United States v. Royle

U.S. Court of Appeals for the First Circuit
United States v. Royle, 86 F.4th 462 (1st Cir. 2023)

United States v. Royle

Opinion

United States Court of Appeals For the First Circuit

No. 20-2143

UNITED STATES OF AMERICA,

Appellee,

v.

GEORGE ROYLE V,

Defendant, Appellant.

APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MAINE

[Hon. Joseph N. Laplante, U.S. District Judge]

Before

Barron, Chief Judge, Howard and Thompson, Circuit Judges.

Jonathan G. Mermin, with whom Preti, Flaherty, Beliveau & Pachios, LLP was on brief, for appellant. John M. Pellettieri, Attorney, Appellate Section, Criminal Division, U.S. Department of Justice, with whom Darcie N. McElwee, United States Attorney, Julia M. Lipez, Assistant United States Attorney, Kenneth A. Polite, Jr., Assistant Attorney General, U.S. Department of Justice, and Lisa H. Miller, Acting Deputy Assistant Attorney General, U.S. Department of Justice, were on brief, for appellee. November 14, 2023 HOWARD, Circuit Judge. George Royle V (Royle) appeals

from his conviction by a jury for possession of child pornography,

in violation of 18 U.S.C. § 2252A(a)(5)(B) and (b)(2).

Specifically, he argues that the district court erred in denying

his motion to suppress the derivative fruits of a warrantless

search of his home, and in denying his motion to dismiss the

indictment due to inadequate notice of that search. He also

contends that the government's trial evidence was insufficient to

support his conviction. We affirm.

I.

In late June 2015, agents with the Department of Homeland

Security (DHS) obtained a video depicting suspected child

pornography that had been shared over the internet by a computer

using an IP address assigned to a home in Portland, Maine.

Investigators learned that the home was owned and occupied by

Royle, a local attorney, and that its internet service was

registered in his name.

On several occasions beginning July 1, 2015, DHS Special

Agent David Fife (SA Fife) conducted surveillance outside Royle's

home. Among other observations, he noted a man matching Royle's

physical description standing in the driveway and entering the

house, as well as a car registered to Royle and his ex-wife parked

near the house. SA Fife also conducted surveillance of Royle's

- 3 - law firm, where he observed this same man and car in the parking

lot. At one point during his surveillance of the home, SA Fife

observed Royle "embrace and kiss an unknown white female," who

then left in a separate vehicle.

While this surveillance was ongoing, SA Fife prepared

documents to apply for a search warrant for Royle's home. For

instance, on Monday, July 6, 2015, SA Fife sent a draft search

warrant affidavit to a federal prosecutor, seeking review and

feedback. The two discussed edits to the draft over the next two

days and, on the morning of July 8, planned via email to seek and

execute a warrant for Royle's home on Monday, July 13. As

reflected in their emails, this agreed-upon timing was intended to

accommodate staffing concerns and allow sufficient time for

internal approval.

During the evening of July 8, SA Fife and another DHS

agent continued surveillance of Royle's home. There, they observed

that the front door and a few windows remained "wide open" for

several hours, though there was no car in the driveway.

Purportedly concerned about the "unsecured nature of the home,"

agents contacted the Portland Police Department (PPD) to "conduct

a welfare check."

Two PPD officers arrived at Royle's house around

10:30 p.m. Officers reported that they observed a mess through

the open front door and that no one appeared to be home. After

- 4 - knocking on the screen door without response, the officers entered

the residence. After "[s]everal minutes" looking around the

residence, the officers exited. PPD then proceeded to talk to a

neighbor, inquiring about Royle, and explaining that "[s]omebody

called in a welfare check" on Royle, "[be]cause the front door was

wide open, unlocked."

After PPD exited Royle's house, SA Fife approached the

PPD cruiser to ask about "what happened." PPD told him that "no

one was present in the home but that there were no signs of forced

entry or other suspicious activity beyond the open door." SA Fife

asked if PPD "s[aw] things there [in the house] that would . . .

not still be there if the place had been . . . robbed." PPD

responded that they observed "a laptop and several televisions,

leading them to believe that no one had been in the residence to

steal or attempt to steal anything." The next day, SA Fife wrote

up a report about the events of July 8. Royle eventually received

a copy of this report nearly three years later, in June 2018, in

connection with pre-indictment talks with the government. This

pre-indictment disclosure was the first time Royle learned that

the July 8 search had taken place.

On Monday July 13, 2015, SA Fife obtained a search

warrant for Royle's home and executed it the next morning at

approximately 7:40 a.m. At this time, Royle was the only adult

home. His two children, who were "[q]uite a bit under ten years

- 5 - old," were also present. SA Fife asked Royle whether there was

someone who could pick the children up; Royle said his ex-wife

could help and provided her phone number to the agents to arrange

for the pickup.

During their search, agents discovered and seized a

MacBook computer in an upstairs room, and that computer was later

found to contain images depicting child pornography.1 No other

computers were seized during the search.2 At the time the laptop

was discovered, it was powered on and on top of a desk. Agents

further determined that the laptop was in the process of running

"a wipe function," which the agents were able to stop by powering

down the computer.3 Forensic examiners later discovered that the

1 Child pornography is essentially defined as "any visual depiction . . . of sexually explicit conduct" involving a minor, with some nuance not relevant here.

18 U.S.C. § 2256

(8). Royle does not dispute that the images recovered from this laptop fit the applicable statutory definition. 2 Agents also seized Royle's phone, though the government did not seek to admit at trial any evidence obtained from the phone. SA Fife testified at Royle's suppression hearing that there was also an older computer in the residence -- a laptop that was found on the main floor of the house. As SA Fife testified, agents "ruled it out either because it was a work laptop or because it was . . . a very old laptop that had no remnants of anything on it that [they] were looking for." 3 According to the testimony, a wipe function performs an intensive deletion process. Typically, when a user deletes files, these items actually remain in a type of limbo known as "unallocated space," and are still recoverable with the help of forensic tools. A wipe function permanently deletes these files, rendering them unrecoverable.

- 6 - wipe function running on the MacBook had been initiated at around

6:55 a.m. that day.

In November 2018, Royle was charged with one count of

knowingly possessing and accessing with intent to view child

pornography, and attempt to do the same, in violation of 18 U.S.C.

§§ 2252A(a)(5)(B), (b)(2), and 2256(8)(A). In July 2019, Royle

moved to dismiss the indictment, arguing that SA Fife's failure to

disclose the existence and details of the July 8 search at any

time before June 2018 violated his procedural and substantive due

process rights. In the alternative, he moved to suppress the

fruits of the July 13 warrant-backed search on the grounds that

the evidence was derivative of observations made during the

warrantless search on July 8. Following a hearing in October 2019,

the district court denied Royle's motion to suppress, holding that

the July 8 search was justified under the community caretaking

exception to the warrant requirement or the good faith exception

"vis-a-vis the wellness check." The court also ruled that, in any

event, the evidence obtained from the July 14 search was admissible

under the independent source doctrine. The district court further

rejected Royle's arguments regarding the failure to give earlier

notice of the July 8 search. The court explained that Royle's

analogies to the pre-indictment delay and Speedy Trial Act contexts

"don't . . . really work here, [and] certainly not in a way that

would lead me to dismiss the case." The court explained, however,

- 7 - that while it was denying Royle's motion, "if there are ways at

trial that this failure to disclose has prejudiced [him] in a way

that I can remedy at trial, I'm open to it."

