PER CURIAM:
Gregory James Shiver appeals from his conviction and sentence for knowingly possessing images of child pornography that had been transported in interstate commerce, in violation of 18 U.S.C. § 2252A(a)(5)(B) (2004).
On appeal, Shiver argues that the district court erred in denying his motion for judgment of acquittal because: (1) there was insufficient evidence that the images of child pornography found on his computer had traveled in interstate commerce; and (2) there was insufficient evidence that he “knowingly possessed” the illicit images. Shiver also contends that the district court erred in enhancing his sentence pursuant to 18 U.S.C. § 2252A(b)(2) based on his conviction for another offense that occurred after he committed the offense at issue in this case. After thorough review, we affirm Shiver’s conviction but remand for resentencing.
We review
de novo
the denial of a defendant’s motion for judgment of acquittal.
United States v. Perez-Tosta,
36 F.3d 1552, 1556 (11th Cir.1994). We view “the evidence in the light most favorable to the government, with all reasonable inferences and credibility choices made in the government’s favor,”
United States v. Keller,
916 F.2d 628, 632 (11th Cir.1990), and ask whether “a reasonable fact-finder could conclude that the evidence established the defendant’s guilt beyond a reasonable doubt,”
United States v. Pistone,
177 F.3d 957, 958 (11th Cir.1999). “It is not necessary that the evidence exclude every reasonable hypothesis of innocence or be wholly inconsistent with every conclusion except that of guilt, provided a reasonable trier of fact could find that the evidence establishes guilt beyond a reasonable doubt.”
United States v. Henry,
920 F.2d 875, 877 (11th Cir.1991) (quotation omitted).
First, we reject Shiver’s claim that the evidence was insufficient to support the jury’s conclusion that the child pornography found on his computer had been “transported in interstate or foreign commerce.” 18 U.S.C. § 2252A(a)(5)(B). The government’s computer expert testified that the file names and resolution of certain of the images indicated that they had arrived on Shiver’s computer via the Internet.
Since it is well-settled that “[t]he internet is an instrumentality of interstate commerce,”
United States v. Hornaday,
892 F.3d 1306, 1311 (11th Cir.2004), this fact alone satisfies § 2252A(a)(5)(B)’s jurisdictional requirement. Moreover, a receipt indicating the cancellation of a subscription to an Internet web site called “Pure Teen Porn” was found in Shiver’s home. Regardless of whether the images on the site constituted child pornography, the receipt shows Shiver’s familiarity with making commercial transactions for pornographic images on the Internet. The government also presented evidence specifically showing that the image of one child in particular had been produced in North Carolina. That the latter image ended up on Shiver’s computer in Florida strongly suggests that it traveled in interstate commerce.
We likewise reject Shiver’s contention that the government’s evidence was insufficient to support the jury’s conclusion that he “knowingly possessed” the images of child pornography on his computer. Although we have interpreted the meaning of “knowing possession” in other contexts,
see, e.g., United States v. Glover,
431 F.3d 744, 748 (11th Cir.2005) (holding that “[k] no wing possession can be demonstrated by proof of either actual or constructive possession”) (quotation omitted), we have not yet had occasion to address what constitutes the “knowing possession” of computer images for purposes of § 2252A(a)(5)(B).
We need not formulate a definitive interpretation of the requirement here, however, because we conclude that, even on Shiver’s own view, there was ample evidence that he knowingly possessed the images on his computer.
Shiver contends that merely viewing images of child pornography on a computer is not enough to show knowing possession of those images. Rather, he claims, the government must prove that he purposely downloaded, stored, or in some way exercised dominion and control over the images. Shiver argues that the government failed to show that he was aware of the images or that he exercised any control over them. Instead, he maintains that they were placed on his computer without his knowledge by a virus or by “pop-up” windows that appeared on his computer screen unbidden. We are not persuaded.
