United States v. Kevin Green

954 F.3d 1119
CourtCourt of Appeals for the Eighth Circuit
DecidedApril 2, 2020
Docket19-1327
StatusPublished
Cited by7 cases

This text of 954 F.3d 1119 (United States v. Kevin Green) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eighth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Kevin Green, 954 F.3d 1119 (8th Cir. 2020).

Opinion

United States Court of Appeals For the Eighth Circuit ___________________________

No. 19-1327 ___________________________

United States of America

lllllllllllllllllllllPlaintiff - Appellee

v.

Kevin Dean Green

lllllllllllllllllllllDefendant - Appellant ____________

Appeal from United States District Court for the Southern District of Iowa - Davenport ____________

Submitted: January 17, 2020 Filed: April 2, 2020 ____________

Before BENTON, GRASZ, and STRAS, Circuit Judges. ____________

GRASZ, Circuit Judge.

Kevin Green moved to suppress evidence of child pornography that FBI agents found on his phone. The district court1 denied the motion. After Green pled guilty to child-pornography crimes, the district court imposed a prison sentence and a

1 The Honorable John A. Jarvey, Chief Judge, United States District Court for the Southern District of Iowa. restitution order. Green appeals the conviction, the prison sentence, and the restitution order. We affirm.

I. Background

FBI agents investigated and tracked down a suspected child pornographer in Florida. The suspect was known on the Kik multi-platform instant-message app as “kidluvr1.” A search of kidluvr1’s computers and phones revealed instant-message conversations with someone known as “havingsomefun67.” In the Kik conversation, havingsomefun67 expressed desire to receive child pornography from kidluvr1 and to produce pornography with his own children. Other comments suggested kidluvr1 and havingsomefun67 had seen the same child-pornography videos.

The FBI began investigating havingsomefun67. After subpoenaing Kik, agents learned that the havingsomefun67 account was registered to kevingreen1719@gmail.com and was accessed from CenturyLink IP addresses. According to CenturyLink, the IP addresses were registered to someone in Davenport, Iowa. CenturyLink provided the FBI with the street address associated with the IP addresses. As the FBI soon discovered, several sources including Lexis/Nexis databases, Iowa driver’s license records, and the U.S. Postal Service listed the street address as belonging to Kevin Dean Green. Agents conducting surveillance observed Green at the house. Facebook photos showed Green with two minors, presumably his children.

FBI agent James McMillan relayed the above information to a federal magistrate judge in a search-warrant application. Agent McMillan asserted that people who view, share, and discuss child sexual abuse and child pornography are very likely to keep evidence of their crimes in their homes. Drawing from his experience investigating child-exploitation crimes, McMillan concluded that the circumstances established probable cause to believe the house contained child-

-2- pornography evidence. In his warrant application, McMillan sought authorization to search the house and seize, among other things, any cellphones and computers found there. The magistrate judge issued the warrant.

A few days later, FBI agents searched the house. During the search, agents found Green’s cellphone which — as they soon discovered — contained 370 images of child pornography. Green was consequently indicted for violating federal laws prohibiting receipt and possession of child pornography.

According to Green, the FBI illegally searched his house and phone. He moved to suppress the evidence found on the phone, contending that the FBI lacked probable cause supporting the search warrant. The district court denied the motion. Green eventually pled guilty to receiving child pornography in violation of 18 U.S.C. § 2252(a)(2) and (b)(1) but retained the right to appeal the denial of his suppression motion.

At sentencing, the district court cited a United States Sentencing Guidelines (“Guidelines”) provision recommending harsher penalties for defendants who used “a computer . . . for the possession, transmission, receipt, or distribution” of child pornography. U.S.S.G. § 2G2.2(b)(6). Green objected to this computer-use enhancement, calling it unconstitutionally vague and explaining that its application would raise his recommended prison sentence from a range of 87–108 months to 108–135 months. The district court nonetheless applied the enhancement. Green was sentenced to 120 months of imprisonment and five years of supervised release. The district court also ordered Green to pay $27,000 in restitution, $3,000 to each of the nine victims of his child-pornography crimes.

-3- II. Analysis

Green argues three points on appeal. First, the district court should have suppressed the child-pornography evidence found on his phone. Second, the district court applied an unconstitutionally vague sentencing enhancement, unfairly increasing his recommended prison time. Third, the district court abused its discretion in ordering him to pay $27,000 to the victims of his crimes. We address his arguments in turn.

A. Suppression of Evidence

Under the Fourth Amendment, search warrants must be supported by probable cause. U.S. Const. amend. IV. According to Green, the FBI did not have probable cause to obtain the warrant. As such, he argues, any evidence discovered pursuant to the warrant — including the child pornography on his phone — was inadmissible. See Weeks v. United States, 232 U.S. 383, 398 (1914) (articulating the exclusionary rule prohibiting admission of unconstitutionally-obtained evidence).

The district court rejected Green’s argument, denying his motion to suppress the evidence. “We review the district court’s factual determinations in support of its denial of a motion to suppress for clear error and its legal conclusions de novo.” United States v. Harper, 466 F.3d 634, 643 (8th Cir. 2006).

We must determine whether the warrant’s issuing court had a substantial basis for finding probable cause. United States v. Johnson, 848 F.3d 872, 876 (8th Cir. 2017). “Probable cause exists, if under the totality of the circumstances, a showing of facts can be made ‘sufficient to create a fair probability that evidence of a crime will be found in the place to be searched.’” Id. (quoting United States v. Wallace, 550 F.3d 729, 732 (8th Cir. 2008)). We owe great deference to the issuing court’s probable-cause determination. Id.

-4- Probable cause existed. In the Kik conversation, havingsomefun67 requested child pornography, expressed intent to produce child pornography, and admitted to molesting his daughter. The havingsomefun67 account was registered to kevingreen1719@gmail.com, and havingsomefun67’s IP address was registered to Kevin Green’s street address. See United States v. Chrobak, 289 F.3d 1043, 1046 (8th Cir. 2002) (holding a child-pornographer’s email address, when linked to a suspect, provides probable cause to search the suspect’s house). According to Agent McMillan, participants in online conversations about child pornography tend to keep evidence in their homes. See United States v. Huyck, 849 F.3d 432, 439 (8th Cir.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Brad Wendt
Eighth Circuit, 2026
United States v. Anthony Lemicy
122 F.4th 298 (Eighth Circuit, 2024)
Green v. Yates
S.D. Illinois, 2023
United States v. Gene Schave
55 F.4th 671 (Eighth Circuit, 2022)
United States v. Nathan Kempter
29 F.4th 960 (Eighth Circuit, 2022)
United States v. Volodymyr Kvashuk
29 F.4th 1077 (Ninth Circuit, 2022)
United States v. Martell Roberts
975 F.3d 709 (Eighth Circuit, 2020)

Cite This Page — Counsel Stack

Bluebook (online)
954 F.3d 1119, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-kevin-green-ca8-2020.