         Case: 17-14913   Date Filed: 11/21/2019   Page: 1 of 11


                                                       [DO NOT PUBLISH]



          IN THE UNITED STATES COURT OF APPEALS

                   FOR THE ELEVENTH CIRCUIT
                     ________________________

                           No. 17-14913
                     ________________________

               D.C. Docket No. 4:16-cr-10043-KMM-1




UNITED STATES OF AMERICA,

                                                          Plaintiff–Appellee,

                                versus

RUSSELL HUDSON CULLEN,

                                                       Defendant–Appellant.



                     ________________________

              Appeal from the United States District Court
                  for the Southern District of Florida
                    ________________________

                          (November 21, 2019)
               Case: 17-14913        Date Filed: 11/21/2019      Page: 2 of 11


Before MARTIN, TJOFLAT, and PARKER, * Circuit Judges.

PER CURIAM:

       Appellant Russell Hudson Cullen appeals from a judgment of conviction in

the United States District Court for the Southern District of Florida. We assume

familiarity with the facts, procedural history, and issues on appeal.

                                     BACKGROUND

       The Department of Homeland Security (“DHS”) uses the Child Protection

System (“CPS”) investigative software to search the internet for computers that

contain child pornography. CPS uses keywords associated with child pornography,

searches the internet, and downloads files that it finds. It then keeps a large database

of known child pornography videos’ “hash values,” which are unique indicators

associated with each individual video. According to expert testimony at trial, CPS

identified hundreds of hash values corresponding to child pornography that had been

downloaded through Shareaza—a peer-to-peer sharing software—to multiple IP

addresses associated with Cullen.           Some of these files had been downloaded

completely while others had been downloaded only partially. In January 2016,

Special Agent Elliott Graves requested an image of child pornography from Cullen’s

IP address and the associated computer automatically sent him the file. In March



       *
          Honorable Barrington D. Parker, United States Circuit Judge for the Second Circuit,
sitting by designation.
                                               2
              Case: 17-14913     Date Filed: 11/21/2019   Page: 3 of 11


2016, DHS obtained a warrant and searched Cullen’s residence.             The agents

retrieved an Asus laptop computer and a LaCie external hard drive.

      When the Cyber Crimes Center extracted the contents of the LaCie hard drive,

they found various documents bearing Cullen’s name as well as child

pornography—specifically a video of two young girls displaying their genitalia. The

video had been found in “unallocated space” in the hard drive, which means that it

had been previously deleted. Special Agent Daniel Kenney was able to play the

recovered video and, at trial, two screenshots from the video were introduced into

evidence. A forensic analyst determined that the Asus laptop had been reformatted

multiple times, relegating certain files to unallocated space on the laptop. From this

space, Lumbert retrieved four images depicting child pornography. Lumbert found

an additional 14 images in a “cache file” that had been created after a thumb drive

was inserted into the computer to upload files.

      Cullen was charged with one count of accessing with intent to view, two

counts of possession, and one count of distribution of child pornography. Cullen

proceeded to and testified at trial. His defense was that he had been addicted to adult

pornography for many years but had never searched for child pornography on any

of his computers. He testified that he would download thousands of video files in

bulk, searching only for adult pornography, and then open them later to sift through

potential options. He admitted that he downloaded and viewed child pornography


                                          3
              Case: 17-14913    Date Filed: 11/21/2019    Page: 4 of 11


but explained that he had done so by accident. When that occurred, he would delete

the files, and in instances where the pornography was particularly shocking, he

would immediately reformat his computer to remove any trace of the files from his

computer. Cullen also testified that he had never allowed any type of sharing of

pornography from his computer and that he had “deselected” all files that could be

shared, thus ensuring that none of them were available for download by other

Shareaza users. He testified that he had no idea how agents were able to obtain child

pornography from his computer.

      During trial, Agent Kenney identified the LaCie hard drive that was seized

from Cullen’s home, but he noted that the hard drive serial number he recalled

differed from the serial number noted on the Government’s exhibit list.           He

nevertheless testified that he “absolutely” recognized it both by the serial number on

the hard drive itself and the external case that accompanied it. The court, over

Cullen’s objection, admitted the hard drive. In February 2017, the jury found Cullen

guilty on all counts.

      Probation determined that Cullen’s base offense level was 22.                 It

recommended a multitude of enhancements, increasing the offense level to 37. In

particular, two levels were added for the knowing distribution of child pornography

and five levels were added because the offense involved 600 or more images of child

pornography. Because Cullen had no criminal history points, his offense level of 37


                                          4
             Case: 17-14913     Date Filed: 11/21/2019   Page: 5 of 11


corresponded to a guidelines range of 210 to 262 months. He also faced a mandatory

minimum sentence of five years and an authorized maximum sentence of 80 years.

