                NOT RECOMMENDED FOR FULL-TEXT PUBLICATION
                           File Name: 19a0237n.06

                                           No. 18-5648

                          UNITED STATES COURT OF APPEALS
                               FOR THE SIXTH CIRCUIT

                                                                                    FILED
                                                                              May 03, 2019
UNITED STATES OF AMERICA,                           )                     DEBORAH S. HUNT, Clerk
                                                    )
       Plaintiff-Appellee,                          )
                                                    )       ON APPEAL FROM THE UNITED
v.                                                  )       STATES DISTRICT COURT FOR
                                                    )       THE EASTERN DISTRICT OF
BRANDON MORAN,                                      )       KENTUCKY
                                                    )
       Defendant-Appellant.                         )

_________________________________/

       Before: GUY, CLAY, and GRIFFIN, Circuit Judges.

       RALPH B. GUY, JR., Circuit Judge. Brandon Moran was convicted by a jury of four

child pornography offenses—one count of distributing, one count of possessing, and two counts

of receiving child pornography—in violation of 18 U.S.C. § 2252(a)(2) and (4)(B). Seeking a new

trial on all counts, Moran contends that the district court erred by: (1) allowing an expert witness

to testify to matters outside the scope of the government’s pretrial disclosures; and (2) providing

an inadequate answer to a question posed by the jury during deliberations. Moran also challenges

the sufficiency of the evidence to support the distribution conviction, arguing that no reasonable

juror could conclude that he knew the files contained child pornography at the time they were

distributed. We affirm.
Case No. 18-5648                                                                                                  2
United States v. Brandon Moran

                                                          I.

         On June 6, 2016, a computer operated by Kentucky’s Internet Crimes Against Children

Task Force was searching for available child pornography on a peer-to-peer network and

successfully downloaded four files containing child pornography from a single IP address near

Marysville, Kentucky. Alerted to the download, Kentucky State Police Detective Brian Cooper

confirmed that the files contained child pornography, requested subscriber information for the

associated IP address, and obtained a search warrant for the home where Brandon Moran resided

with other family members.1

         When the warrant was executed on June 14, 2016, Detective Cooper interviewed Moran’s

sister and nephew who lived in the home; determined that the sister’s boyfriend, who was the

subscriber, had not lived there in weeks; and learned that Moran’s mother lived there but required

care for dementia. That left 25-year-old Brandon Moran, who led Detective Cooper to his room

in the basement and acknowledged that he had been using BitTorrent on the laptop computer that

was sitting on a table. The interview with Moran that followed was recorded and played for the

jury, although he did not testify at trial.

         In that interview, Moran was advised of his right to remain silent before being questioned

further. Moran then confirmed that the bedroom and computer were his; stated that the wifi

connection and computer were password protected; and admitted that there was child pornography

on his computer. Referring to child pornography, Moran said: “I have clicked on it, I’m not going

to lie to you, sir.” Moran said he had looked at all kinds of porn, but denied watching “baby porn”

and claimed that he had used the search term “Lolita” to look for Japanese animated pornography.


1
 The four files, which were the basis of the distribution count, consisted of: one video and one picture file that were
both named “new pthc opva 2014 real father fucks his 13 yo daughter in the basement”; and one video and picture file
that were both named “pedo Lolita pthc hussyfan two preteen lesbian to cam.” There was testimony that “pthc” refers
to “pre-teen hard core.”
Case No. 18-5648                                                                                   3
United States v. Brandon Moran

When asked how torrents worked, Moran said he did not really know but then described having

downloaded and used several peer-to-peer programs—including, BitComet, BitTorrent, UTorrent,

Frostwire, and Limewire. Moran also explained that a torrent download sometimes included things

he did not want, such as child pornography and that he sometimes tried unsuccessfully to delete it.

Near the end of the interview, Detective Cooper asked, “let me get this straight . . . [y]ou’re telling

me that you know there is child pornography on that computer?” And Moran answered, “Yes sir

I do.”

         The interview also included an extended exchange about file sharing, which is relevant to

the charge that Moran knowingly distributed the four files that were obtained by the state computer.

During that exchange, Moran said he did not understand how peer-to-peer file sharing worked

before going on to make further statements that suggested he understood well enough. For

example, at one point, Moran acknowledged that someone using the correct peer-to-peer software

would be able to get a picture from a share folder on his computer. And, although he denied having

shared child pornography directly, he ultimately agreed that it was possible he could have shared

it indirectly from a share folder because “that’s how Torrent works when you download stuff.”

