United States v. James E. Price, III

582 F. App'x 846
CourtCourt of Appeals for the Eleventh Circuit
DecidedNovember 14, 2014
Docket13-11684
StatusUnpublished
Cited by2 cases

This text of 582 F. App'x 846 (United States v. James E. Price, III) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eleventh Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. James E. Price, III, 582 F. App'x 846 (11th Cir. 2014).

Opinion

PER CURIAM:

James E. Price, III, was convicted by a jury of knowing distribution of child pornography, in violation of 18 U.S.C. §§ 2252(a)(2) and 2252(b)(1), and knowing possession of child pornography, in violation of 18 U.S.C. §§ 2252(a)(4)(B) and 2252(b)(2). He challenges three of the district court’s rulings and contends that the evidence was insufficient to prove the knowledge element for both convictions.

I.

Law enforcement officers routinely search peer-to-peer file-sharing networks on the internet for computers sharing child pornography files. 1 On December 20, 2010, Detective Brian Broughton of the Martin County, Florida Sheriffs Office was searching one such network when he noticed a user sharing 179 files with titles describing children performing sex acts or being raped. Broughton tried to download some of those files but was unsuccessful. Ten days later, Broughton noticed that the same IP address was again sharing approximately the same number of suspiciously titled files. He successfully downloaded four image files from the user’s computer and determined that they did indeed depict child pornography.

Broughton then subpoenaed AT & T, the internet service provider, and requested the name of the subscriber to the IP address. That subscriber was Andrea Plant, and she lived in Plantation, Florida. Because Plantation, Florida, is in Bro-ward County, outside of Broughton’s jurisdiction, Broughton forwarded his investigation file to Detective Robert Mauro, a special deputy of the Broward County Sheriffs Office. On three separate occasions in January 2011, Mauro downloaded suspiciously titled files from the same user and determined that they depicted child pornography. That month, Mauro also began to conduct periodic surveillance of the Plantation residence, during *847 which he determined that Price lived there with Plant.

On February 15, 2011, Mauro submitted a sixteen-page affidavit in support of a search warrant for the Plantation residence. In that affidavit, Mauro stated that he and Broughton had each downloaded child pornography files from the same user. Mauro also described how Broughton had traced the user’s IP address to the Plantation residence, and how Mauro had determined that Price lived there. Finally, Mauro stated that, in February 2000, Price had been suspected of downloading child pornography onto the hard drive of his computer at work, and that, although the FBI had requested a forensic examination of Price’s computer, “the results [of the FBI’s investigation were] not available at [that] time.” Based on that affidavit, a magistrate judge issued the search warrant.

The next day, Mauro and other police officers executed the search warrant. From the living room, the officers seized a desktop computer and a large external hard drive that was tucked behind the desktop’s monitor and connected to the computer by cable. From the bedroom, the officers seized a leather bag containing a laptop and a small external hard drive, as well as a Brooks Brothers card and a frequent flyer card in Price’s name. The officers also seized a BlackBerry cell phone that belonged to Price.

Tina McCoy, a computer forensics technician with the Broward County Sheriffs Office, later conducted a forensic examination of the seized items. On the large external hard drive, which was encrypted using a strong password, McCoy found 216 child pornography video and image files, including the files that Mauro and Broughton had discovered during their investigations. McCoy also found that a number of child pornography videos had been stored on the small external hard drive. Although those files had been deleted, McCoy successfully restored the videos to the hard drive and verified that they depicted child pornography. As for the desktop, McCoy did not find child pornography files stored on its internal hard drive. She did find, however, that both Price’s user account and the desktop’s testing profile user account had played several of the child pornography videos stored on the large external hard drive, including one entitled “new PTHC [preteen hard core] 2007 Tara eleven year mass toy anal fuck.” Notably, both accounts were protected with strong passwords. The laptop, which Price used for his work as a computer consultant, had no child pornography stored on it, either. However, both Price’s user account and the laptop’s testing profile user account— which were just as strongly password-protected as their counterparts on the desktop — had accessed and played several of the child pornography videos stored on the large and small external hard drives.

McCoy also found Shareaza, a file-sharing software client, installed on both the desktop and the laptop. With Shareaza, a user can search a number of file-sharing networks at once for a particular file and download portions of that file from multiple computers, thus speeding up the download process. On the desktop, Shareaza directed downloads to the large external hard drive, and the Shareaza library listed the child pornography video and image files found on that hard drive. The video and image files had been designated for sharing. On the laptop, Shareaza directed downloads to another external hard drive, which police did not recover. McCoy could tell, however, that the user had entered search terms suggestive of child pornography, such as “hussy fan,” “PTHC,” and “Raygold” (referring to files collected *848 by an infamous distributor of child pornography). The Shareaza library listed videos and images with similarly suggestive titles.

After McCoy concluded her investigation, Jeanne Burtnett, also a computer forensics technician with the Broward County Sheriffs Office, created timelines based on information McCoy had obtained. The purpose of Burtnett’s timelines was to show that Price — and no one else — had used the computers to download and play child pornography files. One timeline, for example, showed all of the desktop’s activity for approximately one hour in the early morning of February 7, 2011. In that short span of time, Price’s user account visited Linkedln and other business-related websites, visited FedEx’s package-tracking website, downloaded and played child pornography videos, and accessed a file on the large external hard drive. Subpoenaed FedEx records showed that Price had signed for a package that day.

On January 26, 2012, a federal grand jury indicted Price with knowing distribution of child pornography in violation of 18 U.S.C. §§ 2252(a)(2) and 2252(b)(1), and knowing possession of child pornography in violation of 18 U.S.C. §§ 2252(a)(4)(B) and 2252(b)(2).

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
582 F. App'x 846, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-james-e-price-iii-ca11-2014.