United States v. Dobbs

FILED United States Court of Appeals Tenth Circuit January 5, 2011 PUBLISH Elisabeth A. Shumaker Clerk of Court UNITED STATES COURT OF APPEALS TENTH CIRCUIT UNITED STATES OF AMERICA, Plaintiff-Appellee, No. 09-5025 v. TERRY BRIAN DOBBS, Defendant-Appellant. Appeal from the United States District Court for the Northern District of Oklahoma (D.C. No. 4:07-CR-00149-GKF-1) John T. Carlson, Assistant Federal Public Defender (Raymond P. Moore, Federal Public Defender, with him on the briefs), Denver, Colorado, for Defendant- Appellant. Barak Cohen, Attorney, Criminal Division, United States Department of Justice, Washington, D.C. (Thomas Scott Woodward, Acting United States Attorney, and Leena Alam, Assistant United States Attorney, Tulsa, Oklahoma, on the brief), for Plaintiff-Appellee. Before BRISCOE, Chief Judge, HOLLOWAY and HOLMES, Circuit Judges. HOLMES, Circuit Judge. In this criminal appeal, Terry Brian Dobbs brings a sufficiency-of-the- evidence challenge to his conviction for knowingly receiving and attempting to receive child pornography in violation of 18 U.S.C. § 2252(a)(2). Mr. Dobbs contends that there was insufficient evidence to prove: (1) that he knowingly received or attempted to receive either of the two pornographic images submitted to the jury; and (2) that these two particular images traveled in interstate or foreign commerce, as required by our precedent in United States v. Schaefer, 501 F.3d 1197 (10th Cir. 2007). Exercising jurisdiction under 28 U.S.C. § 1291, we agree that the government did not offer sufficient evidence to prove that Mr. Dobbs knowingly received the images found on his hard drive. Consequently, because we have no need to opine on the merits of Mr. Dobbs’s Schaefer argument, we refrain from doing so. We REVERSE and remand to the district court to VACATE Mr. Dobbs’s conviction and sentence. I. Background In April 2006, United States Postal Inspectors in Oklahoma seized Mr. Dobbs’s computer pursuant to a search warrant issued in an unrelated fraud investigation. A search of the computer revealed multiple images suspected to be child pornography, leading the investigators to obtain a second search warrant. The computer’s hard drive was eventually sent to a Department of Justice computer forensic specialist in Washington, D.C. Upon further inspection of Mr. -2- Dobbs’s hard drive, the forensic specialist discovered over 150 images of child pornography in the hard drive’s temporary Internet files folder, or “cache.” 1 Mr. Dobbs was subsequently indicted for receipt, attempted receipt, and possession of visual depictions of minors engaged in sexually explicit conduct in violation of 18 U.S.C. § 2252(a)(2) and (a)(4)(B). Prior to trial, the government dismissed the charge of possession in violation of § 2252(a)(4)(B), leaving the single charge that Mr. Dobbs “knowingly received and attempted to receive one or more visual depictions [of minors engaged in sexually explicit conduct], including but not limited to . . . ‘14[2].jpg’ [and] ‘b003[1].jpg.’” R., Vol. I, at 109 (Second Superseding Indictment, filed July 11, 2008). At trial, the government’s case relied principally on the testimony of the forensic specialist, who explained in detail the results of his investigation of Mr. Dobbs’s hard drive. His analysis indicated both that Mr. Dobbs had typed in multiple search terms reflecting the pursuit of child pornography, 2 and that Mr. 1 The record refers to this folder interchangeably as “temporary internet files folder” and “cache.” For consistency and clarity, we refer to it as the cache. 2 For computers running Microsoft Windows, the Windows registry stores information about the search terms that a user types into Internet search engines. The Windows registry revealed that some of the search terms on Mr. Dobbs’s computer included the following: “very young sex,” “erotic preteen,” “youngest porn,” “pedo pics,” and “preteen Lolita.” R., Vol. III, at 452–56 (Trial Tr., dated Oct. 29, 2008). -3- Dobbs had visited websites consistent with such pornography. 3 Additionally, the forensic specialist reconstructed some of the pages that resulted from Mr. Dobbs’s search activity, noting that after some of the search terms were entered, the user advanced the web browser to get additional results, sometimes up to thirty-six times. He concluded that the computer activity suggested someone who was “methodically seeking out child pornography.” R., Vol. III, at 464. The forensic specialist also testified that the charged photographs recovered from Mr. Dobbs’s hard drive were found exclusively in the computer’s cache. As he explained it, when a person visits a website, the web browser automatically downloads the images of the web page to the computer’s cache. The cache is populated with these images regardless of whether they are displayed on the computer’s monitor. In other words, a user does not necessarily have to see an image for it to be captured by the computer’s automatic-caching function. Although the forensic specialist noted that a computer user can manipulate some images that appear on a computer’s screen, he acknowledged that there was no evidence that Mr. Dobbs actually viewed the charged images, much less clicked on, enlarged, or otherwise exercised actual control over any of them. Furthermore, while the forensic specialist explained that a user may manipulate 3 Like the Windows Registry and search terms, a computer’s “index.dat” file records the websites visited by the computer user. The forensic specialist was able to match up websites listed in the “index.dat” file of Mr. Dobbs’s computer with several websites that were consistent with child pornography. See R., Vol. III, at 376–77. -4- and control an image stored in the computer’s cache, he repeatedly admitted that there was no evidence that Mr. Dobbs had accessed his computer’s cache, or that he even knew it existed. During the trial, the district court initially admitted seventeen images found in Mr. Dobbs’s cache. That number was winnowed down to two when the government failed to provide adequate evidence that fifteen of the images had traveled in interstate commerce. The two remaining images—“b003[1].jpg,” which was captured by the caching function on Mr. Dobbs’s computer on March 15, 2006, at 9:29:56 p.m., and “14[2].jpg,” which was captured shortly thereafter at 9:31:17 p.m.—were banner images, comprised of multiple, smaller images, measuring 3.25 inches by .5 inch. 4 In constructing its case against Mr. Dobbs, the government created a time line of activity aimed at establishing a pattern indicative of the hunt for child pornography. Specifically, the forensic specialist testified that a pattern existed wherein the arrival of suspect images on Mr. Dobbs’s computer was immediately preceded by searches using terms typically affiliated with child pornography. However, while such a pattern may have existed for the images ultimately excluded from the jury’s consideration, the forensic specialist admitted that there was no evidence of a temporally proximate search indicating the pursuit of child 4 Officers from the Palm Beach County Sheriff’s Office and the Suffolk County Police Department testified that these two banners contained images that were created in Florida and New York. -5- pornography with respect to the two images submitted to the jury. Nor was he able to present evidence that Mr. Dobbs visited a website typically associated with child pornography immediately preceding the arrival of the two images in his computer’s cache. At the close of the government’s case, and again at the close of all the evidence, Mr. Dobbs moved for a judgment of acquittal, arguing that insufficient evidence was presented to prove both the jurisdictional element under Schaefer and that he “knowingly” possessed the images found on his hard drive. The district court denied Mr. Dobbs’s motions, based in part on its prior ruling limiting the images submitted to the jury. Mr. Dobbs was subsequently found guilty of knowingly receiving and attempting to receive child pornography. The district court sentenced him to 132 months’ imprisonment and nine years of supervised release. This timely appeal followed. II. Discussion On appeal, Mr. Dobbs argues that we must reverse his conviction because the government offered insufficient evidence to prove that his receipt of child pornography was “knowing,” and thus punishable under § 2252(a)(2). More specifically, he claims that the lack of evidence suggesting that he knew of his computer’s automatic-caching process forecloses a finding of knowing receipt of the two images submitted to the jury, which were found in the cache. He suggests that “a man who doesn’t know he has certain images inside his computer [cannot] -6- be said to have knowingly