United States v. Michael Asher

564 F. App'x 963
CourtCourt of Appeals for the Eleventh Circuit
DecidedMay 6, 2014
Docket13-10798
StatusUnpublished

This text of 564 F. App'x 963 (United States v. Michael Asher) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eleventh Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Michael Asher, 564 F. App'x 963 (11th Cir. 2014).

Opinion

PER CURIAM:

Michael Asher appeals the district court’s denial of his motion for a new trial following his convictions on two counts of knowingly distributing child pornography and one count of knowingly receiving child pornography. See 18 U.S.C. § 2252(a)(2), (b). He contends, as he did in his underlying motion, that he is entitled to new trial *966 based on the government’s alleged violations of the expert disclosure requirements set forth in Federal Rule of Criminal Procedure 16(a)(1)(G), prosecutorial misconduct during closing arguments, ineffective assistance of trial counsel, and the cumulative impact of these errors.

I. FACTS

On December 1, 2008, Special Agent John Brooke Donahue of the Federal Bureau of Investigation used the peer-to-peer file sharing program GigaTribe to download 174 images of child pornography from fellow GigaTribe user “Mangamanl999.” The internet protocol (IP) address for Mangamanl999 was assigned to Michael Asher’s home in Conyers, Georgia. At the time of Agent Donahue’s undercover Giga-Tribe session, Asher was logged into the virtual private network (VPN) of his employer, AT & T, with his username, personal identification number, and employer-issued key fob. FBI agents later executed a search warrant for Asher’s residence and seized eight computers from the home, which were identified during discovery and at trial as QAT01 through QAT08.

Forensic computer examiners with the FBI made copies of the seized computers’ hard drives and scoured them for child pornography using a specialized software program, Forensic Tool Kit (FTK). They then bookmarked any files of interest and generated FTK reports documenting the results of their searches. The examiners unearthed over 1500 images and 80 videos of child pornography on computers QAT03 and QAT04, both of which were registered to Asher and found in his home office. They also found sophisticated “Eraser” software designed to permanently delete information from a computer’s hard drive. One of those computers (QAT03) had a single password-protected user profile, while the other (QAT04) had a password-protected profile labelled “masher,” which contained logs of conversations conducted in internet chat rooms related to child pornography. The examiners discovered that Asher had sent a work-related email from QAT03 within a half hour of child pornography being downloaded onto it.

On Asher’s work laptop, QAT02, which was also found in his home office, forensic examiners found several file names in the computer registry, but not the files themselves, identical to those found on QAT03 and QAT04 and downloaded by Agent Donahue. The examiners did not uncover any child pornography on the computers found elsewhere in Asher’s home, including his 17-year-old stepson’s computer, QAT08.

II. PROCEDURAL HISTORY

Asher was indicted on two counts of distributing child pornography, one count of receiving child pornography, and one count of possessing child pornography. During discovery, the government notified him that it intended to call one of its forensic examiners, Orlando Figueroa, to testify about the analysis of Asher’s computers and the child pornography found on them. It also provided Asher with copies of its FTK reports for the three computers that were found to contain files associated with child pornography. Those reports contained bookmarked file searches for Asher’s work laptop, including one titled “GigaTribe UC files,” which indicated that 15 file names found on that computer matched the names of files downloaded by Agent Donahue.

Convinced that the government’s disclosures did not satisfy the requirements of Federal Rule of Criminal Procedure 16(a)(1)(G), Asher filed a motion to compel the government to prepare a written summary of all the expert testimony that it intended to introduce at trial. In re *967 sponse, the government supplemented its earlier disclosures with a five-page report summarizing the expected testimony of its experts. The supplement indicated that forensic examiners Figueroa and Cyrus Riley searched Asher’s computers for files related to child pornography, GigaTribe, and Mangamanl999; bookmarked the results of those searches in FTK reports; and that they would testify “that numerous files bearing [the] same file names [as] images downloaded by [Agent] Donahue using GigaTribe were deleted from [Ash-er’s] computers.” Despite these disclosures, the district court found that the government had not fully complied with the requirements of Rule 16(a)(1)(G) and therefore ordered it to provide Asher with a written summary describing its expert witnesses’ opinions and the bases for those opinions. The court’s order stated that it would not consider or admit into evidence any expert opinion that was “not part of [the] written summary.”

The government then provided Asher with a 45-page written summary of its expected expert testimony. The summary stated that the government’s forensic examiners would testify that they searched the hard drives of the seized computers for child pornography and found such materials on QAT08 and QAT04, but not on QAT01, QAT05, QAT06, QAT07, or QAT08. The summary also stated that forensic examiner Riley would testify that he searched Asher’s work laptop for file names associated with Agent Donahue’s undercover GigaTribe session and bookmarked the results in an FTK report, which was separately provided to Asher. The FTK report for Asher’s work computer included four bookmarked file searches, one of which indicated that 15 file names found on that computer matched the names of child pornography that Agent Donahue had downloaded.

At trial, the government called forensic examiner Riley as its chief expert witness. Riley testified that QAT03 and QAT04, both of which were registered to Asher, contained child pornography and that someone using QAT04 under the name “masher” had accessed internet chat rooms related to child pornography. He testified that his analysis of Asher’s work laptop uncovered numerous file names, but not the files themselves, matching child pornography downloaded by Agent Donahue, and that the presence of the file names indicated that the actual files were “on the computer at some point.” Asher did not object to any portion of Riley’s testimony, nor did he object to the government’s introduction of exhibits detailing the results of the forensic examination of QAT03. Those exhibits showed that several pornographic files on QAT03 had last been modified in 2003, though not necessarily created or downloaded onto Asher’s computer at that time. Riley did not mention the 2003 modification dates in his trial testimony, though he did testify that QAT03’s hard drive was not manufactured until 2004.

Asher’s defense at trial was that he was unaware of the child pornography found on the computers seized from his home, particularly QAT03 and QAT04, and that his teenage stepson or his stepson’s friends were responsible for those materials.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Chastain
198 F.3d 1338 (Eleventh Circuit, 1999)
United States v. James Scott Pendergraft
297 F.3d 1198 (Eleventh Circuit, 2002)
United States v. Pedro Luis Christopher Tinoco
304 F.3d 1088 (Eleventh Circuit, 2002)
United States v. Marvin Baker
432 F.3d 1189 (Eleventh Circuit, 2005)
United States v. Robert Eckhardt
466 F.3d 938 (Eleventh Circuit, 2006)
United States v. Lopez
590 F.3d 1238 (Eleventh Circuit, 2009)
United States v. Patterson
595 F.3d 1324 (Eleventh Circuit, 2010)
Massaro v. United States
538 U.S. 500 (Supreme Court, 2003)
United States v. Schmitz
634 F.3d 1247 (Eleventh Circuit, 2011)
United States v. Wallace David Eley
723 F.2d 1522 (Eleventh Circuit, 1984)
United States v. George Rodgers
981 F.2d 497 (Eleventh Circuit, 1993)
United States v. Perez
661 F.3d 568 (Eleventh Circuit, 2011)
Jacqueline Weatherly v. Alabama State University
728 F.3d 1263 (Eleventh Circuit, 2013)
United States v. Rodriguez
398 F.3d 1291 (Eleventh Circuit, 2005)

Cite This Page — Counsel Stack

Bluebook (online)
564 F. App'x 963, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-michael-asher-ca11-2014.