         Detective Cooper seized the laptop, which was turned over to a computer forensics

examiner with the Kentucky State Police. The examiner, Mike Viergutz, who testified as an expert

witness, found approximately 200 files—including 106 videos and 91 images—which Moran

stipulated at trial contained or consisted of depictions of minors engaging in sexually explicit

conduct. (Gov’t Exh. 8.) About 20 of those files were recovered from the recycle bin. Viergutz

prepared a spreadsheet with detailed information about those files, including creation date,

directory path, file name, and a unique digital identifier called a “hash value.” (Gov’t Exh. 9.)

Although none of the four files retrieved by the state computer was found on Moran’s computer,
Case No. 18-5648                                                                                                 4
United States v. Brandon Moran

file paths remained indicating that those four files had once been in the “c:\downloads folder.”

Viergutz testified that the only recovered internet search history that was relevant to the charges

was a single parsed (i.e., partial) search on Bing for “pedo forum.”

         Viergutz extracted a long list of torrent files that had been downloaded to Moran’s

computer with various peer-to-peer programs, which included some torrents with names that

suggested child pornography, two that referenced a known series of child pornography, and others

that had innocuous names or characters (“FrostWire” spreadsheet). (Gov’t Exh. 11.)2 Viergutz

also found two logs on Moran’s computer that were created by the BitComet software: one log

showed downloads made using BitComet (“BitComet MyHistory”) and the other showed files

shared through BitComet (“BitComet MyShares”). (Gov’t Exhs. 10a & 10b.) Those BitComet

logs were the subject of the jury’s question during deliberations.

         Testimony about how peer-to-peer networks operate was admitted primarily through

Robert Couchman, the Kentucky State Police Detective who ran the state computers searching for

available child pornography. Briefly, he explained that peer-to-peer networks generally, and

BitTorrent specifically, use the internet to share content directly between computers that have the

same or compatible client software. To find available content, BitTorrent users typically go to an

index site where search terms are entered to find torrent files. The search results are hyperlinks,

which look like a file name, picture, or symbol, and, when clicked on, the torrent file is downloaded

by the user’s client software program. The file name often indicates what the content will be, but


2
 The order denying Moran’s post-verdict motion for judgment of acquittal specifically identified the following torrent
file names found on Moran’s computer as indicative of child pornography: (1) “collection01 preteen pedo underagfe
pthc babyshivid Lolita maffiasex hussyfan st. Petersburg Is magazine”; (2) “Falko III (with sound)”; (3) “[pthc]
falkovideo – part 3 . . . 2014 opva preteen loli 10yo 8yo 9yo 11yo 12yo pedo mom family”; (4) “1st-Studio Siberian
Mouse Custom (ND_TA)”; (5) “_cp”; (6) “BabyJ-R@ck (55S) 5yo enjoys gentle fuck from very big dick (R@ygold
Style RCA pedo 9yo Child sex)”; (7) “baby bj”; (8) “Izzy 8yo 1b - Deep throating”; (9) “CBaby 7 - 3yo girl eat cum
(2m44s)”; (10) “awe pthc videos”; (11) Children-W”; (12) PTHC – (=^.^=) Fernanda (12yo) Cumshot In Face [child
kids pedo r@ygold hussyfan]”; (13) “!!!NEW!!!PTHC – (=^^.^^=) Fernanda (12yo) Cumshot In Face [child kids pedo
r@gold hussyfan]”; (14) “cP.”
Case No. 18-5648                                                                                      5
United States v. Brandon Moran

it is possible, for example, that a file called “cat.jpg” actually is a picture of a dog. Also, the torrent

file itself does not contain the content; instead, it is the “package” and provides instructions for

creating a file to receive the content and includes the metadata for the locations where that content

can be retrieved on the network.

        Once the user clicks on a torrent file, the user’s software, in this case BitComet, launches

automatically to open the torrent file (similar to how Adobe launches to open a .pdf file) and then

begins to retrieve the content in pieces from other computers if it is available for sharing. The

pieces can consist of whole files or parts of files. If the user who downloads a torrent has not

allowed sharing of files, the download speed is “choked” or slowed down greatly. BitComet

allows sharing of pieces before a whole file is received, and the version of BitComet on Moran’s

computer allowed the user to share by default or to turn off sharing. The state computers monitored

multiple networks for available content suggestive of child pornography, but the state computers

were specially configured to download only from a single IP address and to prevent any content

that was received from being shared.

