United States v. Ralph Alpizar

CourtCourt of Appeals for the Eleventh Circuit
DecidedJuly 26, 2018
Docket16-15170
StatusUnpublished

This text of United States v. Ralph Alpizar (United States v. Ralph Alpizar) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eleventh Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Ralph Alpizar, (11th Cir. 2018).

Opinion

Case: 16-15170 Date Filed: 07/26/2018 Page: 1 of 25

[DO NOT PUBLISH]

IN THE UNITED STATES COURT OF APPEALS

FOR THE ELEVENTH CIRCUIT ________________________

No. 16-15170 ________________________

D.C. Docket No. 1:15-cr-20019-JAL-1

UNITED STATES OF AMERICA,

Plaintiff - Appellee,

versus

RALPH ALPIZAR,

Defendant - Appellant.

________________________

Appeal from the United States District Court for the Southern District of Florida ________________________

(July 26, 2018)

Before WILLIAM PRYOR and JILL PRYOR, Circuit Judges, and RESTANI, ∗ Judge.

∗ Honorable Jane A. Restani, Judge for the United States Court of International Trade, sitting by designation. Case: 16-15170 Date Filed: 07/26/2018 Page: 2 of 25

PER CURIAM:

Ralph Alpizar was convicted of three counts of receipt of child pornography,

in violation of 18 U.S.C. § 2252(a)(2) and (b)(1), and three counts of possession of

child pornography, in violation of 18 U.S.C. § 2252(a)(4) and (b)(2), after law

enforcement officers discovered that he was downloading and sharing child

pornography files over the internet. The district court sentenced Alpizar to the

statutory maximum for each count, to be served consecutively, resulting in a total

sentence of 1,440 months’ imprisonment. On appeal, Alpizar argues that his

sentence is procedurally and substantively unreasonable. After careful review, and

with the benefit of oral argument, we affirm.

I. BACKGROUND

A. Factual Background

In March 2014, a Special Agent with the Federal Bureau of Investigation

(“FBI”) discovered that an IP address was sharing child pornography through a

peer-to-peer file sharing program called ARES. 1 The IP address was registered to

Alpizar at an address in Miami. After surveilling and researching the address, the

agent determined that Alpizar lived there with his father, Rafael Alpizar.

1 ARES users can share files with other users by placing files in a shared folder within their own ARES account. 2 Case: 16-15170 Date Filed: 07/26/2018 Page: 3 of 25

Law enforcement officers executed a search warrant at Alpizar’s home

shortly before 6:30 in the morning on July 23, 2014. Alpizar’s father answered the

door after the officers knocked and announced themselves continually for five

minutes. He told the officers that Alpizar was inside the house in his bedroom.

The officers proceeded inside the house and began to shout for Alpizar. Two to

three minutes later, Alpizar emerged from a bedroom. The officers searched the

bedroom, which contained a computer with two monitors. The search of the room

revealed emails addressed to Alpizar and diplomas—including one from the Dade

County School Board indicating that Alpizar had met the requirements set by the

office of vocational adult, career, and community education for a certificate in

electronics technology—in his name. The ARES program was running on the

computer, and the computer’s “recycle bin” was open and had been emptied. The

officers also found two hard drives in a spare bedroom. One of those hard drives

was labeled “R” and “my pics.” Doc. 155 at 121. 2

Although Alpizar was told that he was not under arrest, he agreed to go to

the police station to make a statement. Initially he denied knowing what a file

sharing program was, but he later admitted that he used file sharing programs to

download music. Alpizar also admitted that the hard drives found in the spare

bedroom were his. Eventually, he initialed a formal statement acknowledging that

2 Citations to “Doc #” refer to the numbered entries on the district court docket. 3 Case: 16-15170 Date Filed: 07/26/2018 Page: 4 of 25

“images of child pornography were on his computer, [a] personally built black PC

in his room under his desk which, in fact, he downloaded over the last couple of

years from ARES.” Doc. 154 at 104. The statement went on to say that “Ralph

takes full responsibility and assures that this will never happen again, downloading

[child pornography].” Id.

