United States v. Jason Hill

750 F.3d 982, 2014 WL 1797383, 2014 U.S. App. LEXIS 8557
CourtCourt of Appeals for the Eighth Circuit
DecidedMay 7, 2014
Docket13-1884
StatusPublished
Cited by27 cases

This text of 750 F.3d 982 (United States v. Jason Hill) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eighth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Jason Hill, 750 F.3d 982, 2014 WL 1797383, 2014 U.S. App. LEXIS 8557 (8th Cir. 2014).

Opinion

RILEY, Chief Judge.

A jury convicted Jason Hill of knowingly receiving and distributing child pornography in violation of 18 U.S.C. § 2252(a)(2), (b)(1) (Count 1) and knowingly possessing child pornography in violation of 18 U.S.C. § 2252(a)(4)(B), (b)(2) (Count 2). Hill appeals, arguing the district court 1 erred in *984 denying, without a hearing, his motion to suppress evidence seized from his computer, and denying his motion to dismiss a charged count on double jeopardy grounds. Hill further argues the district court 2 erred in denying his motions for judgment of acquittal on both counts. With appellate jurisdiction under 28 U.S.C. § 1291, we affirm.

1. BACKGROUND

On August 3, 2010, James Smith, a Cassville, Missouri, police officer participating in a southwest Missouri cyber crimes task force investigating Internet crimes against children, used LimeWire, an online “peer-to-peer” file-sharing program, to access Hill’s computer. Officer Smith downloaded ten images of what he believed to be child pornography from Hill’s shared folder on LimeWire. 3 Based on the files downloaded from Hill’s computer, Officer Smith, Task Force Officer Brian Martin, and Special Agent James D. Holdman Jr. of the U.S. Department of Homeland Security (DHS) obtained a federal warrant to search Hill’s residence for child pornography.

The officers executed the warrant on September 28, 2010. When Hill answered the door, the officers served the warrant and explained they were looking for evidence of child pornography. After waiving, in writing, his rights prescribed by Miranda v. Arizona, 384 U.S. 436, 86 S.Ct. 1602, 16 L.Ed.2d 694 (1966), Hill admitted he had been downloading large amounts of adult pornography through LimeWire for about a year, but “initially denied ever seeing any child pornography.” Hill told the officers he may have seen a “popup” for what “he thought ... might be child pornography” the night before the search, but that “he deleted it immediately” as he always did with such “popups.” Hill’s story changed over time.

As the interview progressed, the officers asked Hill whether he used search terms frequently used to obtain child pornography — terms contained in the filenames Officer Smith obtained from Hill’s computer. Hill admitted he may have “accidentally typed ‘preteen’ ” as a search term in Lime-Wire late at night when it was dark or when he was drunk. Hill stated he deleted any child pornography he accidentally downloaded. When pressed, Hill admitted he intentionally used the search term “preteen” and viewed at least one hundred images of child pornography, one involving a child as young as five years old. Hill eventually told the officers he viewed child pornography “once or twice a month” from March 2010 to the time of the search “out of curiosity,” but asserted he did not save it.

The officers seized Hill’s computers, including the one on which Hill admittedly downloaded adult and child pornography. Special Agent James Kanatzar, a forensic examiner for DHS, inspected Hill’s computer and found evidence that files containing child pornography had been downloaded and stored on Hill’s hard drive. Agent Kanatzar found trace evidence that the files Officer Smith downloaded from Hill’s computer had been on the hard drive before being deleted. Agent Kanatzar also found three videos the jury determined to be child pornography in Hill’s LimeWire directory, which made the files *985 accessible to other LimeWire users. Agent Kanatzar also found four files containing child pornography in the recycle bin on Hill’s computer. Before being moved to the computer’s recycle bin, the files would have been saved somewhere else on Hill’s hard drive. One of the images in the recycle bin (Exhibit 40) matched one of the images Officer Smith downloaded on August 3, 2010 (Exhibit 10).

