United States v. Matthew Wiggins

617 F. App'x 266
CourtCourt of Appeals for the Fourth Circuit
DecidedJuly 24, 2015
Docket14-4729
StatusUnpublished

This text of 617 F. App'x 266 (United States v. Matthew Wiggins) is published on Counsel Stack Legal Research, covering Court of Appeals for the Fourth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Matthew Wiggins, 617 F. App'x 266 (4th Cir. 2015).

Opinion

Affirmed by unpublished PER CURIAM opinion.

Unpublished opinions are not binding precedent in this circuit.

PER CURIAM:

Matthew John Wiggins was convicted after a bench trial of two counts of accessing with intent to view child pornography, 18 U.S.C. § 2252A(a)(5)(B) (2012), and tampering with a witness, 18 U.S.C. § 1512(b)(2)(B) (2012). He was sentenced to 210 months’ imprisonment. Wiggins appeals, arguing: (1) that 18 U.S.C. § 2252A(a)(5)(B) is unconstitutionally vague, (2) the evidence was insufficient to support his conviction on one of the two counts charging a violation of § 2252A(a)(5)(B), and (3) the district court erred by allowing the inclusion of privileged mental health records in his presen-tence investigation report. Finding no error, we affirm.

The evidence presented at Wiggins’ trial, viewed in the light most favorable to the Government, see United States v. Burgos, 94 F.3d 849, 854 (4th Cir.1996) (en banc), was as follows. In January 2013, a report generated by the West Virginia Office of Information Security and Controls (OISC) revealed that a computer located at a public library in Parkersburg, West Virginia, had been used to access or attempt to access websites that had been identified as ones containing child pornography. James Amos, an information security officer with OISC, testified that, in response to that report, he began an investigation to monitor in real-time the activity on the IP address identified in the report. Amos prepared a Network Violation Report, including the IP address and physical location, which showed a list of 26 to 32 images of child pornography that had been accessed on that computer on January 16, 2013. Amos then alerted the West Virginia state police Internet Crimes Against Children Task Force.

Based on information provided by Amos, Detectives Travis Wolfe, Pat Edelen, and James Stalnaker — all members of the Task Force — went to the Parkersburg public library on January 17, 2013, and found Wiggins seated at the computer terminal identified in the OISC report. At the same time, Amos was monitoring the computer and relaying information to the detectives, via telephone, that it was being used to access child pornography sites. A search of the library computer revealed 62 images of child pornography that had been accessed on January 17th. Records also established that Wiggins’ library card was used to access the computer identified in the OISC report on January 16 and 17. In addition, a library card issued to Wiggins’ former brother-in-law, Jody Payne, was used to access the same computer on January 16, 2013. Jody testified that he had moved to Ohio in November 2012 and left his library card and PIN number for Wiggins to use.

The Government presented extensive testimony and reports showing that multiple sites were visited, displaying numerous visual depictions of minors engaged in sexually explicit conduct. At the close of evidence, the district court found Wiggins guilty of both counts charging a violation of § 2252A(a)(5)(B), as well as witness tampering.

The presentence report recommended a total offense level of 32 (based on evidence that Wiggins accessed 347 images of child pornography); with a criminal history cat *268 egory of IV, Wiggins’ advisory Guidelines range was 168 to 210 months’ imprisonment. The report also included information from Wiggins’ prior participation in the Bureau of Prison’s Sex Offender Treatment Program, which he had completed in March 2000, as well as a psychological evaluation that he underwent in 2010 as part of a state prosecution for failing to register as a sex offender. In response to Wiggins’ objection to the inclusion of these materials in the PSR, the district court informed the parties that it would not rely upon any information included in the materials in arriving at an appropriate sentence. The court noted, however, that the information at issue could assist the Bureau of Prisons as well as Probation to provide appropriate treatment and monitoring. The court denied Wiggins’ request for a variance and imposed a sentence at the top of the advisory Guidelines range. Wiggins now appeals.

Wiggins argues, first, that 18 U.S.C. § 2252A(a)(5)(B) is unconstitutionally vague because it fails to adequately define “access.” The “vagueness doctrine bars enforcement of a statute which either forbids or requires the doing of an act in terms so vague that men of common intelligence must necessarily guess at its meaning and differ as to its application.” United States v. Lanier, 520 U.S. 259, 266, 117 S.Ct. 1219, 187 L.Ed.2d 432 (1997) (internal quotation marks omitted). To enforce such a statute would “violate[] the first essential of due process of law.” Roberts v. U.S. Jaycees, 468 U.S. 609, 629, 104 S.Ct. 3244, 82 L.Ed.2d 462 (1984) (internal quotation marks omitted). However, a criminal statute is sufficiently definite if “the commonsense meaning” is clear. United States v. Powell, 423 U.S. 87, 93, 96 S.Ct. 316, 46 L.Ed.2d 228 (1975).

We hold that the district court properly concluded that, while there is no case law directly on point, the term “accessing” is sufficiently clear to apprise men of ordinary intelligence of the statute’s prohibition. Wiggins’ multiple visits to websites containing images of child pornography, and the number of images that he viewed during those visits, clearly satisfies the definition of “access.”

Next, Wiggins asserts that the evidence was insufficient to support his conviction on Count 4 (relating to January 17, 2013) because the only files found on the library computer were in the temporary Internet cache.

In order to sustain a conviction under § 2252A(a)(5)(B), the Government must establish that the defendant: (1) knowingly accessed “some proscribed material”; (2) intended to view that material; and (3) knew that the material contained an image of child pornography. United States v. Brune, 767 F.3d 1009, 1020 (10th Cir.2014). Our review of the record leads us to conclude that the evidence was sufficient to sustain Wiggins’ conviction.

Finally, Wiggins argues that confidential documents protected by the therapist/patient privilege should not have been included in the PSR. Although federal law generally recognizes the privilege protecting confidential communications between a psychotherapist and patient, see Jaffee v. Redmond, 518 U.S. 1, 116 S.Ct. 1923, 135 L.Ed.2d 337 (1996), the presentence investigation is “not limited by traditional rules of evidence.” United States v. Corbitt,

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Powell
423 U.S. 87 (Supreme Court, 1975)
Roberts v. United States Jaycees
468 U.S. 609 (Supreme Court, 1984)
Jaffee v. Redmond
518 U.S. 1 (Supreme Court, 1996)
United States v. Lanier
520 U.S. 259 (Supreme Court, 1997)
United States v. Brune
767 F.3d 1009 (Tenth Circuit, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
617 F. App'x 266, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-matthew-wiggins-ca4-2015.