Erik Hentzen v. United States

CourtCourt of Appeals for the Sixth Circuit
DecidedDecember 13, 2023
Docket22-5573
StatusUnpublished

This text of Erik Hentzen v. United States (Erik Hentzen v. United States) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Erik Hentzen v. United States, (6th Cir. 2023).

Opinion

NOT RECOMMENDED FOR PUBLICATION File Name: 23a0522n.06

No. 22-5573

UNITED STATES COURT OF APPEALS FILED Dec 13, 2023 FOR THE SIXTH CIRCUIT KELLY L. STEPHENS, Clerk

) ERIK HENTZEN, ) Petitioner-Appellant, ) ON APPEAL FROM THE UNITED ) STATES DISTRICT COURT FOR v. ) THE EASTERN DISTRICT OF ) KENTUCKY UNITED STATES OF AMERICA, ) ) OPINION Respondent-Appellee. )

Before: BOGGS, SUHRHEINRICH, and READLER, Circuit Judges.

BOGGS, Circuit Judge. Erik Hentzen was convicted of receipt and possession of child

pornography, in violation of 18 U.S.C. § 2252(a)(2) and 18 U.S.C. § 2252(a)(4)(B), and was

sentenced to 20 years in prison. Hentzen then appealed to this court, arguing that the prosecution

presented insufficient evidence to convict and that the admission of a “grooming” video was

improper. United States v. Hentzen, 638 F. App’x 427 (6th Cir. 2015) (“Hentzen I”). Finding that

the body of evidence showed that Hentzen affirmatively sought out child pornography and the

admission of the video was harmless error, this court affirmed the judgment and sentence of the

district court. Id. at 427-35.

Hentzen filed a timely motion to vacate his conviction and sentence under 28 U.S.C.

§ 2255, asserting that his trial counsel was ineffective for failing to obtain and prepare qualified

expert testimony to expose inaccuracies in, and otherwise contest, the government’s

computer-forensics evidence. A magistrate judge recommended that Hentzen’s 28 U.S.C. § 2255 No. 22-5573, Hentzen v. United States

be denied and the district court adopted the findings. Hentzen filed a timely notice of appeal,

asking this court to issue a certificate of appealability (COA). (Hentzen v. United States, No.

18-6168 (“Hentzen II”) Order at 1-2). We granted Hentzen relief as to some of his ineffective-

assistance-of-counsel claims, namely (1) his failure to obtain and prepare a competent expert, (2)

ineffective assistance of trial counsel at the sentencing hearing, and (3) ineffective assistance of

Appellate counsel claims. Ibid. The United States then moved to reverse the district court’s denial

of Hentzen’s motion to vacate and to remand the case to the district court, as he was entitled to an

evidentiary hearing with respect to the claims allowed by the COA. Hentzen II, 2019 U.S. App.

LEXIS 14831, at *1 (6th Cir. May 17, 2019). This court vacated the district court’s judgment and

remanded the matter. Id. at *2-3.

In August 2021, a two-day evidentiary hearing was held. The court heard testimony from,

among others, Dr. Andrew Cobb, a former University of Louisville professor, about the computer-

forensics examination of Hentzen’s computers and computer-related devices. Dr. Cobb opined

that the investigators breached universally accepted procedures of computer forensics and analysis

at the time Hentzen’s equipment was seized and that the court heard inaccurate testimony with

respect to how certain features of the Windows XP operating system functioned. Hentzen himself

also testified during the evidentiary hearing about his trial counsel’s representation of him and the

evidence. Additionally, Kentucky Attorney General’s Office Cyber Crimes Unit Forensic

Examiner and Detective Michael Littrell also testified regarding certain “triage” procedures

conducted on Hentzen’s equipment at the time of seizure. He opined that the time stamps found

on Hentzen’s files that post-dated seizure were the result of the triage software used at the time

Hentzen’s computers and computer devices were seized.

-2- No. 22-5573, Hentzen v. United States

In February 2022, Magistrate Judge Ingram issued a comprehensive Report and

Recommendation, recommending denial of Hentzen’s motion to vacate on his three remaining

grounds: (1) his ineffective-assistance-of-trial-counsel’s failure to obtain and prepare a competent

expert, (2) his ineffective-assistance-of-trial-counsel at allocution at sentencing, and (3) his

ineffective-assistance-of-appellate-counsel at sentencing claims. Magistrate Judge Ingram,

however, also recommended the issuance of a COA only as to the first ground—Hentzen’s

ineffective-assistance-of-trial-counsel counsel claim—finding that reasonable jurists could find

that Hentzen was prejudiced. The district court subsequently entered judgment in favor of the

United States.

Hentzen now appeals, asserting that his trial counsel failed to provide him constitutionally

adequate assistance of counsel as to the presentation of expert testimony regarding the computer-

forensic evidence. Hentzen has failed to establish that his trial counsel’s performance was either

deficient or prejudicial, and we affirm.

I. BACKGROUND

A. Hentzen I

In 2014, a jury convicted Erik Hentzen of knowing receipt and possession of child

pornography and he was sentenced to 240 months in prison. At the time, he was a 25-year-old

student at the University of Kentucky. Hentzen I, 638 F. App’x at 428. Hentzen had a keen interest

in computers, possessing seven computers and seventeen other computer-related devices capable

of storing a combined seventeen terabytes of digital data. He also avidly downloaded and collected

internet files including music, videos, and pornography using peer-to-peer networks like eDonkey.

Ibid. To access eDonkey, Hentzen used a software client called eMule.

-3- No. 22-5573, Hentzen v. United States

The Kentucky Attorney General’s Cyber Crime Unit surveils peer-to-peer networks,

including eDonkey, for the distribution of child pornography. To surveil these networks, the Unit

uses remote forensics tools, including an automatic software that searches networks for common

keywords associated with child pornography. When a computer shares files containing those

keywords, the IP address of the computer and the hash values of the files are documented. A hash

value is a unique digital fingerprint for each file that the Unit can use to identify files that match

those of known child pornography. Between September and November of 2012, an agent detected

many child-pornography files being shared by a single IP address on an unsecured internet router

in Hentzen’s apartment building. These files were traced to a laptop in Hentzen’s apartment.

In March 2013, state law-enforcement officials executed a search warrant at Hentzen’s

apartment. Among the state law-enforcement officials were also computer-forensics experts with

the Kentucky Attorney General’s Office Cyber Crimes Branch, including investigator Thomas

Bell.

Investigators testified that they found “the largest collection of computer equipment” they

had seen in executing over 200 warrants. A total of seven computers, multiple external hard drives,

and USB storage devices were seized from Hentzen’s home. Investigators examined the devices

on the scene and conducted a preliminary review of a laptop. The laptop’s IP address matched the

IP address that had previously been identified as downloading known child-pornography files prior

to the execution of the search warrant. When investigators opened the laptop, it was running and

showed all active downloads and uploads at the time.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Strickland v. Washington
466 U.S. 668 (Supreme Court, 1984)
Maurice Whiting v. Sherry Burt, Warden
395 F.3d 602 (Sixth Circuit, 2005)
Railey v. Webb
540 F.3d 393 (Sixth Circuit, 2008)
Hamblen v. United States
591 F.3d 471 (Sixth Circuit, 2009)
United States v. Erik Hentzen
638 F. App'x 427 (Sixth Circuit, 2015)

Cite This Page — Counsel Stack

Bluebook (online)
Erik Hentzen v. United States, Counsel Stack Legal Research, https://law.counselstack.com/opinion/erik-hentzen-v-united-states-ca6-2023.