Erik Hentzen v. United States

NOT RECOMMENDED FOR PUBLICATION File Name: 23a0522n.06 No. 22-5573 UNITED STATES COURT OF APPEALS FILED Dec 13, 2023 FOR THE SIXTH CIRCUIT KELLY L. STEPHENS, Clerk ) ERIK HENTZEN, ) Petitioner-Appellant, ) ON APPEAL FROM THE UNITED ) STATES DISTRICT COURT FOR v. ) THE EASTERN DISTRICT OF ) KENTUCKY UNITED STATES OF AMERICA, ) ) OPINION Respondent-Appellee. ) Before: BOGGS, SUHRHEINRICH, and READLER, Circuit Judges. BOGGS, Circuit Judge. Erik Hentzen was convicted of receipt and possession of child pornography, in violation of 18 U.S.C. § 2252(a)(2) and 18 U.S.C. § 2252(a)(4)(B), and was sentenced to 20 years in prison. Hentzen then appealed to this court, arguing that the prosecution presented insufficient evidence to convict and that the admission of a “grooming” video was improper. United States v. Hentzen, 638 F. App’x 427 (6th Cir. 2015) (“Hentzen I”). Finding that the body of evidence showed that Hentzen affirmatively sought out child pornography and the admission of the video was harmless error, this court affirmed the judgment and sentence of the district court. Id. at 427-35. Hentzen filed a timely motion to vacate his conviction and sentence under 28 U.S.C. § 2255, asserting that his trial counsel was ineffective for failing to obtain and prepare qualified expert testimony to expose inaccuracies in, and otherwise contest, the government’s computer-forensics evidence. A magistrate judge recommended that Hentzen’s 28 U.S.C. § 2255 No. 22-5573, Hentzen v. United States be denied and the district court adopted the findings. Hentzen filed a timely notice of appeal, asking this court to issue a certificate of appealability (COA). (Hentzen v. United States, No. 18-6168 (“Hentzen II”) Order at 1-2). We granted Hentzen relief as to some of his ineffective- assistance-of-counsel claims, namely (1) his failure to obtain and prepare a competent expert, (2) ineffective assistance of trial counsel at the sentencing hearing, and (3) ineffective assistance of Appellate counsel claims. Ibid. The United States then moved to reverse the district court’s denial of Hentzen’s motion to vacate and to remand the case to the district court, as he was entitled to an evidentiary hearing with respect to the claims allowed by the COA. Hentzen II, 2019 U.S. App. LEXIS 14831, at *1 (6th Cir. May 17, 2019). This court vacated the district court’s judgment and remanded the matter. Id. at *2-3. In August 2021, a two-day evidentiary hearing was held. The court heard testimony from, among others, Dr. Andrew Cobb, a former University of Louisville professor, about the computer- forensics examination of Hentzen’s computers and computer-related devices. Dr. Cobb opined that the investigators breached universally accepted procedures of computer forensics and analysis at the time Hentzen’s equipment was seized and that the court heard inaccurate testimony with respect to how certain features of the Windows XP operating system functioned. Hentzen himself also testified during the evidentiary hearing about his trial counsel’s representation of him and the evidence. Additionally, Kentucky Attorney General’s Office Cyber Crimes Unit Forensic Examiner and Detective Michael Littrell also testified regarding certain “triage” procedures conducted on Hentzen’s equipment at the time of seizure. He opined that the time stamps found on Hentzen’s files that post-dated seizure were the result of the triage software used at the time Hentzen’s computers and computer devices were seized. -2- No. 22-5573, Hentzen v. United States In February 2022, Magistrate Judge Ingram issued a comprehensive Report and Recommendation, recommending denial of Hentzen’s motion to vacate on his three remaining grounds: (1) his ineffective-assistance-of-trial-counsel’s failure to obtain and prepare a competent expert, (2) his ineffective-assistance-of-trial-counsel at allocution at sentencing, and (3) his ineffective-assistance-of-appellate-counsel at sentencing claims. Magistrate Judge Ingram, however, also recommended the issuance of a COA only as to the first ground—Hentzen’s ineffective-assistance-of-trial-counsel counsel claim—finding that reasonable jurists could find that Hentzen was prejudiced. The district court subsequently entered judgment in favor of the United States. Hentzen now appeals, asserting that his trial counsel failed to provide him constitutionally adequate assistance of counsel as to the presentation of expert testimony regarding the computer- forensic evidence. Hentzen has failed to establish that his trial counsel’s performance was either deficient or prejudicial, and we affirm. I. BACKGROUND A. Hentzen I In 2014, a jury convicted Erik Hentzen of knowing receipt and possession of child pornography and he was sentenced to 240 months in prison. At the time, he was a 25-year-old student at the University of Kentucky. Hentzen I, 638 F. App’x at 428. Hentzen had a keen interest in computers, possessing seven computers and seventeen other computer-related devices