USA v. Ethan Larman, No. 12-50855 (5th Cir. 2013)

Annotate this Case
Download PDF
Case: 12-50855 Document: 00512440480 Page: 1 Date Filed: 11/13/2013 IN THE UNITED STATES COURT OF APPEALS FOR THE FIFTH CIRCUIT No. 12-50855 United States Court of Appeals Fifth Circuit FILED UNITED STATES OF AMERICA, November 13, 2013 Plaintiff - Appellee v. Lyle W. Cayce Clerk ETHAN NATHANIEL LARMAN, Defendant - Appellant Appeal from the United States District Court for the Western District of Texas USDC No. 3:11-CR-1007-1 Before JOLLY, JONES, and BARKSDALE, Circuit Judges. PER CURIAM:* Ethan Larman appeals his conviction on one count of Receipt of Child Pornography, one count of Attempted Distribution of Child Pornography, both under 18 U.S.C. § 2252A(a)(2), and two counts of Possession of Child Pornography under 18 U.S.C. § 2252A(a)(4)(B). Larman not only challenges the sufficiency of the evidence to convict him, but further asserts errors in jury instructions, an error in an evidentiary ruling, and errors in the application of Pursuant to 5TH CIR. R. 47.5, the court has determined that this opinion should not be published and is not precedent except under the limited circumstances set forth in 5TH CIR. R. 47.5.4. * Case: 12-50855 Document: 00512440480 Page: 2 Date Filed: 11/13/2013 No. 12-50855 two sentencing enhancements. We consider and reject his arguments, and, for the reasons that follow, we AFFIRM his conviction and sentence on all counts. I. On October 23, 2010, an Internet Protocol address ( IP address ) in El Paso, Texas, made available for sharing child sexual abuse images over a peerto-peer network ( P2P ) between 8:12 and 8:57 a.m. 1 Law enforcement monitoring software created an activity report identifying the internet service provider ( ISP ) and the amount of images, categorized as child notable, associated with child abuse. Nicholas Marquez, a special agent with the Homeland Security Investigations Cyber Crimes Group ( HSI ), first observed this report on November 23, 2010, exactly one month after the incident of sharing. The software identified these images as child notable because of unique indicators called hash values, contained within the images source code. Hash values, specific to the makeup of a particular image s data, allow law enforcement to compare suspected child sexual abuse images to ones already present in law enforcement media libraries. This comparison allows law enforcement to identify child pornography with almost absolute certainty, regardless of the name associated with a file. Using this process, Marquez confirmed that thirteen images from the October 23 incident were indeed verified child sexual abuse images. After this confirmation, Marquez sent a summons to the ISP, Time-Warner Cable, requesting the subscriber information for that particular IP address. He received notice that the IP address belonged to Ethan Larman, a member of the U.S. military, at his El Paso, Texas address. Once Marquez confirmed that Larman resided at that address, he obtained a search warrant for Larman s P2P programs allow computers to exchange information by connecting with one another without having to go through an IP server. On a P2P network, any data placed in a shared folder on a user s computer can be accessed by anyone else using P2P software. 1 2 Case: 12-50855 Document: 00512440480 Page: 3 Date Filed: 11/13/2013 No. 12-50855 residence. Two days later, Marquez and other agents executed the warrant. While executing the warrant, agents took Larman and his roommate Benjamin Morgan outside while officers conducted a search of the apartment. Once outside, Marquez and Dustin Sletner, a special agent in the U.S. Army Criminal Investigation Division, interviewed Larman inside a government vehicle. Sletner took detailed notes during this interview, although the purpose of his presence was to serve as a witness. Marquez and Sletner testified that Larman told them he owned a computer and that he was the only individual who used the computer. Larman described his expertise with computers as low, but he acknowledged that he knew how to move, delete, and rename files. Most importantly, Larman admitted downloading child pornography through the Limewire P2P program approximately 50 times beginning in June of 2010. Larman informed the two agents that there were incriminating images in the My Pictures folder on his computer, on his PlayStation 3, and on two thumb drives he owned. In addition to these admissions, Larman informed agents as to why he was attracted to underage girls and described the manner in which he ordinarily viewed the images. Larman would later testify at trial and deny telling the agents that he ever downloaded or possessed any child pornography. The search of Larman s apartment yielded five pieces of electronic media belonging to Larman that authorities suspected contained child pornography. HSI Special Agent Joseph Byers, a forensic examiner, examined the media using complex forensic software that creates a mirror image of the contents of a media device. The first device was an E-Machines desktop computer (named C1H1 ), found on the upper shelf of a closet in Larman s bedroom. The second and third devices were two SanDisk thumb drives labeled TD-1 and TD-2, respectively. The fourth device was