United States v. Hugh Glenn
Opinion
Hugh Michael Glenn appeals his conviction for one count of transporting and shipping child pornography in violation of 18 U.S.C. § 2252A(a)(1) and one count of accessing child pornography with intent to view it in violation of
I. BACKGROUND
A. Government Obtains a Warrant and Seizes Glenn's Computer
On or about August 30, 2016, the Dallas Police Department ("DPD") received a "cyber tip" from the National Center for Missing and Exploited Children ("NCMEC"). NCMEC informed the DPD that Chatstep, "an anonymous online chatting platform," had reported that someone with the username "TexPerv" uploaded an image of a prepubescent male exposed in a lewd and lascivious manner to its site on August 1, 2016. According to Chatstep, the user had also accessed several chat rooms with names signaling a sexual interest in children, including "UdnreraegAvction," "byyyrooom," and "UdneraegHvmiliation."
DPD Detective Chris De Leon issued an administrative subpoena to AT&T for the subscriber information linked to the IP address in the cyber tip. AT&T's records *316 showed Hugh Michael Glenn as the subscriber for the designated IP address. After running a search on Glenn's telephone number, DeLeon found Glenn listed as a registered sex offender with a prior federal conviction for transporting and shipping child pornography. DeLeon began surveilling the address listed on the sex offender registry and the AT&T documents; in doing so, he observed a UPS package on the doorstep addressed to Hugh Glenn.
On or about September 8, 2016, DeLeon contacted Agent Jennifer Mullican, a member of the FBI's Child Exploitation Task Force, for assistance. Based on the information Mullican collected from DeLeon, including the AT&T records, Mullican sought a warrant to search the residence of 3500 Routh for computer equipment and electronic material. In her affidavit in support of the warrant, Mullican listed 3500 Routh St as the address where Glenn was receiving internet service on August 1, 2016, the date the child pornography image was uploaded to Chatstep. However, the AT&T documents actually showed Glenn was receiving internet service at 3025 West Forest on August 1st; he transferred his billing address to 3500 Routh St on August 2nd and began service at Routh St on August 9th. Because Chatstep reported the pornography was uploaded on August 1st, Glenn could not have uploaded the picture from 3500 Routh, as Mullican's affidavit stated. Accordingly, Mullican's statement in the affidavit about where the upload likely occurred was incorrect.
The mistake went unnoticed and the magistrate judge issued a warrant to search the Routh St address. Officers executed the search warrant on September 14, 2016. Glenn was present at the time of the search and agreed to speak with law enforcement, waiving his Miranda rights. During this interview, Glenn admitted that he visited Chatstep, that he was user TexPerv, and that he had downloaded and uploaded child pornography. He also acknowledged that the officers would find child pornography on his laptop. Glenn admitted he had seen the specific image referenced in the cyber tip, and although he said he did not remember sharing the image, he also stated, "Umm, I obviously saved [the image] if I sent it out." Glenn signed and dated the back of the image.
While Mullican was interviewing Glenn, FBI computer scientist Anthony Lehman performed an initial triage of Glenn's laptop to determine if the computer was encrypted and to see if he could uncover any information helpful to the officers as they interviewed Glenn. Lehman used a software program "to do a quick analysis" of the computer's "allocated space," and he used a different program to recover deleted files from the hard drive's "unallocated space." 1 These searches were consistent with FBI protocol. Lehman's searches of Glenn's computer at the scene recovered many images of child pornography in both the allocated and unallocated spaces.
B. Glenn's Computer Installs Update in Government Custody
While back at the laboratory after the execution of the search warrant, Lehman attempted to create an "image" 2 of the *317 hard drive before the agents searched it further. In accordance with FBI procedures, Lehman removed the hard drive from the computer and tried to image it. However, the hard drive had a "non-standard" connector that was proprietary to its manufacturer and Lehman ran into several issues, requiring multiple attempts to image the drive.
Lehman sought help from his colleagues, but nobody had "seen this type of hard drive." He tried again using a different software program, but that attempt also failed. Lehman then tried two more times, once from a CD and once from a USB drive. Importantly, when Lehman attempted to run a program from the USB drive, the computer "didn't boot to the USB" as Lehman expected it would. Instead, "it tried to start up Windows," and Lehman "powered off the machine."
When Glenn's computer "tried to start up Windows," updates installed automatically onto the hard drive. 3 Although the update did not affect the "thumb cache" 4 of the computer-which contained numerous images of child pornography-one of the updates was a defrag.exe process that reallocated information on the drive so that data could be written more efficiently. Lehman testified that the defrag did not "completely actually run" and he "did not purposefully execute defrag.exe." Glenn contends that the update destroyed at least ten gigabytes of data in the unallocated space of his hard drive.