Royle was convicted on January 23, 2020, following a

three-day jury trial. The government's evidence consisted

principally of testimony from special agents Fife, Douglas

McDonnell, and Seth Plumb, as well as various exhibits reflecting

images and data recovered from the MacBook. SA Fife testified as

to the circumstances surrounding the warrant execution at Royle's

home, as discussed above, and SA McDonnell testified about his

role as a member of the team that executed the search warrant on

July 14. As will be further detailed below, the forensic evidence

-- introduced mainly through SA Plumb -- included images of minors

engaged in sexually explicit conduct, internet browsing history,

and other tranches of data demonstrating that the laptop recovered

from Royle's home was used to access child pornography. The

government argued to the jury that this data, along with other

circumstantial evidence that will be discussed, proved that Royle

knowingly possessed and accessed the child pornography found on

the MacBook.

At the close of the government's evidence, Royle moved

for an acquittal, arguing that the government failed to prove

beyond a reasonable doubt that he knowingly used the laptop to

access child pornography. The district court reserved judgment,

- 8 - see Fed. R. Crim. P. 29(b), and ultimately denied Royle's renewed

motion for acquittal in a written order following the verdict.

This timely appeal followed.

II.

A.

Royle first challenges the district court's denial of

his motion to suppress. The government argues that the July 8

search of Royle's home was justified pursuant to the emergency-

aid exception to the warrant requirement and, in any event, that

the fruits of the later warrant-backed search were admissible under

the independent source doctrine. Because we agree with this second

argument, we need not consider whether the July 8 search was

justified under the emergency-aid exception. Accordingly, we

assume the July 8 search was in violation of the Fourth Amendment

for the purposes of our analysis, and nevertheless affirm the

court's denial of Royle's motion.

As a general matter, "[a]s a prophylaxis against

unreasonable searches," the exclusionary rule prohibits

introducing the fruits of an unlawful search into evidence.

United States v. Flores,

888 F.3d 537, 545

(1st Cir. 2018).

Nonetheless, "under the independent-source doctrine, evidence

acquired from a lawful source that is independent of any Fourth

Amendment infraction is admissible," because "the exclusionary

rule should not put agents 'in a worse position' than if the

- 9 - [initial] constitutional infraction had not happened." United

States v. Ponzo,

853 F.3d 558, 573

(1st Cir. 2017) (quoting

Nix v. Williams,

467 U.S. 431, 443

(1984)). Thus, when information

is obtained through an illegal search, then through a later,

warrant-backed search, "the fruits of that [later] search [are]

admissible . . . unless (1) 'the agents' decision to seek the

warrant was prompted by what they had seen during' the initial

illegal search or (2) 'information obtained during that [illegal

search] was presented to the Magistrate and affected his decision

to issue the warrant.'" United States v. Soto,

799 F.3d 68, 82

(1st Cir. 2015) (quoting Murray v. United States,

487 U.S. 533, 542

(1988)) (final alteration in original). Here, Royle argues

only that the July 13 warrant was deficient under this first

consideration, sometimes called the "subjective" prong. So we

need not consider the second.4

Where, as assumed arguendo here, an unlawful search

precedes the procurement of a warrant, our "subjective inquiry"

asks "whether 'the agents' decision to seek the warrant was

prompted by what they had seen during the initial [illegal]

4The warrant contained no information about the July 8 search or information that was obtained via the July 8 search. In any event, after reviewing the warrant application, we have "little doubt that the [non-July 8 related] information was sufficient to support the judge's decision to issue the warrant." See United States v. Rose,

802 F.3d 114

, 124 n.4 (1st Cir. 2015) (explaining that this second inquiry is "wholly objective" (quoting United States v. Dessesaure,

429 F.3d 359, 369

(1st Cir. 2005))).

- 10 - entry.'" United States v. Rose,

802 F.3d 114

, 123–24 (1st Cir.

2015) (quoting United States v. Dessesaure,

429 F.3d 359, 369

(1st

Cir. 2005)) (alteration original). This inquiry "turns on whether

the particular officer would have still sought the warrant absent

the unlawfully-obtained information." Id.; see also United States

v. Siciliano,

578 F.3d 61, 77

(1st Cir. 2009) (explaining that the

question is "whether the officers would have sought the warrant

even if the unlawful evidence had not been available"). Although

this is "a subjective test, . . . it should not be proven by purely

subjective means." Dessesaure,

429 F.3d at 369

. That means that

"the district court is not bound by after-the-fact assurances of

[the officers'] intent, but instead must assess the totality of

the attendant circumstances to ascertain whether those assurances

appear 'implausible.'"

Id.

(quoting Murray,

487 U.S. at 540

n.2).

We review a district court's determination under the subjective

prong -- which is a factual finding -- for clear error. Soto,

799 F.3d at 83

.

We conclude that the district court did not clearly err

in finding that SA Fife's decision to seek a warrant was not

"prompted" by any information he learned from the July 8 search.

This finding was amply supported by SA Fife's hearing testimony

that what he learned on July 8 did "not at all" affect his intent

to get a warrant for Royle's home. Although such "after-the-fact

assurances" are not controlling, see Dessesaure,

429 F.3d at 369

,

- 11 - the district court was entitled to credit this testimony in

examining evidence of SA Fife's preexisting intent, as it

explicitly did. United States v. Guzmán-Batista,

783 F.3d 930, 937

(1st Cir. 2015) ("[A] challenge based on a district court's

credibility determination 'can virtually never be clear error.'"

(quoting Anderson v. City of Bessemer,

470 U.S. 564, 575

(1985)).

Indeed, the plausibility of SA Fife's assurances is

firmly supported by emails he exchanged with the prosecutor days

and hours before the July 8 search occurred. As previously

mentioned, SA Fife had already drafted an affidavit to support a

search warrant application and sent it to the prosecutor on July

6. Other emails showed that, several hours before SA Fife returned

to Royle's home to conduct surveillance on July 8, both he and the

prosecutor agreed that the contents of that draft were sufficient

for their purposes and planned to submit it for internal approval.

They further planned to seek and execute a warrant the following

week. As the emails show, that decision to wait was prompted by

administrative issues. There was no suggestion that either of

them believed additional information was needed, and nothing

presented at the hearing compelled any finding to the contrary.