accepted those images . . . [or] to have knowingly exercised control over them.” Aplt. Reply Br. at 5. The government, in contrast, contends that Mr. Dobbs’s conviction is supportable based in part on evidence that he “engaged in a pattern of methodically seeking out child pornography, by conducting image searches for terms . . . [associated with child pornography] and downloading websites consistent with child pornography.” Aplee. Br. at 15–16. This, “combined with the ability [of Mr. Dobbs] to control those images, was sufficient to prove that he received child pornography.” Id. at 16. In sum, the government argues that “because Dobbs knowingly sought out and accessed the images, and had the ability to control them when they appeared, the statutory definition of receipt was met.” Id. at 21. Mr. Dobbs also claims that the government failed to prove the jurisdictional element of the crime, as described in Schaefer—namely, that the particular images presented to the jury crossed state lines. See 501 F.3d at 1202. Because we find Mr. Dobbs’s first argument dispositive, we do not address this second issue. A. Standard of Review We review a challenge to the sufficiency of the evidence de novo. United States v. Vigil, 523 F.3d 1258, 1262 (10th Cir. 2008). “Evidence is sufficient to support a conviction if, viewing the evidence in the light most favorable to the -7- government, a reasonable jury could have found the defendant guilty beyond a reasonable doubt.” United States v. LaVallee, 439 F.3d 670, 697 (10th Cir. 2006) (quoting United States v. Hien Van Tieu, 279 F.3d 917, 921 (10th Cir. 2002)) (internal quotation marks omitted). “We will reverse a conviction ‘only if no rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt.’” United States v. Willis, 476 F.3d 1121, 1124 (10th Cir. 2007) (quoting United States v. Gurule, 461 F.3d 1238, 1243 (10th Cir. 2006)). B. Knowing Receipt Mr. Dobbs was charged with and convicted of knowing receipt and attempted receipt of child pornography in violation of 18 U.S.C. § 2252(a)(2). That statute provides for the punishment of any person who knowingly receives . . . any visual depiction that has been mailed, or has been shipped or transported in interstate or foreign commerce, or which contains materials which have been mailed or so shipped or transported, by any means including by computer, . . . if— (A) the producing of such visual depiction involves the use of a minor engaging in sexually explicit conduct; and (B) such visual depiction is of such conduct . . . . 18 U.S.C. § 2252(a)(2) (2006). 5 5 Section 2252 has undergone significant amendment since Mr. Dobbs was charged, including a revision that criminalizes knowingly accessing sexually explicit images with the intent to view them. See Effective Child Pornography Prosecution Act of 2007, Pub. L. No. 110-358, 122 Stat. 4001, 4002–4003. In this appeal, however, we review the sufficiency of the evidence for Mr. Dobbs’s (continued...) -8- Although “knowingly receives” is not defined in the statute, “in interpreting the term, we are guided by its ordinary, everyday meaning.” United States v. Tucker, 305 F.3d 1193, 1204 (10th Cir. 2002) (analyzing the term “possesses” under a related statute, 18 U.S.C. § 2252(a)(5)(B)). The district court instructed the jury that to “receive” means “to accept an object and to have the ability to control it.” R., Vol. I, at 340 (Jury Instruction No. 16). Neither party has objected to this definition. Consequently, we are comfortable adopting the view that it comports with the word’s everyday and ordinary meaning (as appears to be the case). See Webster’s Ninth New College Dictionary (1985) (defining “receive” as “to come into possession of”); see also United States v. Stanley, 896 F.2d 450, 451 (10th Cir. 1990) (approving of the district court’s definition of “to receive” under § 2252(a)(2) as “to acquire control, in the sense of physical dominion or apparent legal power to dispose of the [item]”). In addition, the district court instructed the jury that the term “knowingly” means “that an act was done, or visual depictions were received, voluntarily and intentionally, and not because of mistake or accident.” R., Vol. I, at 340. We believe that this definition is consistent with the ordinary and everyday meaning of the word as well, and the parties do not argue to the contrary. See United States v. Fabiano, 169 F.3d 1299, 1303 (10th Cir. 1999) (“An act is done 5 (...continued) conviction under the law as it existed at the time of the charged offense, not as it stands today. -9- ‘knowingly’ if done voluntarily and intentionally, and not because of mistake or accident or other innocent reason.”); see also Tenth Circuit Criminal Pattern Jury Instructions No. 1.37 (2005) (“When the word ‘knowingly’ is used in these instructions, it means that the act was done voluntarily and intentionally, and not because of mistake or accident.”). There is little doubt that Mr. Dobbs—or at least his computer—“received” child pornography. Indeed, Mr. Dobbs does not contest that the government found images of child pornography on his computer. However, mere receipt of child pornography is not what is proscribed by § 2252(a)(2); rather, it is the knowing receipt of this illegal content that is punishable under the statute. See 18 U.S.C. § 2252(a)(2). Mr. Dobbs challenges the sufficiency of the government’s evidence establishing that he knowingly received the two images that were sent to the jury. A careful review of the record reveals that the government presented no evidence that Mr. Dobbs had accessed the files stored in his computer’s cache, including the two images at issue. And, more tellingly, there was no evidence that he even knew about his computer’s automatic-caching function. Moreover, as to the two images at issue, there was no evidence presented to the jury that Mr. Dobbs even saw them, much less had the ability to exercise control over them by, for example, clicking on them or enlarging them. As such, although there is no question that a rational jury could have found that Mr. Dobbs “received” the two - 10 - images, we conclude that it could not have found that Mr. Dobbs did so knowingly. In resisting such a conclusion, the government relies upon “proof that Dobbs knowingly and methodically sought out child pornography,” Aplee. Br. at 19, and posits that the “[f]iles found in Dobbs’s [cache] provided circumstantial evidence that he had received images of child pornography, by downloading the websites on which they appeared,” id. at 16. However, we are not persuaded. The proof that the government relies upon in establishing Mr. Dobbs’s intent to seek out child pornography—viz., the pattern of child-pornography-related searches immediately preceding the creation of illegal images in the cache—does not apply to the two images submitted to the jury. The government’s own forensic specialist admitted that there is no evidence of suggestive searches immediately prior to the creation of those two images in the cache, nor is there any indication that Mr. Dobbs visited suspect websites prior to their arrival in his cache. The pattern of search-and-creation, therefore, is based solely upon evidence related to the fifteen excluded images, and consequently is irrelevant to the question of whether Mr. Dobbs knowingly received the two images that were properly before the jury. Furthermore, the government’s suggestion that the presence of the child pornography files in the cache of Mr. Dobbs’s computer provides circumstantial evidence of knowing receipt is misguided. The mere presence of the files in the - 11 - cache is certainly proof that the files were received through the automatic-caching process; however, for this evidence to be probative of the question of knowing receipt, the government needed to present proof that Mr. Dobbs at least knew of the automatic-caching process. It presented no such proof in this instance. This proof deficiency is underscored by our decision in United States v. Bass, 411 F.3d 1198 (10th Cir. 2005). Bass was rendered in an analogous context—a prosecution for possession of child pornography under 18 U.S.C. § 2252A(a)(5)(B). There, a search of the defendant’s computer had unearthed over 2000 images of child pornography, although “the origin of the images could not be identified—that is, whether the images had been intentionally or automatically saved to the computer from the internet.” Id. at 1200. When interviewed by the authorities, the defendant admitted viewing child pornography, but “stated that he did not know (1) how to download images from the internet or (2) that the computer was automatically saving the images he viewed.” Id. at 1201. Claiming ignorance of his computer’s caching function, the defendant argued that his lack of knowledge as to this automatic process should prevent a finding of knowing possession. Id. at 1201–02. Despite the defendant’s professed lack of knowledge, we nevertheless affirmed his conviction on appeal. We did so based in large part on evidence that the defendant used software specifically aimed at eliminating the digital residue of his illicit activities, including “History Kill” and “Window Washer.” Id. at - 12 - 1202. 