United States v. Pothier
Opinion
Police learned that someone using an IP address
1
registered to William Pothier at an apartment in Exeter, New Hampshire, downloaded child pornography from a peer-to-peer file-sharing network. They also learned that two people in addition to Pothier received mail at that residence. While executing a search warrant, police found in the living room a laptop computer that was not password-protected. Pothier admitted that he owned the laptop, which contained a handful of documents and innocuous chat histories in his name. It also contained child pornography,
i.e.
, videos of "minor[s] engaging in sexually explicit conduct."
I.
A preliminary investigation revealed that the U.S. Postal Service delivered mail to three people at the Exeter residence associated with the IP address registered to Pothier: Pothier, Josephine Pritchard, and someone named Balis. On March 30, 2016, police officers executed a warrant to search for child pornography at the residence. For approximately fifteen minutes, police officers repeatedly knocked on the door, and called and texted Pothier's cell phone. Though Pothier was inside the residence, he did not answer until the fire department arrived and began to pry open the door. When asked if he had heard the police outside, he answered that he had, and said that neighbors had told him that police had been canvassing the area.
The ensuing search surfaced numerous computers and electronic storage devices, including an Asus laptop found in the living room. Pothier admitted that he owned the laptop, which was not password-protected and had a generic "Asus" profile rather than a user-generated profile. The police were therefore able to access the computer's contents on-site. Among the applications on the Asus laptop were a file-sharing program called Shareaza and an electronic file-shredding program called Evidence Eliminator. Also on the computer were six videos depicting children engaging in sexual acts. In addition, the on-site review revealed that a Skype user called "wdpothier" had engaged in a few innocuous Skype chat exchanges in March 2016.
The police later conducted a full forensic investigation of the Asus laptop. The child pornography discussed above was saved in a temporary folder associated with the Shareaza application. In addition, one more video depicting child pornography was in the laptop's recycle bin. Police also found that a user had searched on both Google and Shareaza using terms consistent with child pornography. Finally, police found thumbnail images that were remnants of child pornography that had been downloaded and deleted.
The computer contained a handful of documents associated with two people. First, police found two mortgage interest statements and a restaurant voucher, all associated with Pothier. Second, they found personnel and military discharge documents belonging to Joseph Walko. Walko testified that he worked at the Federal Aviation Administration in New York with Pothier and that, at some point, they had neighboring cubicles, but that he had no idea why his personal documents were on Pothier's computer. So, the jurors had a basis to conclude that Walko did not have access to the laptop, notwithstanding the presence of his documents on it.
The government was able to pin down the exact times and dates of the illicit downloads and searches. There was no overlap between the dates on which Pothier was known to have used the laptop, the dates on which Walko's documents were saved to the computer, and the dates of the illicit downloads and searches.
At the close of the government's case, Pothier moved pursuant to Federal Rule of Criminal Procedure 29 for judgment of acquittal, arguing that the government failed to prove beyond a reasonable doubt that he knew that the Asus laptop contained child pornography. The district court summarily denied the motion. Pothier neither testified nor presented any evidence in his defense, and the jury returned a guilty verdict. The district court then denied Pothier's motion to set aside the verdict, stating without explanation that a rational jury could find Pothier guilty beyond a reasonable doubt. At sentencing, the district court applied -- over Pothier's objection -- a two-level Guidelines enhancement for "knowingly engag[ing] in distribution" of child pornography. See U.S.S.G. § 2G2.2(b)(3)(F). The court sentenced Pothier to six years of imprisonment and twenty years of supervised release.
Pothier appeals to this court. He challenges both the sufficiency of the evidence underlying the guilty verdict and the district court's application of the sentencing enhancement for knowing distribution of child pornography.
II.
We turn first to Pothier's claim that the district court erred in denying his motion for judgment of acquittal. It goes without saying that the "Constitution prohibits the criminal conviction of any person except upon proof of guilt beyond a reasonable doubt."
Jackson
v.
Virginia
,
A.
The record in this case begins like the first chapter of a detective novel. The criminal act was clear: The laptop contained child pornography. Because the laptop was not password-protected and was found in a common area of the residence, the possible suspects were three: Pothier, Pritchard, and Balis, all of whom apparently had access to the residence and, therefore, to the computer. At that point, the record becomes sketchy and the evidence sparse. We learn very little about the possible suspects and just a bit more about the computer.
The sole fact that the record reveals about Balis is that he or she received mail at the residence. We have no clue whether Balis lived there, how much time Balis spent there, or whether Balis was there when the pornography was downloaded. We know nothing about Balis's relationships with Pritchard or Pothier. The detective who oversaw the investigation testified that neither he nor his subordinates ever attempted to learn more about Balis. As a result, we do not even know Balis's first name.
The trial record discloses only slightly more about Pritchard. One officer testified that he believed she was Pothier's "significant other." She was an airline flight attendant, and she bought the Exeter residence from Pothier. She showed up at the residence while the police were executing the warrant, and she followed Pothier's advice not to speak to the police without a lawyer present. Like Balis, she did not testify.