capable of storing a combined seventeen terabytes of digital data. He also avidly downloaded and collected internet files including music, videos, and pornography using peer-to-peer networks like eDonkey. Ibid. To access eDonkey, Hentzen used a software client called eMule. -3- No. 22-5573, Hentzen v. United States The Kentucky Attorney General’s Cyber Crime Unit surveils peer-to-peer networks, including eDonkey, for the distribution of child pornography. To surveil these networks, the Unit uses remote forensics tools, including an automatic software that searches networks for common keywords associated with child pornography. When a computer shares files containing those keywords, the IP address of the computer and the hash values of the files are documented. A hash value is a unique digital fingerprint for each file that the Unit can use to identify files that match those of known child pornography. Between September and November of 2012, an agent detected many child-pornography files being shared by a single IP address on an unsecured internet router in Hentzen’s apartment building. These files were traced to a laptop in Hentzen’s apartment. In March 2013, state law-enforcement officials executed a search warrant at Hentzen’s apartment. Among the state law-enforcement officials were also computer-forensics experts with the Kentucky Attorney General’s Office Cyber Crimes Branch, including investigator Thomas Bell. Investigators testified that they found “the largest collection of computer equipment” they had seen in executing over 200 warrants. A total of seven computers, multiple external hard drives, and USB storage devices were seized from Hentzen’s home. Investigators examined the devices on the scene and conducted a preliminary review of a laptop. The laptop’s IP address matched the IP address that had previously been identified as downloading known child-pornography files prior to the execution of the search warrant. When investigators opened the laptop, it was running and showed all active downloads and uploads at the time. Recent and current downloads visible on Hentzen’s computer screen included files with keywords that were clearly associated with child pornography. Hentzen was subsequently arrested. -4- No. 22-5573, Hentzen v. United States Hentzen’s computers and computer devices were submitted to forensic examination and were found to contain child pornography. Investigators found a total of 1,348 child-pornography images and 4,144 child-pornography videos on Hentzen’s laptop. An additional 4,006 images and 2,461 videos, all believed to contain representations of child sexual abuse, were also located in a deleted state or stored within unallocated space, indicating that these files had been deleted or moved to another storage device. Further, investigators discovered a digital catalogue for commercial-grade child pornography and child-sexual-abuse images and videos for sale and multiple videos of animated child pornography depicting children engaging in sexual activity with adult men. Videos relating to exactly how to molest a child and how to “groom” a child into participating in abusive activities, as well as videos and images depicting bondage, torture, sado- masochistic behavior, and bestiality involving children were also contained within Hentzen’s devices. All the evidence above was presented at trial. The only contested issue at trial was whether Hentzen knew that the child-pornography files that had been found on his computer were, in fact, child pornography when he downloaded and possessed them. Hentzen I, 638 F. App’x at 429. The government presented a document detailing his last 30 searches on eMule as evidence that Hentzen knew that he was downloading child pornography. This document contained several known keyword terms pertaining to child sexual abuse and pornography, all entered individually. The government also presented evidence that two still images had been opened on an internet browser and some files had been opened using a view that shows the thumbnails of videos and images. The government introduced into evidence several examples of the files that were found on Hentzen’s computer, including the catalogue and nine child-pornography videos, portions of which were played for the jury. These included a video -5- No. 22-5573, Hentzen v. United States depicting a girl forced to engage in sexual activity with an animal as well as recordings of adult men sexually abusing young girls and, in one video, an infant. Hentzen testified on his own behalf, asserting that he did not know that the files he was downloading were child pornography. Hentzen I, 638 F. App’x at 429-30. He testified that the files were on his computer through two different ways: (1) as a result of his side business of fixing his friends’ computers in which he would copy all their media files onto his hard drives, or (2) because of his habit of searching the internet and batch downloading the top searches of the day. Hentzen explained that he developed