United States v. Christopher Robert Harper

CourtCourt of Appeals for the Sixth Circuit
DecidedJuly 25, 2023
Docket22-5984
StatusUnpublished

This text of United States v. Christopher Robert Harper (United States v. Christopher Robert Harper) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Christopher Robert Harper, (6th Cir. 2023).

Opinion

NOT RECOMMENDED FOR PUBLICATION File Name: 23a0341n.06

No. 22-5984

UNITED STATES COURT OF APPEALS FILED FOR THE SIXTH CIRCUIT Jul 25, 2023 DEBORAH S. HUNT, Clerk ) UNITED STATES OF AMERICA, ) Plaintiff-Appellee, ) ) ON APPEAL FROM THE v. ) UNITED STATES DISTRICT ) COURT FOR THE WESTERN CHRISTOPHER ROBERT HARPER, ) DISTRICT OF TENNESSEE Defendant-Appellant. ) ) OPINION

Before: McKEAGUE, GRIFFIN, and MURPHY, Circuit Judges.

GRIFFIN, Circuit Judge.

Defendant Christopher Harper claims he had a right to examine confidential software law

enforcement used to download child pornography from his computer to ensure that it performed

as the government proclaimed. The district court denied his motion to compel, and a jury convicted

him of possessing child pornography. On appeal, he challenges that denial and the sufficiency of

the evidence supporting his conviction. We affirm.

I.

As part of an investigation into the distribution of child pornography, FBI special agent

Stephen Lies used a software designed for law-enforcement purposes called “Torrential

Downpour” to search the BitTorrent peer-to-peer file-sharing network for illicit materials. With

that network “a typical user . . . [generally] receive[s] multiple pieces of a file from several

different sources,” but the software Lies used allowed him to conduct “single-source No. 22-5984, United States v. Harper

downloads”—i.e., from a sole IP address. See United States v. Clark, 24 F.4th 565, 570 (6th Cir.

2022) (brackets omitted). Lies identified a computer offering for download several files with titles

suggesting child pornography and was able to download a partial “video file [that] depicted a

prepubescent female appearing to be under 12 years of age engaged in masturbating a male, vaginal

sex, and the lascivious exhibition of the pubic area.”

Lies traced the IP address to a house in Memphis, Tennessee, and interviewed its residents.

He learned that Harper lived at the house when the video was downloaded. So Lies interviewed

Harper, who both confirmed he used to live at that house and that he owned a laptop, which he

agreed to make available to law enforcement. Lies searched the laptop and discovered—despite

its having the operating system reinstalled (to perhaps clear it of incriminating evidence)—several

deleted files indicative of child pornography. Those included numerous file names referencing

child pornography, as well as searches conducted on the BitTorrent network that are “commonly

used to search for image and video files depicting prepubescent minors engaged in sexually

explicit conduct.” Although the video Lies downloaded was not there, a deleted file with the same

name was.

A grand jury indicted defendant on two counts: (1) distributing child pornography in

violation of 18 U.S.C. § 2252(a)(2); and (2) possessing child pornography in violation of 18 U.S.C.

§ 2252(a)(4)(B). Before trial, Harper broadly moved to compel the government to produce an

installable version of the Torrential Downpour software, as well as the user manual, training

materials, and source code. A magistrate judge denied Harper’s motion following an evidentiary

hearing, which the district court adopted. A jury subsequently convicted defendant on the

possession count, and the district court imposed a sixty-three month sentence.

-2- No. 22-5984, United States v. Harper

II.

Harper first asserts the district court erroneously denied his motion to compel the

production of information about Torrential Downpour. On abuse-of-discretion review, United

States v. Pirosko, 787 F.3d 358, 365 (6th Cir. 2015), we discern no error meriting reversal.

The Federal Rules of Criminal Procedure require the government to produce, “[u]pon a

defendant’s request,” all “data” and “documents” (among other things) that are “material to

preparing the defense.” Fed. R. Crim. P. 16(a)(1)(E)(i). But when the request seeks information

cloaked in law enforcement privilege, we must weigh the competing interests of a defendant’s

articulated needs in receiving that information with the government’s desire to protect it from

disclosure. Pirosko, 787 F.3d at 365. Application of this balancing test means the government

does not have “a blank check to operate its file-sharing detection software sans scrutiny,” for the

discovery of such materials ensures “that the government’s investigative methods [are] reliable,

both for individual defendants . . . and for the public at large.” Id. at 366. Yet, given the sensitive

nature of the government’s investigative methods, we require a “defendant to produce some

evidence of government wrongdoing.” Id.

The district court concluded Harper did not satisfy this “wrongdoing” threshold. It did so

by noting that Harper’s expert, Richard Connor, admitted he had no “way to dispute or refute”

Agent Lies’s testimony, so he wanted access to the software “to see how it operated” and confirm

it worked as advertised. Other than asserting that it would be “theoretically” possible for a virus

to modify the government’s software to render it suspect, Connor offered no evidence of

governmental wrongdoing.

On review of this evidence, we cannot conclude the district court abused its discretion.

Harper “has not shown that the government engaged in wrongdoing (the only way the evidence

-3- No. 22-5984, United States v. Harper

could help his defense) in employing the technique. He commissioned an expert to evaluate the

technique, but the expert could not identify any errors in the government’s efforts.” United States

v. Harney, 934 F.3d 502, 508 (6th Cir. 2019); accord Pirosko, 787 F.3d at 366. And, as in Harney,

the government offered for Connor “to conduct a forensic examination” of the data downloaded

from Harper’s computer, which would have “reveal[ed] the computer logs, show[n] when law

enforcement officers connected to Harper’s computer, and what files were downloaded.” That

offer went unclaimed. See Harney, 934 F.3d at 508 (“Nor did Harney to our knowledge try to use

the information the United States offered to give him to show that the technique didn’t operate as

expected.”). Left with “nothing more than conjecture about what the additional evidence might

show,” Harper “comes up short.” Id.

Defendant resists this conclusion, asserting he demonstrated governmental wrongdoing

because Lies ultimately downloaded only a portion of the video. With that fact, he argues United

States v. Budziak, 697 F.3d 1105 (9th Cir. 2012), is instructive because the defendant there both

“presented evidence suggesting that the FBI may have only downloaded fragments of child

pornography files from his ‘incomplete’ folder, making it ‘more likely’ that he did not knowingly

distribute any complete child pornography files,” and “that the FBI agents could have used the . . .

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Jackson v. Virginia
443 U.S. 307 (Supreme Court, 1979)
United States v. Michael L. Jackson
470 F.3d 299 (Sixth Circuit, 2006)
United States v. Max Budziak
697 F.3d 1105 (Ninth Circuit, 2012)
United States v. Joseph Pirosko
787 F.3d 358 (Sixth Circuit, 2015)
United States v. Harold Persaud
866 F.3d 371 (Sixth Circuit, 2017)
United States v. Jeffrey Harney
934 F.3d 502 (Sixth Circuit, 2019)
United States v. Michael Clark
24 F.4th 565 (Sixth Circuit, 2022)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Christopher Robert Harper, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-christopher-robert-harper-ca6-2023.