United States v. Beau Croghan

973 F.3d 809
CourtCourt of Appeals for the Eighth Circuit
DecidedAugust 28, 2020
Docket18-3709
StatusPublished
Cited by5 cases

This text of 973 F.3d 809 (United States v. Beau Croghan) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eighth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Beau Croghan, 973 F.3d 809 (8th Cir. 2020).

Opinion

United States Court of Appeals For the Eighth Circuit ___________________________

No. 18-3709 ___________________________

United States of America

lllllllllllllllllllllPlaintiff - Appellee

v.

Beau Brandon Croghan

lllllllllllllllllllllDefendant - Appellant ____________

Appeal from United States District Court for the Southern District of Iowa - Council Bluffs ____________

Submitted: May 14, 2020 Filed: August 28, 2020 ____________

Before SMITH, Chief Judge, MELLOY and SHEPHERD, Circuit Judges. ____________

SMITH, Chief Judge.

A jury convicted Beau Brandon Croghan of receipt or attempted receipt of child pornography, in violation of 18 U.S.C. § 2252A(a)(2). The district court1

1 The Honorable Stephanie M. Rose, United States District Judge for the Southern District of Iowa. sentenced Croghan to a below-Guidelines sentence of 110 months’ imprisonment. On appeal, Croghan challenges the district court’s admission of certain evidence, the sufficiency of the evidence, and his sentence. We affirm.

I. Background2 A. The Tor Network Croghan’s offense occurred using the Tor network.3 The Tor network is “a network that runs on top of the regular Internet” and operates as “a series of different computers that are all around the world.” Trial Tr., Vol. I, at 41, United States v. Croghan, No. 1:15-cr-00048-SMR-HCA-1 (S.D. Iowa Aug. 20, 2018), ECF No. 127. When a user connects to a website through the Tor network, the user’s Internet Protocol (IP) connection is bounced through multiple computers. The user’s IP address appears as the last computer funneled through the series of interconnected computers. A user must download special software and install the Tor browser on his or her computer to access the Tor network. Once the user downloads the software, he or she “can use the Tor network to access websites without revealing to those websites where [the user] actually [is].” Id. at 43. The user’s IP address is unavailable, and the user remains anonymous.

“[T]he Tor network [also] has a feature which is known as Tor hidden services.” Id. at 44. This feature allows the user to host a website with the same anonymity by protecting the website administrator’s IP address. The website’s physical location is unknown. In addition, Tor hidden services also allow the users who are accessing the website’s location to be hidden. As a result, these users are

2 “We recite the facts in the light most favorable to the jury’s verdict.” United States v. Galloway, 917 F.3d 631, 632 (8th Cir. 2019) (internal quotation omitted). 3 “Tor” stands for “[t]he Onion Router.” United States v. Horton, 863 F.3d 1041, 1045 (8th Cir. 2017).

-2- “able to communicate with each other through the Tor network without ever revealing to each other where the other is in the real world.” Id. at 45.

“Tor hidden services are very heavily utilized for all types of criminal activity.” Id. at 50. For example, “Tor hidden services [are used] to create child pornography websites.” Id. With Tor hidden services, the uniform resource locator used to access a website is “16 randomly generated letters and numbers.” Id. at 46. “Within the Tor network, a user generally has to know the 16-digit or character string for a hidden service that [he or she] want[s] to access.” Id. at 48–49.

B. Playpen In August 2014, the FBI became aware of a Tor hidden service website called Playpen and began monitoring it. “Playpen was a message board-type website where people would distribute and share images and videos of child pornography.” Id. at 51. Playpen “had hundreds of thousands of members” with “tens of thousands of images and videos of child pornography being shared and distributed.” Id. at 52.

FBI Special Agent Daniel Alfin (“SA Alfin”) was one of the agents charged with monitoring Playpen from August to December 2014. SA Alfin set up user accounts on Playpen to surveil the activity on the website. He testified that a user needed to install the Tor browser, navigate to Playpen via the 16-digit random code, and register a user account with Playpen. A user registered with Playpen by entering an e-mail address, user name, and password. Playpen encouraged anonymity by warning new users to use a fake e-mail address during the registration process. Once logged in, the user was taken to the website’s index page “contain[ing] links to all of the different parts of the Playpen website, and those links were all broken down by categories like boys, girls, toddlers, incest, [etc.]” Id. at 59. The user then clicked on one of the categories displayed on the index page and was taken to the category’s subforum. The subforum contained a listing of different postings that Playpen’s members had created. Each of the “postings . . . ha[d] titles indicative of the types of

-3- images or videos that that user was sharing.” Id. of 65. After clicking on one of the topics, the user “would enter that actual posting, and at that point typically . . . would see images of child pornography on [his or her] computer screen and links to download full videos.” Id. SA Alfin testified that “[w]hen the image is displayed on [the user’s] computer screen, that means it’s been downloaded to [the user’s] computer over the Internet, and now it’s there on [the user’s] computer screen for [the user] to see.” Id. at 66. SA Alfin confirmed that when the image appears on the user’s computer screen, the user has “received whatever image [the user] clicked on.” Id. In summary, SA Alfin explained, the child-pornography

images were embedded within [the] post so when the user clicked on that particular post, these full-sized images were within that post and would have been downloaded to [the user’s] computer and displayed on the computer screen without additional action being taken. The action to view the images was clicking on [the] post.

Trial Tr., Vol. II, at 111, United States v. Croghan, No. 1:15-cr-00048-SMR-HCA-1 (S.D. Iowa Aug. 21, 2018 ), ECF No. 128. The computer downloaded the file to the temporary storage of the user’s computer, and the image displayed on the computer.

In December 2014, Playpen’s administrator misconfigured the website. As a result, when the user entered a valid e-mail address, the user received a confirmation e-mail sent over the regular Internet, not the Tor network. The confirmation e-mail showed the actual IP address for Playpen. The FBI identified Playpen’s administrator and arrested him. Following the administrator’s arrest, the FBI assumed administrative control of Playpen via a court order. The FBI continued operating the website in an attempt to identify Playpen’s users.

The FBI administered Playpen from February 20, 2015, to March 4, 2015—a period of 13 days. The FBI obtained a search warrant authorizing a search of Playpen users’ computers through the use of a Network Investigative Technique (NIT). The

-4- NIT sent a hidden computer code to Playpen users’ computers that instructed the computers to transfer identifying information back to an FBI computer over the regular Internet. This identifying information included the IP address, operating system information, operating system username, and Media Access Control (MAC) address of the user’s computer.

C. Croghan’s Conduct During the 13-day period, the FBI successfully identified a user in Council Bluffs, Iowa. The user was “Beau2358.” The e-mail address associated with Beau2358 was cbbarscene@gmail.com, and Beau2358’s password for the Playpen account was gargoyle62. Beau2358 registered with Playpen on September 27, 2014. Beau2358 logged in to Playpen on four dates during the FBI’s 13-day operation: February 20, 2015; March 1, 2015; March 3, 2015; and March 4, 2015.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State of Missouri v. Stephen Craig Ingram
Missouri Court of Appeals, 2023
United States v. John Kuhnel
25 F.4th 559 (Eighth Circuit, 2022)
United States v. Cedric Wright
993 F.3d 1054 (Eighth Circuit, 2021)

Cite This Page — Counsel Stack

Bluebook (online)
973 F.3d 809, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-beau-croghan-ca8-2020.