation of 18 U.S.C. § 2252A(a)(5)(B). Rogers now appeals his
conviction, arguing that the government did not prove that he
knowingly possessed the child pornography that was found on a
laptop he sold to a pawn shop. Rogers also challenges the district
court's award of $3,150 in restitution to a victim depicted in the
pornography; he asserts that the government failed to establish a
causal connection between his conduct and any harm to the victim.
After careful consideration, we affirm both the conviction and the
restitution award.
I. Facts & Background
The following facts are drawn from the trial record and,
in light of Rogers's challenge to the sufficiency of the evidence
supporting his conviction, are presented in the light most
favorable to the jury verdict. United States v. Valerio, 676 F.3d
237, 240-41 (1st Cir. 2012).
On July 15, 2008, Rogers's then-wife, Heather Rogers,
sold a laptop computer to Coastal Trading and Pawn in Brunswick,
Maine. Later that day, she returned with Rogers himself, who sold
a second laptop to the store. In keeping with Coastal Trading's
usual practice, the clerk asked for, and received, the passwords to
both laptops, to allow the store's staff to access the computers
and restore them to their factory settings.
-2-
The next day, Coastal Trading's computer technician began
the process of preparing the second laptop for resale. He turned
it on and entered the password that Rogers had provided. In an
effort to find the program that would restore the laptop to its
factory settings, he looked in the Windows recycle bin. There, he
discovered a video file captioned "My 15-Year Old Sister." This
discovery prompted him to search the laptop for other videos; he
found "quite a few" more. He viewed portions of a few videos and
saw "[y]oung children involved in sexual acts." He immediately
notified the store manager, who called the Brunswick police.
A few days later, Brunswick Detective William Moir
collected the laptop and the associated sales paperwork from
Coastal Trading and took them to the police station. Until Moir
came to collect it, the laptop remained in the store's back room,
and no one accessed it. Moir, who had specialized electronic
forensics training, removed the laptop's hard drive and attached it
to a "write blocker," which allowed him to view the drive's
contents without altering them. After finding some files with
names "indicative of child pornography," he took the drive to the
Maine State Police Computer Crimes Unit for further analysis.
There, he worked with an analyst to copy and review the contents of
the drive. They found both videos and still images of children
engaged in sex acts.
-3-
Detective Moir soon returned to Coastal Trading and
seized the laptop that Heather Rogers had sold to the store on her
first visit. Nothing of significance was found on that first
computer. Moir then obtained a search warrant for Rogers's home,
which he and other law enforcement officers executed on July 31.
Heather Rogers was there when they arrived; Brian Rogers returned
home during the search. When the officers came upon a desktop
computer and a case containing compact discs, they seized both.
The hard drive of the second laptop -- the one on which
the store employees initially found child pornography -- was
subsequently subjected to a more comprehensive forensic inspection.
Chris Hull, an analyst with the Computer Crimes Unit, used forensic
software to examine the hard drive's contents. He found two user
accounts on the drive: an account called "Mingan" (also designated
"Admin") and a default "guest" account. He also found six child
pornography videos in a "shared" folder associated with the
"Mingan" user account, and still images depicting child pornography
in the "Temporary Internet Files" and "lost files" folders. The
shared folder was created by LimeWire, a peer-to-peer file-sharing
program that Hull found in the recycle bin. The Temporary Internet
Files folder, as Hull testified at trial, stores files from
frequently visited websites that otherwise would have to be loaded
remotely, with the goal of speeding up the user's web browsing
experience.
-4-
Hull also examined the "index.dat" file, which records
the computer user's activity, whether it be visiting websites or
opening files on the computer itself. The index file reflected
numerous visits to websites like "nymphets-first-time-sex.com"
(which was also bookmarked in the laptop's default web browser,
along with "Natural Lolitas" and "innocent-girl.com."). And Hull
found "cookies" (widely used data packets that allow websites to
recognize returning users1) from various websites, including "son-
porno-schoolgirls," a Yahoo user account called "Brian87_2006," and
the social networking site Myspace (which appeared to be associated
with the same login information as the Yahoo account). Indeed,
Detective Moir found a Myspace page for a user called "Mingan"; one
of the account's three Myspace "friends" was Heather Rogers, Brian
Rogers's wife. As it happens, Hull determined that the password
for the user account "Mingan" on the laptop was "Heather," and the
password hint associated with that account was "My baby."
Additionally, Hull found ten "infections," i.e., malware
programs, on the laptop. To determine whether they might be
responsible for the presence of child pornography, he installed the
same infections on a test machine that replicated the conditions on
the laptop and let them run for a week. No child pornography
appeared on the test machine.