We have repeatedly held that such evidence of a pre-existing intent

to obtain a warrant is sufficient to support application of the

independent source doctrine. Dessesaure,

429 F.3d at 369

(officers

not prompted to seek warrant when they were going to apply for one

- 12 - prior to warrantless entry); Soto,

799 F.3d at 83

(independent

source doctrine applied, in part, due to pre-existing

investigation of the defendant); Flores,

888 F.3d at 546-49

(investigation prior to initial search reflected intent to obtain

warrant); see, e.g., United States v. Combs,

727 F. App'x 744

, 748

(3d Cir. 2018) (independent source doctrine satisfied when law

enforcement "already in the process of preparing a search warrant"

prior to pre-warrant welfare-related search of the home (internal

quotations omitted)).

Nevertheless, Royle contends that, even assuming SA Fife

intended to seek a warrant prior to the July 8 search, this intent

was vitiated when he saw the unsecured house. In other words, his

concern about a potential break-in at Royle's home -- and the

prospect that evidence may be stolen -- extinguished his intent to

follow through with the plan to seek a warrant the following week.

Royle argues that those concerns were only abated -- and SA Fife's

intent restored -- after the warrantless search confirmed that a

laptop was in the home. But he offers nothing more than rank

conjecture to support this theory, and it is belied by the hearing

testimony. The district court credited SA Fife's assurance that

the events of July 8 did "not at all" effect his decision to get

a warrant, and this finding was not clearly wrong. Indeed, SA

Fife also testified that he had no expectation that the police

would enter the house to conduct the welfare check. He did not

- 13 - provide them any direction before they did so, let alone request

that they check that certain items were not missing. This

testimony was further corroborated by that of the PPD officers who

performed the search, who confirmed that the choice to enter the

home was their own decision based on the circumstances.5

Royle further argues that the independent-source rule is

inapplicable under these circumstances, because PPD officers could

have discovered something during their search -- i.e., that items

actually had been stolen from the house -- that could have

diminished SA Fife's intent to execute the warrant. This is a

nonstarter. As the Supreme Court explained in Murray, the

independent source doctrine is not concerned with "whether some

hypothetical illegal search would have aborted the warrant," as

To the extent Royle contends that the independent source 5

rule can only apply if the initial search "had no effect on [SA Fife's] decision to seek the warrant," he is incorrect. Our cases make clear that the doctrine's application turns on whether the warrant decision was "prompted by," not merely "influenced by," the illegal search. For instance, in Soto we explained that an agent's "candid acknowledgment that the [evidence from the initial illegal search] was a factor in his initial decision to seek the warrant[] does not" affect the independent-source analysis. Soto,

799 F.3d at 84

. Indeed, "[t]he question is not whether the evidence [observed during the illegal search] did influence the officer's decision[,] . . . but whether the same decision would have been made if the evidence had not been known."

Id.

In any event, even if we were to endorse Royle's alternative test, SA Fife's plausible and credited testimony that the events of July 8 did "not at all" affect his decision to obtain a search warrant would result in the same outcome.

- 14 - going that far would "expand our existing exclusionary rule." See

487 U.S. at 542

n.3.

Royle also contends that this case involves the concerns

implicated in Murray -- the "so-called confirmatory search,

conducted for the precise reason of making sure it is worth the

effort to obtain a search warrant." United States v. Restrepo,

966 F.2d 964, 971-72

(5th Cir. 1992) (quoting LaFave, Search and

Seizure, § 11.4(f), at 70 (1992 Supp.)) (internal quotations

omitted). We disagree, for the reasons already discussed. As in

Murray, this case is not an example of a "'search first, warrant

later' mentality," as "there is nothing to suggest that [officers]

went in merely to see if there was anything worth getting a warrant

for." Murray,

487 U.S. at 540

n.2. As the record demonstrates,

SA Fife had already determined that there was something in Royle's

home "worth getting a warrant for," based on the link between

Royle's IP address and child pornography. Indeed, he had already

gone through the effort of drafting the search warrant affidavit

and felt the contents were adequate for probable cause. Moreover,

the district court credited SA Fife's claim that his call to PPD

was for a wellness check, not a confirmatory search, and we see no

clear error in that finding.

In sum, the record evidence supports the view that "[t]he

facts gathered legally, without resort to the facts gathered

illegally, provided an independent and adequate source for the

- 15 - warrant application." Dessesaure,

429 F.3d at 370

. The district

court found that SA Fife would have still sought a warrant absent

the July 8 search, and our review of the record does not leave us

with "'a definite and firm conviction' that this was a mistake."

Soto,

799 F.3d at 84

(quoting United States v. Brake,

666 F.3d 800, 804

(1st Cir. 2011)). We have affirmed application of the

independent source doctrine on less robust showings. See

Dessesaure,

429 F.3d at 369

. Accordingly, we affirm the district

court's denial of Royle's motion to suppress.

B.

Next, Royle challenges the district court's denial of

his motion to dismiss the indictment or suppress the fruits of the

July 13 warrant due to deficient notice. Specifically, he argues

that the government's years-long delay in notifying him of the

July 8 search was unreasonable in violation of the Fourth

Amendment, and also violated his Fifth Amendment due process rights

by preventing him from investigating the circumstances of the

search while memories were fresh. Although Royle contends that

these inquiries run together and that his Fourth Amendment claim

is "rooted in" due process, his argument for dismissal or

suppression on Fourth Amendment grounds is underdeveloped and

- 16 - therefore waived. United States v. Zannino,

895 F.2d 1, 17

(1st

Cir. 1990).6

In seeking dismissal on due process grounds, Royle

compares the government's failure to timely notify him of the

July 8 search to cases of pre-indictment or pre-trial delay. The

6 Royle advances this argument in a single sentence of his brief, contending that "[w]hile advance notice [of the search] is not required, once the search had been completed, [he] was entitled to 'constitutionally adequate' notice that it had happened." Royle cites Dalia v. United States,

441 U.S. 238, 248

(1979), in support of this contention. But that case, confronting a challenge to the constitutionality of Title III, stands for the proposition that there is no "constitutional rule proscribing all covert entries," despite the fact that "covert entries" inherently involve a "lack of notice."

Id.

at 247–48. Royle offers no authority to support his contention that timely notice of a warrantless search after it has occurred is constitutionally required under the Fourth Amendment. Moreover, even if the July 8 search was unreasonable under the Fourth Amendment due to delayed notice, and that such a violation would be appropriately remedied by operation of the exclusionary rule, we do not see why the independent source exception to the exclusionary rule would not render the fruits of the July 13 warrant admissible. As discussed above, the "independent source doctrine acts as a limitation on the exclusionary rule of the Fourth Amendment," Dessesaure,

429 F.3d at 365

n.6, by permitting "admission of evidence that has been discovered by means wholly independent of any constitutional violation."

Id.

