United States v. Dennis Ammons

CourtCourt of Appeals for the Sixth Circuit
DecidedMarch 13, 2020
Docket19-5686
StatusUnpublished

This text of United States v. Dennis Ammons (United States v. Dennis Ammons) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Dennis Ammons, (6th Cir. 2020).

Opinion

NOT RECOMMENDED FOR PUBLICATION File Name: 20a0150n.06

No. 19-5686

UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT FILED UNITED STATES OF AMERICA, ) Mar 13, 2020 ) DEBORAH S. HUNT, Clerk Plaintiff-Appellee, ) ) ON APPEAL FROM THE v. ) UNITED STATES DISTRICT ) COURT FOR THE WESTERN DENNIS AMMONS, ) DISTRICT OF KENTUCKY ) Defendant-Appellant. ) )

Before: MERRITT, THAPAR, and LARSEN, Circuit Judges.

LARSEN, Circuit Judge. A jury convicted Dennis Ammons of knowingly accessing child

pornography with intent to view it. The district court sentenced him to 110 months in prison. On

appeal, Ammons challenges both his conviction and his sentence. We AFFIRM.

I.

In 2014, the FBI began investigating a website known as “Playpen.” Playpen was an online

forum that advertised and distributed child pornography. Once logged in, users could view an

extensive collection of pictures and videos containing child pornography.

Playpen was not accessible through traditional internet browsers. Instead, the site could

only be accessed through what is colloquially referred to as the “dark web.” See United States v.

Tagg, 886 F.3d 579, 582 (6th Cir. 2018). Users had to download special software known as “The

Onion Router” or “Tor,” which allowed them to anonymously access a network of hidden

websites. Through the Tor software, users then had to input an intricate web address consisting of

random, algorithm-generated characters to reach Playpen’s site. This web address was not linked No. 19-5686, United States v. Ammons

to traditional search engines like Google; it had to be obtained through other means, such as direct

communication with pre-existing users.

With help from a foreign government, the FBI located a server containing a copy of

Playpen’s website. In January of 2015, agents obtained a search warrant and seized a copy of that

server. Agents then identified and apprehended Playpen’s administrator the following month. At

that point, the FBI assumed control over Playpen. But even having control did not allow the FBI

to identify the website’s users; the Tor software masked their IP addresses.

The government sought a warrant from a magistrate judge in the Eastern District of

Virginia—where the FBI had transported Playpen’s server—to deploy what is known as a

“Network Investigative Technique” (NIT). An NIT is a form of “government-created malware.”

United States v. Werdene, 883 F.3d 204, 206 (3d Cir. 2018). It unmasks a user’s IP address by

embedding instructions within the website’s code that force the user’s computer to transmit its IP

address to a government-controlled server. The magistrate judge issued the warrant on February

20, 2015 (the Virginia Warrant).

Using the NIT, the government obtained an IP address associated with the username

“H8RL3Y.” This user had accessed several child-pornography images on Playpen over a six-hour

period in early March 2015. The user had also responded to a post titled “Pthc 14Y Lil Zinaida

13Y Boy (51.15),” asking “What’s the password?” The post contained a link to an external website

where visitors could download child pornography.

The FBI ultimately traced H8RL3Y’s IP address to a home in Muldraugh, Kentucky, where

Ammons lived with his sister and her two minor children. The government sought and obtained a

warrant to physically search Ammons’ residence for evidence of child pornography (the Kentucky

Warrant). The application for the Kentucky Warrant relied on the information obtained through

-2- No. 19-5686, United States v. Ammons

the NIT to establish probable cause. The subsequent search and seizure of Ammons’ computer

revealed 220 child-pornography images (113 non-duplicates) stored in the cache of his Chrome

web-browser. The metadata attached to these images indicated that they had been accessed on

October 22, 2015.

Following the search, the FBI interviewed Ammons. He waived his Miranda rights and

agreed to answer the agents’ questions. Ammons told the agents that he was the primary user of

the computer in his household. He also explained that he had installed a password protected

wireless router in the house a few months earlier. Finally, after initially denying ever seeing child

pornography, Ammons admitted that he came across child pornography while exploring the “dark

web.” He named multiple sites where he had seen child pornography and described the images to

the agents—though he claimed he was not a “collector” of these images.

The FBI also interviewed Ammons’ 16-year-old niece, who lived in his Kentucky home.

She told agents that Ammons had previously taken nude photographs of her. She described an

incident in which Ammons had caught her taking nude pictures of herself. She stated that Ammons

confronted her, confiscated the phone on which she had taken the pictures, and threatened to tell

her mother unless she agreed to pose nude for Ammons. She claimed that Ammons then took

nude photographs of her, forcing her to pose with her legs spread apart exposing her genitals.

These photographs were never found.

A grand jury indicted Ammons on two counts: (1) production of child pornography, in

violation 18 U.S.C. § 2251(a) and (e); and (2) knowingly accessing child pornography with intent

to view it, in violation of 18 U.S.C. § 2252A(a)(5)(B). Prior to trial, Ammons moved to suppress

the evidence obtained from his computer through both the NIT and the physical search of his home.

He argued that the Virginia Warrant was invalid because the issuing magistrate judge lacked

-3- No. 19-5686, United States v. Ammons

jurisdiction over Kentucky, where Ammons’ computer was located when the government

implemented the NIT. Because the subsequent Kentucky Warrant was obtained with information

from the NIT, Ammons contended that evidence from both searches must be suppressed. The

district court denied Ammons’ motion, and the case proceeded to trial.

After trial, the jury rendered a split verdict, acquitting Ammons of producing child

pornography but convicting him of knowingly accessing child pornography with intent to view it.

Ammons moved for a judgment of acquittal, arguing that the evidence was insufficient to support

his conviction. The district court denied his motion.

Ammons’ conviction carried a maximum prison sentence of ten years. See 18 U.S.C.

§ 2252A(b)(2). At sentencing, the district court concluded that the appropriate Guidelines range

was 108 to 120 months. Ammons argued that his Guidelines range was unreasonable.

Specifically, he contended that the enhancements contained in U.S.S.G. § 2G2.2 resulted in nearly

all child-pornography offenders receiving the maximum sentence; as a result, Ammons argued,

the court should ignore those enhancements and issue a below-Guidelines sentence. The district

court disagreed, sentencing Ammons to 110 months in prison—10 months shy of the statutory

maximum. Ammons appealed.

II.

A.

Ammons argues first that the district court erred by denying his motion to suppress.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Master
614 F.3d 236 (Sixth Circuit, 2010)
United States v. Graham
622 F.3d 445 (Sixth Circuit, 2010)
United States v. Donald Ray Scott
260 F.3d 512 (Sixth Circuit, 2001)
United States v. Don S. McAuliffe
490 F.3d 526 (Sixth Circuit, 2007)
United States v. Brune
767 F.3d 1009 (Tenth Circuit, 2014)
United States v. Steven Horton
863 F.3d 1041 (Eighth Circuit, 2017)
United States v. Gabriel Werdene
883 F.3d 204 (Third Circuit, 2018)
United States v. Derek Tagg
886 F.3d 579 (Sixth Circuit, 2018)
United States v. Andrew Moorehead
912 F.3d 963 (Sixth Circuit, 2019)
United States v. Lawrence Lynde
926 F.3d 275 (Sixth Circuit, 2019)
Davis v. United States
180 L. Ed. 2d 285 (Supreme Court, 2011)
United States v. Fisher
745 F.3d 200 (Sixth Circuit, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Dennis Ammons, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-dennis-ammons-ca6-2020.