United States v. Philip Sebolt

CourtCourt of Appeals for the Seventh Circuit
DecidedAugust 21, 2006
Docket04-2588
StatusPublished

This text of United States v. Philip Sebolt (United States v. Philip Sebolt) is published on Counsel Stack Legal Research, covering Court of Appeals for the Seventh Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Philip Sebolt, (7th Cir. 2006).

Opinion

In the United States Court of Appeals For the Seventh Circuit ____________

No. 04-2588 UNITED STATES OF AMERICA, Plaintiff-Appellee, v.

PHILIP M. SEBOLT, Defendant-Appellant. ____________ Appeal from the United States District Court for the Northern District of Illinois, Eastern Division. No. 02 CR 648—Ronald A. Guzman, Judge. ____________ ARGUED MARCH 29, 2006—DECIDED AUGUST 21, 2006 ____________

Before BAUER, KANNE, and SYKES, Circuit Judges. KANNE, Circuit Judge. Philip Sebolt was charged with using his computer to commit various federal crimes involving child pornography. At trial, a host of “other acts” evidence was admitted, some of which Sebolt contested, and some of which he did not. After Sebolt was convicted on all counts, he was sentenced to 360 months’ imprisonment. Sebolt appeals his convictions and his sentence. We affirm the convictions and order a limited remand of his sentence pursuant to United States v. Paladino, 401 F.3d 471, 481-84 (7th Cir. 2005). 2 No. 04-2588

I. HISTORY On March 14, 2002, FBI Special Agent Mark Miller of the Baltimore field office was in the course of his investigation into the online trading of child pornography. Miller logged on to two suspicious chat rooms, one named, “preteen666,” and the other, “preteen411.” In the “preteen666” chat room, Miller noticed that a person using the screen name “Blah35674” was running a file server and had pictures of young boys and girls available. Miller connected to Blah35674’s file server, which utilized a ratio program of 1:3. Essentially, the server would give a visitor three pictures for every one picture the visitor contributed. Miller uploaded his own innocuous files, which enabled him to download 53 images of child pornography from Blah35674’s file server. Specifically, Miller uploaded an encrypted photograph onto the server and in return, the server sent him a picture of child pornography entitled “Helgav 044.jpg.” To request this photograph, Miller had typed the command “Get Helgav 044.jpg.” Before the server sent Miller the picture, it sent a message that the picture was “on its way.” At another time, Miller requested a file entitled “baby fuck 14.JPG” by typing “Get baby fuck14.JPG.” In response, Miller received the message “Failed to send baby fuck 14.JPG.” Miller then requested a file named “Cbaby 2.MPG” by typing “get Cbaby 2.MPG.” In response, Miller received a message that the file was “on its way.” Miller testified that the server displayed a banner scrolling across an internet page, which stated: Upload Boy Baby Pics! Upload Boy Baby Pics! Upload Boy Baby Pics! Upload Boy Baby Pics! Upload Boy Baby Pics! I’m also looking for a text file for someone to msg me, on tips/tactics/advice on how to molest kids. I am not out to hurt or kidnap a kid. Just fun loving molesting. I have a web cam No. 04-2588 3

and am willing to produce pics if I can successfully molest a kid/baby. Any help would be nice. :) Miller contacted his FBI counterparts in Chicago. They determined that the internet protocol address associated with the screen name Blah35674 was registered through an internet service provider to Janet Sebolt in Bensen- ville, Illinois. The FBI, along with members of the Cook County Sheriff’s Department and Bensenville Police Department, executed a federal search warrant for Janet Sebolt’s address on July 1, 2002. After gaining entry to the residence, the officers found Janet’s son, Philip Sebolt, in his bedroom deleting files on his computer. Officers un- plugged the computer and began to search the residence. Two officers interviewed Sebolt at his residence after orally advising him of his Miranda rights. Sebolt indicated that he understood his rights and would answer questions. Sebolt admitted that he was running a file server from his personal computer in his bedroom and that the server’s purpose was to trade child pornography. Sebolt conceded that he used the screen name “Blah” followed by num- bers when he traded child pornography and that he posted the aforementioned advertisement because he had a sexual attraction to young boys. Sebolt then identified specific items of child pornography, acknowledged that they were of real children, and estimated the children’s ages. When asked if he had ever molested young boys, Sebolt stated that he had sexually assaulted a relative. After the interview concluded, the officers took Sebolt to an FBI field office for processing. At the field office, Sebolt signed a written waiver of his Miranda rights and provided a handwritten statement. In the statement, Sebolt admitted to using his computer to possess child pornogra- phy and to distribute it over the internet. Sebolt confessed to printing several of these images, which he kept under his bed and used when masturbating. Sebolt also stated that he engaged in sexual relations with a 16-year-old girl in 4 No. 04-2588