a PlayStation 3, which Byers was unable to examine because of the device s encryption technology. The final device was 3 Case: 12-50855 Document: 00512440480 Page: 4 Date Filed: 11/13/2013 No. 12-50855 a CD-R with the word Limewire handwritten on the front of it. This CD-R was found in a brown CD case belonging to Larman. Byers s examination of C1H1 confirmed that a P2P program called Frostwire had been installed four months before the sharing incident and remained on the computer. Byers found music and a bestiality video in the Frostwire shared folder, but no child pornography. He also found files indicating that Limewire previously had been installed on C1H1. Most importantly, Byers found child pornography files with hash values matching those identified in the earlier sharing incident. C1H1 s temporary internet cache folder also contained data suggesting that child pornography previously had been accessed on that computer. 2 The examination of TD-1 and TD-2 revealed more child pornography. Many of the images on TD-1 were series or known file filter images, meaning these images were of known victims previously identified by law enforcement. Again, several of these images matched the hash values of images identified in the sharing incident by the CPS software. Byers found that these child pornographic images were stored in a folder several levels down the tree structure of the device, meaning that the folders would have had to be consciously created by the user. Also contained on TD-1 were a large assortment of Larman s personal photographs, including pictures of his tattoos and pictures of his wife. TD-2 contained fewer child pornographic images, although Byers was able to effectively identify three such images. The CD-R Once a computer views a webpage, the computer automatically stores a copy of that webpage in a folder known as the cache. United States v. Moreland, 665 F.3d 137, 142 (5th Cir. 2011). Whenever the computer user revisits that webpage, the presence of that file in the temporary internet cache allows the page to load more quickly by retrieving the version stored in the cache. Id. In this case, investigators could view the hash values of the files to see what images were viewed. Some of these images matched known child pornographic images. 2 4 Case: 12-50855 Document: 00512440480 Page: 5 Date Filed: 11/13/2013 No. 12-50855 Byers recovered contained several files with names that indicated the images were child pornography, although these images were not charged in Larman s indictment. On April 4, 2012, a federal grand jury returned a four-count, superseding indictment charging Larman with violating 18 U.S.C. § 2252(a)(2) in Count One: Receipt of Child Pornography and Count Two: Attempted Distribution of Child Pornography, and 18 U.S.C. § 2252(a)(4)(B) in Counts Three and Four: Possession of Child Pornography. On April 16, 2012, Larman s jury trial began. Four days later, a jury found Larman guilty on all four counts. The district court judge later sentenced Larman to concurrent 188-month terms of imprisonment on Counts One and Two, and concurrent 120-month terms of imprisonment on Counts Three and Four. Larman appeals only Counts One, Two, and Three of his conviction. Thus, as far as the record shows, he stands convicted on Count Four. II. Larman s first issue on appeal challenges the sufficiency of the evidence used to support Counts One, Two, and Three of his child pornography conviction. Larman properly preserved this challenge by moving for a judgment of acquittal after the close of all evidence and thus the court s decision denying his motion for judgment of acquittal is reviewed de novo. United States v. McDowell, 498 F.3d 308, 312 (5th Cir. 2007). In reviewing the evidence, this court views it in the light most favorable to the Government with all reasonable inferences to be made in support of the jury s verdict. United States v. Moser, 123 F.3d 813, 819 (5th Cir. 1997). The overarching question is whether any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt. United States v. JaraFavela, 686 F.3d 289, 301 (5th Cir. 2012) (quoting Jackson v. Virginia, 443 U.S. 307, 319 (1979)). 5 Case: 12-50855 Document: 00512440480 Page: 6 Date Filed: 11/13/2013 No. 12-50855 A. Larman challenges the sufficiency of the evidence in Counts One and Three, in which he was found knowingly to have received and possessed child pornography, respectively. The direct evidence of knowing receipt in Count One was the testimony of Agents Marquez and Sletner that Larman had admitted to downloading child pornography on Limewire, a P2P program, approximately fifty times since June 2010. At trial, Larman consistently denied ever having told the agents that he downloaded child pornography on Limewire. Larman argues that the Government s reliance on the files contained within his temporary internet cache cannot form the sole basis of his receipt conviction because the Government failed to show that Larman knowingly received these images and that he exerted dominion and control over them. Determining [t]he weight and credibility of the evidence [is] the sole province of the jury. United States v. Parker, 505 F.3d 323, 331 (5th Cir. 2007). Here, the jury apparently found credible the agents testimony that Larman admitted