Cullen argued that he did not knowingly distribute child pornography. He also

argued that only one video (which corresponded to 75 images) and 18 photographs—

93 images in total—were involved in his offense conduct, and thus only a two-level

and not a five-level enhancement was warranted. The District Court rejected both

arguments and sentenced Cullen to 240 months’ imprisonment, adopting the

recommendation of the Probation Office. In addition, the Court stated on the record

that it would have imposed the same sentence had only the two-level and not the

five-level enhancement properly applied.

                                  DISCUSSION

                              Sufficiency of Evidence

      The reversal of a conviction for insufficient evidence is warranted only if no

reasonable jury could find proof of guilt beyond a reasonable doubt. United States

v. Thomas, 8 F.3d 1552, 1556 (11th Cir. 1993).

                              Possession and Access

      The evidence that Cullen possessed and accessed child pornography was

overwhelming. Child pornography was found in unallocated space on his computer

and hard drive and an investigation of Cullen’s computer indicated that a thumb

drive had been used to upload additional pornographic images onto his computer.


                                           5
               Case: 17-14913    Date Filed: 11/21/2019    Page: 6 of 11


Further, full and partial downloads of hundreds of child pornography videos and

images were linked to a series of IP addresses all associated with Cullen. We find

this evidence sufficient to support his convictions.

                                     Distribution

      In United States v. Carroll, 886 F.3d 1347 (11th Cir. 2018), which involved

peer-to-peer sharing software, a jury convicted the defendant of distributing child

pornography after he had downloaded hundreds of images and videos from a peer-

to-peer sharing platform called Ares. Id. at 1349. Ares functions in the same way

as Shareaza, the peer-to-peer software in this case:

      When downloaded, Ares sets up a shared folder on the computer where,
      by default, it automatically places all subsequent downloads. Once a
      file is placed in the shared folder, it is immediately available for further
      dissemination. Unless an Ares user changes the default settings or
      deliberately moves files out of the shared folder, downloaded files will
      remain freely accessible to anyone else on the Ares network . . . .

Id. at 1350.

      We reversed the conviction in Carroll based on insufficient evidence because

“[n]othing in the record demonstrate[d] that Carroll intended to share files or that he

was even aware that the contents of his Ares folder were automatically distributed

to the peer-to-peer network.” Id. at 1353. We rejected the Government’s argument

that the defendant “was guilty of knowing distribution simply because he was using

a peer-to-peer file sharing program and ‘that is what it is.’” Id. at 1353. We

explained that “the fact that files were automatically shared from [the defendant’s]
                                           6
              Case: 17-14913     Date Filed: 11/21/2019    Page: 7 of 11


Ares folder, without some evidence of his awareness of it, cannot carry the

government’s burden to prove knowing distribution beyond a reasonable doubt.” Id.

at 1353–54. The basis of our reasoning was that “Ares, by default, installs a shared

folder, automatically places downloaded files into that folder, and distributes all

contents of the shared folder to anyone else on the Ares network without prompting

the user—even when the user is away from his computer.” Id. at 1354. In response

to the Government’s argument that “it would be impossible for an individual to use

a peer-to-peer file sharing program and lack a full understanding of its operations,”

we noted that it was “unwise to adopt such a sweeping rule in this fact-sensitive

context, where the mechanics of each peer-to-peer program may bear on the issue of

knowledge in different ways.” Id.

      Generally, courts should be cautious in their approach to distribution charges

brought in the peer-to-peer software context. Peer-to-peer software runs on the

sharing of downloaded files. If users do not proactively disable all sharing upon

installing the software, their files will be shared indefinitely without their awareness

and even when they have stepped away from their computer. The software also

intentionally makes it difficult for the average user to manage which of their files

are being shared at any given moment, often obscuring instructions for disabling

sharing, as is the case with Shareaza. Given the nature of this software, courts should




                                           7
             Case: 17-14913     Date Filed: 11/21/2019   Page: 8 of 11


focus with particular care on whether distribution on peer-to-peer software was done

knowingly.

      In this case, however, Carroll does not compel a reversal because Cullen

testified that he understood how Shareaza’s automatic sharing function operated.