a text file of all possible pornography keywords and would copy those keywords into the eMule search box and download any files that the program told him he did not already have. Hentzen maintained that he would generally not look at the names of the files, but rather the size of the file and how quickly it could download onto his computer. Using this batch downloading method, Hentzen testified that he downloaded at least 100,000 media files and had not watched most of them. Upon downloading the files, Hentzen would immediately open 25 different files at once to see if the files prompted an alert that they contained a virus or were otherwise corrupted. He testified that he would then move the uncorrupted files into a new labeled folder. If a folder was automatically created by the downloading software for a group of files, Hentzen would search for other files with that keyword and place them together in that folder. The government presented rebuttal testimony from William Baker, investigating forensic examiner and investigations manager for the Cyber Crimes Unit at the Kentucky Attorney General’s Office, regarding the files that were actively downloading when Hentzen’s computer was seized. Baker testified that, for some of the child-pornography files, there was no evidence that any other downloads had begun during the downloading process for those files found actively -6- No. 22-5573, Hentzen v. United States downloading on Hentzen’s computer at the start of the seizure. Additionally, the forensic examiner noted that the still-downloading files had been downloaded individually. After hearing the evidence, a jury convicted Hentzen. Hentzen I, 638 F. App’x at 430-31. He received a below-Guidelines sentence of 240 months of imprisonment. Ibid. Hentzen appealed, contesting the sufficiency of the evidence supporting his conviction, but this court affirmed. Id. at 431-37. B. Hentzen II Hentzen then filed a timely motion to vacate his conviction and sentence under 28 U.S.C. § 2255. Hentzen II, 2019 U.S. App. LEXIS 14831, at *1. Among other things, Hentzen argued that his counsel was ineffective because his defense attorney failed to obtain and prepare qualified- expert testimony to expose alleged inaccuracies in, and otherwise contest, the government’s use of computer evidence. Id. at *3. To support his claim, Hentzen submitted an affidavit from Andrew Cobb, Ph.D., a forensic examiner and partner at One Source Discovery. Hentzen II, No. 18-6168 Order at 5. Ultimately, this court vacated and remanded the case to the district court so that an evidentiary hearing may be held. Hentzen II, 2019 U.S. App. LEXIS 14831, at *1. In his affidavit, Dr. Cobb reviewed the evidence and averred that the Kentucky Attorney General’s investigators “breached universally accepted procedures” of computer-forensic data collection and analysis. Hentzen II, No. 18-6168 Order at 5. He argued that this compromised the integrity of the evidence after Hentzen’s hard drives were taken into custody, “call[ing] into question the quality of the evidence, and all findings and opinions based on such evidence.” Dr. Cobb also averred that examiner William Baker provided false testimony about certain features of the Windows XP Operating System, namely the creation and existence of “shortcut evidence,” such as .lnk and thumbs.db files, on Hentzen’s devices. Dr. Cobb contends that the government -7- No. 22-5573, Hentzen v. United States used this piece of evidence to persuade the jury of Hentzen’s guilt. Ibid. Hentzen argued that his counsel’s failure to mitigate the government’s “shortcut evidence” with evidence akin to Dr. Cobb’s findings was “fatal” to his case. Hentzen also argued that trial counsel was ineffective because he failed to obtain a “more reliable, competent, and persuasive” computer-forensics expert. Hentzen II, No. 18-6168 Order at 6. Hentzen contends that Brian Ingram, the forensics expert that his counsel retained, was “grossly inadequate” and compromised his counsel’s ability to formulate sound trial strategy. This court rejected Hentzen’s argument that trial counsel was ineffective because of a failure to obtain a “more” competent expert. Explaining that the selection of a trial expert is a “paradigmatic example” of a “virtually unchallengeable” strategic choice, Hentzen had accordingly failed to demonstrate a reasonable probability that the outcome of his trial would have been different had counsel consulted another expert. We noted that counsel’s investigation was thorough; he contacted several computer-forensics entities in search of a competent expert for Hentzen’s case, a fact Hentzen himself admitted. Further, Hentzen noted that, after determining that Mr. Ingram’s expertise was insufficient, counsel sought and retained another expert for the defense, Emmanuel Kressel. We concluded that, apart from mere speculation, Hentzen had failed to demonstrate a reasonable probability that the outcome of his trial would have been different had counsel retained a different, “more