to the downloading of child pornography on Limewire and found not credible Larman s testimony that he made no such admission to the agents. Our court assesses the credibility of witness testimony only to the extent that it may be incredible or patently unbelievable. United States v. Lopez, 74 F.3d 575, 578 (5th Cir. 1996). The agents testimony is neither. On this evidence alone, Larman s conviction of receipt of child pornography on Count One can be affirmed. The Government also presented circumstantial evidence that Larman received child pornography from the Internet. Hash values for several of the child pornographic images found on both C1H1 and TD-1 matched those that were shared via the P2P network on October 23, 2010. Although it was not charged, the CD-R containing child pornography was found in a brown CD case 6 Case: 12-50855 Document: 00512440480 Page: 7 Date Filed: 11/13/2013 No. 12-50855 that Larman admitted was his at trial. All of this evidence is enough, with respect to the receipt count, to support the jury s finding that the Government proved the essential elements of the crime beyond a reasonable doubt. JaraFavela, 686 F.3d at 301. Larman also challenges his conviction in Count Three for possession of child pornography in violation of 18 U.S.C. § 2252(a)(4)(b). As evidence of Larman s knowing possession, the Government presented the files found on C1H1, TD-1, and TD-2. At trial, and at oral argument, Larman contended that the jury lacked a legal basis to find him guilty of possession of the illegal images under a constructive possession theory because his roommate, Benjamin Morgan, could have accessed, downloaded, and possessed the material himself rather than Larman. 3 Possession, under this statute, may be either actual or constructive; actual possession means the defendant knowingly has direct physical control over a thing at a given time. United States v. Moreland, 665 F.3d 137, 150 (5th Cir. 2011). Constructive possession, on the other hand, is the ownership, dominion or control over an illegal item itself or dominion or control over the premises in which the item is found. Id. Larman relies heavily on Moreland to argue that the Government was required to prove something else (e.g., some circumstantial indicium of possession) . . . besides mere joint occupancy [to] support[] a plausible inference that the defendant had knowledge of and access to the . . . contraband. Id. Larman is correct when he asserts that where a residence is jointly occupied, the mere fact that contraband is discovered at the residence will not, without more, provide evidence sufficient to support a conviction based upon constructive possession against any of the occupants. Id. Although evidence Testimony at trial established that Larman s router, modem and WiFi connection were password protected. Morgan was the only other individual with the credentials to access Larman s network. 3 7 Case: 12-50855 Document: 00512440480 Page: 8 Date Filed: 11/13/2013 No. 12-50855 of mere occupancy is not enough, additional evidence of the defendant s knowing dominion or control of the contraband, besides the mere joint occupancy of the premises can support a reasonable inference that the defendant had knowledge of and access to the child pornography. Id. To be sure, the Government presented ample additional evidence of Larman s knowing possession. Larman s roommate, Morgan, testified that he did not know the two seized thumb drives existed. He further testified that he had never used Larman s PlayStation 3 outside of the few occasions they played it together and that he had never used Larman s desktop computer. Morgan described his knowledge of computer technology as being limited to surfing the Internet. Morgan was adamant that he had never seen or viewed child pornography. There was no evidence to suggest Morgan had ever used any of the media devices outside the presence of Larman. When Special Agent Byers ran a forensics check on Morgan s personal laptop, he did not find any child pornography, P2P software, or cleanup software to suggest data had been deleted. There is a notable dearth of evidence linking Morgan to use of any of the media containing child pornography. On the other hand, there is compelling evidence linking Larman to use of the media devices. First, Larman admitted that only he used those media devices, an admission he recanted at trial. Agent Byers testified that the file structure of C1H1 was intentionally configured to send and receive data through P2P software; law enforcement found P2P software on Larman s computer, and Larman testified that he knew how to create, delete, and move files electronically. The presence of child pornography on Larman s multiple media devices, along with the CD-R containing child pornography in Larman s brown CD case, a case that Morgan testified he had never seen before, all constitute additional evidence necessary to support Larman s conviction for possession on Count Three. For the reasons above, we 8 Case: 12-50855 Document: 00512440480 Page: 9 Date Filed: 11/13/2013 No. 12-50855 find the evidence sufficient to support Larman s convictions on Counts One and Three, that is for receipt and possession of child pornography, respectively. B. On Count Two of his conviction, the