(quoting Nix,

467 U.S. at 443

). Thus, even if the delayed notice provided to Royle rendered the July 8 search unlawful, we would conclude that the independent source exception to the exclusionary rule applied, and that the district court was justified in denying Royle's motion to suppress. See, e.g., United States v. Freitas,

800 F.2d 1451, 1456-57

(9th Cir. 1986) (finding a notice-based defect in the warrant, but explaining that suppression was improper because of operation of an exception to the exclusionary rule).

- 17 - district court determined that Royle had failed to present

sufficient authority for the proposition that the government had

an obligation to disclose this information sooner than it did, or

show that dismissal was warranted. We affirm the district court's

conclusion that there was no constitutional violation here.

As he did before the district court, Royle argues that

his due-process claim should be resolved "[i]n keeping with" the

"principles" of pre-indictment delay and speedy trial cases. We

think the speedy trial framework is unsuitable to assessing Royle's

due process claim, as the guarantee of a speedy trial reflects a

distinct right protected by the Sixth Amendment and the Speedy

Trial Act, see United States v. Irizarry-Colón,

848 F.3d 61, 67

(1st Cir. 2017), while Royle has unequivocally explained that the

delayed notice violated the Fifth Amendment.7

"[E]xcessive pre-indictment delay can sometimes, albeit

rarely" violate due process, "if the defendant shows both that the

'delay caused substantial prejudice to [defendant's] right to a

fair trial' and that 'the [g]overnment intentionally

delayed indictment . . . to gain a tactical advantage.'" Irizarry-

Colón,

848 F.3d at 70

(quoting United States v. Bater, 594 F.3d

The speedy trial analogy is likewise inapposite, given that 7

the "right attaches only . . . [after] a defendant is indicted, arrested, or otherwise officially accused," United States v. MacDonald,

456 U.S. 1, 6

(1982); United States v. Handa,

892 F.3d 95, 101

(1st Cir. 2018), but the delay Royle contests occurred pre-indictment.

- 18 - 51, 54 (1st Cir. 2010)) (emphasis original). The second prong

requires showing "deliberate misconduct by the prosecutor (or at

least something very close to that)." Bater, 594 F.3d at 54. We

review the district court's decision not to dismiss an indictment

for a purported pre-indictment delay due process violation for

abuse of discretion. Irizarry-Colón,

848 F.3d at 70

.

Even if we assume that the "principles" from the pre-

indictment delay context govern Royle's claim, this is not one of

the rare cases where we would conclude there was a due process

violation. First, Royle cannot make out the requisite prejudice.

"With respect to prejudice, a defendant must do more than allege

that witnesses' memories had faded or that evidence had been lost

that might have been helpful to him."

Id.

(quoting United

States v. Muñoz–Franco,

487 F.3d 25

, 58 (1st Cir. 2007)). Here,

all that Royle alleges is that witnesses' memories have faded and

that evidence that might have been helpful to him was lost. His

argument fails accordingly.8

Despite asking us to view his claim through the pre- 8

indictment delay lens, at the same time Royle suggests that the applicable standard is an imperfect fit under these circumstances. In essence, he contends that prejudice under his circumstances should be assumed satisfied in his case, because the undisclosed information was uniquely and exclusively known to the government. With this undisclosed knowledge, he says, the government impeded his ability to begin investigating the circumstances of the July 8 search at an earlier time, which not only prejudiced him but also gave the government a leg up. But we fail to see how this meaningfully differs from the potential for prejudice in the pre-

- 19 - Moreover, any argument that "fresher" memories from the

witnesses would have helped Royle is speculative and based on

"conjecture." Bater, 594 F.3d at 54. Indeed, if witnesses with

fresher memories had testified "it is not clear just what [they]

would have said or how much it would have helped [Royle]." Id. at

55; United States v. McCoy,

977 F.2d 706, 711

(1st Cir. 1992) ("For

the defendant to carry the heavy burden of proving actual prejudice

from pre-indictment delay, concrete proof is required; mere

speculation and bare allegations will not suffice."). Royle

effectively concedes this very point, noting that "[i]t is

impossible to know what [the two] PPD witnesses [who testified at

the suppression hearing] would have said about what Fife was up to

on July 8" had Royle been notified of the search earlier. Despite

having access to audio recordings obtained from body microphones

worn by the officers during the search, Royle offers no evidence

to suggest that any accounts from the PPD officers closer in time

to the search would have meaningfully differed from what they

offered at his suppression hearing.

indictment delay context. In either case, the government's delay in providing notice of information exclusively known to it -- whether it be the circumstances of a search or the fact of an impending grand jury indictment -- affects the defendant's ability to prepare a defense. United States v. Lovasco,

431 U.S. 783, 796

(1977) (acknowledging that "lapse of time" indicting may have had negative impact on defense); United States v. Ciampaglia,

628 F.2d 632, 639

(1st Cir. 1980) (noting that a delay in indictment delays notice to indictee).

- 20 - If there was any doubt, Royle has also failed to show

that "the [g]overnment intentionally delayed [disclosure] . . . to

gain a tactical advantage." Irizarry-Colón,

848 F.3d at 70

(quoting Bater, 594 F.3d at 54). As in the pre-indictment context,

this perhaps could have been shown by evidence that the government

purposefully "[d]elay[ed] [disclosure] in order to deprive [him]

of witnesses." Id. at 71. But, again, Royle's argument that this

was the case rests on pure conjecture. Thus, "[e]ven if [Royle]

had demonstrated some degree of prejudice from the delay," this

appeal would fail, as he has "made no concomitant showing that the

government intentionally delayed [disclosure] to gain tactical

advantage." Muñoz-Franco, 487 F.3d at 59; Bater, 594 F.3d at 53-

54 (no violation of due process after four-year pre-

indictment delay, when there was "no evidence that the

government delayed the indictment to deprive [defendant] of

[relevant] testimony") (emphasis original).

We acknowledge that the government's delayed disclosure

was inopportune. "Obviously it is undesirable that [notice]

be delayed . . . ." Bater, 594 F.3d at 54. However, even assuming

that we would apply the analysis used in pre-indictment delay

cases, on these facts there is no showing that Royle was actually

prejudiced by this late disclosure or that it was in bad faith.

- 21 - Accordingly, the district court did not abuse its discretion in

denying Royle's motion to dismiss.9

III.

Finally, Royle challenges the sufficiency of the

evidence to prove that he "knowingly possess[ed], or knowingly

access[ed] with intent to view" child pornography found on the

laptop, as required to sustain his conviction under 18 U.S.C.

§ 2252A(a)(5)(B). We disagree.

