United States v. James Lowe

795 F.3d 519, 2015 FED App. 0169P, 2015 U.S. App. LEXIS 13047, 2015 WL 4529516
CourtCourt of Appeals for the Sixth Circuit
DecidedJuly 28, 2015
Docket14-5615
StatusPublished
Cited by34 cases

This text of 795 F.3d 519 (United States v. James Lowe) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. James Lowe, 795 F.3d 519, 2015 FED App. 0169P, 2015 U.S. App. LEXIS 13047, 2015 WL 4529516 (6th Cir. 2015).

Opinion

OPINION

COOK, Circuit Judge.

James Paul Lowe appeals his conviction for knowingly receiving, distributing, and possessing child pornography in violation of 18 U.S.C. § 2252(a). He concedes that a laptop computer found in his home contained "hundreds of image and video files depicting child pornography but maintains that no rational juror could find beyond a reasonable doubt that he knew about those files or placed them there. We agree and REVERSE Lowe’s conviction.

I.

Between March and August 2011, a user downloaded child pornography to a laptop found in the home James Lowe shared with his wife, Stacy Lowe. The Lowes lived at 2204 Robin Street in Athens, Tennessee. Michael Lowe, a minor relative described by one witness as James Lowe’s “adopted child,” lived with James and Stacy at some point during 2011 but moved out before agents searched the home in August.

Four government witnesses testified at Lowe’s trial. Bradley County Sheriffs Office Detective J.P. Allman recounted learning in early 2011 that someone was using a particular Internet Protocol (IP) address to share child pornography. On May 23, he searched for that IP address and discovered a computer sharing files with names consistent with child pornography over a peer-to-peer network. He downloaded one video and two still images of child pornography from the computer’s shared folder.

Detective Alman subpoenaed AT & T for information about the account associated with the IP address. AT & T’s records listed James Lowe as the account holder, 2204 Robin Street as the billing address, and Lowe.Stacy@yahoo.com as the email address associated with the account. Detective Alman conducted surveillance and determined that, as of August 2011, James and Stacy Lowe were the sole residents of 2204 Robin Street.

Detective Alman and other officers executed a search warrant on August 8. Stacy was home during the search but James was not. Law enforcement officers seized three computers: a Dell Inspiron laptop with the username “Stacy” found in the *521 bedroom, an HP Pavilion laptop with the username “Jamie” found in the office, and a desktop that was also located in the office. Detective Allman testified that his role during the search was “speaking with Ms. Lowe.” (R. 75, Allman Test., Day 1 Trial Tr. at 32.) He latdr told the jury that he learned that the laptop found in the office belonged to James Lowe. Agents also found a form on the desk in the office that listed James’s name, social security number, date of birth, and the email address jamedoglll@excite.com.

FBI Special Agent Stephen McFall told the jury that he examined the three hard drives and discovered that only the HP Pavilion laptop contained child pornography. Agent McFall found 639 image files and 176 video files depicting child pornography on the device.

A user named the HP Pavilion laptop “Jamie-PC” and created a single user account, “Jamie.” The laptop’s settings did not require users to enter a password to access the “Jamie” account or any of the laptop’s files and programs. And while the Lowes password-protected their residence’s wireless-internet account, the laptop automatically connected to the internet through a stored wireless password.

The laptop’s desktop screen included the following shortcuts, icons, and files: the computer’s recycling bin, an internet browser, iTunes, Shareaza (a peer-to-peer file-sharing program), a media player, a folder labeled Microsoft Office Programs, a PDF file labeled “2011-_Auhto..four Microsoft Excel spreadsheets labeled “Copy of Service Aut...,” an MP3 music file, and what appeared to be a computer game. Agent McFall told the jury that the spreadsheets “looked like they were authorization agreements for business.” (R. 75, McFall Test., Day 1 Trial Tr. at 107.)

Agent McFall testified at length about the Shareaza peer-to-peer file-sharing program used to download child pornography to the HP Pavilion laptop. 1 Someone installed the program on February 24, 2011. Because no one overrode the program’s default username' setting, the Shareaza account adopted the laptop’s username, “Jamie.” But someone altered the default for the program’s chat-feature username and instead entered “JA.”

Shareaza was not password-protected, and it automatically started running in the background whenever someone switched the computer on. But users had to open the program to search for files and initiate downloads.

The Shareaza home screen — which any user would see upon opening the program — showed that someone searched for terms consistent with child pornography such as “young mama” and “PTHC” (which stands for “pre-teen hard core”), and non-pornographic terms such as “Oceans 11,” “Elbe Goulding,” and “Tron.” The list of downloads on the home screen included files named “PTHC Pedoland Fri-fam Heidi,” “11 yo sleeping kid,” and “new girl img-0063-rl0.”

Files were stored in an “incomplete” folder within Shareaza until they finished downloading, at which point they would appear in the laptop’s “downloads” folder. Agent McFall testified that files could “take a very long time to download” and that downloading time depended on factors such as the internet connection’s speed. (R. 75, McFall Test., Day 1 Trial Tr. at 103.)

Most of the laptop’s images and videos depicting child pornography were stored in Shareaza libraries. Agent McFall also found' evidence of images, some of which had been deleted, elsewhere on the lap *522 top’s hard drive. For instance, the recycling bin contained a video titled “Lolita PTHC 2011 3yo Ariel part 1.” Agent McFall found references to the three files Detective Allman downloaded on May 23 through a text-string search, but someone deleted the actual files before agents seized the computer. He never specified whether the “downloads” folder contained child-pornography files.

Agent McFall admitted that he could not pinpoint when someone searched for or initiated downloads of child pornography. But forensic analysis revealed the date and time on which partial or completed downloads appeared on the laptop’s hard drive. Microsoft Windows registry data revealed that a user opened files depicting child pornography as recently as August 4.

Agent McFall also testified about the laptop’s internet-usage history as recorded through “cookies.” On numerous occasions between March and August, downloads completed within minutes of someone accessing a web-based email service or one of several retail, banking, appliance-repair, and travel websites. Agent McFall identified one date — March 10 — on which a user appeared to log in to Yahool’s email service. When the government’s attorney asked if he recalled “what the log-in was,” he replied, “For the Yahoo mail, I don’t remember exactly. I think Jamie or jame dog was part of the, part of the e-mail address.” (R. 76, McFall Test., Day 2 Trial Tr. at 173.) In general, however, Agent McFall attributed no special significance to the laptop’s browsing history.

Agent.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

People v. Conner CA6
California Court of Appeal, 2023
United States v. Sirshun Burris
999 F.3d 973 (Sixth Circuit, 2021)
United States v. William Miller
982 F.3d 412 (Sixth Circuit, 2020)
United States v. Farnum
Second Circuit, 2020
United States v. Atrel Howard, Jr.
947 F.3d 936 (Sixth Circuit, 2020)
United States v. Carl Hall
Fourth Circuit, 2019
United States v. Pothier
919 F.3d 143 (First Circuit, 2019)
State of Tennessee v. Stephen Douglas Smith
Court of Criminal Appeals of Tennessee, 2018

Cite This Page — Counsel Stack

Bluebook (online)
795 F.3d 519, 2015 FED App. 0169P, 2015 U.S. App. LEXIS 13047, 2015 WL 4529516, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-james-lowe-ca6-2015.