6 We concluded that in light of his use of these programs, a “jury . . . reasonably could have inferred that [the defendant] knew child pornography was automatically saved to his mother’s computer based on evidence that [he] attempted to remove the images.” Id.; see also Tucker, 305 F.3d at 1204 (finding sufficient evidence to support a conviction of knowing possession of child pornography located in the computer’s cache when the defendant admitted that “he knew that when he visited a Web page, the images on the Web page would be sent to his browser cache file and thus saved on his hard drive”). In contrast to Bass, the government presented absolutely no evidence here from which a reasonable jury could infer that Mr. Dobbs knew of his computer’s automatic-caching function, much less that he had accessed his cache. Consequently, we conclude that the presence of the child pornography files in the cache of Mr. Dobbs’s computer does not alone demonstrate—circumstantially or otherwise—his knowing receipt of those files. For us to conclude otherwise would “turn[] abysmal ignorance into knowledge and a less than valetudinarian grasp into dominion and control.” United States v. Kuchinski, 469 F.3d 853, 863 (9th Cir. 2006). 7 6 The defendant admitted that he used “History Kill” and “Window Washer” to delete child pornography because “he didn’t want his mother to see those images.” Bass, 411 F.3d at 1202. 7 The Ninth Circuit’s decision in Kuchinski also underscores the proof deficiency here. In Kuchinski, the court was called on to determine whether (continued...) - 13 - The government vigorously contends that Bass and other cases where at least part of the prosecution related to possession of child pornography are inapposite because this is “a pure receipt case,” where the proof requirements are different. Aplee. Br. at 29. Even assuming arguendo that there are significant differences in the proof requirements of possession and receipt prosecutions, 8 the 7 (...continued) images found in the defendant’s cache could be used to enhance his sentence for knowingly receiving and possessing child pornography in violation of 18 U.S.C. § 2252A(a)(2) and (a)(5)(B). Although 110 images of child pornography had been found in the defendant’s download folders and deleted files folder (recycle bin), more than 1100 illegal images were found in his active cache, and another 13,904 to 17,784 related files were located amongst the deleted temporary Internet files. Id. at 856. The district court applied the five-level enhancement that is triggered when over 600 qualifying images are recovered, relying on the additional images found in the computer’s cache. Id. at 862. The defendant appealed, claiming that there was insufficient evidence to establish that he knowingly possessed the cached files. The Ninth Circuit, in reviewing the record, agreed that “there was no evidence that Kuchinski was [a] sophisticated [computer user], that he tried to get access to the cache files, or that he even knew of the existence of the cache files.” Id. at 862. Relying on its earlier decision in United States v. Romm, 455 F.3d 990 (9th Cir. 2006), which in turn rested heavily on our decision in Tucker, the court concluded that “[w]here a defendant lacks knowledge about the cache files, and concomitantly lacks access to and control over those files, it is not proper to charge him with possession and control of the child pornography images located in those files, without some other indication of dominion and control over the images.” Kuchinski, 469 F.3d at 863; see also Romm, 455 F.3d at 1000 (“[T]o possess the images in the cache, the defendant must, at a minimum, know that the unlawful images are stored on a disk or other tangible material in his possession.”). Like Kuchinski, there is no evidence in this case that Mr. Dobbs knew of his computer’s automatic-caching function or of the files that were created as a result of it. 8 Although we need not (and do not) definitively opine on the matter, even assuming that different proof standards attend prosecutions for possession (continued...) - 14 - government’s arguments are unavailing because they do not square with the language of the receipt statute. The government contends that “in a pure receipt case, evidence that the defendant intentionally sought out child pornography establishes that his receipt was knowing.” Id. The government, in effect, is positing that defendants need not know that they actually have received child pornography—through automatic caching or otherwise—to be convicted of knowing receipt of child pornography, so long as they intentionally were seeking it out. This contention is logically untenable and unpersuasive on its face. 8 (...continued) and receipt of child pornography, the government’s contention that the standards for the former (i.e., possession) are more stringent than for the latter (i.e., receipt) is open to serious question. Some courts have taken the view that knowing possession—even if fleeting—is an essential predicate for knowing receipt. See United States v. Davenport, 519 F.3d 940, 943 (9th Cir. 2008) (“It is impossible to ‘receive’ something without, at least at the very instant of ‘receipt,’ also ‘possessing’ it.”); United States v. Miller, 527 F.3d 54, 71 (3d Cir. 2008) (“[I]t is clear that, as a general matter, possession of a contraband item is a lesser-included offense of receipt of the item.”); Romm, 455 F.3d at 1001 (“Generally, federal statutes criminalizing the receipt of contraband require a ‘knowing acceptance or taking of possession’ of the prohibited item.”); United States v. Kamen, 491 F. Supp. 2d 142, 150 (D. Mass. 2007) (“Receipt equals possession plus the additional element of acceptance, rendering possession a lesser included offense of receipt . . . .”); cf. also United States v. Morgan, 435 F.3d 660, 662–63 (6th Cir. 2006) (stating in dicta that a defendant who was initially charged with receiving child pornography under 18 U.S.C. § 2252A(a)(2) ultimately “entered an oral conditional plea of guilty to possessing images depicting minors engaged in sexually explicit conduct in violation of 18 U.S.C. § 2252A(a)(5)(B), a lesser-included offense of the charged violation”). However, we need not definitively resolve that issue here. Even if we assume arguendo that significant distinctions exist between the proof requirements for child pornography possession and receipt offenses, we conclude that the government’s arguments are unavailing. - 15 - The government also argues that in “a pure receipt case” it need not prove that the defendant “actually exercised control” over the illegal images, but rather “the ability to control the images he received is sufficient.” Id. Even if it were true that in a receipt prosecution the focus is on the ability to control the images (rather than the actual control of them), that ability would need to relate to images that the defendant knew existed; otherwise, the defendant’s conduct with respect to the images could not be deemed to be knowing. Cf. Kuchinski, 469 F.3d at 863 (“Where a defendant lacks knowledge about the cache files, and concomitantly lacks access to and control over those files, it is not proper to charge him with possession and control of the child pornography images located in those files, without some other indication of dominion and control over the images.” (emphasis added)). In other words, defendants cannot be convicted for having the ability to control something that they do not even know exists. Generally, in regard to the cached images, the government failed to present any proof that Mr. Dobbs knew that the images were automatically being downloaded to his computer’s cache—viz., that he even knew that the images were there. Therefore, the government perforce failed to prove that Mr. Dobbs had the ability to control those images. As for any child pornography that may have appeared on Mr. Dobbs’s computer monitor, the government’s argument likewise breaks down when we specifically focus on the two images at issue. - 16 - The government presented no evidence that Mr. Dobbs actually saw the two images on his monitor, such that he would have had the ability to exercise control over them. As noted, the pattern of child-pornography-related searches immediately preceding the creation of illegal images in the cache does not apply to the two images