Specifically, the Government, in cross-examination, asked Cullen: “You talked

about—I know you have used file-sharing for a long time, and you’ve talked about

when you first used file-sharing devices all that time ago. You learned that when

you set it up you had to deselect folders? Do you remember that?” In response,

Cullen answered, “Absolutely, have to, have to.” Furthermore, without prompting,

Cullen stated: “But always, always, always make sure . . . [to] deselect every

[downloaded file] because if you leave even one up, there are people with software

[who] will be able to access all of your computer. This is what I was told.” Based

on Cullen’s statements evincing an understanding of Shareaza’s automatic sharing

features and the testimony from Graves that he successfully downloaded child

pornography from Cullen’s IP address, we find the evidence sufficient to support

Cullen’s conviction.

                    Admissibility of LaCie Hard Drive

      We review for an abuse of discretion the District Court’s rulings on the

admissibility of evidence. United States v. Shabazz, 887 F.3d 1204, 1216 (11th Cir.

2018). “To satisfy the requirement of authenticating or identifying an item of


                                         8
              Case: 17-14913     Date Filed: 11/21/2019    Page: 9 of 11


evidence, the proponent must produce evidence sufficient to support a finding that

the item is what the proponent claims it is.” Fed. R. Evid. 901.

      Cullen argues that the testifying witness, Kenney, could not identify the LaCie

hard drive seized during the execution of the search warrant. To be sure, Kenney

noticed that the serial number on the hard drive did not include the last four digits of

the serial number listed on the Government’s exhibit list. Notwithstanding the

confusion as to the serial number, the District Court did not abuse its discretion in

admitting the hard drive. Kenney was able to identify the hard drive by its external

casing and was able to identify most of the digits on the serial number. He also

testified that he was “absolutely” certain that the hard drive offered into evidence

was the same hard drive as was seized from Cullen’s home. Kenney’s identification,

taken together with the evidence that the hard drive contained child pornography

along with Cullen’s tax form, Cullen’s resume, and Cullen’s job application,

demonstrates that the Government produced “evidence sufficient to support a

finding that the item is what the proponent claims it is.” See Fed. R. Evid. 901.

                             Sentencing Enhancements

      “We review a district court’s choice of sentence . . . for abuse of discretion,

determining if the sentence was procedurally in error or substantively unreasonable.

United States v. Trapp, 396 F. App’x 671, 672 (11th Cir. 2010). “When the

government seeks to apply an enhancement under the Sentencing Guidelines over a


                                           9
             Case: 17-14913    Date Filed: 11/21/2019   Page: 10 of 11


defendant’s factual objection, it has the burden of introducing ‘sufficient and

reliable’ evidence to prove the necessary facts by a preponderance of the evidence.”

United States v. Washington, 714 F.3d 1358, 1361 (11th Cir. 2013).

                              Knowing Distribution

      The Guidelines authorize a two-level enhancement “if the defendant

knowingly engaged in distribution.” U.S.S.G. § 2G2.2(b)(3)(F). For the reasons

discussed above, the District Court did not abuse its discretion in imposing a two-

level enhancement, given that Cullen admitted to fully understanding Shareaza’s

automatic sharing features.

                   Number of Images Involved in the Offense

      The Guidelines authorize a five-level enhancement if the offense involved

“600 or more images.” U.S.S.G. § 2G2.2(b)(7)(D). In determining the number of

images, “[e]ach video, video-clip, movie, or similar visual depiction shall be

considered to have 75 images.” Id. cmt. app. n. 6(B)(ii).

      Cullen argues that his offense involved only the 18 images and one video

recovered from his laptop—a total of 93 images under the Guidelines. Cullen thus

argues that he should have only received a two-level enhancement because his

offense involved “fewer than 150” images. See U.S.S.G. § 2G2.2(b)(7)(A). The

District Court, however, considered 27 videos that were fully downloaded to IP

addresses associated with Cullen as reflected on the CPS database. These 27 videos


                                         10
             Case: 17-14913    Date Filed: 11/21/2019   Page: 11 of 11


corresponded to 2,025 images under the Guidelines, but they had never actually been

found on Cullen’s devices.       Still, the Government has demonstrated, by a

preponderance of evidence, that these videos were involved in Cullen’s offense.

They were linked to his IP addresses, they matched the hash values for known child

pornography, and they had been fully downloaded into his computer. While they

were not found on the physical devices seized from his home, the District Court

reasonably inferred that Cullen had deleted them, especially given his testimony that

he routinely reformatted his computer. The District Court thus did not abuse its

discretion in imposing the five-level enhancement.

                                 CONCLUSION

      We have considered Cullen’s remaining arguments and find them to be

without merit. For the foregoing reasons, the judgment is AFFIRMED.




                                         11