competent” expert. With respect to Hentzen’s “shortcut evidence” claim, however, this court remanded the issue for further proceedings. Explaining that this ineffective-assistance-of-counsel claim relied on off-the-record conversations between Hentzen and his counsel, Hentzen should be afforded an evidentiary hearing. Id. at 7. The court further noted that Hentzen had already met the burden for an evidentiary hearing through his § 2255 petition and affidavit. Because reasonable jurists could -8- No. 22-5573, Hentzen v. United States debate whether Hentzen is entitled to an evidentiary hearing, the court explained that, logically, this would also mean that reasonable jurists could debate having resolved of Hentzen’s “shortcut evidence” claim without such an evidentiary hearing. On remand, the district court considered whether trial counsel was ineffective for failing to obtain and prepare qualified-expert testimony to expose inaccuracies in, and otherwise contest, the government’s computer-forensics evidence. Following an evidentiary hearing, a magistrate judge recommended denying the motion to vacate but issuing a certificate of appealability (COA) for only this ground due to the fact-intensive nature of the inquiry. The district court agreed and adopted the magistrate judge’s recommendation, denied the motion, and issued a COA. In issuing the COA, the district court noted that the question is very fact-intensive and reasonable jurists could debate whether Hentzen was prejudiced by the failure to introduce evidence as described by Dr. Cobb. Hentzen appeals. II. ANALYSIS A defendant must make two showings to succeed on an ineffective-assistance-of-trial- counsel claim. First, he must show that counsel’s performance “fell below an objective standard of reasonableness.” Strickland v. Washington, 466 U.S. 668, 687–88 (1984). This means that “counsel made errors so serious that counsel was not functioning as the ‘counsel’ guaranteed the defendant by the Sixth Amendment.” Id. at 687. When reviewing counsel’s performance, we “indulge a strong presumption” that, “under the circumstances, the challenged action ‘might be considered sound trial strategy.’” Id. at 689 (citation omitted). Disagreement over trial strategy is not a basis for ineffective assistance of counsel. Ibid. In particular, “strategic choices made after thorough investigation of law and facts relevant to plausible options are virtually unchallengeable.” Id. at 690. This standard is extremely -9- No. 22-5573, Hentzen v. United States deferential, as counsel is “strongly presumed to have rendered adequate assistance and made all significant decisions in the exercise of reasonable professional judgment.” Ibid. The inquiry involves eliminating “the distorting effects of hindsight . . . to evaluate the conduct from counsel’s perspective at the time.” Id. at 689. Second, the defendant must establish that counsel’s “deficient performance prejudiced the defense.” Id. at 687. For counsel’s error to be prejudicial, “[i]t is not enough… that [it] had some conceivable effect on the outcome of the proceeding.” Id. at 693. Instead, there must be a “reasonable probability that, but for counsel’s unprofessional errors, the result of the proceeding would have been different.” Id. at 694. A reasonable probability is a “probability sufficient to undermine confidence in the outcome.” Ibid. Counsel must have engaged in errors “so serious as to deprive the defendant of a fair trial, a trial whose result is reliable.” Id. at 687. “An error by counsel, even if professionally unreasonable, does not warrant setting aside the judgment of a criminal proceeding if the error had no effect on the [ultimate] judgment.” Id. at 691. Defendants alleging ineffective assistance of counsel bear “a heavy burden of proof.” Whiting v. Burt, 395 F.3d 602, 617 (6th Cir. 2005). The “threshold issue is not whether [counsel] was inadequate; rather, it is whether he was so manifestly ineffective that defeat was snatched from the hands of probable victory.” United States v. Morrow, 977 F.2d 222, 229 (6th Cir. 1992). In reviewing ineffective-assistance-of-counsel claims, the goal is not to ensure that a criminal defendant is afforded perfect counsel, but rather “to ensure that the adversarial testing process works to produce a just result under the standards governing decision.” Strickland, 466 U.S. at 687. The “proper measure of attorney performance remains simply reasonableness under prevailing professional norms.” Id. at 688. -10- No. 22-5573, Hentzen v. United States This court reviews de novo the denial of a 28 U.S.C. § 2255 motion and will overturn the factual findings of the district court only if they are clearly erroneous. Hamblen v. United States, 591 F.3d 471, 473 (6th Cir. 2009). Ineffective-assistance-of-counsel claims present mixed questions of law and fact and are reviewed de novo. Railey v. Webb, 540 F.3d 393, 415 (6th Cir. 2008). A. Battle of the Experts In his 28 U.S.C. § 2255 motion, Hentzen relies heavily upon