submitted to the jury. In particular, the government’s forensic specialist acknowledged that there was no evidence of suggestive searches immediately prior to the creation of those two images in the cache. Nor, according to the specialist, was there evidence of Mr. Dobbs visiting child pornography websites prior to the arrival of the two images in his cache. In sum, the lack of a search-and-creation pattern as it relates to the two images before the jury, when combined with the absence of any evidence establishing that Mr. Dobbs ever saw the images, forfends any view that knowing receipt could have been found by a rational jury. In other words, the government needed to present sufficient evidence in the first instance that Mr. Dobbs knew that the two images were present on his monitor before it could convict him of knowingly receiving them under its theory that receipt could be established in “a pure receipt case,” Aplee. Br. at 29, by Mr. Dobbs’s ability to control the images as they appeared on his monitor. It presented no such evidence here. The government also highlights that Mr. Dobbs was charged with attempted receipt. Therefore, it reasons that we should not conclude that “the lack of direct evidence that Dobbs viewed the two images” is “fatal to his - 17 - conviction,” because there was “substantial evidence establishing Dobbs’s intent to receive child pornography, and that he acted to commit that offense” to permit us to “affirm his conviction on the attempt charge.” Aplee. Br. at 32. In particular, as to the “substantial step” requirement of an attempt offense, the government contends that “the combination of those [Internet] searches [involving keywords suggesting child pornography] with Dobbs’s subsequent visits to websites consistent with child pornography was precisely the type of act that would ordinarily result in the receipt of child pornography.” Id. at 34. However, when we pause to consider the nature of the completed offense that would necessarily need to be the object of any attempt conviction here, it is patent that the government’s argument is unavailing. An attempt offense does not exist in a vacuum; it must relate to the completion of the charged offense. See, e.g., United States v. Cornelio-Pena, 435 F.3d 1279, 1286 (10th Cir. 2006) (“A defendant is guilty of attempt if he intends to commit a crime and takes a substantial step toward the commission of that crime.” (emphasis added)); United States v. Taylor, 413 F.3d 1146, 1155 (10th Cir. 2005) (“In our circuit, a conspiracy or an attempt to commit a crime requires the intent to commit the crime and overt acts in furtherance of that intent.” (emphasis added)); see also Ira P. Robbins, Double Inchoate Crimes, 26 Harv. J. on Legis. 1, 70 (1989) (“Crimes in the nature of attempt, however, are not merely abstract attempts. Rather, they - 18 - are substantive offenses combining elements of a completed offense with the attempt to commit that specific offense.” (emphasis added)). Here, the only aspects of the charged offense that went to the jury involved two images—“b003[1].jpg,” which was captured by the caching function on Mr. Dobbs’s computer on March 15, 2006, at 9:29:56 p.m., and “14[2].jpg,” which was captured shortly thereafter at 9:31:17 p.m. Thus, the government’s evidence needed to be sufficient to establish the attempt offense with respect to those two images. Indeed, in oral argument, the government’s counsel candidly acknowledged that, were the court to stray in its attempt analysis from a focus on the two images to the other images that the district court did not permit the jury to consider, it would “create problems.” Oral Argument at 21:09. In order to be guilty of attempt, a defendant must be shown to have intended to carry out the proscribed conduct—viz., knowing receipt of child pornography. See, e.g., Cornelio-Pena, 435 F.3d at 1286 (stating that “to be guilty of attempt a defendant must intend to commit the crime”); United States v. Evans, 358 F.3d 1311, 1312 (11th Cir. 2004) (“A conviction for attempt require[s] proof . . . that [the defendant] possessed the mens rea required for the underlying crime . . . .”). Significantly, an essential element of an attempt offense is a “substantial step.” See, e.g., United States v. Munro, 394 F.3d 865, 869 (10th Cir. 2005) (“To prove attempt, the government had to show that Munro took a ‘substantial step’ - 19 - towards the commission of the ultimate crime, and that such step was more than mere preparation.”). Thus, the government’s evidence had to be sufficient to prove that Mr. Dobbs took a substantial step toward the knowing receipt of the two images at issue. See United States v. DeSantiago-Flores, 107 F.3d 1472, 1479 (10th Cir. 1997) (“A substantial step is an ‘appreciable fragment’ of a crime and an action of ‘such substantiality that, unless frustrated, the crime would have occurred.’” (quoting United States v. Buffington, 815 F.2d 1292, 1303 (9th Cir. 1987))), overruled on other grounds by United States v. Holland, 116 F.3d 1353, 1359 n.4 (10th Cir. 1997) (en banc footnote); United States v. Savaiano, 843 F.2d 1280, 1296 (10th Cir. 1988) (“We concluded that ‘[t]here must be an overt act pointed directly to the commission of the crime charged.’” (alteration in original) (quoting United States v. Monholland, 607 F.2d 1311, 1320 (10th Cir. 1979))). In some instances, “[d]efining conduct which constitutes a ‘substantial step’ toward commission of the crime has proved to be a thorny task.” Savaiano, 843 F.2d at 1296. However, on this record, it is not. As it pertains to the two images at issue, the government’s evidence of a substantial step is clearly insufficient. As noted, the pattern of child-pornography-related searches immediately preceding the creation of the illegal images in the cache of Mr. Dobbs’s computer does not apply to the two images submitted to the jury. Moreover, the government’s forensic specialist acknowledged that there is no evidence of suggestive searches immediately prior to the creation of those two - 20 - images. And, there is no indication that Mr. Dobbs visited suspect websites before the images arrived in his computer’s cache. Therefore, consistent with Mr. Dobbs’s argument, we would be hard-pressed to conclude that Mr. Dobbs took a substantial step toward the knowing receipt of these two images, even if receipt could be accomplished through viewing the child pornography images on his monitor, with the present ability to control them. See Aplt. Reply Br. at 20–21 (“Yet [the government’s] laundry list of facts returns to the evidence supporting the 15 images never submitted to the jury, namely, the searches he conducted to find them and the Web sites he visited to obtain them. None of these facts constitute a substantial step toward acquiring and controlling (that is, receiving) the two relevant images.” (citation omitted)). Therefore, the government’s attempt argument must fail. III. Conclusion For the reasons discussed above, we conclude that the government provided insufficient proof to establish the knowledge required for conviction under 18 U.S.C. § 2252(a)(2). Accordingly, we REVERSE the district court’s judgment and remand with instructions to VACATE the conviction and sentence. - 21 - No. 09-5025, United States v. Dobbs BRISCOE, Chief Judge, dissenting: I respectfully dissent. In my view, the evidence presented by the government at trial was sufficient to allow the jury to find that Dobbs knowingly received or attempted to receive the two images at issue (“14[2].jpg” and “b003[1].jpg”), and that the two images were transported in interstate commerce. Thus, I would affirm Dobbs’ conviction and resulting sentence. I. Standard of Review Although the majority correctly recites the basic standard of review that applies to Dobbs’ sufficiency-of-evidence challenges, that standard bears repeating: “In reviewing sufficiency challenges, we ask whether, viewing the evidence in the light most favorable to the government as the prevailing party, any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt.” United States v. Hutchinson, 573 F.3d 1011, 1033 (10th Cir. 2009) (emphasis added). It also is useful to note an accompanying standard that we have long employed, but that the majority has overlooked: “The evidence necessary to support a verdict ‘need not conclusively exclude every other reasonable hypothesis and need not negate all possibilities except guilt.’” United States v. Wilson, 182 F.3d 737, 742 (10th Cir. 1999) (quoting United States v. Parrish, 925 F.2d 1293, 1297 (10th Cir. 1991) (citations omitted)). With those standards in mind, I now turn to the arguments asserted by Dobbs in his appeal. II. Sufficiency of evidence - knowing receipt Dobbs first contends that the evidence presented at trial was insufficient to allow the jury to reasonably find that he “knowingly” received or attempted to receive the two images at issue. In addressing this contention, I begin first with the statute of conviction, then proceed to address the evidence presented by the government at trial, and conclude by addressing the two specific arguments raised by Dobbs on appeal. Finally, following the discussion of Dobbs’ arguments, I shall outline what I see as the flaws in the majority opinion. Dobbs’ conviction arose under 18 U.S.C. § 2252(a)(2), which provides that any person who knowingly receives . . . any visual depiction that has been mailed, or has been shipped or transported in interstate or foreign commerce, or which contains materials which have been mailed or so shipped or transported, by any means including by computer, if— (A) the producing of such visual depiction involves the use of a minor engaging in sexually explicit conduct; and (B) such visual depiction is of such conduct; ... shall be punished as provided in subsection (b) of this section. 