        With respect to the four files that the state computer requested and received from Moran’s

computer on June 6, Couchman testified in detail from a log of the communications between the

computers. In short, when the state computer initiated a “handshake” at 59:17, Moran’s computer

responded that it did not have any of the 92 pieces of those four files available for sharing.

BitComet on Moran’s computer responded that it had only one piece available (which was also

one complete file) at 59:47; and then it communicated that it had all four files as of 1:01:58.

Sixteen second later, at 1:02:14, the state computer received the first complete piece of those files

from Moran’s computer; and, at 1:12:21, the state computer finished receiving all four files from
Case No. 18-5648                                                                                                 6
United States v. Brandon Moran

Moran’s computer. The log also indicated that Moran’s computer was receiving those files as an

“unchoked” download.

         Moran moved unsuccessfully for judgment of acquittal at the close of the government’s

proofs and again after the defense rested without presenting any witnesses or other evidence. The

jury found Moran guilty of distributing child pornography on June 6, 2016; receiving child

pornography on May 15 and June 12, 2016; and possessing additional files of child pornography

when his laptop computer was seized on June 14, 2016. The district court denied Moran’s post-

verdict motion for judgment of acquittal, and imposed a below-Guidelines sentence of 138 months

of imprisonment. This appeal followed.3

                                                         II.

         Reviewing the denial of a motion for judgment of acquittal de novo, this court views the

evidence in the light most favorable to the government and asks whether “any rational trier of fact

could have found the essential elements of the crime beyond a reasonable doubt.” Jackson v.

Virginia, 443 U.S. 307, 319 (1979); see also United States v. Humphrey, 279 F.3d 372, 378 (6th

Cir. 2002). In evaluating the evidence, we “must draw all reasonable inferences from the record

in favor of the prosecution and must avoid the temptation to weigh the evidence anew or assess

the credibility of witnesses.” United States v. Fitzgerald, 906 F.3d 437, 449 (6th Cir. 2018).

Challenging only the conviction for distributing child pornography, Moran argues that the

evidence could not establish that he knew the files constituted or contained child pornography at

the time of distribution.




3
 There appears to be no dispute that the receiving and possessing counts each involve distinct videos or images, which
is necessary to avoid a violation of the Double Jeopardy Clause. See United States v. Ehle, 640 F.3d 689, 696-98 (6th
Cir. 2011).
Case No. 18-5648                                                                                                 7
United States v. Brandon Moran

         Moran accepts that distribution under 18 U.S.C. § 2252(a)(2) may be established by

showing “that the defendant maintained child pornography in a shared folder, knew that doing so

would allow others to download it, and another person actually downloaded it.” United States v.

Pirosko, 787 F.3d 358, 368 (6th Cir. 2015) (quoting United States v. Budziak, 697 F.3d 1105, 1109

(9th Cir. 2012) (following First, Eighth, and Tenth Circuits)). Although Pirosko addressed this

proposition in a different context, this statement represents a consensus among the circuits that

passive distribution of known child pornography made available for sharing on a peer-to-peer

network constitutes distribution. As the First Circuit explained: “When an individual consciously

makes files available for others to take and those files are in fact taken, distribution has occurred”

and “[t]he fact that the defendant did not actively elect to transmit those files is irrelevant.” United

States v. Chiaradio, 684 F.3d 265, 282 (1st Cir. 2012); see also United States v. Ryan, 885 F.3d

449, 453 (7th Cir. 2018); United States v. Richardson, 713 F.3d 232, 235-36 (5th Cir. 2013).4

         Similarly, this court has repeatedly held that a two-level sentencing enhancement for

distribution of child pornography applies when files are knowingly made available through file-

sharing software. See United States v. Abbring, 788 F.3d 565, 567-68 (6th Cir. 2015) (citing cases

interpreting USSG § 2G2.2(b)(3)(F)). The point of using a file-sharing program, we said, “is to

share, sharing creates a transfer, and transferring equals distribution.” Id. at 567 (citing United

States v. Connor, 521 F. App’x 493, 499-500 (6th Cir. 2013)).




