United States v. Rogers

714 F.3d 82, 2013 WL 1799898, 2013 U.S. App. LEXIS 8725
CourtCourt of Appeals for the First Circuit
DecidedApril 30, 2013
Docket12-1639
StatusPublished
Cited by5 cases

This text of 714 F.3d 82 (United States v. Rogers) is published on Counsel Stack Legal Research, covering Court of Appeals for the First Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Rogers, 714 F.3d 82, 2013 WL 1799898, 2013 U.S. App. LEXIS 8725 (1st Cir. 2013).

Opinion

STAHL, Circuit Judge.

Brian Rogers was convicted by a jury in the District of Maine of possessing child pornography in violation of 18 U.S.C. § 2252A(a)(5)(B). Rogers now appeals his conviction, arguing that the government did not prove that he knowingly possessed the child pornography that was found on a laptop he sold to a pawn shop. Rogers also challenges the district court’s award of $3,150 in restitution to a victim depicted in the pornography; he asserts that the government failed to establish a causal connection between his conduct and any harm to the victim. After careful consideration, we affirm both the conviction and the restitution award.

I. Facts & Background

The following facts are drawn from the trial record and, in light of Rogers’s challenge to the sufficiency of the evidence supporting his conviction, are presented in the light most favorable to the jury verdict. United States v. Valerio, 676 F.3d 237, 240-41 (1st Cir.2012).

On July 15, 2008, Rogers’s then-wife, Heather Rogers, sold a laptop computer to Coastal Trading and Pawn in Brunswick, Maine. Later that day, she returned with Rogers himself, who sold a second laptop to the store. In keeping with Coastal Trading’s usual practice, the clerk asked for, and received, the passwords to both laptops, to allow the store’s staff to access the computers and restore them to their factory settings.

The next day, Coastal Trading’s computer technician began the process of preparing the second laptop for resale. He turned it on and entered the password that Rogers had provided. In an effort to find the program that would restore the laptop to its factory settings, he looked in the Windows recycle bin. There, he discovered a video file captioned “My 15-Year Old Sister.” This discovery prompted him to search the laptop for other videos; he found “quite a few” more. He viewed portions of a few videos and saw “[yjoung children involved in sexual acts.” He immediately notified the store manager, who called the Brunswick police.

A few days later, Brunswick Detective William Moir collected the laptop and the associated sales paperwork from Coastal Trading and took them to the police station. Until Moir came to collect it, the laptop remained in the store’s back room, and no one accessed it. Moir, who had specialized electronic forensics training, removed the laptop’s hard drive and attached it to a “write blocker,” which allowed him to view the drive’s contents without altering them. After finding some files with names “indicative of child pornography,” he took the drive to the Maine State Police Computer Crimes Unit for further analysis. There, he worked with an analyst to copy and review the contents of the drive. They found both videos and still images of children engaged in sex acts.

Detective Moir soon returned to Coastal Trading and seized the laptop that Heather Rogers had sold to the store on her first *85 visit. Nothing of significance was found on that first computer. Moir then obtained a search warrant for Rogers’s home, which he and other law enforcement officers executed on July 31. Heather Rogers was there when they arrived; Brian Rogers returned home during the search. When the officers came upon a desktop computer and a case containing compact discs, they seized both.

The hard drive of the second laptop— the one on which the store employees initially found child pornography—was subsequently subjected to a more comprehensive forensic inspection. Chris Hull, an analyst with the Computer Crimes Unit, used forensic software to examine the hard drive’s contents. He found two user accounts on the drive: an account called “Mingan” (also designated “Admin”) and a default “guest” account. He also found six child pornography videos in a “shared” folder associated with the “Mingan” user account, and still images depicting child pornography in the “Temporary Internet Files” and “lost files” folders. The shared folder was created by LimeWire, a peer-to-peer file-sharing program that Hull found in the recycle bin. The Temporary Internet Files folder, as Hull testified at trial, stores files from frequently visited websites that otherwise would have to be loaded remotely, with the goal of speeding up the user’s web browsing experience.

Hull also examined the “index.dat” file, which records the computer user’s activity, whether it be visiting websites or opening files on the computer itself. The index file reflected numerous visits to websites like “nymphets-first-time-sex.com” (which was also bookmarked in the laptop’s default web browser, along with “Natural Lolitas” and “innocent-girl.com.”). And Hull found “cookies” (widely used data packets that allow websites to recognize returning users 1 ) from various websites, including “son-porno-schoolgirls,” a Yahoo user account called “Brian87_2006,” and the social networking site Myspace (which appeared to be associated with the same login information as the Yahoo account)... Indeed, Detective Moir found a Myspace page for a user called “Mingan”; one of the account’s three Myspace “friends” was Heather Rogers, Brian Rogers’s wife. As it happens, Hull determined that the password for the user account “Mingan” on the laptop was “Heather,” and the password hint associated with that account was “My baby.”

Additionally, Hull found ten “infections,” 1.e., malware programs, on the laptop. To determine whether they might be responsible for the presence of child pornography, he installed the same infections on a test machine that replicated the conditions on the laptop and let them run for a week. No child pornography appeared on the test machine.

Hull examined the desktop computer seized from Rogers’s home as well. Using the same forensic tools he used on the laptop, he uncovered child pornography images. These files were located in unallocated space, indicating that the files had been deleted by a user but not yet overwritten with new data. He also found two user accounts on the desktop: “Bunny” and “NEXCOM,” the latter of which was also captioned “Mingan.” Associated with the latter account were internet bookmarks for websites like “LolitasBBS-free-ware” and “nasty-virgins.org.”

On October 22, 2008, a grand jury indicted Rogers on one count of possessing child pornography in violation of 18 U.S.C. §§ 2252A(a)(5)(B), 2256(8)(A). 2 After rul *86 ings by both the district court and this court related to the suppression of certain statements Rogers made during the search of his house, see United States v. Rogers, 659 F.3d 74 (1st Cir.2011), the case went to trial. The jury, after hearing testimony about all the events related above, found Rogers guilty. The district court sentenced Rogers to sixty months’ imprisonment and eight years’ supervised release.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Rogers
758 F.3d 37 (First Circuit, 2014)
Paroline v. United States
134 S. Ct. 1710 (Supreme Court, 2014)
United States v. Breton
740 F.3d 1 (First Circuit, 2014)
United States v. Monserrate-Valentin
729 F.3d 31 (First Circuit, 2013)

Cite This Page — Counsel Stack

Bluebook (online)
714 F.3d 82, 2013 WL 1799898, 2013 U.S. App. LEXIS 8725, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-rogers-ca1-2013.