18 U.S.C. 2252(a)(2) (2006). -2- The statute does not define the terms “knowingly” or “receives,” “but in interpreting the[se] term[s], we are guided by [their] ordinary, everyday meaning.” See United States v. Tucker, 305 F.3d 1193, 1204 (10th Cir. 2002). The district court instructed the jury that “[t]he term ‘knowingly,’ as used in the[] instructions, means that an act was done, or visual depictions were received, voluntarily and intentionally, and not because of mistake or accident.” ROA, Vol. I at 340. In turn, the district court instructed the jury that “[t]he term ‘receive’ means to accept an object and to have the ability to control it.” Id. These definitions, neither of which were challenged by the parties, comport with the terms’ natural, ordinary meanings. E.g. United States v. Bowling, 619 F.3d 1175, 1184 (10th Cir. 2010) (affirming use of jury instructions that employed similar definition of “knowingly”); United States v. Stanley, 896 F.2d 450, 451 (10th Cir. 1990) (approving of district court’s definition of “to receive” under § 2252(a)(2) as “to acquire control, in the sense of physical dominion or apparent legal power to dispose of the [object]”). Thus, I will employ these same definitions in analyzing whether Dobbs knowingly received or attempted to receive the two images at issue. The government based its proof of Dobbs’ knowing receipt on the testimony of Jonathon Bridbord, a computer forensic specialist employed by the United States Department of Justice’s Child Exploitation and Obscenity section. Bridbord testified that his investigative task was to create and examine a “forensic -3- bit-stream image,” or exact copy, of the contents of the hard drive of Dobbs’ computer in order to determine if any “child exploitation offenses” existed on the hard drive. ROA, Vol. 3 at 127-28. Before discussing his specific findings, Bridbord described for the jury, in general terms, what would have occurred each time Dobbs accessed the internet with his computer. According to Bridbord, when a computer user such as Dobbs utilizes Microsoft Windows Internet Explorer (the browser) to access a particular web site, the browser in turn directs the computer to contact the web site’s server (a dedicated computer holding the web site’s content). The server then transmits, and the user’s computer receives, the data and images associated with a particular page of the web site. In addition to displaying the images on the user’s computer monitor, the browser also creates a copy of each image on the page and deposits it into what is referred to as the temporary internet files folder (or cache). In other words, absent the presence of unusual circumstances, such as the occurrence of a pop-up or the existence of malicious software, an image cannot be simultaneously displayed on the computer monitor and copied into the cache without the user accessing a web site on which the image is contained. A computer utilizing a Windows-based operating system (such as Dobbs’ computer, which utilized the Windows XP Professional operating system) also creates an entry in what is referred to as the index.dat file, noting the date and time the web site was accessed. Lastly, if such a user employs a search engine, such as Google, to search for images or data, the user’s computer records -4- each search term utilized, along with the date and time the term was utilized, into a file called the “Windows Registry.” Id. at 209. According to Bridbord, Dobbs first began using his Windows-based computer on November 15, 2005. Id. at 255. Bridbord testified that he determined, based upon his review of the files on Dobbs’ computer, that Dobbs began performing Google searches for images of child pornography on December 15, 2005. Id. at 290. On that date, Bridbord testified, Dobbs used the search terms “ls-island,” “ww2.ls-island.net,” “www.ls-island.net,” “ls-magazine,” “ww2.ls-magazine/net,” and “ww2.ls-magazine.net.” Id. at 211. According to Bridbord, the term “ls” is an abbreviation commonly understood in the law enforcement community as an abbreviation for “Lolita Studios,” and is associated with images of child pornography. Id. Bridbord testified that Dobbs continued to conduct searches for child pornography in late December 2005 (using the search phrase “very young sex”), February 2006 (using the search terms “young blowjob video,” “ls-island.info,” “lolita top,” and “lolita new”), early to mid-March 2006 (approximately March 5 through March 12) (using the search terms “pedo,” “erotic preteen,” “erotic pre-teen,” “pretty teen sex,” “youngest porn,” “young models,” “pre teen sex,” “priteen sex,” “priteen newsgroups,” “top preteen models,” “lolita models,” “pretene models,” “pedo,” and “pedo pics”), and early April 2006 (using the search terms “youngest cock sucker -gay,” “pedo sex,” “lolita blowjobs,” “youngest cock sucker,” “preteen models,” “young cock -5- sucker,” “young blowjob bbs,” “preteen lolita,” “preteen newsgroups,” “lola,” “nymphet,” and “nymphet pics”). Id. at 291-93. In employing these search terms, Dobbs often advanced his browser numerous times in order to view additional search results (for example, Dobbs advanced his browser approximately thirty-six times when employing the term “preteen lolita”). ROA, Gov’t Exh. 1.4 at 32. Bridbord also provided information about specific web sites visited by Dobbs. One of the exhibits prepared by Bridbord and admitted at trial, Government Exhibit 1.6, listed the web sites visited by Dobbs between November 15, 2005, the date Dobbs first began using his computer, and the time the computer was seized by law enforcement officials in April 2006. Those entries, based upon the index.dat file of Dobbs’ computer, indicated that Dobbs began visiting web sites that were potentially related to child pornography in late December 2005. ROA, Gov’t Exh. 1.6 at 1-2. Similar web site visits occurred in February 2006, id. at 3-5 (indicating a number of such web sites visited on February 10, 2006), March 2006, id. at 6, 9-10, 16-19, and April 2006, id. at 21- 26, 28-29, 33-42. Notably, those visits were not always associated with Dobbs’ Google searches for child pornography images. In other words, the index.dat file entries indicated that, on some occasions, Dobbs directly visited potential child -6- pornography web sites without first employing a search engine or any child pornography-related search terms. 1 Bridbord proceeded to describe for the jury seventeen images of child pornography he found in the cache of Dobbs’ computer 2, including the two images that formed the basis of Dobbs’ conviction. 3 The first image at issue, which had a file name of “b003[1].jpg,” was created on March 15, 2006, at 9:29:56 p.m. The second image at issue, with a file name of “14[2].jpg,” was created approximately a minute-and-a-half later, at 9:31:17 p.m. on March 15, 2006. For these two image files to have been created in the cache of Dobbs’ computer, Bridbord testified, Dobbs “certainly ha[d] to visit a Web site or use another type of technology.” ROA, Vol. 3 at 301. Bridbord testified, however, that he was unable to identify, based upon his review of the index.dat file, the 1 According to Bridbord, it is not unusual for pedophiles to discover child pornography web sites through avenues other than search engines. ROA, Vol. 3 at 368. 2 Bridbord testified that Dobbs’ browser was set to retain only a certain amount of data in the cache, thus resulting in the automatic deletion of older files. ROA, Vol. 3 at 368. Consequently, Bridbord testified, it was possible that additional images of child pornography were received by Dobbs on his computer, but were not recoverable after the computer was seized by law enforcement authorities. Id. at 368-69. Indeed, Bridbord testified, he was able to identify the existence of “a number of files that were overwritten that were picture files,” but was unable to completely recover those files. Id. at 369. 