"We review preserved challenges to the sufficiency of

the evidence de novo, viewing the record in the light most

favorable to the prosecution and rejecting such challenges if any

rational jury could have convicted the defendant when considering

all the evidence, direct and circumstantial, in this way." United

9We note that applying caselaw from the Brady context would also not help Royle. When the government has delayed disclosure of exculpatory evidence, we review for abuse of discretion, and affirm unless "the delayed disclosure prejudiced the defendant." United States v. Montoya,

844 F.3d 63, 71

(1st Cir. 2016). In this context, "the test is whether defendant's counsel was prevented by the delay from using the disclosed material effectively in preparing and presenting the defendant's case." United States v. Ingraldi,

793 F.2d 408, 411-12

(1st Cir. 1986). "[A] court's principal concern must be whether learning the information altered the subsequent defense strategy, and whether, given timeous disclosure, a more effective strategy would likely have resulted." United States v. Devin,

918 F.2d 280, 290

(1st Cir. 1990). For the same reasons his challenge fails in the pre-indictment delay context, he also would not succeed if we used the lens of the Brady cases: Royle has not shown prejudice from his delayed notice of the search.

- 22 - States v. Levin,

13 F.4th 96, 99

(1st Cir. 2021). "[T]he issue is

not whether a jury rationally could have acquitted but whether it

rationally could have found guilt beyond a reasonable doubt."

Id.

at 99–100 (quoting United States v. Breton,

740 F.3d 1, 16

(1st

Cir. 2014)) (quotation omitted). Because Royle moved for an

acquittal at the close of the government's case and the district

court reserved decision, we must "consider only the evidence

presented in the government's case-in-chief to assess whether 'a

rational factfinder could find, beyond a reasonable doubt, that

the prosecution successfully proved the essential elements of the

crime.'" United States v. Ortiz,

447 F.3d 28, 32

(1st Cir. 2006)

(quoting United States v. Moran,

312 F.3d 480, 487

(1st Cir.

2002)); see Fed. R. Crim. P. 29(b). Accordingly, we turn to an

examination of the evidence introduced by the government.

A.

As discussed above, the government's trial evidence

consisted of testimony from SA Fife and DHS special agents Douglas

McDonnell and Seth Plumb, as well as forensic evidence consisting

of images and other data extracted from the laptop.

To carry its burden on the mens rea element presently at

issue, the government argued that this circumstantial evidence

established that Royle was the user responsible for the child-

pornography-related contents of the laptop.

- 23 - This forensic data fit into roughly six related

categories. First, the government introduced 17 exhibits, showing

images of child pornography recovered from the laptop's deleted

files. Some of the images contained superimposed text (i.e., a

text stamp) depicting the name of a child pornography website.

Second, the government introduced evidence of internet-

browser screenshots recovered from the laptop's deleted files

containing the images previously discussed. As SA Plumb explained,

these screenshots depicted what would have been visible in the

browser at the time the corresponding images were displayed. He

further explained that certain browsers capture such screenshots

automatically, in order to show recently viewed webpages when a

new browser window is subsequently opened. Another explanation he

offered for how such screenshots could end up on (or deleted from)

a device is if they were affirmatively taken by a user.

Third, the government produced internet browsing

history, in chart form, collecting certain browsing activity

recovered from the laptop's Firefox web-browser application from

10 dates spanning the period from April 2, 2015 to July 13, 2015.

As SA Plumb explained, the chart was generated using a forensic

tool and listed the following information: various web addresses

visited by the browser; the corresponding title or name of each

address's webpage as displayed therein; the date and time each was

- 24 - visited;10 the number of times each was visited;11 and whether or

not the website was typed into the browser by a user. The chart

showed visits to video-chat and image-hosting websites that, in SA

Plumb's investigative experience, were linked to child

pornography, such as ImageTwist, Omegle, and mrvine.net.

Moreover, some of the web addresses themselves and titles of the

webpages used terms associated with child pornography (or

otherwise suggestive of sexually explicit content involving

minors), such as "Jailbait Amateur Pictures" and "Teens-posing and

sex." This included a site displayed as "stickamgfs.com," which

frequently appeared in the browser history.

The chart further reflected that many of the visits to

these websites occurred at late evening hours, and sequentially,

for periods of time ranging from 20 minutes to an hour.

Furthermore, SA Plumb identified that some of the web addresses

visited by the laptop matched the superimposed text, or file names,

reflected in the sexually explicit images recovered from the

laptop. For example, one image was superimposed with "4947-

pul.avi.," which was embedded in an ImageTwist web address visited

The chart indicated the time in Universal Coordinated Time 10

(UTC), and Plumb explained to the jury that this is four or five hours ahead of the time in Portland, Maine. Exactly how many hours ahead depends on the "time of year." This metric only reflects a hit for a user going "to that 11

one page that one time" -- thus, this metric is "precise to [a specific] web address."

- 25 - on May 7, 2015: "http:imagetwist.com/dbk60c5x4il7/4947-

pul.avi.jpg.html."

Fourth, the government introduced another chart

generated by SA Plumb's forensic tools, the "SessionStore

Artifacts," that contained additional information about the

laptop's use of the Firefox browser. As SA Plumb explained, the

SessionStore Artifacts reflected "a record of the most recent use

of that browser," listed in individual entries containing a "title"

and web address, but no data as to the date or time the material

was accessed. In some instances, the "title" reflected search

terms used in various search engines, including Google and Bing.

For example, searches discussed during SA Plumb's testimony

reflected Bing searches for "Young Teens in Swimsuits Candid,"

"Junior High Schools Bikinis," and "Tween Teen Bikinis Candid."

SA Plumb further identified entries showing visits to some of the

child-pornography-linked sites discussed above, e.g., ImageTwist,

mrvine.net, and other sexually explicit references to "[j]unior

[h]igh [s]chool" and "9_or_10_year_old_girl[s]." As with the

browsing history example, SA Plumb was able to match several

SessionStore Artifacts entries with file names appearing on the

child pornography images previously introduced.

Fifth, the government introduced a third chart

summarizing "Launch Services Quarantine Events" (LSQ) data

extracted from the laptop and examined by SA Plumb. As SA Plumb

- 26 - explained, LSQ data records instances in which a MacBook's user

attempts to open a file downloaded from the internet. When such

an attempt is made, the computer automatically provides a "yes" or

"no" prompt to the user before the file can be opened, and this

event is recorded. He further pointed out several entries between

2012 to 2013 recording attempts to open files with sexually

explicit references to minors.

Finally, Plumb testified regarding a fourth chart

reflecting extracted "QuickLook Thumbnail Cache" data. He

explained that the QuickLook feature enables a user to quickly

view the contents of files held in a folder directory by selecting

an individual file and hitting the space bar. The data reflected

in the QuickLook chart show the filenames and pathways for files

that are prepared to be launched from the QuickLook feature. SA

Plumb then proceeded to discuss specific entries of this data

extracted from the MacBook. As he discussed and the jury was

shown, many of the file names in these entries reflected picture

and video files with overt references to minors engaged in sex

acts, previously discussed websites, e.g., Omegle, or terms such

as "jailbait." These files were all in the "aMule Downloads"

folder.

