United States v. Cameron

762 F. Supp. 2d 152, 2011 U.S. Dist. LEXIS 4721, 2011 WL 197365
CourtDistrict Court, D. Maine
DecidedJanuary 18, 2011
Docket1:09-cr-00024
StatusPublished
Cited by9 cases

This text of 762 F. Supp. 2d 152 (United States v. Cameron) is published on Counsel Stack Legal Research, covering District Court, D. Maine primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Cameron, 762 F. Supp. 2d 152, 2011 U.S. Dist. LEXIS 4721, 2011 WL 197365 (D. Me. 2011).

Opinion

ORDER ON POST-TRIAL MOTIONS

JOHN A. WOODCOCK, JR., Chief Judge.

James Cameron moves for post-trial relief from verdicts finding him guilty of multiple child pornography offenses, asserting violations of his Sixth Amendment right of confrontation, the erroneous admission into evidence of digital images of child pornography, the failure to suppress the evidentiary results of an illegal warrantless seizure of property, improper venue, lack of jurisdiction, and the improper consideration of expert medical testimony. The Court rejects the Defendant’s motions, concluding that the digital evidence was appropriately admitted, that the Internet Service Provider (ISP) was not acting as a Government agent and its actions do not implicate the Fourth Amendment, that venue and jurisdiction were proper, and that the Court correctly found that some of the images were of minor children despite the absence of corroborating expert testimony.

I. STATEMENT OF FACTS

A. Procedural History

On August 23, 2010, at the close of a six-day, jury-waived trial, the Court found James M. Cameron guilty of thirteen violations of federal criminal law against child pornography. Oral Ct. Verdict (Docket # 179). On September 4, 2010, Mr. Cameron moved separately for: (1) a new trial, (2) arrest of judgment as to Counts 12 and 13, and (3) reconsideration of his motion for acquittal. Defense Mot. for New Trial (Docket # 194) (Def.’s Mot for New Trial); Mot. for Arrest of J. as to Counts 12 & IS on Lack of Jurisdiction Grounds (Docket # 195) (Def.’s Jurisdictional Mot.); Defense Mot. for Seeking Recon. of Disposition of Mot. for J. of Acquittal (Docket # 196) (Def. ’s Mot. for Recon.). On September 15, 2010, the Government filed a consolidated response. Gov’t’s Opp’n to Def.’s Post-Trial Mots. (Docket #200) (Gov’t’s Opp’n). On September 29, 2010, Mr. Cameron filed a consolidated reply. Consolidated Reply to the Gov’t’s Opp’n to Post-Trial Defense Mots. (Docket #204) (Def.’s Reply).

B. The Government Investigation and Evidence of Images of Child Pornography

Before, during and now after trial, Mr. Cameron has vigorously asserted that the images of child pornography that were posted on the Yahoo! servers and which the Government traced to him were inadmissible. Mr. Cameron contends, first, that the images had been illegally seized, and second, that the Government failed to produce a proper authenticating witness.

On March 15, 2007, Yahoo!, an ISP, received customer complaints about the existence of images of child pornography associated with the screen name “lilhottyohh.” Yahoo! searched its servers for sites associated with that screen name and reported these images to the National Center for Missing and Exploited Children (NCMEC). In August 2007, after viewing the images, NCMEC referred the matter to the Maine State Police Computer *156 Crimes Unit (MSPCCU), directing MSPCCU to images associated with the “lilhottyohh” screen name as well as to those associated with a second screen name, “lilhotteeOOOOO.” Later, NCMEC made a second referral concerning child pornography that Yahoo! had discovered in the photographs section of an account under the screen name “harddudeOOOO.” Yahoo! records confirmed that these three screen names were traceable to an Internet Protocol (IP) address, which had been assigned to Mr. Cameron’s wife at a residence they shared in Hallowed, Maine.

On December 17, 2007, the Maine State Police executed a search warrant at Mr. Cameron’s residence and seized four computers. An analysis of the four computers revealed, among other things, that an eMachines computer at Mr. Cameron’s home had been used to access seventeen Yahoo! profiles, including variations of “lilhottee,” “harddude,” and other screen names. Based on this and other information, the Government served process on Yahoo!. 1 In compliance with the subpoena, Yahoo! produced images and discs associated with the identified screen names that contained child pornography. At trial, the Government sought to introduce these images of child pornography with evidence tying the Defendant to the screen names.

II. DISCUSSION

A. Sixth Amendment Right to Confrontation

Before and during trial, Mr. Cameron vigorously contended that, before admission of the Yahoo! evidence, he had a constitutional right to confront the Yahoo! employee or employees who located the images of child pornography on the Yahoo! server. Defense Mot in Limine Seeking Exclusion of Digital Images and Related Materials Derived From Yahoo!, Google & NCMEC Sources (Docket # 137). Before trial, the Court dismissed without prejudice a motion in limine premised on Sixth Amendment violations. Order on Mot in Limine Regarding Documentary Evidence (Docket # 172) {Mot. in Limine Order). During trial, the Court rejected the same objections and admitted the contested exhibits. Mr. Cameron now moves for a new trial on similar grounds.

B. United States v. Jackson

To set the stage for Mr. Cameron’s objections, it is necessary to review the Seventh Circuit case of United States v. Jackson, 208 F.3d 633 (7th Cir.2000), which Mr. Cameron cites in support of his motions. In Jackson, the Seventh Circuit addressed whether the contents of Web site postings could be admitted into evidence under the business records exception to the rule against hearsay evidence. Id. at 637. See also Fed.R.Evid. 803(6). Noting that the comments on the Web sites were being introduced for their truth and were therefore hearsay, the Seventh Circuit rejected the contention that the website postings were the business records of the ISPs:

Jackson tries to fit the web postings in as a hearsay exception under Federal Rule of Evidence 803(6) as business records of the supremacy groups’ Internet service providers. Internet service providers, however, are merely conduits. The Internet service providers did not themselves post what was on Storm Front and the Euro-American Student Union’s websites. Jackson presented no evidence that the Internet service pro *157 viders even monitored the contents of those web sites. The fact that the Internet service providers may be able to retrieve information that its customers posted or email that its customers sent does not turn that material into a business record of the Internet service provider. Any evidence procured off the Internet is adequate for almost nothing, even under the most liberal interpretations of the hearsay exception rules.

Jackson,

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Paitsel
District of Columbia, 2022
United States v. Charriez-Rolon
923 F.3d 45 (First Circuit, 2019)
PHILIP MORRIS USA INC., and R.J. REYNOLDS TOBACCO CO. v. ROSE POLLARI, etc
228 So. 3d 115 (District Court of Appeal of Florida, 2017)
United States v. Batchu
724 F.3d 1 (First Circuit, 2013)
United States v. Cameron
699 F.3d 621 (First Circuit, 2012)
Lebewohl v. Heart Attack Grill LLC
890 F. Supp. 2d 278 (S.D. New York, 2012)
Osunde v. Lewis
281 F.R.D. 250 (D. Maryland, 2012)

Cite This Page — Counsel Stack

Bluebook (online)
762 F. Supp. 2d 152, 2011 U.S. Dist. LEXIS 4721, 2011 WL 197365, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-cameron-med-2011.