3 The district court ruled, at the conclusion of the government’s evidence, that the government failed to present sufficient evidence to allow the jury to find an interstate nexus for the other fifteen images. That ruling has not been challenged in this appeal. -7- web sites from which the two images were derived. Id. at 302-03. Bridbord explained that there are occasions when “data doesn’t get written from the memory on to [sic] the hard drive,” id. at 297, as well as times when the “data gets overwritten and the data is gone,” id. at 272, thus forcing him “to piece together what’s there,” id. at 297. Bridbord ruled out the possibility that the two images at issue arrived in the cache of Dobbs’ computer by way of “pop-ups” or malicious software. Id. at 254, 255, 257, 264, 371. Bridbord also noted that, immediately following the creation of the two images at issue, Dobbs directly visited four web sites associated with child pornography and that, as a consequence of that action, eight additional images of child pornography were copied into the cache of his computer. In sum, Bridbord opined, based upon a combination of his experience and his analysis of Dobbs’ computer, that Dobbs’ receipt of the two images at issue was the result of him “methodically seeking out child pornography.” Id. at 222. I readily conclude that Bridbord’s testimony and related exhibits were sufficient to allow the jury to find that Dobbs knowingly received the two images. 4 As noted, Bridbord’s analysis of Dobbs’ computer established that, from 4 Dobbs effectively concedes on appeal, as he did at trial, that he “received” the two images at issue. More specifically, Dobbs concedes: “1) that at various times he used his web browser to search for images of child pornography; (2) that he visited websites known to contain child pornography, and that some of these visits followed closely on the heels of his searches for child pornography; and 3) that images depicting child pornography were (continued...) -8- late December 2005 through April 2006, Dobbs methodically utilized Google searches to locate images of child pornography (employing various search terms and often advancing his browser numerous times to produce additional search results), and directly visited numerous web sites whose addresses strongly suggested an association with child pornography. Bridbord’s analysis further revealed that, as a result of this activity and the computer’s automatic caching process, multiple images of child pornography were copied into the cache of Dobbs’s computer, including the two images at issue. Considered together, I conclude that this evidence allowed the jury to find beyond a reasonable doubt that Dobbs knowingly sought and received the two images at issue by accessing web pages on which copies of those images were contained. 5 See United States v. Romm, 455 F.3d 990, 998 (9th Cir. 2006) (“In the electronic context, a person can receive and possess child pornography without downloading it, if he or she seeks it out and exercises dominion and control over it.”). Dobbs raises two specific concerns, neither of which give me pause. First, Dobbs correctly notes that the government offered no direct proof that either of 4 (...continued) discovered on his computer.” Aplt. Br. at 22. 5 I acknowledge that if a defendant accidentally views a pornographic image, “as through the occurrence of a ‘pop-up,’” that image will be copied into the computer’s cache. United States v. Romm, 455 F.3d 990, 1000 (9th Cir. 2006). In light of the government’s expert computer analysis in this case, however, I conclude the jury could have readily rejected the possibility that the two images at issue were accessed by Dobbs accidentally. -9- the two images actually appeared on his computer monitor. I am not persuaded, however, that such direct proof, which would be nearly impossible for the government to muster given the obviously secretive nature of the charged crime and the limitations of computer forensic science, was essential or, for that matter, required in order to support a conviction under 18 U.S.C. § 2252(a)(2). Given Dobbs’s pattern, both before and after the receipt of the two images at issue, of methodically searching for images of child pornography and visiting web sites with an association to child pornography, I conclude the jury could have reasonably inferred that Dobbs was similarly methodical in actually viewing any web sites that he accessed that might have contained such images. 6 In other words, I conclude the jury could have reasonably inferred that Dobbs would have, in his search for child pornography images, methodically scrolled down the entire length of each web page he accessed, including the pages that contained the two images at issue. 7 6 The district court properly instructed the jury that it could base its findings upon either direct or circumstantial evidence, and could draw reasonable inferences from the evidence. ROA, Vol. I, Part 2 at 329. 7 Even if I were to conclude the evidence presented at trial was insufficient to allow the jury to reasonably find that Dobbs actually viewed the two images on his computer monitor, I readily conclude that the evidence was more than sufficient to establish that Dobbs attempted to receive the two images at issue. More specifically, this evidence would have permitted the jury to reasonably find that (a) Dobbs intended to locate and receive images of child pornography, and (b) took a substantial step towards commission of that crime by intentionally accessing the web pages on which the two images at issue were contained. See (continued...) - 10 - The second concern raised by Dobbs is that the government offered no evidence from which the jury could infer that he knew about his computer’s cache or the caching process. Although this is true, I am not persuaded that such proof was required in order for the jury to convict Dobbs of knowing receipt of the images. As I see it, the government’s evidence established that Dobbs’s intent was to seek out and view images of child pornography. And this activity, which according to Bridbord afforded Dobbs temporary dominion and control over the images, was sufficient to establish his knowing receipt of the images. See Romm, 455 F.3d at 1000 (concluding that defendant “exercised control over the cached images while they were contemporaneously saved to his cache and displayed on his screen” because, “[a]t that moment,” he “could print the images, enlarge them, copy them, or email them to others”). Thus, it was irrelevant whether Dobbs was aware of the computer’s cache or the caching process, and the existence of copies of the images in the cache of his computer was, like fingerprints left at the scene of a crime, merely evidence of his actual criminal activity. Having disposed of Dobbs’ arguments, it is necessary to outline what I view as significant flaws in the majority’s reasoning. Initially, the majority incorrectly suggests that the government’s case rested exclusively on “a pattern . . . wherein the arrival of suspect images on Mr. Dobbs’ computer was immediately 7 (...continued) generally United States v. Ramirez, 348 F.3d 1175, 1180 (10th Cir. 2003). - 11 - preceded by searches using terms typically affiliated with child pornography.” Maj. Op. at 5. Although Bridbord’s testimony and related exhibits established that Dobbs sometimes utilized this pattern, that same evidence established that Dobbs frequently visited child pornography web sites directly, i.e., without any preceding searches. Indeed, the evidence established that, within two minutes of the creation of the second image at issue in this case, Dobbs directly visited four child pornography web sites and received eight additional images of child pornography. Moreover, Bridbord testified that it is not unusual for persons interested in child pornography to learn about child pornography web sites through avenues other than search engines. As for his inability to identify precisely what web site(s) Dobbs visited in obtaining the two images at issue, Bridbord explained that there are occasions when “data doesn’t get written from the memory on to the hard drive,” ROA, Vol. 3 at 297, as well as times when the “data gets overwritten and the data is gone,” id. at 272. Finally, Bridbord ruled out the possibility that the two images arrived in Dobbs’ cache as the result of pop-ups or malicious software. In sum, the lack of evidence of any Google searches immediately preceding Dobbs’ receipt of the two images at issue is by no means fatal to the government’s case, because Bridbord’s testimony and related exhibits, taken as a whole, would have allowed the jury to reasonably conclude that Dobbs obtained the two images at issue by directly visiting child pornography web sites. - 12 - The majority also wrongly concludes that evidence of Dobbs’ frequent “pattern of [employing] child-pornography-related searches immediately preceding the creation of illegal images in the cache” of his computer “is irrelevant to the question of whether [he] knowingly received the two images that were properly before the jury.” Maj. Op. at 11. Dobbs’ pattern of searching for and/or directly visiting child pornography web sites, which occurred both before and after the two images at issue were received on Dobbs’ computer, as well as his receipt of other images of child pornography, was highly relevant for purposes of proving both absence of mistake and knowledge. See Fed. R. Evid. 404(b) (“Evidence of other crimes, wrongs, or acts . . . may . . . be admissible for . . . purposes [of proving] . . . knowledge . . . or absence of mistake or accident”). 