United States v. Joseph Lannutti

648 F. App'x 202
CourtCourt of Appeals for the Third Circuit
DecidedApril 27, 2016
Docket15-2137
StatusUnpublished

This text of 648 F. App'x 202 (United States v. Joseph Lannutti) is published on Counsel Stack Legal Research, covering Court of Appeals for the Third Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Joseph Lannutti, 648 F. App'x 202 (3d Cir. 2016).

Opinion

OPINION *

SHWARTZ, Circuit Judge.

Joseph Lannutti appeals his convictions for receipt and possession of child pornography, arguing that the Government failed to prove he knowingly engaged in such acts. Because the evidence presented to the jury was sufficient to sustain the convictions, we will affirm.

I

Upon learning that a computer using the IP address assigned to Lannutti had accessed a website linked to child pornography, law enforcement visited Lannutti’s home and, with his consent, conducted a forensic preview of his computer. 1 The preview revealed forty-five videos “de-pictfing] suspected prepubescent children engaged in sexual activity.” The video files were contained in a “media” folder on Lannutti’s hard drive, associated with Lan-nutti’s user profile, “Mikey.” The files had been created primarily between midnight and 6:00 a.m. on various nights. Several of the files had names specifically indicating that they contained child sex acts, and others bore names such as “Lolita,” which trial testimony demonstrated are linked to child pornography. Lannutti’s computer also contained a program designed to download internet videos and automatically place a copy in the “media” folder, and another program designed to mask a user’s internet activity.

Lannutti told the investigators that he spent approximately three to four hours a night viewing pornography, that he preferred “borderline” and “barely legal” pornography, and that he visited Chinese websites. Investigation further revealed that someone using Lannutti’s computer profile had searched for a Russian translation of the word “underage,” App. 38, and some of the child pornography videos contained Asian language characters.

Lannutti was charged, tried, and convicted of receiving six videos containing child pornography in violation of 18 U.S.C. § 2252(a)(2) (Count One) as well as possessing media containing child pornography in violation of 18 U.S.C. *204 § 2252(a)(4)(B) (Count Two), Lannutti appeals, arguing that the Government did not prove he knowingly received or possessed the child pornography found on his computer.

II 2

To secure a conviction for either possession or receipt of child pornography under § 2252(a), the Government must prove that the defendant engaged in the acts knowingly. 3 See United States v. Miller, 527 F.3d 54, 63 (3d Cir.2008) (analyzing the parallel child pornography statute 18 U.S.C. § 2252A). 4 Because the possibility exists that something other than a defendant’s actions may be responsible for the illicit videos appearing on a computer, we must “rigorously scrutinize whether there is sufficient evidence to establish the intent-element of the crime.” Id. (citation omitted). In assessing sufficiency of the evidence as it relates to knowledge in child pornography cases, we consider four non-exhaustive factors: (1) whether the images were on the defendant’s computer; (2) the number of images or videos found; (3) “whether the content of the images was evident from their file names”; and (4) the “defendant’s knowledge of and ability to access the storage area for the images” or videos. Id. at 67 (citations and internal quotation marks omitted).

Lannutti does not contest that the first three factors are satisfied nor could he given the evidence presented to the jury. First, the images were found on Lannutti’s computer under his user profile, “Mikey.” App. 31. Second, Lannutti’s computer contained over fifty video files, forty-five of which contained child pornography, including the six video files mentioned in Count One and other explicit videos referred to in Count Two. Third, the files bore names that either directly referenced underage sexual behavior or used terms such as “Lolita” that are commonly understood to refer to such conduct. .These facts alone are sufficient to sustain Lannutti’s conviction. Accord United States v. Franz, 772 F.3d 134, 156 (3d Cir.2014) (holding evidence sufficient despite not meeting all of the Miller factors).

Additional evidence supported the jury’s conclusion that Lannutti had knowledge of and the ability to access the illicit files on his computer. One of the investigators, Christopher Kudless, testified to the child pornography files’ presence on the “root” of Lannutti’s hard drive, which is the “first *205 layer of files and folders presented to a user,” undermining a conclusion that the files could have been buried deep in the computer’s structure by a virus. App. 24; accord United States v. Pavulak, 700 F.3d 651, 669 (3d Cir.2012) (“Pavulak was also the likeliest person to have accessed the child-pornography images on the laptop. They were not buried away where an innocent user could have overlooked them.”). Kudless also testified that he found two programs on the computer that would facilitate the download of child pornography: a QVOD player, which allows users to download or open a file and place a copy of the file in a computer’s media folder, where the files were found in this case; and TOR, a program used by people “when they want to hide what they’re doing on line [sic], whether for legitimate purposes or not.” App. 35. Kudless also addressed whether a virus could have placed the files on Lannutti’s computer, and explained that it would be “inconsistent” with his findings in this case. Supp. App. 3.

In addition to this testimony, evidence of Lannutti’s online behavior further supports the jury’s conclusion that Lannutti himself downloaded and viewed the videos. Lannutti first came to the attention of Homeland Security because his IP address accessed a website associated with child pornography. Lannutti admitted that he viewed pornography three to four hours per night, and forensic examination revealed that the files on Lannutti’s computer were downloaded between midnight and 6:00 a.m. Lannutti also told law enforcement that he liked “borderline” and “barely legal” videos, and Kudless testified that whoever used Lannutti’s user profile on his computer searched for translations of “underage,” a word commonly associated with child pornography. App. 38. Finally, Lannutti said he visited Chinese websites, and several videos found in the folder were child pornography videos containing Asian language characters. From this, a juror could easily infer that Lannutti accessed the internet to acquire child pornography.

¡ Taken together, the evidence supports the jury’s conclusion that Lannutti both knew about and accessed the child pornography on his computer,, satisfying the fourth Miller factor. See Franz,

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Jackson v. Virginia
443 U.S. 307 (Supreme Court, 1979)
United States v. David Malik
385 F.3d 758 (Seventh Circuit, 2004)
United States v. Paul Pavulak
700 F.3d 651 (Third Circuit, 2012)
United States v. Benoit
713 F.3d 1 (Tenth Circuit, 2013)
United States v. Miller
527 F.3d 54 (Third Circuit, 2008)
United States v. Robert Franz
772 F.3d 134 (Third Circuit, 2014)
United States v. Anthony Burnett
773 F.3d 122 (Third Circuit, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
648 F. App'x 202, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-joseph-lannutti-ca3-2016.