Eventually, Lehman was able to image the hard drive. All of the information about Lehman's attempts to image Glenn's hard drive, including the Windows update, was logged in the computer's registry. Lehman was supposed to write a "302 report" summarizing his efforts to image Glenn's hard drive, but Lehman failed to make his 302 report until about five months before trial. Lehman testified that this delay was an "oversight" because he "thought that [he] had written it" earlier.
Glenn's computer expert, Brian Ingram, was so disturbed by Lehman's failures that he brought them to the attention of the FBI. However, Ingram confirmed that he had no reason to doubt that 2,000 images of child pornography were on Glenn's computer before the FBI took custody of the computer. Additionally, Tom Petrowski, Division Counsel for the FBI, testified that Ingram said he thought Glenn was "guilty as sin."
After the hard drive was imaged, Mullican reviewed it. She located numerous images of child pornography-including the image referenced in the cyber tip-on Glenn's hard drive. Mullican also found explicit stories on the hard drive that depicted "the sexual exploitation of minor boys."
C. Pretrial Proceedings, the Trial, and Sentencing
Glenn was charged in a superseding indictment with one count of transporting
*318
and shipping child pornography in violation of 18 U.S.C. § 2252A(a)(1) and one count of accessing child pornography with intent to view it in violation of
Glenn moved to suppress the evidence obtained during the search once it came to light that Mullican's affidavit incorrectly stated Glenn's address was Routh St at the time the image was uploaded to Chatstep. No one contested that Mullican's affidavit supporting the warrant contained a false statement, and the district court judge therefore conducted an evidentiary hearing in accordance with
Franks v. Delaware
,
Glenn also moved to dismiss the indictment "due to prosecutorial misconduct" because Lehman allowed the computer to reboot in his custody, which triggered the installation of the Windows update and defrag program, resulting in at least ten gigabytes of destroyed data. The district court carried the motion to dismiss with the case so that it could hear live testimony from both Lehman and Glenn's computer experts, but it indicated that it was unlikely to grant the motion.
During trial, Mullican testified that she found numerous images of child pornography on Glenn's computer, including the image uploaded to Chatstep. Glenn objected, arguing that Mullican was not an expert in "hash values" used to identify specific images, nor was she an expert in the program used to find the illicit images on Glenn's computer. The district court overruled the objection and admitted the images into evidence. After trial, the district court denied Glenn's motion to dismiss. It also denied Glenn's request for a spoliation of the evidence instruction because it found that there was "not sufficient evidence of bad faith." The jury convicted Glenn on both counts of the indictment. The district court sentenced Glenn to a total of 360 months of imprisonment.
Glenn timely appealed.
II. DISCUSSION
Glenn raises four issues on appeal to challenge his convictions. He does not challenge his sentence. We address each of his arguments in turn.
A. Motion to Dismiss for Prosecutorial Misconduct
Glenn first argues that the district court erred by denying his motion to dismiss. He bases this argument on two different legal theories: 1) the Government suppressed exculpatory evidence under
Brady v. Maryland
,
1. Standard of Review
"We generally review whether the government violated
Brady de novo
, although even when reviewing a
Brady
*319
claim
de novo
, we must proceed with deference to the factual findings underlying the district court's decision[.]"
United States v. Cessa
,
2. Brady Argument
"To establish a
Brady
violation, a defendant must show: (1) the evidence at issue was favorable to the accused, either because it was exculpatory or impeaching; (2) the evidence was suppressed by the prosecution; and (3) the evidence was material."
United States v. Dvorin
,
"Evidence is material if there is a reasonable probability that, had the evidence been disclosed to the defense, the result of the proceeding would have been different."
Dvorin
,
Glenn cannot show that, had he had access to the overwritten data, the outcome of the trial would have been different. As for the uploaded image that was the subject of Count I, Glenn admitted having seen the uploaded image, and while he told Mullican he did not remember sharing the image, he later stated, "Umm, I obviously saved [the image] if I sent it out." Taken together with the facts that Glenn admitted to being user "TexPerv," he signed and dated the back of the image, and that the only other person to have had access to his computer was confirmed to have been at work on the date of the upload, there is little likelihood that the overwritten data would have changed the outcome of this case, even assuming it had some exculpatory or impeachment value. 5 As to the four images that made up Count II, Glenn's own expert agreed that the Windows update would not have moved files in Glenn's thumb cache. Moreover, Glenn told Mullican she would find child pornography on his computer. Consequently, Glenn's Brady arguments are without merit.
*320 3. Youngblood Claim
Unlike
Brady
, where the good or bad faith of the officer is irrelevant,
Youngblood
establishes that "the Due Process Clause requires a different result when we deal with the failure of the State to preserve evidentiary material of which no more can be said than that it ...
might
have exonerated the defendant."
