United States v. Jeff Tillotson

490 F. App'x 775
CourtCourt of Appeals for the Sixth Circuit
DecidedAugust 3, 2012
Docket10-5722
StatusUnpublished
Cited by1 cases

This text of 490 F. App'x 775 (United States v. Jeff Tillotson) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Jeff Tillotson, 490 F. App'x 775 (6th Cir. 2012).

Opinion

COOK, Circuit Judge.

After a three-day trial, a jury found Defendant Jeff Tillotson guilty of knowingly distributing, advertising, and possessing child pornography in violation of 18 U.S.C. § 2252A(a)(2), (a)(3)(B), and (a)(5)(B). Til-lotson appeals, arguing that the district court erred in denying his motions for a bill of particulars, a mistrial, and a new trial. We AFFIRM.

I.

In 2007, law enforcement agents with the Department of Homeland Security (“DHS”), Federal Bureau of Investigation, and Pennsylvania State Police discovered an internet file server, “MovServ,” that advertised child pornography. From Mov-Serv, officials with each agency downloaded video files depicting children engaged in sexually explicit activity. After tracing MovServ to Tillotson’s address, the agents searched Tillotson’s home, where they found a laptop computer, an external hard drive, and a portable storage device (commonly known as a “thumb drive”). Suspecting that each contained child pornography, the officers seized the devices.

A forensic examination, conducted by DHS Agent Keith Barwick, confirmed the *776 officers’ suspicion: Agent Barwick determined that Tillotson’s external hard drive hosted MovServ, the illicit file server, and held a cache of child pornography. Because many files were corrupted or incomplete, Agent Barwick was unable to view most of the files on the hard drive; he recovered, however, four videos containing child pornography and unearthed many more corrupted or incomplete files bearing names suggestive of child pornography. The government charged Tillotson with distributing, advertising, and possessing child pornography.

Prior to trial, the United States disclosed the evidence it planned to offer against Tillotson. On June 17, 2008, it provided Tillotson with a summary of Agent Barwick’s testimony that it planned to use at trial. To this summary, the United States attached a copy of Agent Barwick’s DHS investigation report, which detailed the results of his forensic analysis of Tillotson’s computer hardware. The same day, the United States provided Til-lotson with copies of his thumb drive, external hard drive, and laptop hard drive.

Agent Barwick’s report described the four recovered videos, as well as the corrupted and diffieult-to-view files that bore file names suggestive of child pornography. First, the report noted that an examination of the external hard drive “yielded POSITIVE results for videos containing visual depictions of exploited minor children” and listed four video files that he “recovered from free/deleted areas of the disk.” Further, the report noted that Agent Barwick found “[approximately 166 graphical depictions of pornography both images and movies” in a directory on the external hard drive. According to Agent Barwick, “[o]f the 166, many contained file name[s] suggestive of child pornography,” but he left blank the space provided for listing the files containing “actual visual depiction[s] of child pornography.” A few days after Agent Barwick completed his forensic analysis, the United States filed a superseding indictment against Tillotson.

Complaining that the indictment’s lack of detail impeded his ability to prepare a defense, Tillotson moved for a bill of particulars under Federal Rule of Criminal Procedure 7(f). The challenged indictment charged Tillotson with using his computer to commit child pornography offenses “on or about September 16, 2007, to on or about November 6, 2007.” Apart from the date range of the offenses, the indictment provided little information about the exact files or instances of downloading or advertising. Tillotson sought, among other things, greater detail about the manner and dates of the charged offenses, the names and birth dates of his alleged victims, and “[t]he exact name and location of the alleged illegal material (i.e. file name and file path).” A magistrate judge denied the motion, finding the indictment “more than sufficient to inform [Tillotson] of the nature of the charges against him” and that “[he] and his attorneys well understand the nature of the prosecution and the anticipated evidence against [him].”. The district judge denied Tillotson’s appeal of the magistrate’s order.

The case proceeded to a jury trial. The United States presented its case against Tillotson, relying primarily on the four videos that Agent Barwick recovered from Tillotson’s external hard drive. During his direct examination, Agent Barwick testified that he located between 100 and 150 incomplete files on the external hard drive bearing names suggestive of child pornography, but noted that the bulk of the files “were corrupt” and that he only recovered and viewed the four video files described in his expert report. On cross-examination, defense counsel pressed Agent Barwick about the corrupted files, seeking an admission that the files did not depict child *777 pornography. Contrary to defense counsel’s expectation, Agent Barwick replied that he could view the corrupted files— though only with the assistance of forensic technology and even then, imperfectly— and that the files contained child pornography-

Defense counsel moved for a mistrial, arguing that this revelation constituted an unfair surprise. Because Agent Barwick left blank the area provided in his report for listing files depicting child pornography on the external hard drive, defense counsel argued, Tillotson crafted his defense on the assumption that the four encrypted video files were the entirety of the government’s evidence against him. In response, the prosecutor explained that she had limited her presentation of evidence to the four recovered videos, because the files that defense counsel inquired about on cross-examination were too incomplete to meet the statutory definition of child pornography.

Citing three reasons, the district court refused to grant a mistrial. First, Agent Barwick’s report reflected that the additional files on the external hard drive bore names suggestive of child pornography. Second, the United States provided Tillot-son with a copy of the external hard drive from which they discovered the images. Third, defense counsel himself embarked on the line of questioning that revealed the presence of additional child pornography on the hard drive, despite the fact that he “certainly should have been at least alerted as to what the answer might have been.” The court also rejected Tillotson’s proposal that it order the jurors to disregard the testimony elicited from Agent Barwick during his cross examination, reasoning that such an instruction would call undue attention to the objectionable testimony.

The trial proceeded, and the jury found Tillotson guilty of all three counts. Following the verdict, Tillotson moved for a new trial, raising the same arguments presented in support of his motion for a mistrial — that the United States “ambushed” his defense by submitting a misleading expert report. The district court denied the motion and sentenced Tillotson to 204 months’ imprisonment. This timely appeal followed.

II.

Tillotson challenges the district court’s denial of his motion for a bill of particulars and its refusal to grant him a new trial. For reasons explained below, we reject both challenges.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Qwindel Page
575 F. App'x 641 (Sixth Circuit, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
490 F. App'x 775, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-jeff-tillotson-ca6-2012.