8 As I have already outlined, it was precisely this pattern of methodical activity that would have allowed the jury to reasonably infer that, upon visiting a web site potentially related to child pornography, Dobbs would have methodically perused 8 Much, if not all, of the evidence of Dobbs’ computer activity was inextricably intertwined with evidence of the charged offense, and thus would not have been subject to Rule 404(b) analysis. See generally United States v. Parker, 553 F.3d 1309, 1314 (10th Cir. 2009) (noting that “intrinsic evidence,” which is not subject to Rule 404(b), “is directly connected to the factual circumstances of the crime and provides contextual or background information to the jury”). Nonetheless, it is useful in this context to note that, as set forth in Rule 404(b), even extrinsic evidence of criminal activity can be relevant for proving absence of mistake and knowledge. - 13 - the entirety of the site in his search for images of child pornography, and thus would have knowingly received the two images at issue. 9 In this same vein, the majority errs in concluding that, because there was no evidence that Dobbs knew of his computer’s automatic-caching function, “the presence of the child pornography files in the cache of Mr. Dobbs’ computer does not alone demonstrate—circumstantially or otherwise—his knowing receipt of those files.” Maj. Op. at 13. Bridbord testified in detail about seventeen images of child pornography he found in the cache of Dobbs’ computer, including the two images at issue. With one exception, all of those images were copied into the cache at different times, thus indicating, according to Bridbord’s testimony, that on each of those occasions Dobbs visited separate web sites containing images of child pornography. ROA, Gov’t Exh. 1.12 at 1. Whether or not this evidence was sufficient, standing alone, to establish that Dobbs knowingly received the two images at issue, it was certainly relevant to that question. For example, this evidence would have supported a finding that the two images at issue arrived in the cache as a result of intentional activity on the part of Dobbs, rather than, as 9 Although the majority takes the government to task for not presenting any evidence “establishing that Mr. Dobbs ever saw the images,” Maj. Op. at 17, the majority fails to acknowledge the secretive nature of Dobbs’ crime, and in turn fails to identify precisely what evidence it believes could or should have been presented. In any event, the majority also fails to explain why the jury could not reasonably have inferred, based upon the entirety of Bridbord’s testimony and related exhibits, that Dobbs actually viewed the two images at issue. - 14 - suggested by his counsel at trial, by forces beyond his control and unbeknownst to him, such as pop-ups or malicious software. Relatedly, the majority errs in suggesting that Dobbs’ lack of knowledge of the automatic-caching process was fatal to his prosecution. The focus of Dobbs’ internet activity was obviously to find and view images of child pornography, not to create copies of those images in his computer’s cache. In turn, the knowing receipt issue hinged on whether Dobbs intentionally sought out and viewed the two images at issue. The fact that copies of the two images were found in his cache (along with other images of child pornography) was merely proof of that activity. In other words, Dobbs’ awareness of the cache or the automatic-caching process was unnecessary to his conviction. Similarly, the majority wrongly asserts that, because the government presented no proof Dobbs was aware of the cache or the automatic-caching process, it “perforce failed to prove that [he] had the ability to control those images.” Maj. Op. at 16. As Bridbord explained, however, images displayed on a computer user’s monitor can be manipulated, and thus controlled, by the user (for example by copying those images into a personal folder). ROA, Vol. 3 at 305, 354. Consequently, Dobbs’ crime was complete at the moment he viewed the images on his monitor because, at that moment, he necessarily had the ability to control the images, regardless of whether or not he exercised control. See Romm, 455 F.3d at 1000 (reaching similar conclusion). - 15 - Finally, the majority errs in concluding that the government’s evidence was insufficient to establish, for purposes of the attempt charge, that “Dobbs took a substantial step toward the knowing receipt of the two images at issue.” Maj. Op. at 20. As with its analysis of the receipt charge, the majority wrongly refuses to acknowledge that it was entirely permissible for the jury to infer that Dobbs directly visited, with the intent of finding and viewing images of child pornography, web sites containing the two images at issue. More specifically, the jury could have based such a finding on the entirety of Dobbs’ internet activity, Bridbord’s explanation for why he could not identify the web sites from which the two images at issue were derived, and Bridbord’s refutation of Dobbs’ theory that the two images may have resulted from pop-ups or malicious software. Such a finding by the jury, which I submit could have been the only reasonable finding it could have made based upon the government’s evidence, clearly would have satisfied the substantial step element of the attempt charge. In sum, I conclude the evidence presented by the government at trial was sufficient to establish that Dobbs knowingly received, as well as attempted to receive, the two images at issue. III. Sufficiency of evidence - travel in interstate commerce Dobbs also contends that the evidence presented at trial was insufficient to establish the jurisdictional element for knowing receipt of child pornography under § 2252(a)(2), i.e., that the two images at issue traveled in interstate or - 16 - foreign commerce. Indeed, Dobbs argues that we are bound by our prior decision in United States v. Wilson, 182 F.3d 745 (10th Cir. 1999), to rule in his favor on this issue. It is important to note that Wilson involved a different charge than the one at issue in the present case. In Wilson, the defendant was indicted for possessing three or more matters (one computer hard drive and ten computer diskettes) containing visual depictions of child pornography “which were produced using materials that had been mailed, shipped, or transmitted in interstate or foreign commerce in violation of 18 U.S.C. § 2252(a)(4)(B).” Id. at 740. At trial, a government witness testified that some of the images on the defendant’s computer diskettes originated in German magazines. Id. at 744. We concluded that “the fact that some of the images possessed by defendant originated at some point in German magazines does not demonstrate, without more, that the German magazines were actually ‘materials’ used to produce the images possessed by defendant.” Id. at 744 n.5. But the instant case is distinguishable from Wilson because the government in this case, unlike in Wilson, did not seek to prove that the materials used to produce the images traveled in interstate commerce. Rather, the government in this case sought to prove that the visual depictions had traveled in interstate commerce, relying on the statutory language that prohibits knowing receipt of “any visual depiction that has been mailed, or has been shipped or transported in - 17 - interstate or foreign commerce . . . .”