United States v. Meisel

875 F.3d 983
CourtCourt of Appeals for the Tenth Circuit
DecidedNovember 14, 2017
Docket15-3182
StatusPublished

This text of 875 F.3d 983 (United States v. Meisel) is published on Counsel Stack Legal Research, covering Court of Appeals for the Tenth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Meisel, 875 F.3d 983 (10th Cir. 2017).

Opinion

MURPHY, Circuit Judge.

I. INTRODUCTION

A jury found. Steven Meisel guilty of distributing and possessing child pornography. See 18 U.S.C. § 2252(a)(2), (a)(4)(B). Meisel asserts the district court (1) violated his right to present a complete defense by preventing him from adducing alternative perpetrator evidence 1 ; and (2) erred in denying his request to instruct the jury on “identity.” Even assuming the district court erred in limiting Meisel’s ability to present alternative perpetrator evidence, any such error was harmless. And, since the jury instructions, considered as a whole, adequately conveyed to the jury the gist of Meisel’s defense, the district court did not abuse its discretion in refusing to give Meisel’s proffered instruction. Exercising jurisdiction pursuant to 28 U.S.C. § 1291, this court affirms Meisel’s convictions.

II. BACKGROUND

A. The Criminal Investigation

On May 9, 2014, Detective Jennifer Wright saw a user on the Ares file-sharing network 2 offering child pornography. 1 After downloading five videos, she captured the IP address, the user’s Ares nickname, and the user’s version of Ares. Based on the captured IP address, she obtained a search warrant for a home Meisel shared with Linda Thomas. When the warrant was executed, officers found two computers: Thomas’s and Meisel’s. Meisel’s computer, which had a picture of a unicorn on the cover, was' connected to an external hard drive.

Officers interviewed Thomas during execution of the warrant. She said (1) Meisel moved in with her three years earlier, in the fall of 2011; (2) W.R., Meisel’s son, lived with them for one year, but had been gone from the residence for one year; and (3) . she previously shared Meisel’s computer. Thomas bought her own computer approximately one year earlier, after she discovered child pornography on Meisel’s computer. She immediately confronted Meisel about the child pornography and, in response, Meisel blamed W.R. At that point, Meisel insisted Thomas obtain her own computer. Thereafter, according to Thomas, Meisel “was the only one that was ever on there because he wouldn’t let anybody use his computer.” 3 . Thomas said that when Meisel had friends over, they had to bring their own computers to access the internet.

During his interview with officers, Meisel acknowledged owning the computer and external drive and said he did not share his password with anyone. He identified his user profile as “Unicorn” and provided the password. This was the only profile on the computer associated with child pornography. 4 Despite being aware of the purpose of the interview, it took Meisel some time before he told officers he previously found, in a folder titled'“Test,” child pornography sites and pictures. Officers did find a “Test” folder on the external hard drive. That “Test” folder turned out to be the exact location child pornography was stored, some having been added just three days prior to the execution of the warrant. Meisel attributed the “Test” folder and child porn to W.R. 5

In contrast to Thomas’s statement, Meisel said he was the one who first found the child pornography on his computer. He claimed he opened one picture and deleted the rest based on the titles. 6 He admitted using Ares, stating his Ares nickname of “Unil” was consistent with his user profile name and his love of unicorns. He claimed he left the Ares settings to “default,” but later described changing them to direct files to particular locations. He said the external hard drive, which he purchased at a yard sale three years earlier, was always connected to the computer. When asked about organization of the external hard drive, he claimed he had not “sorted through [it] for I’d say a year or so.” Challenged about the more recent activity after W.R. was gone, Meisel stated: “If it’s on there, and it’s recent, then it had to have been me.” He repeated, “If you found it on there, evidently it’s on there somehow, nobody else used it, I guess I put it there.... If it’s in there, I must have put it in there somehow.”

Officers conducted a forensic examination of Meisel’s computer. Meisel purchased the computer on September 14, 2011. Regarding login information for the “Unicorn” user profile, the laptop recorded 3249 successful logins prior to June 13, 2014, equating to roughly 3 logins (and, thus, logouts) per day. The Ares client was installed the same day Meisel purchased the computer. The Ares version (2.1.6.3040) and user-nickname (“UNI1”) matched those captured by Wright when

she originally saw a user on the Ares file-sharing network offering child pornography. The videos downloaded by Wright during the investigation were present on the external hard drive under the “Test” folder.

The external hard drive had been intentionally assigned the specific drive letter “H.” Meisel’s Ares client was set to share from (and only from) the “Test” folder and its subfolders on the “H” external drive. These folders were organized according to content (i.e., “pics” contained still images, “videos” contained only videos, and “text” contained “literature”). Under the “videos” folder, the files were further organized according to content (e.g., “beast” for bestiality, “mas” for masturbation, “ori” for oral sex, “ful” for intercourse, etc.). The Ares client also identified that only videos, images, and documents were being shared, not music or software. Similar to the sharing feature, Meisel’s Ares client was set to download only to the “Test” folder on the external drive. Thus, both the external hard drive and the sharing/downloading features of Ares had been specially set to the “H” drive, regardless of other available drive letters.

Only nine videos downloaded to the “Test” folder had not yet been sorted into subcategory folders. Almost all had been downloaded recently, except for one titled “suicide.” The “Test” folder and its sub-folders had been specifically set to show “large” previews of the contents, such that any user would immediately see the actual contents rather than an icon. Child pornography from the external hard drive was frequently viewed on Meisel’s computer via the Windows Media player. Windows Explorer showed the “Test” folder, and its descriptively-named subfolders, had been recently and frequently accessed, to the exclusion of any other folder. Likewise, both Wordpad and Adobe Reader indicated sexualized literature involving children was recently accessed via Meisel’s computer. Recent search terms in the Ares client revealed terms associated with child pornography. Finally, the forensic examination revealed that all remotely recent activity on the “H” drive had taken place in the “Test” folder (i.e., the very location on the hard drive that contained child pornography).

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Holmes v. South Carolina
547 U.S. 319 (Supreme Court, 2006)
United States v. Glass
128 F.3d 1398 (Tenth Circuit, 1997)
United States v. McVeigh
153 F.3d 1166 (Tenth Circuit, 1998)
United States v. McGuire
200 F.3d 668 (Tenth Circuit, 1999)
United States v. Montelongo
420 F.3d 1169 (Tenth Circuit, 2005)
United States v. Bowling
619 F.3d 1175 (Tenth Circuit, 2010)
United States v. Arthur Ortiz
804 F.2d 1161 (Tenth Circuit, 1986)
United States v. Mark Jordan
485 F.3d 1214 (Tenth Circuit, 2007)
Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd.
545 U.S. 913 (Supreme Court, 2005)
United States v. Michael Grzybowicz
747 F.3d 1296 (Eleventh Circuit, 2014)
United States v. Bradley Abbring
788 F.3d 565 (Sixth Circuit, 2015)
United States v. Russian
848 F.3d 1239 (Tenth Circuit, 2017)

Cite This Page — Counsel Stack

Bluebook (online)
875 F.3d 983, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-meisel-ca10-2017.