United States v. Michael Huyck

849 F.3d 432, 2017 WL 694517
CourtCourt of Appeals for the Eighth Circuit
DecidedFebruary 22, 2017
Docket15-3649, 15-3652
StatusPublished
Cited by24 cases

This text of 849 F.3d 432 (United States v. Michael Huyck) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eighth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Michael Huyck, 849 F.3d 432, 2017 WL 694517 (8th Cir. 2017).

Opinion

GRUENDER, Circuit Judge.

Following a jury trial, Michael Huyck was convicted of multiple child pornography-related crimes. On appeal, he raises four issues, claiming that (1) the district court 1 erred in denying his motion to suppress evidence seized pursuant to an allegedly stale search warrant, (2) the district court abused its discretion in admitting various exhibits, (3) the evidence did not support the jury’s verdicts, and (4) the district court abused its discretion in denying his motion for a new trial. We affirm.

I. BACKGROUND

In November 2012, the FBI seized a computer server in Bellevue, Nebraska that hosted child pornography websites on the “Tor” network. The Tor network is designed to allow users to surf the Internet anonymously and access otherwise hidden websites, including illegal websites like “Pedoboard,” which was strictly devoted to child pornography. To access the Tor network, a user downloads special software that obscures a user’s Internet Protocol (“IP”) address, thereby evading traditional law enforcement IP identification techniques. 2 Once on the Tor network, users must have a unique, sixteen-character web address to access the Pedoboard website. Unlike traditional web addresses, a Tor web address does not indicate the services or content available on the site. Thus, a Pedoboard user must obtain the web address from other users or from Internet postings describing Pedoboard’s content. The most common way to find Pedoboard’s web address was to access the “Hidden Wiki”- — a directory of Tor hidden services providing the name of the hidden service, a description of its content, and the Tor web address. To identify people accessing Pe-doboard, the FBI installed Network Investigative Technique (“NIT”) software on the website, which revealed the true IP addresses of people accessing the site, the date and time the user accessed the content, and the user’s computer operating system.

The FBI controlled and monitored Pe-doboard from November 16, 2012 to December 2, 2012. On November 21, 2012, an IP address linked to Huyck’s residence utilized the Tor network and browsed Pe-doboard for at least nine minutes. The computer used Windows XP and a Google Chrome browser. Huyck and his sixteen-year-old daughter were the only people present at his residence that night. No child pornography was downloaded during the visit.

*437 In early April 2013, law enforcement agents conducted physical surveillance of Huyck’s residence. They noted that Huyck utilized an unsecured wireless network, though the signal strength was so weak that agents could not obtain the signal from the front yard of his residence. Agents prépared a search warrant for the residence, which was executed on April 9, 2013, more than four months after the November 2012 Pedoboard access date. Officers went to the basement of Huyck’s residence and discovered a complex computer network. They also found a Hitachi 160GB hard drive, a G-Technology 2GB external storage drive, and a Molex 2GB thumb drive on his desk and among his personal belongings. Two computers were located underneath the desk, and neither used Windows XP or Google Chrome at the time of the search. However, one of the computers had been recently wiped clean of all data, and stickers on the computer towers indicated Windows 7 had been downgraded to Windows XP Pro. Huyck was the only adult living at the residence, and during the search, Huyck told officers that no one else had access to his computers and that he worked at Mo-lex in an information technology position. Finally, Huyck admitted that he was familiar with and had used the Tor network, believing it to be anonymous.

A forensic analysis of the Hitachi hard drive revealed ninety-five thumbnail images of child pornography in the thumbs.db file, though the images were not viewable without special software. Nonetheless, the thumbnail images indicated that original, full-size images were present on the Hitachi hard drive in 2010 but had been deleted by the time of the search. A forensic analysis of the G-Technology external storage drive revealed a text file with instructions on how to configure a computer to access the Tor network using a Google Chrome browser. The forensic analysis also exposed a list of Tor hidden services — including a link to the Onion Pedo Video Archive (OPVA), a different Tor child pornography website — and an image of a young girl, appearing to be under eighteen years of age, taking a picture with her genitalia showing. A forensic analysis of the Molex thumb drive revealed a picture of Huyck; another reference to the OPVA hyperlink; and a text file stating, “[H]ttps://opva2pilscvtwmh.onion/ Need to use download manager downthe-mall is good for some.” The hyperlink was the Tor web address for OPVA. “Downthe-mall” is a download manager that helps a user efficiently download contents of an Internet website, such as child pornography, though it is commonly used for legal purposes.