As SA Plumb explained, aMule is a peer-to-peer file

sharing program, which allows a user to search for and download

files from the machines of other users over the internet. A user

- 27 - of a peer-to-peer program can locate files of interest by using

search terms, and can then download any particular file by

"clicking" on it. With aMule, any such downloaded files will

populate in an aMule downloads folder on the user's computer, which

is automatically created by the program. SA Plumb further

explained that, to his knowledge, a file would have to be clicked

on by a user in order to be downloaded and populate in such a

folder. Further evidence captured in the laptop's browsing history

showed searches suggesting that the aMule program had been

downloaded to the laptop from the internet, in April 2015.

Although the aMule program was not installed on the MacBook when

it was seized, SA Plumb confirmed through additional forensic tools

that it was installed and running on the laptop as of July 9, 2015.

B.

Royle does not contest that the government sufficiently

proved that the laptop both contained child pornography and

reflected visits to websites associated with child pornography.

Instead, he contends that the government failed to prove that Royle

downloaded those images or visited those websites. Boiled down,

his argument is twofold. First, he argues that the evidence failed

to prove that the child pornography's presence on the laptop was

a result of knowing human activity, rather than automated computer

activity. Second, he argues that even if the evidence sufficiently

established that a person was responsible, no rational jury could

- 28 - conclude that he was that person without impermissible

"guesswork." For this second argument, Royle heavily relies on

our decision in United States v. Pothier,

919 F.3d 143

(1st Cir.

2019). We address and reject each argument in turn.

1. Human Activity

Royle argues that various non-volitional "automatic

process[es]" could have caused the pornographic material to end up

on the computer. Specifically, he argues that processes such as

"caching," "pre-fetching," "re-direction," or "malware" could

explain the presence of illegal material on the laptop.12 He points

to SA Plumb's concession on cross-examination that he could not

say for certain how the images recovered from the laptop got there

and that it could have possibly been due to one of those automated

processes. But a rational jury could have readily found this

theory implausible, given the volume of evidence showing child

pornography browsing and peer-to-peer downloads, and other

evidence tending to show that a human accessed the recovered

images.

12 Both pre-fetching and caching are processes that allow computers to quickly respond to queries from users. As SA Plumb testified, pre-fetching refers to a process in which "files that [have] previously been accessed are . . . prioritized in a way to allow them to be in active memory quicker." Likewise, caching is an automatic process in which the browser saves items displayed on the screen "to a certain degree within the computer," so if a user returns "to that page or . . . want[s] to access that link it will be available to [him] more quickly."

- 29 - First, a reasonable jury could have rejected the notion

that child pornography inadvertently ended up on the computer

through these automated processes in light of the considerable

volume of that data in evidence. For instance, the browsing

history, reflecting activity from 10 dates spanning April to July

2015, collectively showed hours of sequential visits to dozens, if

not hundreds, of webpages associated with child pornography.

Similarly, the SessionStore Artifacts chart contained over 1,400

individual entries for webpages recently visited by the laptop's

browser, many of which very clearly reference child pornography.

The volume of this activity helps dispel any reasonable doubt about

whether the data resulted from mistake or the automated processes

of innocent web browsing. Cf. United States v. Myers,

560 F. App'x 184, 187

(4th Cir. 2014) (holding that the "plethora of child

pornography on [defendant's] computer . . . establish[ed] that it

was not by mistake or error that the files were downloaded").

Second, multiple pieces of evidence showed that the

laptop was affirmatively manipulated by a human, in at least some

instances, in connection with child pornography viewing activity.

For example, the browsing activity evidence, aided by SA Plumb's

testimony, showed that visits to the sites omegle.com and

stickamgfs.com were initiated by a person typing those addresses

- 30 - into the browser window.13 Omegle.com, which had three typed visits

logged as of April 2015, was known to SA Plumb through prior child

exploitation investigations and was superimposed on some of the

images in the case. Similarly, typing-initiated visits to

stickamgfs.com on separate days in May 2015 linked to pages with

"Jailbait Videos" in the title. The SessionStore Artifacts

evidence further supports an inference of human-initiated

activity, where searches for illicit terms such as "Young Teens in

Swimsuits Candid" appeared. Cf. Breton,

740 F.3d at 17

(noting

that a "history of visits to websites with a child pornography

connection or use of search terms associated with child pornography

can support a finding that the defendant knew the images he

retrieved contained child pornography"); United States v. Shiver,

305 F. App'x 640, 643

(11th Cir. 2008) (rejecting the theory that

child pornography appeared "on [defendant's] computer without his

knowledge by a virus or by 'pop-up' windows that appeared on his

computer screen unbidden," when "the government's computer expert

testified that Internet searches conducted on [the defendant's]

computer used words and terms that were likely to return

pornographic images of children"). Further evidence reflecting

repeated viewing of specific pornographic videos also cuts against

13SA Plumb acknowledged that this search could appear "typed" if it had been copied and pasted. This, however, still evidences volitional activity.

- 31 - a theory that malware or automatic "re-direction" was the real

perpetrator. See Shiver,

305 F. App'x at 643

(repeated viewing of

image supports theory of volitional activity).

Moreover, the contents of the aMule downloads folder

provide further evidence that a human downloaded the child

pornography found on the MacBook. SA Plumb testified that any

downloads from aMule "would have had to have been clicked on and

downloaded" to end up in that folder. And the content in the aMule

downloads folder suggests a human used aMule to download child

pornography, given that the titles in the folder explicitly

referenced girls ranging from "6Yo" to "15Yo" engaging in sex acts.

The government did not introduce any of the images or videos from

the aMule files into evidence. However, as we have previously

recognized, "[t]he presence of files with names indicative of child

pornography -- even absent further proof of what, if anything,

those files contained -- tends to make it more probable that [a

defendant] knowingly was involved with child pornography."

Breton,

740 F.3d at 14

.14

14 TheaMule downloads folder and its files were not actually present on the laptop when recovered. However, the government sufficiently established that they were, at some time, through SA Plumb's explication of the function of the QuickLook Thumbnail cache. It further demonstrated that the aMule program was apparently removed from the laptop sometime between July 9, when it was known to be running, and the July 14 seizure, when it was no longer installed.

- 32 - Moreover, the pornographic content on the computer was

consistent across time and across various tranches of data (aMule,

QuickLook, etc.), suggesting human -- not automated -- activity.

The aMule file names reflect the same sources of content shown in

the browsing history (e.g., Omegle and stickam) and use of similar

terms (e.g., "jailbait"). The computer activity also reflected an

absorption with certain subject matters: young girls of a specific

age (10 to 15 years old), bikinis, and young girls from Russia. A

rational jury could conclude that a human with particular interests

was behind these queries and downloads.

In sum, ample evidence supported the conclusion that a

human being was responsible for the child-pornography-related

evidence recovered from the laptop.