jury found that Larman attempted to distribute child pornography on October 23, 2010, when the CPS system indicated that a computer using his IP address was sharing child pornographic images. At trial, Larman contested the Government s assertion that he was the individual sharing the files. Larman s alibi was that he was on duty at the local army base from 9 a.m. until 9 p.m. on October 23. Larman argues that he could not have started sharing the files at 8:12 a.m. and stopped sharing them at 8:57 a.m. because he was not present at his house during this time. Although Larman appears to have been at work during this incident of sharing, the Government put on ample evidence that Larman did not need to be physically present at the house to allow the files transmission to other computers. The Government compared the act of sharing of files on a P2P network to the operation of a self-service gas station where the sharer merely provides access to the files and the recipient helps himself to the files by downloading them. United States v. Richardson, 713 F.3d 232, 236 (5th Cir. 2013) (citing United States v. Shaffer, 472 F.3d 1219, 1223-24 (10th Cir. 2007)). At oral argument, the Government cleared up any confusion regarding the duration of the sharing by explaining that the CPS system began pinging, or sending a signal to, P2P users folders at 8:12 and ceased at 8:57; the sharing ceased because the CPS system quit searching, not because of some activity from Larman s IP address while Larman was at work. The evidence supporting the attempted distribution count is circumstantial in nature, but it nevertheless paints a clear picture for the jury to determine that Larman was the culpable individual. Larman s modem was 9 Case: 12-50855 Document: 00512440480 Page: 10 Date Filed: 11/13/2013 No. 12-50855 password protected and, as previously discussed, there is no evidence that Morgan ever accessed Larman s media devices outside of his presence. The IP address sharing the child pornography on October 23 matched Larman s modem, and the subsequent investigation of Larman s computer revealed that many of the images found on it matched those made available on the P2P network during the sharing incident. Even though Larman s shared folder did not contain any child pornography at the moment it was seized, five months had passed since the sharing incident. The Government established that Larman possessed the technical expertise to create, delete, and manipulate folders and files on his computer; a rational trier of fact could conclude that if Larman used Frostwire to distribute the images, he likely moved them out of the shared folder. On the other hand, evidence that Limewire previously had been installed and then deleted from C1H1 also suggests that Larman could have used that particular P2P program to share the files and that its subsequent deletion before the execution of the search warrant prevented another shared folder from being examined. In sum, we hold that there was sufficient evidence for the jury to convict Larman on Counts One (receipt), Two (attempted distribution), and Three (possession) of his child pornography conviction. III. Next, Larman raises an evidentiary issue and argues that the district court committed reversible error when it refused to allow him to testify as to his version of the incriminating statements he made to the agents in their interview with him, that is, unless such testimony was accompanied by a limiting instruction. Under Rule 103(a) of the Federal Rules of Evidence, a party may only challenge a district court s evidentiary ruling excluding evidence if that party informs the court of its substance by an offer of proof, unless the substance 10 Case: 12-50855 Document: 00512440480 Page: 11 Date Filed: 11/13/2013 No. 12-50855 was apparent from the context. FED. R. EVID. 103(a). This court will not even consider the propriety of the decision to exclude the evidence at issue, if no offer of proof was made at trial. United States v. Winkle, 587 F.2d 705, 710 (5th Cir. 1979). In response to the court s exclusion of the testimony, Larman failed to offer the substance of the excluded testimony. When informed that Larman s testimony would be subject to the limiting instruction, Larman s attorney told the district court that he would not ask the question at [that] point. We understand that his testimony would have contradicted the agents account of what he told them, but what is not apparent from the record, is how it would have differed from the agents accounts. 4 In short, counsel simply made no offer of proof. As a result, we find that Larman s challenge to the district court s exclusion of his testimony fails due to an insufficient offer of proof. IV. Finally, Larman challenges his conviction based on two alleged errors with the jury instructions. We review a district court s decisions on jury instruction for abuse of discretion. United States v. Demmitt, 706 F.3d 665, 675 (5th Cir. 2013). First, Larman challenges the district court s deliberate ignorance instruction on grounds that the instruction is not supported by the facts of the case. Even if we assume error, we have consistently held that such an error is harmless where there is substantial evidence of actual knowledge. United States v. Threadgill, 172 F.3d 357, 369 (5th Cir. 1999) (citation and internal Mere statements that a criminal defendant will give his version of a conversation are not sufficient to make known to the court the substance of the evidence. United States v. Winkle, 587 F.2d 705, 710 (5th Cir. 1979). Our precedent is clear that [a] general description of the excluded evidence . . . [will] not preserve error. United States v. Ballis, 28 F.3d 1399, 1406 (5th Cir. 1994). 