A forensic team examined the computer from Alpizar’s room. It contained

only one specially created user account, named “Ralph.” The ARES account on

the computer was registered to Ralph Alpizar under the email address

ralphrestoration@comcast.net. The search history in the ARES program running

on the computer revealed that someone had searched for multiple child

pornography terms. The FBI also found thousands of videos and images on the

computer, including many with file names indicative of child pornography.

The FBI’s forensic search of the computer revealed that on the morning of

the search, items had been placed in the computer’s recycle bin and then deleted;

some of those items had been in the shared folder before deletion. At least one file

had been deleted at 6:28 a.m., after law enforcement began knocking on the door

but before Alpizar left the bedroom.

The forensic team also examined the hard drives found in the spare

bedroom, both of which contained child pornography. The files had been

4 Case: 16-15170 Date Filed: 07/26/2018 Page: 5 of 25

downloaded onto the hard drives and placed in a folder that had been manually

created. On one of the hard drives, the user account was identified as “Ralph.”

Despite this evidence, Alpizar was not arrested after the first search. Several

months later, a new FBI Special Agent assigned to Alpizar’s case reviewed the

evidence and decided to obtain an arrest warrant for Alpizar. Before doing so, the

agent decided to check to see if Alpizar still was sharing child pornography over

the internet. The agent detected that Alpizar’s IP address again was sharing child

pornography. Law enforcement executed a second search warrant in January 2015.

During the second search, Alpizar told law enforcement that he was the only

one in the house who used the internet and that his father did not use the

computers. He admitted that he had purchased a new hard drive for his desktop

after the FBI had seized the old one and that he had installed ARES on it.

Law enforcement conducted a forensic examination of the new hard drive,

named “Ralph-PC.” Doc. 148 at 15. Fax cover sheets with Alpizar’s name on

them and emails to “Ralph Restoration” were found on the computer.

DriveScrubber, a program that wipes the hard drive clean to make deleted data

unrecoverable, had been installed on the computer. In addition, a user had disabled

the computer’s ability to create shadow copies of files that had been deleted.

ARES had been downloaded; once again the registered user was Ralph Alpizar and

5 Case: 16-15170 Date Filed: 07/26/2018 Page: 6 of 25

the associated email was ralphrestoration@comcast.net. Numerous search terms

associated with child pornography had been entered into ARES.

In total, counting only the files with titles strongly indicative of child

pornography, the FBI estimated that between December 2010 and January 2015

Alpizar had downloaded 1,781 child pornography videos and images using ARES.

Alpizar was arrested.

B. Procedural Background

In February 2015, Alpizar was charged via superseding indictment with

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Patti
337 F.3d 1317 (Eleventh Circuit, 2003)
United States v. Anthony Richard Kinard
472 F.3d 1294 (Eleventh Circuit, 2006)
United States v. Gonzalez
550 F.3d 1319 (Eleventh Circuit, 2008)
United States v. Langston
590 F.3d 1226 (Eleventh Circuit, 2009)
Gall v. United States
552 U.S. 38 (Supreme Court, 2007)
United States v. Rothenberg
610 F.3d 621 (Eleventh Circuit, 2010)
United States v. Tome
611 F.3d 1371 (Eleventh Circuit, 2010)
United States v. Irey
612 F.3d 1160 (Eleventh Circuit, 2010)
United States v. Turner
626 F.3d 566 (Eleventh Circuit, 2010)
United States v. Sarras
575 F.3d 1191 (Eleventh Circuit, 2009)
United States v. Francisco Cubero
754 F.3d 888 (Eleventh Circuit, 2014)
United States v. Emmanuel Asante
782 F.3d 639 (Eleventh Circuit, 2015)
United States v. Donald Eugene Creel
783 F.3d 1357 (Eleventh Circuit, 2015)
United States v. Jesus Rosales-Bruno
789 F.3d 1249 (Eleventh Circuit, 2015)
United States v. James Dale Little
864 F.3d 1283 (Eleventh Circuit, 2017)
United States v. Fulvio Monetti
705 F. App'x 865 (Eleventh Circuit, 2017)
United States v. Charles Carroll
886 F.3d 1347 (Eleventh Circuit, 2018)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Ralph Alpizar, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-ralph-alpizar-ca11-2018.