United States v. Christopher Frater

CourtCourt of Appeals for the Sixth Circuit
DecidedMay 13, 2025
Docket24-3258
StatusUnpublished

This text of United States v. Christopher Frater (United States v. Christopher Frater) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Christopher Frater, (6th Cir. 2025).

Opinion

NOT RECOMMENDED FOR PUBLICATION File Name: 25a0245n.06

No. 24-3258

UNITED STATES COURT OF APPEALS FILED FOR THE SIXTH CIRCUIT May 13, 2025 KELLY L. STEPHENS, Clerk ) UNITED STATES OF AMERICA, ) Plaintiff-Appellee, ) ON APPEAL FROM THE UNITED ) STATES DISTRICT COURT FOR v. ) THE NORTHERN DISTRICT OF ) OHIO CHRISTOPHER L. FRATER, ) Defendant-Appellant. ) OPINION ) )

Before: STRANCH, BUSH, and NALBANDIAN, Circuit Judges.

JOHN K. BUSH, Circuit Judge. Christopher Frater appeals his conviction for knowingly

receiving, distributing, and possessing child pornography, in violation of 18 U.S.C. § 2252(a)(2).

He argues that the government failed to prove beyond a reasonable doubt that he, rather than his

wife, received or distributed child pornography. We disagree and AFFIRM.

I.

In November 2017, Van Wert Police Detective Jeff Blackmore was operating an online

law enforcement surveillance tool called Gridcop,1 when he received seven complete files of child

pornography from an unknown IP address based in Lima, Ohio. After verifying that the files were

in fact illicit images and videos depicting child pornography, Blackmore subpoenaed Charter

Communications for information about the account associated with the IP address. The records

listed Christopher Frater as the registered account holder.

1 GridCop is a tool designed for law enforcement that monitors peer-to-peer internet activity of users distributing child pornography. No. 24-3258, United States v. Frater

Law enforcement executed a search warrant on Frater’s residence in January 2018. Frater

and two young foster children—one girl and one boy—were present during the search. Frater’s

wife, Nicky, was not. Agents confiscated several items, including Frater’s Motorola Droid cell

phone, several DVD-ROM discs, his desktop computer, the modem, router, an MP3 player, and a

digital camera. A forensic analysis revealed child pornography was present on the desktop

computer.

A grand jury indicted Frater in October 2018 on one count of receipt and distribution of

child pornography, in violation of 18 U.S.C. § 2252(a)(2). He proceeded to trial in November

2023. Several witnesses testified for the government. Detective Blackmore, the lead detective on

the case, testified to how GridCop helped him identify Frater as the perpetrator. He described the

sexually explicit files that he received from Frater’s IP address and the way those files were

downloaded and shared via a peer-to-peer software called LemonWire and a peer-to-peer network

called Gnutella. Specifically, he explained how a user searching for child pornography must be

familiar with common terms such as “PTHC” (pre-teen hard core), “Tropical Cuties,” “Paradise

Birds,” and “daddypedo,” among others. And he confirmed that Frater’s IP address generated

several keyword searches including these terms.

Task Force Officer Steven Mueller likewise appeared for the government. Mueller, a

forensic examiner, analyzed the devices taken from Frater’s home during the search, and he

confirmed that Frater’s HP desktop computer contained child pornography. He spoke about how

he looked for stills, graphic files, and videos of child pornography, as well as a Global Unique

Identifier (GUID), which is a type of serial number that links a specific computer to the peer-to-

peer software program. Mueller was able to connect the computer’s activity with Frater because

the main user account was titled “Chris,” and he identified multiple documents that belonged to

2 No. 24-3258, United States v. Frater

Frater personally, including, for example, a college loan document. And while there was also a

secondary guest account titled “Nicky,” belonging to Frater’s wife, Mueller stated that he only

found child pornography on the User Chris account.

Mueller also spoke to the files that he found on Frater’s computer, describing where those

files were located and why there was no doubt—from a forensic perspective—that child sex abuse

material (CSAM) was located on Frater’s computer. He confirmed that the digital footprint of the

CSAM originated from the User Chris account. The jury also heard about the web history

extraction report that Mueller prepared of Frater’s cell phone. Mueller explained how Frater’s

web history contained common child pornography search terms, including “Tropical Cuties,”

“Family taboo,” and “Family strokes.” That said, no actual CSAM was found on Frater’s phone.

Christina Suther, a senior digital forensic examiner with the FBI, also testified. Like

Mueller, Suther analyzed Frater’s computer and cell phone. She first spoke to the files that she

found on the computer in the User Chris account. She explained that Windows records about fifty

of the user’s “most recently used files.” And of those files, she found child pornography opened

as recent as January 26, 2018—the same day as the execution of the search warrant—in the User

Chris account. More still, Suther noted that the User Nicky account did not have a password, but

User Chris’s account was password protected.

Suther also created a report that included a timeline of logins and logouts of each of the

two accounts on Frater’s computer. The report showed, for example, that the last login time for

the User Chris account was January 25, 2018, at 11:48 p.m., while the last logout time occurred at

12:58 a.m. on January 26, 2018. During that time, the user viewed child pornography. For the

User Nicky account, the last login time was January 24, 2018, at 12:44 p.m., while the last logout

occurred just three minutes later. Child pornography activity was not detected during that time

3 No. 24-3258, United States v. Frater

frame. And Suther found no evidence of a remote session—where a user logs in to his or her

desktop computer from a different device—or of a virtual private network, which she described as

a tunnel-like internet connection accessible only to authorized users. But there was evidence of

external media and flash drives associated with Frater’s computer and proof that child pornography

files were viewed using the flash drive. More still, Suther explained that though Frater’s computer

had viruses, they could not have been the source of the child pornography, dispelling any

speculation that the CSAM found was not attributable to conscious conduct. And Suther, like

Mueller, established that Google searches on Frater’s phone included visits to child pornography

websites on multiple dates between December 2017 and January 2018.

Frater’s former foster daughter also testified. She explained that she sometimes used

Frater’s phone to play games on. She testified that she saw videos of “kids and grown-ups having

sex with their clothes off” on both Frater’s phone and computer. And on some occasions, when

Frater did not know she was there, she would see him viewing child pornography on his computer.

Finally, Special Agent Brian Russ of the FBI testified. Agent Russ recounted for the jury

the voluntary conversation that occurred between himself, Frater, and another agent on the day of

the search warrant. They discussed Frater’s background and asked him whether he had any peer-

to-peer programs on his computer. Frater told Agent Russ that he used LemonWire and LimeWire

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Jackson v. Virginia
443 U.S. 307 (Supreme Court, 1979)
United States v. Schene
543 F.3d 627 (Tenth Circuit, 2008)
United States v. David Oufnac
449 F. App'x 472 (Sixth Circuit, 2011)
United States v. Michael Price
134 F.3d 340 (Sixth Circuit, 1998)
United States v. Paul Pavulak
700 F.3d 651 (Third Circuit, 2012)
United States v. Jordan
544 F.3d 656 (Sixth Circuit, 2008)
United States v. James Lowe
795 F.3d 519 (Sixth Circuit, 2015)
United States v. Russell Collins
799 F.3d 554 (Sixth Circuit, 2015)
United States v. Lesa Chaney
921 F.3d 572 (Sixth Circuit, 2019)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Christopher Frater, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-christopher-frater-ca6-2025.