Even the evidence about Pothier is remarkably scant. We know that Pothier worked for the Federal Aviation Administration and that he spent at least four days a month in New York, where he maintained an apartment. He also owned property in Newmarket, New Hampshire, and his vehicle was registered there. He received "some" but "not a lot" of mail at the Exeter residence, and the mail he did receive there would sometimes sit in the mailbox for several days. We don't know whether he left the laptop at the Exeter residence when he was elsewhere. Although the government knew the dates and times on which the culprit downloaded the pornography, it did not investigate -- much less prove -- where Pothier was on those days or at those times.
Then there is the Asus laptop that belonged to Pothier. By not establishing a password, Pothier left the contents of the laptop fully accessible to anyone who might turn it on. He also left the laptop physically accessible, sitting in the living room where the police found it. It is undisputed that Pothier used the computer on at least a handful of occasions. There is no proof that anyone else either did or did not use the computer. Importantly, the evidence does not reveal whether an innocent user of the computer would have been aware that it contained child pornography. The seven illegal videos contained on the computer at the time of the search were not filed in conspicuous locations, but rather in the recycle bin and in a temporary folder only visible to a user who overrode Microsoft's default setting.
B.
There is no dispute that the jurors could rationally conclude that anyone viewing the videos would know that they depicted child pornography. The question at hand is whether a rational jury could find beyond a reasonable doubt that Pothier knew that his laptop contained the videos. The government's sole theory at trial and on appeal is that Pothier must have known that the illicit material was on his laptop because he was the only person who otherwise used the laptop, and therefore must have been the person who downloaded the pornography. In assessing the extent to which the evidence supports this argument, we begin by spelling out the scenario the government's theory necessarily posits: Pothier downloaded the file-sharing program Shareaza, the file-shredding program Evidence Eliminator, and child pornography, but decided to forgo password protection and then left the laptop in the living room of a residence at which two other people received mail. Furthermore, during the fifteen or so minutes when he knew the police were at the door, Pothier did not conceal or destroy the laptop or run the file-shredding Evidence Eliminator program that the government presumes he had installed.
A contrary scenario consistent with the limited evidence is that Pritchard or Balis used the readily available laptop during Pothier's frequent absences to download the file-sharing and file-shredding applications and the child pornography. Neither of them could have put a password on the computer without alerting Pothier. And because they were not present when the police came calling, neither of them could have hidden or destroyed the computer, or erased the child pornography, when the need to do so arose.
How could jurors rationally decide beyond a reasonable doubt which scenario describes what happened? In many cases, jurors rely on their assessments of witnesses' credibility to select between views of the evidence. Here, though, each competing scenario presumes the accuracy of the testimony proffered by the government, so credibility determinations cannot explain the conviction. Each scenario is plausible, and though one might debate their relative merits, to settle on one beyond reasonable doubt would require guesswork. And "[g]uilt beyond a reasonable doubt cannot be premised on pure conjecture."
See
Stewart
v.
Coalter
,
Trying to mine the record for some additional inculpatory inferences, the government contends that, in addition to the evidence described above, Pothier's actions at the search scene demonstrated consciousness of guilt. More particularly, the government argues that Pothier's lengthy delay in responding to the police reveals that he had "something to hide." In other contexts, similar conduct might carry some probative weight. Here, though, given that Pothier apparently did nothing in the available fifteen minutes to hide the laptop or shred the evidence, his conduct as a whole just as easily suggests obliviousness to the content on his computer as it does a guilty conscience. At best, any evidence of consciousness that one can infer from Pothier's reaction to the police is entirely ambiguous.
The government also points out that Pothier advised Pritchard not to talk to the police without a lawyer present. But he had just seen a warrant with Pritchard's name on it. Was he conscious of her guilt? Of Balis's? Was he just giving sound legal advice that one could glean any evening from watching network television? Perhaps not, but we would be guessing.
We acknowledge that Pothier could have filled many of these evidentiary gaps, and that his decision neither to testify nor to present any evidence likely struck the jury as suspicious. But the government bore both the burden of persuasion and the burden of production for the knowledge element of the crime.
See
Jackson
,
The Sixth Circuit encountered a remarkably similar case involving three potential suspects with access to a computer that was unprotected by password.
United States
v.
Lowe
,
The government attempts to distinguish both Lowe and Moreland . It points first to Pothier's behavior when the police came knocking. We have already explained why that conduct, viewed in context, renders speculative any inference that Pothier manifested consciousness of guilt of the relevant charges.
The government also points out that there exists no evidence that anyone besides Pothier actually used the laptop. In
Lowe
as well, though, there was no proof that the other possible users did in fact use the laptop.
Finally, we address the government's warning that a reversal on sufficiency grounds will thwart future prosecutions for possession of child pornography. As demonstrated by
Lowe
, our ruling does not make new law. Rather, we simply recognize that Congress criminalized only the knowing possession of child pornography, and a conviction under that law -- like any other conviction -- cannot be based on mere guesswork. "[A] society that values the good name and freedom of every individual should not condemn a man for commission of a crime when there is reasonable doubt about his guilt."
In re Winship
,
III.
Having concluded that Pothier's conviction rests on insufficient evidence, we need not reach his sentencing challenge. For the reasons discussed above, we reverse .
"An IP address, or Internet Protocol address, 'is the unique address assigned to every machine on the internet.' "
United States
v.
McLellan
,
Reference
- Full Case Name
- UNITED STATES, Appellee, v. William POTHIER, Defendant, Appellant.
- Cited By
- 4 cases
- Status
- Published