Wisconsin whom he met on the internet, and that he had molested a young male relative several times (the same victim as Sebolt’s oral confession). The search of Sebolt’s computer revealed more than 27,000 images of child pornography. Sebolt’s computer also contained transcripts of online conversations Sebolt had with respondents to his advertisement requesting advice on molesting children. Five of these chats were found in a file labeled “how to molest,” with one in a file labeled “personal,” and another in a file labeled “kp.” The online conversations centered on Sebolt’s attempts to molest children without getting caught by law enforcement. Officers also found on Sebolt’s computer logs the com- puter had generated detailing the server’s interactions with online visitors. The logs showed guests’ requests for certain files and the server’s responses. For instance, one of the logs showed that on June 25, 2002, someone using the screen name Gustave Premier (“Premier”) sent files to Sebolt’s server and requested in exchange files containing child pornography, including one entitled “hel-an09.jpg.” After Premier requested “hel-an09.jpg,” Sebolt’s computer responded that “hel-an09.jpg is on its way.” Officers also recovered approximately 250 pictures containing child pornography and a pair of boys’ Pokemon underwear from beneath Sebolt’s bed. On March 26, 2003, a federal grand jury returned a four- count second superseding indictment charging Sebolt with violating various federal child pornography laws. Count 1 charged Sebolt with knowingly possessing child pornog- raphy. Counts 2 and 3 alleged Sebolt transported child pornography, namely computer images entitled “helgave049.jpg” and “hel-an09.jpg,” for Counts 2 and 3, respectively. Count 4 charged Sebolt with advertising child pornography online. No. 04-2588 5

Sebolt filed a pretrial motion in limine objecting to the introduction of evidence relating to his molestation of his young male relative. The motion in limine was denied. During the four-day jury trial, the government repeatedly referred to Sebolt’s molestation of his relative. The gov- ernment also made repeated reference to his trip to Wiscon- sin to have sex with a minor female, his failed attempts to molest other children, and the underwear under his bed. Sebolt made no objections at trial to the introduction into evidence of any of these other acts that occurred in addition to the acts of molestation that involved his relative. Sebolt’s strategy at trial was to admit to collecting child pornography but to deny distribution and advertisement. Sebolt proclaimed that his role was passive and that the logs were inaccurate. The jury disagreed and returned guilty verdicts against Sebolt on all counts. On March 3, 2004, the district court held a sentencing hearing. The court applied the sentencing guidelines and found that several enhancements applied. The court calculated a criminal history category of I, and an offense level of 40, resulting in a sentencing range of 292 to 365 months.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Olano
507 U.S. 725 (Supreme Court, 1993)
United States v. Booker
543 U.S. 220 (Supreme Court, 2004)
United States v. Ronald Wynn
845 F.2d 1439 (Seventh Circuit, 1988)
United States v. John W. Wilson
966 F.2d 243 (Seventh Circuit, 1992)
United States v. Myro L. Wilson
31 F.3d 510 (Seventh Circuit, 1994)
United States v. Willie E. Lloyd
71 F.3d 1256 (Seventh Circuit, 1995)
United States v. Constance F. Cunningham
103 F.3d 553 (Seventh Circuit, 1996)
United States v. Patrick Menting and Dennis Tushoski
166 F.3d 923 (Seventh Circuit, 1999)
United States v. Tommy Asher
178 F.3d 486 (Seventh Circuit, 1999)
Jackie Wilson v. James K. Williams
182 F.3d 562 (Seventh Circuit, 1999)
United States v. Robert Gardner
238 F.3d 878 (Seventh Circuit, 2001)
United States v. Robert Thomas
321 F.3d 627 (Seventh Circuit, 2003)
United States v. Felipe Rangel
350 F.3d 648 (Seventh Circuit, 2003)
United States v. Ramon Toro
359 F.3d 879 (Seventh Circuit, 2004)
United States v. Kenneth Shearer
379 F.3d 453 (Seventh Circuit, 2004)
United States v. Gary T. Whitlow
381 F.3d 679 (Seventh Circuit, 2004)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Philip Sebolt, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-philip-sebolt-ca7-2006.