Based on this evidence, the Government charged Huyck with five offenses in two separate indictments, which were later consolidated for trial. In the first indictment, the Government charged Huyck with two crimes in connection with the Pedoboard activity: (1) receipt or attempted receipt of child pornography, in violation of 18 U.S.C. §§ 2252A(a)(2) and (b)(1) (“Pedoboard receipt count”); and (2) accessing with intent to view child pornography, in violation of 18 U.S.C. § 2252A(a)(5)(B) (“Pedoboard access count”). In the second indictment, the Government charged Huyck with three crimes related to evidence seized from his residence. In relation to the ninety-five images found on the Hitachi hard drive, the Government charged Huyck with (1) receipt or attempted receipt of child pornography, in violation of 18 U.S.C. §§ 2252A(a)(2) and (b)(1) (“Hitachi receipt count”); and (2) possession of child pornography, in violation of 18 U.S.C. § 2252A(a)(5)(B) (“Hitachi possession count”). The last count was for possession of child pornography con *438 tained on the G-Technology external storage drive.

Huyck moved to suppress evidence seized during the search of his residence, alleging that a four and one half-month delay between his browsing of Pedoboard and the warrant’s issuance rendered the warrant fatally stale. The magistrate judge 3 recommended denying the motion to suppress, which the district court adopted. Huyck also moved to exclude Exhibits 16, 18, 23, 24, 27, 28, and 32, claiming unfair prejudice. Exhibits 23, 24, and 32 concerned the “downthemall” program, 4 and Exhibits 16, 18, 27, and 28 involved instructions for accessing and anonymizing the Tor network and references and links to OPVA. 5 The district court admitted all of the challenged evidence over Huyck’s objections.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State v. Dore
Connecticut Appellate Court, 2026
State v. Kenneth G.
Connecticut Appellate Court, 2026
United States v. Edward Brown
Seventh Circuit, 2025
United States v. Norman Burch
113 F.4th 815 (Eighth Circuit, 2024)
United States v. Tawhyne Patterson, Sr.
68 F.4th 402 (Eighth Circuit, 2023)
United States v. Timothy Caruso
63 F.4th 1197 (Eighth Circuit, 2023)
United States v. Gene Schave
55 F.4th 671 (Eighth Circuit, 2022)
United States v. Christopher Golden
44 F.4th 1129 (Eighth Circuit, 2022)
United States v. Anthony Hall
44 F.4th 799 (Eighth Circuit, 2022)
United States v. LaSamuel Richardson, III
40 F.4th 858 (Eighth Circuit, 2022)
United States v. Ivan Espinoza
9 F.4th 633 (Eighth Circuit, 2021)
United States v. Cedric Wright
993 F.3d 1054 (Eighth Circuit, 2021)
United States v. James Everett, Jr.
977 F.3d 679 (Eighth Circuit, 2020)
United States v. Beau Croghan
973 F.3d 809 (Eighth Circuit, 2020)
United States v. Scott Fortier
956 F.3d 563 (Eighth Circuit, 2020)
United States v. Kevin Green
954 F.3d 1119 (Eighth Circuit, 2020)
United States v. Joel Augard
954 F.3d 1090 (Eighth Circuit, 2020)
United States v. Steven Horton
Eighth Circuit, 2019
United States v. Bryan Reichel
911 F.3d 910 (Eighth Circuit, 2018)

Cite This Page — Counsel Stack

Bluebook (online)
849 F.3d 432, 2017 WL 694517, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-michael-huyck-ca8-2017.