Hill was indicted on November 9, 2010, and arrested the next day. Before trial, Hill moved to suppress the evidence seized from his computer, alleging the initial contact with his computer was an unreasonable search and anything derived therefrom was tainted. The district court denied the motion. Hill then moved to dismiss either Count 1 or Count 2, arguing conviction on both counts would violate his right against double jeopardy because possession of child pornography is a lesser-included offense of receipt. The district court denied the motion, concluding there was no double jeopardy issue because the possession and receipt charges “involvefd] different files.” The district court denied Hill’s renewed motion to dismiss a count at trial.

Hill’s three day trial began September 25, 2012. The government presented testimony from the investigating officers and the forensic examiner describing their interviews with Hill and the child pornography they found on his computer. The government also showed the still images (Exhibits 4-13, 37-40) and played a portion of each of the three videos from Hill’s computer (Exhibits 41-43) for the jury.

Maintaining his innocence, Hill took the stand in his own defense. Unemployed after losing his job in the technical support division of AT & T Mobility, Hill explained he supplemented his income rebuilding and repairing broken computers with component parts. As to the seized computer containing child pornography, Hill testified he had replaced the RAM, the hard drive, the video processor, the CD drive, and the power source. Hill also testified he was a “gamer,” meaning he played interactive video games with others online. Distinguishing between his familiarity with hardware and his purported ignorance of software, Hill testified he loaded LimeWire onto his computer to download music and adult pornography but, contrary to the officers’ testimony, denied he knew the LimeWire files he downloaded were automatically available to other LimeWire users.

Hill’s direct examination took an unexpected turn. For the first time, Hill admitted to “knowingly receiving and distributing child pornography involving the use of minors engaging in sexually explicit conduct,” as charged in the indictment, and intentionally obtaining the images shown to the jury. But Hill also stated he only viewed the child pornography to protect his children 4 — Hill explained he was intentionally searching for “preteen” images because he thought an unidentified man at a party may have taken illicit pictures of his fourteen- and sixteen-year-old stepdaughters showering. Though Hill’s teenage stepdaughters were not “preteen,” Hill claimed he viewed many images of child pornography and then deleted them when he verified they did not include his stepdaughters. When confronted on cross examination with timing inconsistencies, Hill testified he had also looked for images of a family friend he had helped after she was exploited online.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Jacob Richard Beyer
Court of Appeals of Wisconsin, 2024
United States v. Kyle Soto
58 F.4th 977 (Eighth Circuit, 2023)
United States v. Joseph Keck, Jr.
2 F.4th 1085 (Eighth Circuit, 2021)
United States v. Danny Ferguson
970 F.3d 895 (Eighth Circuit, 2020)
United States v. Roland Hoeffener
950 F.3d 1037 (Eighth Circuit, 2020)
United States v. Jamin Fletcher
946 F.3d 402 (Eighth Circuit, 2019)
United States v. September Waloke
923 F.3d 1152 (Eighth Circuit, 2019)
United States v. Sergeant First Class JAMES E. HOPKINS
Army Court of Criminal Appeals, 2018
United States v. Rex Furman
867 F.3d 981 (Eighth Circuit, 2017)
United States v. Joseph Maurizio, Jr.
701 F. App'x 129 (Third Circuit, 2017)
United States v. Frank Russell McCoy
847 F.3d 601 (Eighth Circuit, 2017)
United States v. Specialist ANTHONY T. DAVENPORT
Army Court of Criminal Appeals, 2016
United States v. Donald Harvey
829 F.3d 586 (Eighth Circuit, 2016)
United States v. Cedric McDonald
826 F.3d 1066 (Eighth Circuit, 2016)
United States v. Eric-Arnaud Briere DE L'Isle
825 F.3d 426 (Eighth Circuit, 2016)
United States v. Arman Nshanian
821 F.3d 1013 (Eighth Circuit, 2016)
United States v. Staff Sergeant SCOTT T. SCHEMPP
Army Court of Criminal Appeals, 2016
United States v. Maurek
131 F. Supp. 3d 1258 (W.D. Oklahoma, 2015)

Cite This Page — Counsel Stack

Bluebook (online)
750 F.3d 982, 2014 WL 1797383, 2014 U.S. App. LEXIS 8557, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-jason-hill-ca8-2014.