United States v. Hatfield

358 F. App'x 692
CourtCourt of Appeals for the Seventh Circuit
DecidedDecember 22, 2009
DocketNo. 09-2556
StatusPublished
Cited by3 cases

This text of 358 F. App'x 692 (United States v. Hatfield) is published on Counsel Stack Legal Research, covering Court of Appeals for the Seventh Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Hatfield, 358 F. App'x 692 (7th Cir. 2009).

Opinion

ORDER

Following a two-day trial, a jury found Scott Hatfield guilty of possessing child pornography, see 18 U.S.C. § 2252(a)(4)(B), and he was sentenced to a below-guidelines term of 84 months in prison. Hatfield appeals, but his appointed counsel reports that he cannot identify any nonfrivolous issues on appeal and therefore seeks to withdraw. See Anders v. California, 386 U.S. 738, 744, 87 S.Ct. 1396, 18 L.Ed.2d 493 (1967). Counsel’s supporting brief is facially adequate, and Hatfield did not respond to our invitation to comment on his lawyer’s submission. See Cir. R. 51(b). We confine our review [694]*694to the five potential issues identified in counsel’s brief. See United States v. Schuh, 289 F.3d 968, 974 (7th Cir.2002).

Police executed a search warrant of Hatfield’s home looking for evidence of illegal downloads of child pornography and found a home office full of computer equipment. After receiving Miranda warnings, Hatfield explained that he ran a computer business from his home but used one of the “downloader” towers in the room specifically for his personal file-sharing activities. Police took this tower to a mobile forensic laboratory parked in front of Hatfield’s home for further examination. Hatfield initially admitted using a file-sharing program to download music, games, movies, and adult pornography. But when he learned that police were examining the tower outside, he quickly confessed to downloading child pornography. He described some of the images that would be found on the tower and also acknowledged using search terms such as “Lolita” and “PTHC” that were known to police to return links to child pornography. Hatfield told the officers that he also burned some of this content on CDs and DVDs that he marked with an “X.” Police took Hatfield to the mobile lab, and he identified several illegal video clips from the tower.

Police seized the downloader tower, a number of loose hard drives, and a CD and DVD marked with an “X.” The materials then were turned over to a forensic computer examiner, who found thousands of images of child erotica and child pornography and 58 illegal videos, all saved in a file-sharing folder on the downloader tower. Hatfield was charged with knowing possession of the 58 videos, including 12 specifically listed in the indictment.

Before trial Hatfield stipulated both to the requisite interstate-commerce nexus and to the fact that the 58 videos and other seized images and files fit the legal definition of child pornography. But the government correctly anticipated that Hatfield would try to imply that his computer equipment had been compromised by someone who downloaded the child pornography without his knowledge. To combat this defense the government filed a pretrial motion announcing its intent to introduce uncharged materials under Federal Rule of Evidence 404(b), including a sex video of Hatfield and his wife found in the same file-sharing folder as the 58 charged videos, and additional child pornography found on the marked CD and DVD and in the “recycle bin” of one of the loose hard drives. Hatfield conceded that the material was relevant to issues other than propensity, but argued that the prejudicial effect would far outweigh any probative value. The district court concluded that the uncharged material was admissible so long as limiting instructions were given to cabin the jury’s consideration of the evidence.

During trial Special Agent Michael Johnson testified about the results of the police search of Hatfield’s home, and he described his lengthy interview with Hatfield, including Hatfield’s admissions. Sergeant Jennifer Barnes, the forensic computer examiner, explained that the configuration of the files on the down-loader precluded the possibility that an outside party was to blame. She testified that Hatfield’s personal files, including the sex video of him and his wife, were commingled with the illegal videos. Barnes also explained that the passwords and registration names on the download-er tower matched those Hatfield used on other computer equipment, including the loose hard drive containing more child pornography. These identifiers were all variations of Hatfield’s initials or the names associated with his home business. Barnes testified that the log of Hatfield’s search terms included many associated with child pornography and several that [695]*695matched the terms Hatfield admitted using to police. Brief clips of the 12 videos listed in the indictment were played for the jury, but the government did not publish the uncharged material described in its pretrial motion. Instead, Barnes described the items and explained how their nature and location demonstrated that the downloads were not accidental. Hatfield did not take the stand, choosing instead to have counsel suggest on cross-examination and in closing argument that someone else could have been responsible for the downloads.

The jury found Hatfield guilty, and at his sentencing hearing he expressed remorse for his actions. The district court calculated a guidelines imprisonment range of 108 to 120 months, but Hatfield’s sincerity, his compliant behavior while on pretrial release, and his rededication to his family, his church, and his work did not go unnoticed, and the court settled on a below-guidelines range of 84 months in prison.

In his Anders submission counsel first considers whether Hatfield could argue that the district court erred in admitting Barnes’s descriptions of the uncharged material. We would review the court’s evidentiary ruling for an abuse of discretion, United States v. Zahursky, 580 F.3d 515, 523 (7th Cir.2009), and we agree with counsel that this argument would be frivolous. Evidence of other acts may not be offered to establish a propensity for criminal behavior, but may be used to prove the defendant’s knowledge, intent, motive, or absence of mistake. Fed.R.Evid. 404(b); United States v. Conner, 583 F.3d 1011, 1021 (7th Cir.2009). Because Hatfield wanted the jury to believe he was ignorant about the child pornography on his computer equipment and storage media, the district court reasonably determined that Barnes’s limited description of the uncharged materials was relevant to corroborate Johnson’s testimony about Hatfield’s statements and to show Hatfield’s cyber-fingerprints on all the seized computer materials. See United States v. Ganoe, 538 F.3d 1117, 1123-24 (9th Cir.2008), cert denied, — U.S. ---, 129 S.Ct. 2037, 173 L.Ed.2d 1122 (2009) (agreeing with district court that testimony about sexually explicit names and storage configuration of child-pornography files on defendant’s computer was relevant to establishing defendant’s knowledge of their content); United States v. MoralesAldahondo, 524 F.3d 115, 120 (1st Cir.), cert denied, — U.S. —, 129 S.Ct.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Tanguay
982 F. Supp. 2d 119 (D. New Hampshire, 2013)
United States v. Christopher Eads
729 F.3d 769 (Seventh Circuit, 2013)
USA v. Jonathan Tanguay
2012 DNH 197 (D. New Hampshire, 2012)

Cite This Page — Counsel Stack

Bluebook (online)
358 F. App'x 692, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-hatfield-ca7-2009.