To begin with, Shiver himself provided direct evidence that he knowingly possessed child pornography when he was interviewed by the police. Upon being asked by investigators, “Do you have any child pornography?” Shiver responded, “I had a small amount but I think I pretty much well have gotten rid of it.” Shiver’s claim that in answering the question he was referring only to adult pornography is flatly contradicted by the record.
The government also produced substantial indirect evidence that Shiver knowingly possessed the images. Por example, during an interview with authorities, Shiver referred to himself as a “pedophile.” In addition, the government’s computer expert testified that Internet searches conducted on Shiver’s computer used words and terms that were likely to return pornographic images of children, and that many of the illicit images on Shiver’s computer had been accessed on multiple occasions, thus belying Shiver’s contention that a virus had placed the images on his computer without his knowledge. The government’s expert also opined that, as a technological matter, the images on Shiver’s computer could not plausibly be accounted for by pop-up windows.
Shiver insists that since all of the images had been deleted and stored in his computer’s unallocated files, and since he lacked the “forensic software” to access or retrieve the images from that location, he consequently lacked the ability to exercise dominion or control over the images. But even assuming that Shiver was in fact unable to retrieve the images from the unallocated files, he was able to exercise control over the images by deleting them from his computer’s cache.
See Romm,
455 F.3d at 1000-01 (observing that deleting images is a form of exercising control over them).
Free access — add to your briefcase to read the full text and ask questions with AI
PER CURIAM:
Gregory James Shiver appeals from his conviction and sentence for knowingly possessing images of child pornography that had been transported in interstate commerce, in violation of 18 U.S.C. § 2252A(a)(5)(B) (2004).
On appeal, Shiver argues that the district court erred in denying his motion for judgment of acquittal because: (1) there was insufficient evidence that the images of child pornography found on his computer had traveled in interstate commerce; and (2) there was insufficient evidence that he “knowingly possessed” the illicit images. Shiver also contends that the district court erred in enhancing his sentence pursuant to 18 U.S.C. § 2252A(b)(2) based on his conviction for another offense that occurred after he committed the offense at issue in this case. After thorough review, we affirm Shiver’s conviction but remand for resentencing.
We review
de novo
the denial of a defendant’s motion for judgment of acquittal.
United States v. Perez-Tosta,
36 F.3d 1552, 1556 (11th Cir.1994). We view “the evidence in the light most favorable to the government, with all reasonable inferences and credibility choices made in the government’s favor,”
United States v. Keller,
916 F.2d 628, 632 (11th Cir.1990), and ask whether “a reasonable fact-finder could conclude that the evidence established the defendant’s guilt beyond a reasonable doubt,”
United States v. Pistone,
177 F.3d 957, 958 (11th Cir.1999). “It is not necessary that the evidence exclude every reasonable hypothesis of innocence or be wholly inconsistent with every conclusion except that of guilt, provided a reasonable trier of fact could find that the evidence establishes guilt beyond a reasonable doubt.”
United States v. Henry,
920 F.2d 875, 877 (11th Cir.1991) (quotation omitted).
First, we reject Shiver’s claim that the evidence was insufficient to support the jury’s conclusion that the child pornography found on his computer had been “transported in interstate or foreign commerce.” 18 U.S.C. § 2252A(a)(5)(B). The government’s computer expert testified that the file names and resolution of certain of the images indicated that they had arrived on Shiver’s computer via the Internet.
Since it is well-settled that “[t]he internet is an instrumentality of interstate commerce,”
United States v. Hornaday,
892 F.3d 1306, 1311 (11th Cir.2004), this fact alone satisfies § 2252A(a)(5)(B)’s jurisdictional requirement. Moreover, a receipt indicating the cancellation of a subscription to an Internet web site called “Pure Teen Porn” was found in Shiver’s home. Regardless of whether the images on the site constituted child pornography, the receipt shows Shiver’s familiarity with making commercial transactions for pornographic images on the Internet. The government also presented evidence specifically showing that the image of one child in particular had been produced in North Carolina. That the latter image ended up on Shiver’s computer in Florida strongly suggests that it traveled in interstate commerce.
