United States v. Ross

837 F.3d 85, 101 Fed. R. Serv. 504, 2016 WL 4800800, 2016 U.S. App. LEXIS 16809
CourtCourt of Appeals for the First Circuit
DecidedSeptember 14, 2016
Docket15-1460P
StatusPublished
Cited by8 cases

This text of 837 F.3d 85 (United States v. Ross) is published on Counsel Stack Legal Research, covering Court of Appeals for the First Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Ross, 837 F.3d 85, 101 Fed. R. Serv. 504, 2016 WL 4800800, 2016 U.S. App. LEXIS 16809 (1st Cir. 2016).

Opinion

TORRUELLA, Circuit Judge.

Following a two-day jury trial in the United States District Court for the District of Maine, defendant-appellant Kevin Ross was found guilty of one count of possession of child pornography under 18 U.S.C. § 2252A(a)(5)(B). Before trial, Ross sought to exclude from evidence six images and three videos of child pornography found on his computers and hard drive on the basis that the inflammatory nature of these materials risked unfairly prejudicing the jury against him under Federal Rule of Evidence 403. He contended that, because he was willing to stipulate that his computers contained child pornography, these images were of minimally probative value. The district court denied Ross’s request without viewing the challenged evidence. On appeal, Ross asserts that the district court committed reversible error when it declined to view the evidence before allowing its admission and by admitting these materials-. We affirm.

I.

In July of 2011, United States Postal Inspector Scott Kelley was monitoring a peer-to-peer network known as the Gnutel-la network and discovered that an Internet Protocol (“IP”) address from Maine was sharing files with hash values 1 indicative of child pornography. Kelley connected to the IP address and downloaded nine files which proved to contain, child pornography. Kelley later learned that this IP address was assigned to the subscriber Kevin Ross at an address in Penobscot, Maine. Ross had joined his mother, Madeline Ross, at this address in 2011, after his father fell ill, and continued to live there after his father’s death in April 2011.

On July 25, Kelley obtained a search warrant for the Ross residence. He executed the warrant with several law enforcement officers on July 26. Ross was the only individual in the home at the time of the search. During the search, Chief of the Belfast Police Department Michael James McFadden and United States Postal Inspector Michael Connelly investigated the basement. There, they found a laptop playing a video in which a “young female, probably under the age of 2, .[was] engaged in full intercourse with an adult male.” The agents seized the laptop and the laptop’s internal hard drive, a desktop computer and the desktop’s internal hard drive, an external hard drive, and thumb drives from the basement. Despite having removed “all of the Internet devices” from- the residence, on August 10, McFadden discovered that the same IP address was still being used to access *88 child pornography, and officers returned to Ross’s residence to conduct a search. They were unable to find any devices capable of connecting to the Internet and did not learn how anyone could have accessed the Internet from Ross’s residence after the initial search.

Ross was charged with one count of knowingly possessing child pornography under 18 U.S.C. § 2252A(a)(5)(B) and proceeded to a two-day jury trial. Prior to trial, the Government indicated that it intended to introduce two images and one video each from Ross’s laptop and desktop hard drives and his external hard drive, for a total of six images and three videos. Ross moved to exclude these materials. He contended that, because he was willing to stipulate that the videos and images contained child pornography, “[a]ny probative value that remains in showing this material is slight and substantially outweighed by the prejudicial quality of the evidence” under Federal Rule of Evidence 403. In the motion, Ross described the images and videos as “graphic and disturbing” such that they risked “creating] an emotional or visceral response with the jury,”

The district court denied the motion “[gjiven the limited number of actual images or videos to be proffered by the Government.” But the district court noted:

[T]he Court has not viewed any of the images or videos, and the Third Circuit suggested in [United States v. Cunningham, 694 F.3d 372 (3d Cir. 2012)] that, if contested, a trial judge should actually view the child pornography before admitting it. If defense counsel believes that the exhibits selected by the Government are too extreme and do not fairly represent what was' on the computer, the Court will investigate further, view the proffered exhibits, and rule on any specific objections that Mr. Ross wishes to press. In other words, if there are specific objections by Mr. Ross that the Government’s images and videos do not fairly represent the pornography on the subject computers or that they are particularly inflammatory, the Court will resolve this issue after having seen the proffered evidence outside the presence of the jury.

On the first day of trial, the district court repeated this request:

The Court: And the one issue that is still outstanding, I think, is whether or not the defendant contends that any of the images that the — that the government proposes to introduce, given the parameters of the order itself, still fall as inadmissible under Rule 403. In other words, do you want me to review those images before they’re introduced?
[Ross’s Counsel]: Your Honor, I don’t think the images misrepresent the type of material that was recovered from the computer. So for that reason, I would say the court doesn’t need to — to review the images.

At trial, Ross did not dispute that the computers and hard drives contained child pornography, instead arguing that someone else had used his IP address and computers to access the materials. He emphasized that his IP address continued to access child pornography after the computers were removed from his home and that forensics reports obtained by the Government showed that Ross’s computer had accessed child pornography in May 2011, when he and his family were on vacation in Michigan.

In addition to calling several officers ' who had searched 1 -Ross’s home to testify, the Government presented the testimony of Michael Scichilone, a computer forensic analyst with the United States Postal Inspection Service Digital Evidence Unit. He stated that he located “over a *89 hundred images and 50 videos of what appears to be a female under the age of 18 conducting sexual activities with adult male[s] and in sexual poses” on the desktop hard drive and “thousands of images” and “about 50 videos” on the laptop hard drive, as well as thousands of images and videos on the external hard drive and thumb drives. Scichilone testified. that Ross’s external hard drive could not itself access the internet and that it would need to have been “physically connected]” to a computer for these materials to be loaded onto it.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

ROSS v. WOODCOCK
D. Maine, 2025
ROSS v. MCCORMACK
D. Maine, 2025
United States v. Crater
93 F.4th 581 (First Circuit, 2024)
United States v. Apple Macpro Computer Apple Ma
851 F.3d 238 (Third Circuit, 2017)
United States v. Mata-Peña
233 F. Supp. 3d 281 (D. Puerto Rico, 2017)

Cite This Page — Counsel Stack

Bluebook (online)
837 F.3d 85, 101 Fed. R. Serv. 504, 2016 WL 4800800, 2016 U.S. App. LEXIS 16809, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-ross-ca1-2016.