Youngblood
,
The district court concluded, albeit in the context of a spoliation instruction, that Lehman's actions in allowing the Windows update to install were at most negligent. This is not clear error, especially where the district court waited to rule on Glenn's motion until hearing testimony both from Glenn's computer expert and from Lehman regarding his actions leading to the overwritten data.
See
United States v. Anderson
,
B. Spoliation Instruction
Glenn next argues that the district court erred by denying his request for a spoliation instruction regarding Lehman's failure to stop the Windows update on his computer. We review the district court's denial of such an instruction for abuse of discretion.
United States v. Valas
,
To receive a spoliation instruction, Glenn had to show that the Government acted in bad faith or with bad conduct.
Valas
,
C. Motion to Suppress
Glenn contends that the district court erred in denying his motion to suppress Glenn's statements and the images found on his computer. He argues the warrant was invalid based on the incorrect address included in Mullican's application for the search warrant.
1. Standard of Review
We "review[ ] the '[f]actual findings in a ruling on a motion to suppress ... for clear error' and questions of law de novo."
*321
United States v. Jarman
,
2. Analysis
Ordinarily, "[t]he Fourth Amendment's exclusionary rule will not bar the admission of evidence obtained with a warrant later found to be invalid so long as the executing officers acted in reasonable reliance on the warrant."
United States v. Alvarez
,
Here, the district court held an evidentiary hearing in accordance with
Franks
. There are three questions in the
Franks
inquiry: 1) "does the affidavit contain a false statement?"; 2) "was the false statement made intentionally or with reckless disregard for the truth?"; and 3) "if the false statement is excised, does the remaining content fail to establish probable cause?"
Ortega
,
It is undisputed that Mullican's statement that Routh St was the address associated with Glenn's AT&T account on the date of the upload was incorrect. 6 Therefore, Glenn has satisfied the first prong. However, Glenn cannot satisfy the second prong. Mullican testified at the hearing about her state of mind as she was completing the affidavit. She expressed she had no doubts as to the correctness of the Routh Street address as of August 1st and that she made an effort to get the address correct. The district court found her testimony to be credible and her mistake to be understandable considering the "relative[ly] opaque nature of the AT&T records." The district court even went so far as to find that Mullican was not "even negligent." We must view Mullican's statements in the light most favorable to the district court's ruling and give deference to the district court's credibility determination; in doing so, we see no clear error. 7
D. Daubert Challenge
Glenn's final argument is that the district court erred in allowing Mullican to testify regarding the images of child pornography she found on Glenn's computer. Glenn raises this as a challenge under
Daubert v. Merrell Dow Pharms., Inc.
,
It is not clear to us that Glenn's argument falls within
Daubert
, as he seems to be faulting Mullican's alleged lack of personal knowledge simply because she did not run the imaging program. Regardless, our review is for abuse of discretion.
United States v. Valencia
,
III. CONCLUSION
For the foregoing reasons, we AFFIRM the judgment of the district court.
"Allocated space" is space on a hard drive dedicated to storing files used or saved by the user so they can be accessed at a later time. After a file is deleted, it is stored in a hard drive's "unallocated space" until the hard drive is either permanently wiped using special software or the files are overwritten by other actions of the user. A user generally cannot access files in the unallocated space of the hard drive without special software, which Glenn did not have.
In this context, an image of a hard drive is "an identical copy of [the] hard drive."
A Windows update proceeds in two steps: the updates are downloaded onto the computer either automatically or by the user; and then the user can either install the updates immediately by restarting the computer or they will automatically install the next time the computer is restarted. The updates on Glenn's laptop had automatically downloaded to Glenn's computer the day before the execution of the search warrant; however, because Glenn had not restarted his computer, the updates had not yet been installed. It is undisputed that the Windows update did not contain images of child pornography.
A "thumb cache" is a database file that "basically stores every picture that you have knowingly opened on the computer" to help files load faster when they are opened subsequently. The thumb cache is located in the allocated space on the hard drive.
To the extent Glenn implied at oral argument that the Government may have intentionally placed the images on Glenn's computer, there is simply nothing in the record to support such a contention.
Mullican's statement was as follows:
AT&T responded that during the time the file was uploaded, IP address 99.8.79.141 was assigned to an account registered to the following individual: Michael Glenn, 3500 Routh Street, Dallas, Texas 75219. Service dates: 5-18-2016 through the date of legal process.
Reference
- Full Case Name
- UNITED STATES of America, Plaintiff - Appellee v. Hugh Michael GLENN, Defendant - Appellant
- Cited By
- 12 cases
- Status
- Published