United States v. Phillip Clingman

521 F. App'x 386
CourtCourt of Appeals for the Sixth Circuit
DecidedApril 2, 2013
Docket11-6263
StatusUnpublished
Cited by5 cases

This text of 521 F. App'x 386 (United States v. Phillip Clingman) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Phillip Clingman, 521 F. App'x 386 (6th Cir. 2013).

Opinion

OPINION

CARR, District Judge.

Defendant-Appellant, Phillip James Clingman, appeals his April 13, 2011, jury-trial conviction for transporting child pornography in violation of 18 U.S.C. § 2252(a)(1). He also appeals his sentence of 240 months’ imprisonment and one condition of his supervised release. For the reasons set forth below, we AFFIRM defendant’s conviction and sentence, but refrain from deciding the propriety of his condition of supervised release.

I. FACTUAL AND PROCEDURAL BACKGROUND

This case arises from an investigation into child pornography on a file-sharing website, Radar.net. In 2008, the FBI received information indicating the California-based website was being used to store and distribute child pornography.

The website required new users to provide a personal email address and phone number. It also required new users to choose a screen name and password. The website allowed users to upload pictures from computers or cellular phones. To upload an image, a user would email it to a unique, unalterable email address provided by the website. Only a person with this email address and a user’s password could post pictures to the user’s account.

Users could post a comment or title with each uploaded image, which the website automatically time-stamped. After a user uploaded an image, the user could share it with others by giving them a “join code” linked to the account. The website kept records showing the time, date, and internet protocol address associated with each user log-in.

FBI Special Agent Stephen Lies, the case agent for the investigation, determined that a website user page registered under the screen name “xcon28” contained images of child pornography. The xcon28 user maintained about nineteen pages of content with several images of child pornography on each page on the website.

Agent Lies determined the xcon28 user-name was associated with the email address phillipclingman@yahoo.com. A website representative told Agent Lies the user identified as xcon28 had given 6155061353@mms.mycricket.com as his mobile email address, and (615) 506-1353 as his cell phone number. Phone records established the phone number belonged to defendant. In an email sent from the phillipclingman@yahoo.com account, the sender identified himself as “xeon28 from Radar.” The sender offered to share pictures directly with the recipient. Defendant, a former convict, was twenty-eight years old when the xcon28 user account was created.

Internet protocol addresses showed the user xcon28 had logged in repeatedly from several IP addresses. One of these IP addresses corresponded with a charitable organization, Greenhouse Ministries (Greenhouse), and another corresponded with the Tennessee Technology Center (TTC), an affiliate of the Tennessee university system. Defendant volunteered in 2008 at Greenhouse, where he had computer and internet access. He studied at TTC from January 2007 to January 2008. There, he had computer and internet access in a laboratory course.

*389 A representative from the Tennessee Board of Corrections testified about defendant’s multiple criminal convictions. After one such conviction, he was incarcerated from January 30, 2008, through March 25, 2008. While in custody, defendant had no access to computers or phones with internet access. During that time, the xcon28 account was inactive. The only exception was one unsuccessful login attempt from an IP address belonging to a company in the United Kingdom.

Defendant’s TTC classmate, Kevin Prather, testified that a TTC teacher, Burt Pelsue, approached him with concerns that there may be pornography on TTC computers. Pelsue told Prather he feared he would lose his job if anyone found out about the pornography. Prather knew several people looked at pornography on TTC computers. Pelsue asked Prather to remove the pornography from one computer. Pelsue committed suicide six months after the FBI arrested defendant.

Defendant admitted to Agent Lies he used computers at Greenhouse and TTC. Defendant confirmed he had owned the cellular phone associated with (615) 506-1353, but had sold it a few months before his arrest to a friend named Clyde Craun. Defendant admitted having the email address phillipclingman@yahoo.com. Defendant stated he did not own a computer. He acknowledged using his cellular phone to send sexual images of adults, but denied ever transmitting pornographic pictures of children. Defendant admitted past visits to the website. He also confirmed he owned the xcon28 user account.

Craun testified that defendant took a picture of him using the cellular phone that Craun bought from defendant. The text “MDMNFILI” appeared under the picture. The same text appeared under an image on xeon28’s website page.

Craun acknowledged purchasing the cellular phone from defendant. Craun received a new phone number when he transferred the phone to his name. He had the phone for about three months before giving it to the FBI in August, 2008. Craun denied accessing the website or Yahoo! email services. He told Agent Lies that, because he is illiterate, he did not use the internet. The phone’s web browser history, however, showed someone had, at some time, accessed both the website and Yahoo! email from the phone.

Craun testified that he and defendant were together on July 2, 2008, from lunchtime to 5:00 p.m. On that day, someone uploaded an image containing child pornography to xcon28’s website account from a Greenhouse computer.

While at TTC, defendant had a dispute with another student, Eric Narvaez. Defendant believed Narvaez put nails under his tires because defendant had obtained a position that Narvaez wanted. Narvaez testified that he saw defendant looking at pornography on TTC computers. Defendant had an altercation on January 30, 2008, and TTC suspended him. Defendant never returned.

Narvaez testified he left TTC before September, 2007. Defense counsel objected to his testimony because it encompassed a time period outside that referenced in the indictment. The trial court allowed Narvaez’s testimony as “relevant conduct,” but told the jury the testimony did not directly prove defendant’s guilt or innocence.

During cross-examination, defense counsel asked Agent Lies whether the cellular phone obtained from Craun contained any images of child pornography. Agent Lies stated that, although not apparent from the image itself, one image on the phone contained child pornography. Agent Lies stated he knew it contained child pornog *390 raphy because he “recognize[d] it as a known image.” The purported image on the cellular phone was not part of the basis for the charges against defendant.

Defense counsel objected and moved for a mistrial, stating the government had not disclosed the image during discovery. Agent Lies testified he did not recall defense counsel asking him whether the phone contained child pornography. Defense counsel called defendant’s IT specialist, who, defense counsel stated, was present when he had asked Agent Lies whether the phone contained child pornography. The IT specialist did not recall defense counsel having asked whether the phone contained pornography of any kind.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Wasson
Tenth Circuit, 2021
United States v. William Miller
982 F.3d 412 (Sixth Circuit, 2020)
United States v. Robert Fall
955 F.3d 363 (Fourth Circuit, 2020)

Cite This Page — Counsel Stack

Bluebook (online)
521 F. App'x 386, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-phillip-clingman-ca6-2013.