the affidavit and testimony of his new expert, Dr. Andrew Cobb, at his evidentiary hearing to identify issues that he says his trial counsel should have responded to or raised. Dr. Cobb’s affidavit was based on copies of evidence introduced at trial along with spreadsheets and other data files provided in discovery. At the evidentiary hearing, Dr. Cobb alleged that the computers and computer devices that were seized from Hentzen’s residence and later admitted into evidence during trial were not properly handled. The Kentucky Office of Attorney General’s Cyber Crimes Branch, according to Dr. Cobb’s testimony at the hearing, mishandled Hentzen’s items because they did not comply with applicable industry standards in their investigation. To support his claim, Dr. Cobb pointed to several thousand files that contained time stamps and dates after the evidence was taken into custody. Dr. Cobb testified at the evidentiary hearing that this could indicate “a variety of activity,” but did not opine as to what caused the post-custody time stamps on those files. During cross-examination, however, Dr. Cobb contradicted himself. Cobb admitted that the on-scene “triage” that investigators used on Hentzen’s computer and computer devices, which involves running a particular program—OS Triage—to examine for suspect activity on devices during the execution of a search warrant, can result in post-custody timestamps. Moreover, Cobb -11- No. 22-5573, Hentzen v. United States testified that on-scene triage is, in fact, acceptable practice in this precise investigatory situation: when investigators see contraband on the screen and suspect that file encryption may be involved. This acceptable practice is in line with the testimony of Detective Mike Littrell, a forensic examiner and detective with the Kentucky Attorney General’s Office Cyber Crimes Unit, who testified that triage is (1) a part of basic forensic protocol; (2) can be performed on site without a further search warrant; and (3) results in additional post-seizure dates being placed on a file. Further, Detective Littrell noted that the “created” file dates—the only forensic date of importance in a child-pornography case—were not modified. Dr. Cobb acknowledged that none of Hentzen’s child-pornography files in question contained any creation dates that post-dated the search warrant. Dr. Cobb also contested the testimony of William Baker, the government’s forensic examiner, with respect to how certain shortcut files—.lnk and thumbs.db files found on Hentzen’s computer—were created. Examiner Baker testified that a .lnk file is created when a file is opened and a thumbs.db file is created by Windows software when a file is either viewed or opened in icon or display view. Cobb argued, however, that .lnk files may also be created using two other methods: right clicking on a file and creating a shortcut link, and moving an already existing .lnk file from one device to another. Notably, however, Dr. Cobb conceded that the .lnk files, as well as the actual child-pornography files, in question matched the existing file paths on Hentzen’s computer, noting that there was no evidence that the .lnk files were copied or had traveled from another computer onto Hentzen’s computer. Likewise, Dr. Cobb also disagreed with Examiner Baker’s testimony about the creation of thumbs.db files. Cobb testified that a thumbs.db file appears when a file is opened and viewed in icon view or when a file is moved from one computer to another, even if it was never opened. Cobb conceded, however, that there was no evidence that the thumbs.db files in question were -12- No. 22-5573, Hentzen v. United States copied from another computer to Hentzen’s computer; the actual child-pornography files upon which the thumbs.db files were created already existed on Hentzen’s computer. Stated simply, Dr. Cobb concluded that the shortcut files in question, .lnk and thumbs.db files, as well as the actual child-pornography files, both existed, and that they had matching file paths on Hentzen’s computer and computer devices; there was no evidence that they were copied onto Hentzen’s devices. Lastly, Dr. Cobb attempted to discredit Examiner Baker’s rebuttal testimony with respect to Hentzen’s batch-downloading defense. While Hentzen testified that he did not have an awareness of exactly what he was downloading because his practice was to download several files at once, Baker testified in rebuttal that this was untrue because certain downloaded files on Hentzen’s computer had different timestamps, rather than a single one indicative of batch downloading. Cobb, however, noted that the creation times of the files revealed a pattern of many files sharing a single timestamp on Hentzen’s eMule folder. The magistrate judge recommended denying Hentzen’s motion to vacate, finding that Hentzen’s counsel was not deficient or prejudicial. The magistrate judge explained that, had Dr. Cobb testified at trial, the testimony would not have had any meaningful effect to undermine