4 11 Case: 12-50855 Document: 00512440480 Page: 12 Date Filed: 11/13/2013 No. 12-50855 quotation marks omitted). The overwhelming evidence, recounted in this opinion, of Larman s actual knowledge renders the error harmless. 5 Second, Larman challenges the district court s refusal to give a Pennington instruction addressing Larman s knowledge of the illicit images on his media devices. 6 The instruction derives from United States v. Pennington, in which two truck drivers were indicted on drug possession charges after authorities discovered large amounts of marijuana in their tractor-trailer. 20 F.3d 593 (5th Cir. 1994). Both defendants claimed they did not know the drugs were in the vehicle, and that they could not be guilty because the Government failed to produce evidence of such knowledge. Id. at 597-98. In response to their argument, this court declared that [t]he knowledge element in a possession case can be inferred from control of the vehicle in some cases[,] but where the illicit substance is hidden . . . control [over the vehicle] alone is not sufficient to prove knowledge. Id. at 598. Although we found that the marijuana in the defendants tractor-trailer was indeed hidden, we nevertheless upheld the verdict because the Government had offered additional evidence beyond the defendants mere control of the vehicle, to show the defendants guilt. Id. Here, Larman s files were easily and quickly accessible. The fact that images found on TD-1 and TD-2 sat below the top level of visible folders is simply not enough for those images to be considered hidden within the Here, the Government offered ample evidence that Larman had actual knowledge of his receipt, attempted distribution, and possession of child pornography. Such evidence included the agents testimony regarding Larman s admissions, the structure of the file folders on C1H1, TD-1, and TD-2, along with Larman s ownership of the CD-R, which contained several child pornography images. 6 As an initial matter, we have no authority that a Pennington instruction is even appropriate in any child pornography case. In one unpublished decision only, have we evaluated a claim whether a Pennington instruction was proper involving child pornography possession. United States v. Adams, 338 F. App x 417, 420 (5th Cir. 2009). 5 12 Case: 12-50855 Document: 00512440480 Page: 13 Date Filed: 11/13/2013 No. 12-50855 meaning of Pennington. We therefore find no abuse of discretion in refusing Larman s requested Pennington instruction. V. We now turn to Larman s sentencing claims. Larman s raises two issues, both involving sentencing enhancements. A district court s application of the Guidelines . . . is reviewed de novo. United States v. Smith, 440 F.3d 704, 706 (5th Cir. 2006). We accept[] findings of fact made in connection with sentencing unless clearly erroneous. Id. Larman first challenges his two-level enhancement imposed under § 2G2.2(b)(3)(f), reflecting an enhancement based upon distribution of child pornography. Our earlier finding that the evidence supported the jury s verdict that Larman attempted to distribute child pornographic images as charged in Count Two of the indictment adequately supports the imposition of this enhancement without further discussion. Larman s next challenge is to his two-level enhancement imposed under § 3A1.1(b)(1), on grounds that his victims were vulnerable victims. He argues that his specific offense guideline, under § 2G2.2(b)(2), already takes into account the ages of the children, and so the imposition of that particular vulnerable victim enhancement constitutes double counting. We rejected such an argument in a recent opinion. See United States v. Jenkins, 712 F.3d 209, 213-14 (5th Cir. 2013) (holding that an enhancement under § 3A1.1(b)(1) is still appropriate when the under 12 enhancement in § 2G2.2(b)(2) is also applied). Thus, there is no error here. VI. In sum, we conclude, first, that there was sufficient evidence to convict Larman on Counts One (receipt), Two (attempted distribution), and Three (possession) of his indictment. Second, because Larman failed to make an offer of proof, he cannot challenge the district court s evidentiary ruling excluding 13 Case: 12-50855 Document: 00512440480 Page: 14 Date Filed: 11/13/2013 No. 12-50855 part of his testimony at trial. Third, any error concerning a deliberate ignorance instruction was harmless because of overwhelming evidence of Larman s actual knowledge. Fourth, the district court did not err in refusing Larman s Pennington instruction because the child pornography files were not hidden on his media devices. And, finally, both of the challenged sentencing enhancements were proper under the Guidelines. Accordingly, the judgment of the district court is AFFIRMED. 14

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.