United States v. Frakes

402 F. App'x 332
CourtCourt of Appeals for the Tenth Circuit
DecidedNovember 12, 2010
Docket09-3361
StatusUnpublished
Cited by3 cases

This text of 402 F. App'x 332 (United States v. Frakes) is published on Counsel Stack Legal Research, covering Court of Appeals for the Tenth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Frakes, 402 F. App'x 332 (10th Cir. 2010).

Opinion

ORDER AND JUDGMENT *

CARLOS F. LUCERO, Circuit Judge.

Casey Frakes appeals his conviction and sentence for possession and distribution of child pornography. Exercising jurisdiction under 28 U.S.C. § 1291, we affirm.

I

In March 2008, an Independence, Missouri, detective investigating child exploitation crimes learned that a computer with a certain Internet Protocol (“IP”) address was sharing suspected child pornography images using Limewire, a peer-to-peer file-sharing program. 1 Determining that the IP address belonged to Pam S. Frakes of Atchison, Kansas, he referred the case to Kansas law enforcement. After investigating the case, Terry Kelley, an Atchison police department detective, and Jim Ka-natzar, an Immigration and Customs Enforcement special agent, executed a federal search warrant of Pam Frakes’ home on June 10, 2008. They interviewed Pam Frakes and her son Jason Frakes. They later interviewed Casey Frakes, the defendant, at his job site.

According to Kelly and Kanatzar, Frakes initially denied knowledge of any child pornography on the computer. Upon further questioning, he admitted having watched a twenty second video clip of a girl that was “probably younger than 14” disrobing. Kelly and Kanatzar testified that Frakes admitted that he used Lime-wire, that there were over a hundred pornographic movies on his computer, and that “probably 10 to 15 percent” were child pornography. At the end of the interview, Frakes told Kelley that if there was any child pornography on the computer, it was his, and to leave his brother and mother out of it. Agent Kanatzar’s further investigation of the Frakes’ computer uncovered a total of seven video files containing child pornography, all in a Limewire “shared” folder. Each member of the Frakes family had a “profile” on the computer, but Limewire was only installed in Casey’s profile. Pam Frakes and Jason Frakes testified that Casey’s profile was not password-protected and that other family members used it.

Frakes was charged in May 2009 with knowingly distributing and possessing child pornography. At trial, he admitted that he installed and used Limewire to search for pornography. He admitted that *334 he knew that Limewire was a “share program” and that any files he downloaded to his Limewire “shared” folder would be available to be shared with other Limewire users. He did not deny that his computer contained child pornography, but he testified that he did not specifically search for child pornography. Instead, he claimed that he used general sexual search terms and downloaded all of the resulting files, and that any child pornography on the computer had accidentally been downloaded in the process. He also testified that he never viewed the child pornography videos Agent Kanatzar found on his computer.

Following a three-day trial, a jury found Frakes guilty of both the distribution and possession charges. Although the district judge calculated an advisory Guidelines range of 188 to 235 months’ imprisonment, he sentenced Frakes to eighty-four months.

II

On appeal, Frakes argues: (1) there was insufficient evidence to sustain his conviction; (2) the district court incorrectly calculated his advisory Guidelines range; and (3) his counsel at sentencing was ineffective.

A

In assessing the sufficiency of the evidence supporting Frakes’ conviction, we review the record de novo. United States v. Ramos-Arenas, 596 F.3d 783, 786 (10th Cir.2010). We consider “the evidence and its reasonable inferences in the light most favorable to the government, to determine whether a reasonable jury could find the defendant guilty beyond a reasonable doubt.” Id. We do not weigh conflicting evidence or consider witness credibility. Id.

Frakes contends that there was insufficient evidence that he knowingly possessed one or more visual depictions of a minor engaged in sexually explicit conduct or that he knew the visual depictions involved the use of a minor engaging in sexually explicit conduct, elements under 18 U.S.C. § 2252(a)(4)(B). At trial, Kanatzar and Kelley testified to Frakes’ statement that ten to fifteen percent of his pornography was child pornography, and that if there was any pornography on the computer it was his. Frakes, however, contradicted Kanatzar and Kelley’s recollection of the interview, and presented evidence showing that the computer and Limewire shared folder were unsecured and accessible by the entire Frakes family. He also showed that the child pornography files were never moved or organized, and that only seven of the more than 500 video files he downloaded from Limewire were child pornography. Nevertheless, the government affirmatively produced sufficient evidence of Frakes’ knowledge, and the jury chose to believe that evidence. Although Frakes disagrees with the jury’s evaluation, we may not second-guess the jury’s credibility determination. See United States v. Gallant, 537 F.3d 1202, 1222 (10th Cir.2008).

For the jury to find Frakes guilty of knowing distribution of child pornography under 18 U.S.C. § 2252(a)(2), the government had to prove, among other elements, that Frakes knowingly distributed child pornography and that he knew that it depicted minors engaging in sexually explicit conduct. Frakes contends that the government did not produce sufficient evidence of his knowledge regarding either element.

At trial, the government introduced testimony indicating: (1) Frakes stated he knew there was child pornography on his computer; (2) he stated that if there was any child pornography on his computer it *335 was his; (3) he installed Limewire on this computer; (4) he knew the files in his Limewire “shared” folder would be shared with others; (5) his Limewire “shared” folder contained child pornography; and (6) a detective was able to access images of child pornography from Frakes’ computer via Limewire. Again, although Frakes introduced contradictory evidence tending to mitigate his knowledge (for example, that the Limewire “shared” folder is the default destination for files downloaded from Li-mewire), the jury determined that the government’s witnesses were more credible. Viewed in the light most favorable to the government, that evidence was sufficient for a reasonable jury to conclude beyond a reasonable doubt that Frakes knowingly distributed child pornography.

B

Frakes also claims that the district court erroneously calculated his advisory Guidelines sentencing range. Because he did not raise this objection below, we review this claim only for plain error. United States v. Mancera-Perez, 505 F.3d 1054, 1058 (10th Cir.2007).

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Steve Singo
680 F. App'x 190 (Fourth Circuit, 2017)
United States v. Mark McGill
754 F.3d 452 (Seventh Circuit, 2014)
United States v. Reingold
731 F.3d 204 (Second Circuit, 2013)

Cite This Page — Counsel Stack

Bluebook (online)
402 F. App'x 332, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-frakes-ca10-2010.