United States v. Ethan Larman

547 F. App'x 475
CourtCourt of Appeals for the Fifth Circuit
DecidedNovember 13, 2013
Docket12-50855
StatusUnpublished
Cited by6 cases

This text of 547 F. App'x 475 (United States v. Ethan Larman) is published on Counsel Stack Legal Research, covering Court of Appeals for the Fifth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Ethan Larman, 547 F. App'x 475 (5th Cir. 2013).

Opinion

PER CURIAM: *

Ethan Larman appeals his conviction on one count of Receipt of Child Pornography, one count of Attempted Distribution of Child Pornography, both under 18 U.S.C. § 2252A(a)(2), and two counts of Possession of Child Pornography under 18 U.S.C. § 2252A(a)(4)(B). Larman not only challenges the sufficiency of the evidence to convict him, but further asserts errors in jury instructions, an error in an evidentiary ruling, and errors in the application of two sentencing enhancements. We consider and reject his arguments, and, for the reasons that follow, we AFFIRM his conviction and sentence on all counts.

I.

On October 23, 2010, an Internet Protocol address (“IP address”) in El Paso, Texas, made available for sharing child sexual abuse images over a peer-to-peer network (“P2P”) between 8:12 and 8:57 a.m. 1 Law enforcement monitoring software created an activity report identifying the internet service provider (“ISP”) and the amount of images, categorized as “child notable,” associated with child abuse. Nicholas Marquez, a special agent with the Homeland Security Investigations Cyber Crimes Group (“HSI”), first observed this report on November 23, 2010, exactly one month after the incident of sharing. The software identified these images as “child notable” because of unique indicators called hash values, contained within the images’ source code. Hash values, specific to the makeup of a particular image’s data, allow law enforcement to compare suspected child sexual abuse images to ones already present in law enforcement media libraries. This comparison allows law enforcement to identify child pornography with almost absolute certainty, regardless of the name associated with a file.

Using this process, Marquez confirmed that thirteen images from the October 23 incident were indeed verified child sexual abuse images. After this confirmation, Marquez sent a summons to the ISP, *478 Time-Warner Cable, requesting the subscriber information for that particular IP address. He received notice that the IP address belonged to Ethan Larman, a member of the U.S. military, at his El Paso, Texas address. Once Marquez confirmed that Larman resided at that address, he obtained a search warrant for Larman’s residence. Two days later, Marquez and other agents executed the warrant. While executing the warrant, agents took Larman and his roommate Benjamin Morgan outside while officers conducted a search of the apartment.

Once outside, Marquez and Dustin Sletner, a special agent in the U.S. Army Criminal Investigation Division, interviewed Larman inside a government vehicle. Sletner took detailed notes during this interview, although the purpose of his presence was to serve as a witness. Marquez and Sletner testified that Larman told them he owned a computer and that he was the only individual who used the computer. Larman described his expertise with computers as “low,” but he acknowledged that he knew how to move, delete, and rename files. Most importantly, Larman admitted downloading child pornography through the Limewire P2P program approximately 50 times beginning in June of 2010. Larman informed the two agents that there were incriminating images in the “My Pictures” folder on his computer, on his PlayStation 3, and on two thumb drives he owned. In addition to these admissions, Larman informed agents as to why he was attracted to underage girls and described the manner in which he ordinarily viewed the images. Larman would later testify at trial and deny telling the agents that he ever downloaded or possessed any child pornography.

The search of Larman’s apartment yielded five pieces of electronic media belonging to Larman that authorities suspected contained child pornography. HSI Special Agent Joseph Byers, a forensic examiner, examined the media using complex forensic software that creates a mirror image of the contents of a media device. The first device was an E-Machines desktop computer (named “C1H1”), found on the upper shelf of a closet in Larman’s bedroom. The second and third devices were two SanDisk thumb drives labeled “TD-1” and “TD-2,” respectively. The fourth device was a PlayStation 3, which Byers was unable to examine because of the device’s encryption technology. The final device was a CD-R with the word “Limewire” handwritten on the front of it. This CD-R was found in a brown CD case belonging to Larman.

Byers’s examination of C1H1 confirmed that a P2P program called Frostwire had been installed four months before the sharing incident and remained on the computer. Byers found music and a bestiality video in the Frostwire shared folder, but no child pornography. He also found files indicating that Limewire previously had been installed on C1H1. Most importantly, Byers found child pornography files with hash values matching those identified in the earlier sharing incident. ClHl’s temporary internet cache folder also contained data suggesting that child pornography previously had been accessed on that computer. 2

*479 The examination of TD-1 and TD-2 revealed more child pornography. Many of the images on TD-1 were “series” or “known file filter” images, meaning these images were of known victims previously identified by law enforcement. Again, several of these images matched the hash values of images identified in the sharing incident by the CPS software. Byers found that these child pornographic images were stored in a folder several levels down the “tree structure” of the device, meaning that the folders would have had to be consciously created by the user. Also contained on TD-1 were a large assortment of Larman’s personal photographs, including pictures of his tattoos and pictures of his wife. TD-2 contained fewer child pornographic images, although Byers was able to effectively identify three such images. The CD-R Byers recovered contained several files with names that indicated the images were child pornography, although these images were not charged in Larman’s indictment.

On April 4, 2012, a federal grand jury returned a four-count, superseding indictment charging Larman with violating 18 U.S.C. § 2252(a)(2) in Count One: Receipt of Child Pornography and Count Two: Attempted Distribution of Child Pornography, and 18 U.S.C. § 2252(a)(4)(B) in Counts Three and Four: Possession of Child Pornography. On April 16, 2012, Larman’s jury trial began. Four days later, a jury found Larman guilty on all four counts. The district court judge later sentenced Larman to concurrent 188-month terms of imprisonment on Counts One and Two, and concurrent 120-month terms of imprisonment on Counts Three and Four. Larman appeals only Counts One, Two, and Three of his conviction. Thus, as far as the record shows, he stands convicted on Count Four.

II.

Larman’s first issue on appeal challenges the sufficiency of the evidence used to support Counts One, Two, and Three of his child pornography conviction.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Villacorta
Fifth Circuit, 2025
State Of Washington v. Aaron Mark Harrier
Court of Appeals of Washington, 2020
United States v. Daryl Pawlak
935 F.3d 337 (Fifth Circuit, 2019)
Zachary M. Morales v. State of Florida
274 So. 3d 1213 (District Court of Appeal of Florida, 2019)
United States v. Henry Reddick
900 F.3d 636 (Fifth Circuit, 2018)
United States v. Ronald Seabridge
628 F. App'x 258 (Fifth Circuit, 2015)

Cite This Page — Counsel Stack

Bluebook (online)
547 F. App'x 475, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-ethan-larman-ca5-2013.