§ 2252(a)(2). This is a different jurisdictional prong than that relied on in Wilson. Although Dobbs contends that the differences in statutory language are meaningless, I disagree. There is a significant difference between the materials used to produce visual depictions and the visual depictions themselves. They are independent jurisdictional prongs, either one of which the government must prove. See Wilson, 182 F.3d at 744 (“[T]he language of § 2252(a)(4)(B) makes it abundantly clear that either the visual depictions . . . or the materials used to produce the visual depictions must have traveled in interstate commerce.”). Wilson focused on whether there was sufficient evidence to show that the materials used to produce the visual depictions had traveled in interstate commerce because the defendant in that case was charged under that jurisdictional prong. See id. at 740. Thus, Wilson does not answer the question presented under the jurisdictional prong in this case: whether proving the origin of photographs is sufficient evidence to prove that those visual depictions have traveled in interstate commerce. The government in this case notes that it presented uncontroverted evidence that the two images at issue were originally created in Florida and New York, thus allowing the jury to reasonably find that, to end up on Dobbs’s computer in Oklahoma, the images necessarily had to have traveled in interstate commerce. Dobbs argues, in response, that the government’s theory is foreclosed by United - 18 - States v. Schaefer, 501 F.3d 1197 (10th Cir. 2007). In particular, Dobbs relies on the following language in Schaefer: [E]ven if we assume arguendo that the images appearing in the foreign language movie clips and the image of the young girl originated outside of the State of Kansas (like the images from the German magazine in Wilson), the government offered no proof that the particular images on the CDs in question moved across state lines. Id. at 1206. I conclude that Dobbs’s reliance on Schaefer is misplaced. There was no evidence in Schaefer supporting where the images at issue there originated. Rather, the government’s only evidence was that the defendant had (a) used the internet, and (b) possessed CDs that contained images of child pornography. Id. at 1198. We declined to assume “that Internet use automatically equates with a movement across state lines.” Id. at 1205. Specifically, we held “that the government’s evidence concerning [the defendant’s] use of the Internet, standing alone, was insufficient to satisfy the jurisdictional requirements of these statutes.” Id. at 1207. Notably, we were not presented with a case where the government provided any other evidence of a jurisdictional nexus, such as evidence of the origin of an image. Moreover, we have since recognized that “Schaefer is limited to its facts–the government’s say so was not enough to prove that the Internet operates in interstate commerce, no matter how obvious.” United States v. Vigil, 523 F.3d 1258, 1266 (10th Cir. 2008). - 19 - I thus address head-on whether evidence of the out-of-state origin of a photograph, as was presented by the government in this case regarding the two images at issue, is sufficient evidence to meet the jurisdictional requirement of § 2252(a)(2). Dobbs argues that evidence of the origin is insufficient for two reasons. First, the government did not prove an interstate internet connection. And second, even if the government proved where the original photograph was taken, this does not prove that the “particular” images found in Dobbs’s cache traveled in interstate commerce. See Aplt. Br. at 47. I turn first to Dobbs’s argument that Schaefer requires the government to prove an interstate internet connection. As I have explained, Dobbs’s reliance on Schaefer is misplaced. In that case, we recognized that the government needed to prove that the images in question had moved between states, and proof of an internet connection, by itself was insufficient. See Schaefer, 501 F.3d at 1206. We noted that “the government offered no proof that [the defendant] accessed the images through an interstate Internet connection.” Id. That is not the same as requiring an interstate internet connection in every case in order to prove that an image has crossed state lines. While proof of an interstate internet connection may be sufficient to show that an image crossed state lines, it is not always necessary. Rather, the government must prove that the visual depictions traveled in interstate commerce at some point prior to arriving on Dobbs’s computer. See United States v. Snow, 82 F.3d 935, 941 (10th Cir. 1996) (concluding that - 20 - jurisdictional requirement that a firearm was “shipped or transported in interstate commerce” was met upon proof that “firearm had at some point crossed a state line.”); see also United States v. Urbano, 563 F.3d 1150, 1154 (10th Cir. 2009) (recognizing sufficient jurisdictional nexus when firearm traveled in interstate commerce at some time in the past). An interstate internet connection is but one way to prove that the image traveled in interstate commerce. I next address Dobbs’s argument that the government can prove only where the original photographs were taken, not where the “particular” images found on his computer came from. To answer this question, I must decide whether the statute distinguishes between original images and copies of those images when regulating visual depictions that have traveled in interstate commerce. I begin with the statutory language, giving the words their ordinary or natural meaning. Wilson, 182 F.3d at 740. The effective statute refers to visual depictions that have been transported in interstate or foreign commerce “by any means including by computer.” § 2252(a)(2). As the government explains, when one computer sends a digital image to another computer, “the original image does not travel from the sender to the recipient. Rather, the original remains on the sender’s computer, and an exact digital copy is created on the recipient’s computer.” Aplee. Br. at 43. Thus, any transmission by computer necessarily involves the creation of copies. - 21 - Dobbs’s suggestion that the statute covers only “particular” images but not copies would render the statutory language “by any means including by computer” meaningless. But, federal courts “cannot construe a statute in a way that renders words or phrases meaningless, redundant, or superfluous.” United States v. Power Eng’g Co., 303 F.3d 1232, 1238 (10th Cir. 2002). Because the statutory language explicitly includes “by computer,” and computers necessarily create digital copies when they transmit images, it follows that the statute covers copies of a visual depiction, and not merely the original visual depiction itself. I am thus left to decide whether the evidence presented at trial was sufficient to prove that the two images submitted to the jury traveled in interstate commerce, “by any means including by computer.” Taking the evidence in the light most favorable to the government, I have little trouble concluding that a reasonable jury could find that an image originally created in New York or Florida necessarily had to have traveled in interstate or foreign commerce before arriving on a computer in Oklahoma. See United States v. Schene, 543 F.3d 627, 639 (10th Cir. 2008) (holding that there was sufficient evidence to prove that a hard drive was a “material” that had traveled in interstate or foreign commerce upon proof that the hard drive was manufactured in Singapore); see also United States v. Williams, 403 F.3d 1188, 1195 (10th Cir. 2005) (holding that there was sufficient evidence that a firearm had previously traveled in interstate commerce by proof that the firearm was manufactured out-of-state). - 22 - I note that this conclusion is supported by our prior unpublished decision in United States v. Swenson, No. 07-8097, 2009 WL 1803285 (10th Cir. June 25, 2009). In Swenson, the defendant was convicted for receipt, possession, and attempted distribution of child pornography under §§ 2252A(a)(2) and 2252A(a)(5)(B). Id. at *1. There, state agents in Wyoming discovered that the defendant was offering images of child pornography for download via Limewire, a peer-to-peer networking application. Id. At trial, the government introduced evidence that at least one image was being distributed out of South America. Id. at *2. We concluded that “[a] reasonable jury could (even if it need not) conclude from this evidence that, for the image to wend its way from South America to Wyoming, it had traveled in interstate or foreign commerce . . . .” Id. While certainly not binding, the Swenson decision is persuasive regarding what a reasonable jury could conclude when given virtually the exact same evidence as that presented to the jury in the case at bar. In sum, I conclude that because a reasonable jury could find that the two images at issue traveled in interstate commerce at some point before arriving on Dobbs’s computer, there was sufficient evidence to support the jurisdictional element. I would affirm Dobbs’ conviction and sentence. - 23 -