2. Evidence linking Royle to the Computer

There is also sufficient evidence to support the jury's

finding that Royle, and not some other person, was behind the child

pornography activity at issue. While there is no direct evidence

that Royle knew the images were on the laptop, "[w]e have

recognized that knowledge of child pornography 'often is shown

through circumstantial evidence.'" Levin,

13 F.4th at 100

(quoting

Breton,

740 F.3d at 17

). Here, a reasonable jury could infer that

Royle knowingly possessed the child pornography from

circumstantial evidence that he used the computer during the period

that child pornography browsing activity occurred and that he was

- 33 - the only plausible person who could have initiated the wipe

function.

First, the evidence is sufficient to show that Royle was

the only adult resident of the home where the computer was found.

It was undisputed that Royle owned and resided at the home and

that the home's internet service was registered in his name. The

wifi network for the home was titled with Royle's initials. The

government also established that Royle was observed at the home

before the warrant was executed, and that only he and his two small

children were there when agents arrived during the early morning

hours of July 14. SA Fife further testified that, based on his

walk-though of the home, it appeared that only one adult was living

there. He also explained that Royle needed to call someone to

pick up the children. Moreover, a reasonable jury could conclude

that the room in which the laptop was found -- where it was open,

and positioned on a desk -- was an adult's workspace, and therefore

Royle's.15 Thus, when a computer was seized from the home, and

from this room, the jury could reasonably infer that it belonged

to Royle, the home's only adult resident.

15Pictures of this room introduced by the government showed the MacBook on top of a desk, next to a printer. Other items visible on the desk were various papers, sticky notes, and a stack of books, including "The Goldfinch" by Donna Tartt and "On Immunity" by Eula Biss. A wooden baseball bat appeared beside the desk.

- 34 - Various evidence from the computer itself further

confirms that Royle used the laptop with some regularity. Indeed,

Royle admitted to SA Fife that he used the laptop to access "Citrix

client" for his work. Forensic evidence also showed that Royle

had stored some personal documents on the computer. For example,

filenames in the QuickLook Thumbnail Cache included "Royle

Boys.jpg," "Royle, George 1400010680.pdf," "GEORGE.docx." The

MacBook also contained tax-related documents, i.e.,

"2014TurboTaxReturn.pdf" and "GRFund 1099." A reasonable jury

could further find additional filenames were linked to Royle, such

as "Notes on SM Deposition.docx," given evidence that he was an

attorney, and "CHILD SUPPORT AFFIDAVIT.pdf," given evidence that

he was divorced and had young children.

There was also evidence of innocent browsing activity

that the jury could have reasonably linked to Royle. For instance,

evidence showed browsing activity associated with repair

facilities in Portland, Maine, the local weather, Portland Sea

Dogs tickets, baseball cards, questions about childcare, and

activities to do with children. These queries all match up with

what the jury knew about Royle -- he owned a home in Portland, had

two young children, and had an interest in baseball.16 From all

The photo shown to the jury of the room that jurors could 16

conclude was Royle's showed a baseball bat among his other belongings.

- 35 - of this evidence, a reasonable jury could find that Royle used the

laptop with some degree of regularity, which further supports a

conclusion that he knew about the illicit images beyond a

reasonable doubt.

All of this evidence supports a reasonable inference

that Royle was the only adult living at the home while the laptop

-- which he indisputably used -- accessed child pornography. A

reasonable jury could have relied on this evidence in concluding

that Royle was the only plausible user behind that activity.

Indeed, the forensic evidence showed that the child-pornography-

related browsing often occurred late at night and early in the

morning. As we have recognized, evidence of child pornography

access during times that only a person occupying a room or a home

would be present tends to show that the primary occupant was

responsible for such activity. See United States v. Figueroa-

Lugo,

793 F.3d 179, 188-89

(1st Cir. 2015) (evidence that illicit

files were downloaded at around 4:00 a.m. onto computer found in

defendant's bedroom supported jury's rejection of other-user

defense theory, where there was "no evidence that anyone else slept

in the room or was present during the early morning hours"); see

also United States v. Salva-Morales,

660 F.3d 72, 75

(1st Cir.

2011) (per curiam) (holding that it was reasonable to infer that

owner of shop in which child-pornography-containing computer was

found was behind access to illicit files accessed around 2:00 a.m.

- 36 - and 9:00 a.m., given that he "locked up the shop at night . . . and

presumably opened it as well in the morning"). This is a common-

sense inference. United States v. Williams,

717 F.3d 35, 40

(1st

Cir. 2013) ("Jurors have the right -- indeed, the obligation -- to

use their common sense in evaluating and drawing inferences from

circumstantial evidence.").

Finally, the fact and timing of the wipe function

initiated on the laptop was highly probative of Royle's knowledge

of the child pornography files. First, "evidence that a person

deliberately deleted or attempted to delete files containing child

pornography tends to show that the person was aware of the files

and their illicit nature." Breton,

740 F.3d at 13

; United States

v. Glassgow,

682 F.3d 1107, 1109-10

(8th Cir. 2012) (knowledge

shown, in part, from deletion of images).17

The evidence reasonably supported a finding that Royle

was the initiator of this wipe. As discussed above, the government

established that the wipe function began at 6:55 a.m., and that

Royle was the only adult home at 7:40 a.m. when the agents

discovered the open computer on a desk upstairs. Although it is

perhaps conceivable that an unknown, overnight or early-morning

17 Thefacts in Royle's case provide especially compelling indicia of guilt, as the computer user here did not simply put files in the trash -- the pornographic content had already been deleted once, then a wipe function was initiated to further eviscerate the files.

- 37 - guest initiated the wipe and left without trace prior to the

agents' arrival, a reasonable jury could well find this theory

implausible, based on the evidence previously discussed. In

addition to evidence tending to show that Royle was the only adult

living in the home and that he used the laptop, evidence showed

that the wipe function would take approximately 13 hours to

complete. Royle's argument that a transitory guest would have

left the laptop unattended in Royle's home to complete this process

defies common sense. See, e.g., United States v. Shaw,

670 F.3d 360, 366

(1st Cir. 2012) ("[J]urors are neither required to divorce

themselves from their common sense nor to abandon the dictates of

mature experience" (quoting United States v. Ortiz,

966 F.2d 707, 712

(1st Cir. 1992))).18

3. Pothier: Other Plausible Users Theory

Lastly, to the extent Royle argues that our decision in

Pothier is "materially identical" to his case and compels reversal,

18 Royle argues that the wipe function was a perfectly innocent

application to run. But, for the reasons discussed, a reasonable jury could supportably conclude that under these circumstances it evinced consciousness of guilt, rather than routine maintenance. United States v. Ortiz,

966 F.2d 707, 712

(1st Cir. 1992) ("When assessing sufficiency challenges in criminal cases, we have remarked, time and again, that factfinders may draw reasonable inferences from the evidence based on shared perceptions and understandings of the habits, practices, and inclinations of human beings."). This is particularly so given the time-intensive nature of the process, the testimony that many files on the computer had already been deleted once, and that the wipe function, if completed, would have prevented forensic examiners from recovering the data.