1
See In re Pharmatrak, Inc., 329 F.3d 9, 14 (1st Cir.
2003) (describing cookies).
-5-
Hull examined the desktop computer seized from Rogers's
home as well. Using the same forensic tools he used on the laptop,
he uncovered child pornography images. These files were located in
unallocated space, indicating that the files had been deleted by a
user but not yet overwritten with new data. He also found two user
accounts on the desktop: "Bunny" and "NEXCOM," the latter of which
was also captioned "Mingan." Associated with the latter account
were internet bookmarks for websites like "LolitasBBS-freeware" and
"nasty-virgins.org."
On October 22, 2008, a grand jury indicted Rogers on one
count of possessing child pornography in violation of 18 U.S.C.
§§ 2252A(a)(5)(B), 2256(8)(A).2 After rulings by both the district
court and this court related to the suppression of certain
statements Rogers made during the search of his house, see United
States v. Rogers, 659 F.3d 74 (1st Cir. 2011), the case went to
trial. The jury, after hearing testimony about all the events
related above, found Rogers guilty. The district court sentenced
Rogers to sixty months' imprisonment and eight years' supervised
release. As discussed in more detail below, the district court
2
Rogers was charged with possessing the child pornography
found on the laptop, but not the images found on the desktop. At
trial, he objected to testimony regarding the desktop computer on
the ground that it was other-bad-acts evidence under Federal Rule
of Evidence 404(b). The district judge allowed the testimony on
the ground that it went to intent, knowledge, or absence of
mistake, see Fed. R. Evid. 404(b)(2), and gave a cautionary
instruction to the jury. Rogers has not renewed his evidentiary
argument on appeal.
-6-
also ordered Rogers to pay $3,150 in restitution to "Vicky," a
woman who was depicted in some of the child pornography materials
found on the laptop.
II. Analysis
A. Sufficiency of the Evidence
A sufficiency-of-the-evidence challenge to a jury's
guilty verdict will not succeed unless no rational jury could have
concluded that the government proved all of the essential elements
of the offense beyond a reasonable doubt. United States v. Green,
698 F.3d 48, 56 (1st Cir. 2012). As noted above, we evaluate the
facts and draw all reasonable inferences in favor of the verdict.
Id. We do not weigh evidence or assess credibility. United States
v. Tavares, 705 F.3d 4, 18 (1st Cir. 2013).
18 U.S.C. § 2252A(a)(5)(B) creates criminal penalties for
any person who "knowingly possesses, or knowingly accesses with
intent to view, any . . . computer disk, or any other material that
contains an image of child pornography" that was produced or
transported in interstate commerce, including via computer. Here,
it is undisputed that the images found on the laptop constituted
child pornography and that the interstate commerce element was
satisfied. Rogers's challenge focuses instead on the question of
knowing possession. To satisfy the statute's knowing-possession
requirement, the government must show that Rogers possessed, and
knew he possessed, child pornography. See United States v.
-7-
X-Citement Video, Inc., 513 U.S. 64, 78 (1994); United States v.
Hilton, 167 F.3d 61, 75 (1st Cir. 1999), disapproved of on other
grounds by Ashcroft v. Free Speech Coal., 535 U.S. 234 (2002).
To begin with, there can be no serious dispute that the
child pornography found on the laptop was downloaded knowingly and
deliberately. The web browser's cookies and indexed history
indicated that someone had used the browser to make numerous visits
to websites related to, or with names indicative of, child
pornography, including "nymphets-first-time-sex.com," "Natural
Lolitas," and "innocent-girl.com." See United States v. Pruitt,
638 F.3d 763, 767 (11th Cir. 2011) (conviction was supported by "a
record of visits to websites with a child-pornography connection");
accord United States v. Ramos, 685 F.3d 120, 132 (2d Cir. 2012);
United States v. Kain, 589 F.3d 945, 949 (8th Cir. 2009). Further,
the discovery of child pornography in the Temporary Internet Files
folder suggests that those images were downloaded when a user
visited websites hosting them. Cf. Kain, 589 F.3d at 948. And, as
the government observes, the fact that a user bookmarked some of
these websites supports the conclusion that they were visited
deliberately. Cf. United States v. Kornhauser, No. 12-135-CR L,
2013 WL 1197751, at *2 (2d Cir. Mar. 26, 2013) (summary
affirmance); United States v. McNealy, 625 F.3d 858, 870 (5th Cir.
2010).
