United States v. Daryl Pawlak

935 F.3d 337
CourtCourt of Appeals for the Fifth Circuit
DecidedAugust 15, 2019
Docket17-11339
StatusPublished
Cited by7 cases

This text of 935 F.3d 337 (United States v. Daryl Pawlak) is published on Counsel Stack Legal Research, covering Court of Appeals for the Fifth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Daryl Pawlak, 935 F.3d 337 (5th Cir. 2019).

Opinion

JERRY E. SMITH, Circuit Judge:

Daryl Pawlak was convicted of receipt of child pornography and access with intent to view child pornography involving a prepubescent minor. Pawlak asserts that the district court erred in denying his motions to dismiss the indictment and to suppress evidence, that the evidence was insufficient to sustain his convictions on either count, and that the court clearly erred in applying a two-level sentencing enhancement for obstruction of justice. Finding no error, we affirm.

I.

A.

In December 2014, federal law enforcement officials learned that a U.S.-based Internet protocol ("IP") address was hosting a website called "PlayPen," which contained a significant amount of child pornography. United States v. Ganzer , 922 F.3d 579 , 581 (5th Cir. 2019), petition for cert. filed (July 23, 2019) (No. 19-5339). The website operated on an anonymity network and was accessible using publicly available software known as The Onion Router ("TOR"). Id .

Unlike the traditional Internet, TOR software anonymizes a user's actual IP address (which can be tied to a physical location) by routing the user's connection through a series of randomly selected computers on the network. Id . That feature generally makes it impossible for law enforcement officials to identify the administrators and users of websites containing child pornography, such as PlayPen, without employing other investigative techniques. Id .

In January 2015, the FBI executed a search warrant and obtained a copy of the server hosting the PlayPen website, which it transferred to a government-controlled facility in Virginia. Id . After obtaining a second warrant from a magistrate judge in the Eastern District of Virginia, id. , the FBI began a thirteen-day sting operation *342 aimed at unmasking the identities of PlayPen users. 1

The operation centered on the use of specialized malware called the Network Investigative Technique ("NIT"). Id. "The NIT was a form of malware that augmented the content sent by Playpen to the computers of Playpen users with directions instructing those computers to send identifying information to a computer controlled by the government," id ., including "the computer's IP address and when the NIT determined [it]; a unique identifier for the computer generated by the NIT; the type of operating system used by the computer and the operating system's active username ...; the computer's host name; and the computer's media access control," id. at 581-82 . The government further explains that

[t]he NIT would not deploy onto a PlayPen user's computer until that individual logged into the website (which required them to have the TOR browser, know the 16-character website address, [ 2 ] and enter their login information for PlayPen), accessed a certain section in the site, and then actually requested content by clicking on a post in one of the more egregious sections.

B.

Using the NIT, federal agents linked PlayPen user "notsoslow"-later determined to be Daryl Pawlak-with an IP address associated with a residence in Johnson County, Texas. The user had been logged into PlayPen for more than fourteen hours before the NIT deployed on his computer in March 2015, and he had spent an additional hour-and-a-half on PlayPen during the FBI's operation of the website. The NIT also returned Pawlak's computer username ("d.pawlak"), the name of the computer ("Sigma94"), and the computer's MAC address.

On October 1, 2015, after obtaining a search warrant for Pawlak's residence, FBI agents interviewed Pawlak's wife. Using the wife's cell phone, Agent Marya Wilkerson called Pawlak and recorded the conversation. On the call, Pawlak admitted, inter alia , that he had downloaded and viewed child pornography using laptops from two different employers, had an email address utilizing the term "notsoslow," had previously used a work computer with the name of "Sigma94," and believed his username on that computer was "d.pawlak." Pawlak also acknowledged that the computer (the "Sigma94 computer") had been in his possession from October 2014 until May 2015, when he returned it to his former employer, Sigma Cubed following his termination.

In the recorded conversation, Pawlak stated that he had initially viewed child pornography approximately three or four years earlier while working for a previous employer. He admitted that he preferred child pornography involving prepubescent females approximately seven to eleven years old, that he often accessed such pornography on a website called "Girls Hub," and that he had last viewed child pornography about one week before.

Later that day, Pawlak and Agent Wilkerson engaged in a second conversation that was not recorded. Pawlak admitted *343 that he had attempted to delete the contents of the hard drive on his current work computer (the "Independence Oil computer") but was unable to do so.

The FBI later acquired the Sigma94 computer from Sigma Cubed. Pawlak was the first and only employee to use the computer, which had remained in a sealed box in Sigma Cubed's offices after he returned it in May 2015. Following a forensic examination, law enforcement officials discovered several images of child pornography in the temporary Internet cache of the Sigma94 computer. The presence of the images in the cache demonstrated that the files came from the Internet, as well as that they were received and stored on the computer. Federal agents also found evidence of seven other images of child pornography on the computer.

In addition, federal agents captured information from when Pawlak accessed the PlayPen website both before and during the thirteen days it was operated by the government. Evidence showed that Pawlak clicked on several posts containing child pornography involving prepubescent female children.

In October 2015, the FBI obtained access to the Independence Oil computer, on which investigators discovered approximately eight hundred images and four videos of child pornography. Pawlak was charged with receipt of child pornography, in violation of 18 U.S.C. § 2252A(a)(2)(A) (Count One), and access with intent to view child pornography involving a prepubescent minor, in violation of 18 U.S.C. §

Related

State v. Dore
Connecticut Appellate Court, 2026
United States v. Clint Schram
128 F.4th 922 (Eighth Circuit, 2025)
State of Arizona v. Brian Matthew MacHardy
521 P.3d 613 (Court of Appeals of Arizona, 2022)
United States v. Sarabia
Fifth Circuit, 2021
United States v. Wagner
951 F.3d 1232 (Tenth Circuit, 2020)
United States v. Louis Smith
Fifth Circuit, 2019

Cite This Page — Counsel Stack

Bluebook (online)
935 F.3d 337, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-daryl-pawlak-ca5-2019.