- 38 - he is mistaken. In Pothier, we reversed a child pornography

conviction, holding that the evidence in that case was insufficient

to support a finding that the defendant knowingly possessed child

pornography. Pothier,

919 F.3d at 144, 148

.

The defendant in that case, William Pothier, owned a

laptop that was found to contain child pornography. The laptop

was discovered by police in an Exeter, New Hampshire, apartment

where two adults other than Pothier received mail.

Id.

at 146-

47. One of these two other people -- Josephine Pritchard -- owned

the apartment.

Id. at 146

. There was no additional evidence about

the third adult.

Id.

Pothier also had a New York apartment where

he would spend time, and owned other property in New Hampshire,

where his car was registered.

Id.

Police seized Pothier's laptop after initiating a search

of the residence. When police arrived to execute the search, they

repeatedly knocked on the door, and Pothier did not respond to the

knocking for some time.

Id. at 145

. After entering the apartment,

the police found the laptop in the living room of the residence.

Id. at 144

. The owner of the apartment, Pritchard, arrived during

the search.

Id. at 146

.

Like the laptop here, Pothier's computer was not

password protected.

Id. at 145

. Although Pothier admitted to

owning the laptop and indisputably "used [it] on at least a handful

of occasions," it was unknown "whether he left the laptop at the

- 39 - [residence in question] when he was elsewhere."

Id. at 146-47

.

At trial, the prosecution's "sole theory" was that "Pothier must

have known that the illicit material was on his laptop because he

was the only person who otherwise used [it], and therefore must

have been the person who downloaded the pornography."

Id. at 147

.

In reversing Pothier's conviction on that theory, we

explained that the government's evidence for the "knowing" element

required "guesswork" between two "plausible" scenarios.

Id. at 147

. On the one hand, it was plausible that Pothier downloaded

the child pornography but "decided to forgo password protection

and then left the laptop in the living room of a residence at which

two other people received mail."

Id.

On the other hand, it was

also plausible that one of the two other adults "used the readily

available laptop during Pothier's frequent absences to download

the . . . child pornography."

Id.

Without more evidence to

reasonably support a finding as to "which scenario describe[d]

what happened," we held that the jury's acceptance of the former

theory was necessarily based on "guesswork."

Id.

As we explained,

"[g]uilt beyond a reasonable doubt cannot be premised on pure

conjecture."

Id.

(quoting Stewart v. Coalter,

48 F.3d 610, 615

(1st Cir. 1995)) (alterations original). But "pure conjecture" is

not what we have here.

Royle seems to suggest that Pothier created a bright-

line rule that, where "someone other than the defendant had the

- 40 - opportunity to use a [child-pornography-containing] computer," the

government must affirmatively offer evidence "rul[ing] out" this

other person or directly prove the defendant was using the computer

when the illicit material was accessed. Here, Royle contends that

other plausible "someone[s]" include the computer's automated

processes, his ex-wife, the "unknown white female" observed

outside of his house, or a burglar. He contends that Pothier

requires reversal in this case because the government did not

affirmatively "rule out" these other potential suspects. But Royle

misreads things.

Our decision in Pothier created no such rule and

expressly disclaimed any attempt to "make new law." Pothier,

919 F.3d at 149

. The law remains that "[t]he government need not

present evidence that precludes every reasonable hypothesis

inconsistent with guilt in order to sustain a conviction." United

States v. Hernández,

218 F.3d 58, 64

(1st Cir. 2000) (quoting

United States v. Loder,

23 F.3d 586, 590

(1st Cir. 1994)); United

States v. Naranjo-Rosario,

871 F.3d 86

, 92–93 (1st Cir. 2017) ("[We

need not] be convinced that the government succeeded

in eliminating every possible theory consistent with the

defendant's innocence." (quoting United States v. Troy,

583 F.3d 20, 24

(1st Cir. 2009))). Rather, the government need only prove

each essential element of a charge beyond a reasonable doubt.

United States v. Rodríguez-Vélez,

597 F.3d 32, 39

(1st Cir. 2010).

- 41 - For the reasons already discussed, a reasonable jury could conclude

that the government did so here.

Even if we assume, arguendo, that Royle's theories of

other persons using the laptop to access child pornography are

"plausible" on their face, the weight of the government's evidence

here is markedly stronger than the "surprisingly incomplete

record" in Pothier. See

919 F.3d at 147, 149

. Unlike in Pothier,

here, the government presented evidence that Royle was the only

adult resident of the house, the laptop was found in a more private

space than a living room, and the laptop was used to access child

pornography during hours in which a resident of the house would

presumably be home alone. The wipe-function evidence moves the

needle to point even further away from a "plausible" coin-toss to

Royle, and toward beyond a reasonable doubt, given the timing of

when it was run.19 Indeed, in Pothier, we noted that the absence

of any similar attempt by the defendant to destroy the laptop's

We note that a rational jury would have been well-supported 19

in rejecting alternative theories about the wipe as implausible or overly speculative. We refer to our discussion above as to Royle's argument that the laptop itself could have been the culprit. The notion that a person's ex-wife would briefly show up to his house at 6:00 a.m. to initiate a 13-hour wipe-function and then leave is implausible. Similarly, the notion that the "unknown white female" was behind the wipe, to the extent she was a different person, is too speculative to disrupt this verdict. The suggestion that a burglar, who periodically entered a dwelling over a period of months to download pornography, broke back into that home to delete evidence of his activity strains common sense. Although Royle does not specifically argue that any of these other potential users was behind the wipe function, his argument necessarily implies it.

- 42 - child pornography -- despite perhaps having the time and means to

do so -- undermined the sufficiency of the government's scant

evidence. See Pothier,

919 F.3d at 147-48

.20 In sum, the

combination of these factual distinctions removed the jury's task

from the "guesswork" apparent in Pothier.

We conclude by noting that we agree with the district

court's observation that "[t]he prosecution could have done more

to investigate and demonstrate the laptop's provenance, usage, and

location," and "other adults' access to the house." United States

v. Royle, No. 2:18-cr-165-JNL,

2020 WL 2617133

, at *9 (D. Me. May

22, 2020). However, this perspective alone does not allow us to

disturb the jury's verdict. See, e.g., Salva-Morales,

660 F.3d at 75

. Here, the government did enough. "Viewing the record as a

whole and using their common sense," a rational jury could have

found Royle guilty beyond a reasonable doubt. Williams,

717 F.3d at 40

.

IV.

AFFIRMED.

Pothier took about 15 minutes to answer the door to allow 20

the police in; we noted that he did not run a wipe function or hide the computer during this "lengthy delay." Pothier,

919 F.3d at 147-48

.

- 43 -

Reference

Status
Published