-8-
To be sure, we must be cognizant of "the prevalence and
sophistication of some computer viruses and hackers that can prey
upon innocent computer users" by placing child pornography on their
machines, but "the specter of spam, viruses, and hackers must not
prevent the conviction of the truly guilty." Pruitt, 638 F.3d at
766-67. Here, Hull's forensic analysis of the computer, which
included running the malware "infections" discovered on the laptop
on a test machine for over a week, all but ruled out the
possibility that the images had been downloaded by a virus without
the user's knowledge. And child pornography (along with a similar
pattern of web browsing) was found on the desktop computer seized
from Rogers's home, further diminishing the possibility that the
presence of the images and videos on the laptop was inadvertent.
Lastly, some of the files were found in the laptop's recycle bin,
suggesting that someone deliberately attempted to delete them (and
thus knew they had been downloaded). See Ramos, 685 F.3d at 132;
United States v. Bass, 411 F.3d 1198, 1202 (10th Cir. 2005). On
this record, there is no real possibility that this case involved
unknowing possession. Cf. Note, Child Pornography, the Internet,
and the Challenge of Updating Statutory Terms, 122 Harv. L. Rev.
2206, 2211-14 (2009) (describing ways that a person could
unintentionally possess or receive child pornography).3
3
There was also no testimony realistically suggesting that
the images could have been downloaded or installed after Rogers
sold the laptop to Coastal Trading. The pawn shop's employees and
-9-
The only remaining question is whether the government
proved that the person who knowingly possessed the images and
videos was Rogers himself. We think it did. The user account
"Mingan," which was the only user-created account on the laptop,
was strongly associated with Rogers, and child pornography videos
were found in the shared folder associated with that user account.
The password hint for the "Mingan" account was "My baby" and the
password itself was Rogers's wife's name (Heather). Rogers himself
provided this password to Coastal Trading when he sold the laptop,
and has not pointed to evidence suggesting that anyone else knew
it. Further, Detective Moir discovered a Myspace profile named
"Mingan," one of whose Myspace friends was Heather Rogers. The
Myspace profile appeared to share login information with a Yahoo
account that the laptop had been used to access: Brian87_2006.
Brian, of course, is Rogers's name, and he was born in 1987. See
United States v. Boll, 635 F.3d 340, 341 (8th Cir. 2011) (the fact
that a computer was registered to "Terry," the defendant's first
name, supported the conclusion that he knowingly possessed child
pornography found on it); United States v. Koch, 625 F.3d 470, 478
(8th Cir. 2010) (conviction was supported by the fact that "user
all the law enforcement personnel who handled the laptop testified
that the computer was not altered in any way after Rogers left it
at the store. Further, the laptop's operating system indicated
that the child pornography files had been created well before
Rogers sold the computer to Coastal Trading (although, as Rogers
points out, such information is not impervious to manipulation).
-10-
names on both the computer and flash drive [on which child
pornography were found] were variations on [the defendant's] first
name"). The web browser's cookies showed access to the same Yahoo
account, along with visits to the disturbingly named websites
discussed above. The web browser also included a bookmark for the
U.S. Navy's website; Rogers was a member of the Navy at the time of
his arrest.4
In light of all this evidence, and the reasonable
inferences that can be drawn from it, we think the jury's decision
to convict was wholly rational. The evidence amply established
that Rogers possessed and used the laptop, and supported the
reasonable inference that he was the one who searched for and
knowingly downloaded the child pornography. Rogers's suggestions
that someone else somehow downloaded or placed the images and
videos on the laptop are simply not supported by any evidence
adduced at trial. Hull's testimony all but extinguished the
possibility that a virus put the images and videos there, and there
4
Less forceful is the government's suggestion that Rogers
must have been the laptop's user because it contained computer
games with "pugilistic" names like "Dungeons and Dragons" and
"World of Warcraft," which the government says are not "games that
might appeal to a female," i.e., Heather Rogers. As best we can
tell, this argument is simply based on outmoded assumptions about
what sort of entertainment appeals to women. See Nick Breckon,
Nielsen Estimates 400,000+ Female World of Warcraft Players in US,
Shack News (Apr. 8, 2009 2:27 p.m.), http://www.shacknews.com/
article/58076/nielsen-estimates-400000-female-world (last visited
Apr. 25, 2013) (reporting that a Nielsen Company survey found
428,621 female World of Warcraft players in the United States).
-11-
was no suggestion that a third party could have done it after
Rogers sold the laptop. Nor was there any testimony that, before
the computer's sale, anyone other than Brian and Heather Rogers had
access to it (assuming that she even knew the password, which is
certainly possible but is not established by any evidence in the
record). Thus constrained, Rogers is forced to posit that his now-
ex-wife was responsible for the child pornography found on the
laptop, but that assertion finds essentially no support in the
record, and the jury was entitled to dismiss it. Consequently, we
reject Rogers's challenge to the sufficiency of the evidence
supporting his conviction. Cf. United States v. Salva-Morales, 660
F.3d 72, 75 (1st Cir. 2011) (per curiam).