the government’s credibility with respect to its data-collection methods. Similarly, the magistrate judge explained that Dr. Cobb simply presented his own speculation regarding how thumbs.db and .lnk files could have been copied and transferred from another computer onto Hentzen’s own computer; there was no real evidence supporting this method of shortcut file creation. Finding that the weight of the evidence clearly pointed to the fact that the child-pornography files were accessed on Hentzen’s computer and computer devices, the magistrate judge found that Dr. Cobb’s highlighting of “minor” inconsistencies was ultimately insignificant. The magistrate judge found that, even taking Hentzen’s batch-downloading -13- No. 22-5573, Hentzen v. United States testimony as true against that of Baker’s rebuttal, no prejudice resulted, considering the volume and strength of evidence against Hentzen. The district court agreed and denied the § 2255 motion. We agree. Hentzen has failed to show that, had Dr. Cobb’s speculative critiques of counsel based on the evidentiary record at trial been presented to the jury at said trial, the result would have been different. In fact, at the evidentiary hearing, Dr. Cobb conceded on several key issues asserted in his affidavit, including the industry standards of acceptable triage practice, the creation and presence of “shortcut evidence,” and the time stamps associated with Hentzen’s downloading patterns. Thus, Hentzen’s argument fails to demonstrate that counsel’s performance was deficient or that the trial outcome would have been different. Considering the evidence, he has done quite the opposite. B. Preparation of Computer-Forensics Evidence On appeal, Hentzen claims that counsel was unprepared to address the government’s computer-forensics evidence. He argues that his counsel was deficient because he should have been prepared to show that investigators mishandled seized computer-forensics evidence and that the government’s expert provided inaccurate testimony. The jury, he argues, did not have the opportunity to hear mitigating evidence as to how the computer evidence was seized. Had they had that opportunity, Hentzen claims, the integrity of the government’s computer evidence would have been undermined. Hentzen’s failure-to-challenge argument fails. As acknowledged by Dr. Cobb himself, the evidence was handled properly. Dr. Cobb’s own testimony noted that an exception to the general industry practice of powering down devices upon seizure applied to this case—when contraband was visible on the screen. Thomas Bell testified at trial that Hentzen’s computer was in the process of actively downloading content using eMule software at the time the search warrant was executed -14- No. 22-5573, Hentzen v. United States and that the names and keywords of those files were indicative of child pornography and immediately visible to the investigators. Thus, the subsequent decision by investigators to triage Hentzen’s computers and computer devices was a reasonable one. Expert testimony, including that of Dr. Cobb, contravenes Hentzen’s argument. As mentioned above, Dr. Cobb himself conceded that the post-custody timestamps that he once argued were significant were a result of the triaging on Hentzen’s computer at the time the search warrant was executed. Likewise, Detective Littrell testified that changes in the times and dates of files were an “expected outcome” of the process. Both Dr. Cobb and Detective Littrell agreed that the created dates of the child-pornography files were the most significant pieces of evidence and were never modified in this case. Hentzen’s counsel testified at the evidentiary hearing that he consulted not one but two forensic experts, both of whom raised no issues with the forensic methods used by the government. Counsel stated that, had his experts found an issue with the forensics, he would have made the strategic choice to contest the evidence presented by the government. Counsel’s strategic choice to forgo countering this evidence, therefore, was sound trial strategy that exercised reasonable professional judgment. As such, counsel cannot be considered deficient or prejudicial for a failure to challenge the computer-forensics evidence. C. Importance of Computer-Forensics Evidence Admitted to Trial Relying on Dr. Cobb’s opinion, Hentzen also challenges counsel’s failure to contest the accuracy of the government’s expert testimony. He argues that counsel allowed the government expert to testify inaccurately and did not provide appropriate factual context regarding the nature of shortcut files on his devices. Hentzen argues that their existence does not necessarily mean that he opened the original, existing child-pornography files upon which the shortcut files were made, -15- No. 22-5573, Hentzen v. United States but rather that the files could be on his device through other means, such as transferring the files from another device onto his own. This argument also fails under Strickland. As mentioned, Dr. Cobb