We likewise reject Shiver’s contention that the government’s evidence was insufficient to support the jury’s conclusion that he “knowingly possessed” the images of child pornography on his computer. Although we have interpreted the meaning of “knowing possession” in other contexts,
see, e.g., United States v. Glover,
431 F.3d 744, 748 (11th Cir.2005) (holding that “[k] no wing possession can be demonstrated by proof of either actual or constructive possession”) (quotation omitted), we have not yet had occasion to address what constitutes the “knowing possession” of computer images for purposes of § 2252A(a)(5)(B).
We need not formulate a definitive interpretation of the requirement here, however, because we conclude that, even on Shiver’s own view, there was ample evidence that he knowingly possessed the images on his computer.
Shiver contends that merely viewing images of child pornography on a computer is not enough to show knowing possession of those images. Rather, he claims, the government must prove that he purposely downloaded, stored, or in some way exercised dominion and control over the images. Shiver argues that the government failed to show that he was aware of the images or that he exercised any control over them. Instead, he maintains that they were placed on his computer without his knowledge by a virus or by “pop-up” windows that appeared on his computer screen unbidden. We are not persuaded.
To begin with, Shiver himself provided direct evidence that he knowingly possessed child pornography when he was interviewed by the police. Upon being asked by investigators, “Do you have any child pornography?” Shiver responded, “I had a small amount but I think I pretty much well have gotten rid of it.” Shiver’s claim that in answering the question he was referring only to adult pornography is flatly contradicted by the record.
The government also produced substantial indirect evidence that Shiver knowingly possessed the images. Por example, during an interview with authorities, Shiver referred to himself as a “pedophile.” In addition, the government’s computer expert testified that Internet searches conducted on Shiver’s computer used words and terms that were likely to return pornographic images of children, and that many of the illicit images on Shiver’s computer had been accessed on multiple occasions, thus belying Shiver’s contention that a virus had placed the images on his computer without his knowledge. The government’s expert also opined that, as a technological matter, the images on Shiver’s computer could not plausibly be accounted for by pop-up windows.
Shiver insists that since all of the images had been deleted and stored in his computer’s unallocated files, and since he lacked the “forensic software” to access or retrieve the images from that location, he consequently lacked the ability to exercise dominion or control over the images. But even assuming that Shiver was in fact unable to retrieve the images from the unallocated files, he was able to exercise control over the images by deleting them from his computer’s cache.
See Romm,
455 F.3d at 1000-01 (observing that deleting images is a form of exercising control over them). Shiver suggests that viewing images and deleting them from a computer’s cache cannot be sufficient to constitute knowing possession under the statute, for such a rule would create a perverse incentive for individuals who innocently discover child pornography on their computers to leave the illicit material in place. Whatever concern such a prospect might raise in other circumstances, it presents no problem here, given the wealth of evidence indicating that Shiver actively sought to access child pornography.
In short, when viewed in the light most favorable to the government, the evidence supports the jury’s conclusion that the images found on Shiver’s computer had been transported in interstate commerce and that Shiver possessed the images knowingly •
Although we affirm Shiver’s conviction, we conclude that the district court
erred in applying an enhancement to Shiver’s sentence based on his prior conviction for another offense. A “prior” conviction for enhancement purposes “must occur before the
conduct
violating § 2252A(a)(5), and not merely before the § 2252A(a)(5)
conviction
occurs.”
United States v. King,
509 F.3d 1338, 1343 (11th Cir.2007) (emphases added). The putative prior conviction here — Shiver’s conviction in state court on sexual abuse charges — occurred on June 2007, well after the conduct forming the basis for Shiver’s prosecution in the instant case (December 2004). Indeed, the government concedes that the enhancement was improper. Accordingly, we vacate Shiver’s sentence and remand for resentencing without the enhancement.
AFFIRMED IN PART, VACATED AND REMANDED IN PART.