B. Restitution
The district court ordered Rogers to pay $3,150 in
restitution to "Vicky," a woman whose abuse at the hands of her
father at age ten or eleven was depicted in two minutes of video
found on the laptop. The order was made pursuant to 18 U.S.C.
§ 2259, which prescribes a mandatory restitution scheme for victims
of certain crimes, including the possession, transportation, or
distribution of child pornography. The statute calls for
restitution of "the full amount of the victim's losses," including
medical services; therapy or rehabilitation; transportation,
housing, or child care costs; lost income; attorneys' fees and
costs; and "any other losses suffered by the victim as a proximate
-12-
result of the offense." Id. § 2259(b)(1), (3). The "victim" is
"the individual harmed as a result of a commission of a crime."
Id. § 2259(c).
We first considered restitution to a child pornography
victim under § 2259 in United States v. Kearney, 672 F.3d 81 (1st
Cir. 2012), cert. dismissed, 133 S. Ct. 1521 (2013), which also
involved restitution to Vicky.5 In Kearney, we identified three
issues related to the restitution inquiry: (1) whether someone is
a victim of a child pornography offense; (2) what causation
requirement applies to identify the compensable losses suffered by
the victim as a result of the offense; and (3) what amount of
restitution is reasonable. Id. at 93. We held that Vicky was
plainly a victim of Kearney's crime because she was harmed by the
continuing possession and dissemination of child pornography
containing her image, which he perpetuated. Id. at 94. As to
causation, we joined a number of other circuits in applying a
proximate causation standard (although the circuits' applications
of that standard have varied), and found "that the proximate cause
requirement was satisfied here, because Kearney's actions resulted
in identifiable losses as outlined in the expert reports and
Vicky's victim impact statements." Id. at 99-100. Finally, we
upheld the district court's award of $3,800 as reasonable. We
5
Unfortunately, video of Vicky's abuse has been widely
disseminated online, leading to numerous child pornography cases in
which material depicting her has played a role.
-13-
found no error in the district court's decision to base the
restitution award on amounts that Vicky had received in other
cases, and we noted that "the restitution award was small, both in
absolute terms and as a proportion of the total amount of the
restitution request," id. at 101, which came to $226,546.10, id. at
86.
Having sketched the terrain, we turn to the restitution
award in this case. "We review orders of restitution for abuse of
discretion, reviewing legal questions de novo and subsidiary
findings of fact for clear error." Id. at 91. Here, our analysis
is straightforward. As Rogers's counsel acknowledged at oral
argument, Vicky's restitution request in this case was supported by
precisely the same set of materials that she submitted in Kearney:
"affidavits and a letter provided by Vicky's attorney, with
attached documentation." Id. at 85. Here, as in Kearney, those
materials amply established "that Vicky has suffered immensely
. . . from the continued dissemination and viewing of" material
depicting her abuse. Id. Given that the underlying crimes in the
two cases are similar, that the materials supporting the
restitution requests are identical, and that there is no evidence
that Vicky has been made whole, we see no basis to reach a result
here that differs from the one we reached in Kearney. Certainly,
Rogers cannot show that the district court abused its discretion by
-14-
ordering him to pay slightly less than Kearney had to pay on such
a similar record.
Indeed, rather than asserting that this case is
materially different from Kearney,6 Rogers devotes much of his
energy to arguing that we should have adopted a stricter causation-
of-harm standard like that employed by some other courts. E.g.,
United States v. McGarity, 669 F.3d 1218, 1269-70 (11th Cir.),
cert. denied, 133 S. Ct. 374 (2012). But Kearney remains binding
on us. United States v. Troy, 618 F.3d 27, 35 (1st Cir. 2010); see
also United States v. Chiaradio, 684 F.3d 265, 284 (1st Cir. 2012)
(applying Kearney). We acknowledge that Kearney left unanswered
some questions about how the restitution analysis works; for
example, the district court and the attorneys in this case wrestled
conscientiously with the question of how to settle on a precise
amount to award the victim. Future cases may call for further
refinement of the causation and reasonableness inquiries. But this
case, which Rogers has not seriously attempted to distinguish from
Kearney, does not. Consequently, we affirm the district court's
award of $3,150 in restitution.
III. Conclusion
For the foregoing reasons, we affirm Rogers's conviction
and the district court's restitution award.
6
For example, Rogers does not attempt to distinguish the
notice of his offense that Vicky's attorney received in this case
from the notice given in Kearney. See 672 F.3d at 85 & n.4, 100.
-15-