presents mere speculation, not evidence, relating to the alternative ways in which .lnk and thumbs.db shortcut files can be created. Regarding the child-pornography videos in question, Dr. Cobb conceded that the .lnk and thumbs.db shortcuts traced back to and matched file paths with those found on Hentzen’s computer. Simply stated, the actual files upon which the shortcut files were based were on Hentzen’s computer; there is no evidence that the shortcut files were on Hentzen’s computer through other means. Hentzen correctly identifies two instances in which Examiner Baker’s trial testimony was incorrect: (1) eMule was installed on more than one, not just on one, of Hentzen’s computers, and (2) Baker’s assertion that Hentzen downloaded some files individually or in small batches of a few files at a time was not supported by Hentzen’s eMule history, which in fact favored Hentzen’s claim that he mostly batch-downloaded his files in bulk. For an ineffective-assistance-of-counsel claim to prevail, however, the question is whether counsel’s failure to highlight these errors in Baker’s testimony fell below professional standards and prejudiced Hentzen’s defense. While Hentzen’s counsel may have failed to highlight the presence of eMule on multiple devices, Hentzen himself stated this fact to the jury in his own testimony. As such, this point did not require a qualified expert to testify, and Hentzen cannot fault counsel for deficiency on this ground. In addition, it would not seem that this discrepancy is either relevant or harmful. Likewise, whether counsel contended that some, most, or all of Hentzen’s contraband files were downloaded individually or in batches does not render his performance ineffective. Hentzen argues that, had trial counsel been effective, he would have been able to undermine the confidence -16- No. 22-5573, Hentzen v. United States in the computer-forensics evidence. This would, in turn, provide the jury with reasonable doubt that Hentzen knew he downloaded child pornography and produce a different result. There is no doubt, however, that Hentzen had knowledge of what he was doing. Regardless of the downloading method, it is uncontested that thousands of child-pornography files were downloaded onto Hentzen’s computer. Accomplishing this necessarily required Hentzen to knowingly search in specific places and for specific terms on the internet. A survey of Hentzen’s last 30 searches on eMule alone showed terminology referring to known darknet child- pornography production studios and websites, titles and abbreviations for child pornography known to law enforcement, known terminology added to the ends of file names to disguise child pornography files from the authorities, and the words “toddler” in Dutch and “daughter,” “sister,” and “brother” in German. Counsel’s failure to challenge Baker’s testimony was not prejudicial to Hentzen, considering the evidence. Under Strickland, Hentzen again fails to prove that counsel’s performance was deficient and that the outcome of his proceeding would have been different. Lastly, Hentzen claims that, had his counsel been constitutionally adequate, he would have been able to keep out of the trial record an allegedly prejudicial animated “grooming video” that he claims was erroneously introduced into evidence. This would, in Hentzen’s view, have warranted a reversal for a new trial on his direct appeal. Hentzen also asserts that, had counsel been effective, he would have been able to undermine this piece of “significant circumstantial evidence.” Hentzen I, 638 F. App’x at 431. Again, Hentzen’s argument fails. As this court previously held, the admission of the video evidence was one of harmless error. Id. at 435. Whether the admission of improperly admitted 404(b) evidence “substantially swayed” a jury “generally depends on whether the properly -17- No. 22-5573, Hentzen v. United States admissible evidence of defendant’s guilt was overwhelming.” Id. at 434. Again, Hentzen fails to show that his counsel was ineffective or prejudicial. The weight of properly admitted evidence in this case is overwhelming. For Hentzen to acquire thousands of images and videos of minors engaged in sexual abuse and sexual conduct, he intentionally inserted keywords and phrases that he knew related to child pornography into a search box on a peer-to-peer network, directed the program to search for files that matched those known terms, selected the files to download from a screen that revealed the file names, instructed the computer to download those files, and eventually removed them from his incoming folder to other locations. As this court previously held, the admission of an isolated video in light of the evidence is not substantial or prejudicial. There was no undermining of the properly admitted evidence in this case; the “limited” use of single video weighed against the body of “horrifying” evidence presented did not materially affect the outcome of the case. Hentzen I, 638 F. App’x at 435. AFFIRMED. -18-