4
 An analogy adopted by some circuits compares the distribution of child pornography through peer-to-peer sharing
“to that of the owner of a self-service gas station: although the owner might not be present and does nothing when a
motorist purchases gas at the pump, the gas station owner distributes gasoline just as a computer user on a peer-to-
peer network distributes child pornography—by making the material available for other users on the network just as
the gasoline is available to passing motorists.” Richardson, 713 F.3d at 236 (relying on United States v. Shaffer, 472
F.3d 1219, 1223-24 (10th Cir. 2007)). Of course, a gas station owner is also in the business of selling gas. But the
description of passive distribution is illustrative nonetheless.
Case No. 18-5648                                                                                    8
United States v. Brandon Moran

          Moreover, in Abbring, the enhancement applied even though the file sharing occurred at

the same time the defendant was downloading the files. Id. at 567. It did not matter that the peer-

to-peer software in that case did not allow users to disable automatic sharing or that files could not

be moved out of the shared folder until the download had been completed. Id. at 566. This court

explained that all the guidelines require “is the knowing sharing of the files.” Id. at 567–68. As

the Seventh Circuit concluded in Ryan, “[t]here is no reason why this same definition should not

apply when interpreting ‘distribute’ in the criminal statute.” 885 F.3d at 453.

          Without denying that knowing distribution was established, Moran argues that no

reasonable juror could conclude that he knew, or could have known, that those files consisted of

or contained child pornography at the time they were distributed. This court has long held that

§ 2252(a)(2) requires knowledge of “the nature of the materials received or distributed.” United

States v. Brown, 25 F.3d 307, 311 (6th Cir. 1994). However, “knowledge of the contents of

material ‘may be proven by circumstantial evidence.’” United States v. Hentzen, 638 F. App’x

427, 431 (6th Cir. 2015) (quoting United States v. Kussmaul, 987 F.2d 345, 350 n.4 (6th Cir.

1993)).

          In Hentzen, this court found that circumstantial evidence was sufficient to establish that the

defendant knew the character of the material involved because there was evidence that he searched

for child pornography and viewed it once it was on his computer. Id. at 431-32. That was the case

despite the defendant’s innocent explanations because this court “‘may not reweigh the evidence,

reevaluate the credibility of witnesses, or substitute our judgment for that of the jury.” Id. at 431

(citation omitted); see also United States v. Haymond, 672 F.3d 948, 957 (10th Cir. 2012) (finding

sufficient circumstantial evidence of knowledge where the jury could conclude the defendant used

a peer-to-peer network to search for, click on, and download child pornography).
Case No. 18-5648                                                                                9
United States v. Brandon Moran

       Here, there was evidence that Moran used peer-to-peer file sharing networks, understood

that any downloaded files in a shared folder could be retrieved by other users on the network, and

knew that child pornography was downloaded to his computer. It is true that the four files sent to

the state computer were not found on Moran’s computer when it was seized, which a jury could

infer meant that the content was not what he was looking for. Nor did the forensic examination

find internet searches for child pornography beyond a single recovered parsed search for “pedo

forum.” Although Moran suggested during his initial interview that he sometimes received content

that he did not want, he also admitted to having clicked on child pornography and admitted that

there was child pornography on his computer. In fact, the forensic examination found about 200

files of child pornography on Moran’s computer, and only about 20 of them had been moved to

the recycle bin. Further, plenty of the file names were consistent with Moran’s stipulation that

they contained or consisted of child pornography.

       The jury was entitled to consider Moran’s admissions along with the testimony that

BitTorrent users typically go to an index site and enter search terms when looking for torrent files

to download. Moreover, once a link to a torrent file is found, the user must affirmatively click on

it to download the torrent file and activate BitComet to retrieve the files. Although the specific

torrent file associated with the four distributed files had a non-descriptive name and only some of

the other torrent file names were indicative of child pornography, the jury could infer that Moran

had searched for that content and clicked on it because he expected it to be what he was looking

for.

       The district court emphasized that Moran’s computer finished downloading all of the

pieces of all four files before the state computer received anything from Moran’s computer.

However, it is not necessary to prove that Moran actually saw the files prior to the distribution in
Case No. 18-5648                                                                                 10
United States v. Brandon Moran

order for a reasonable juror to conclude that Moran knew the nature of the material that was

downloaded and made available for sharing. For that reason, it does not matter how short the time

was between when Moran’s computer finished downloading all four files and when the state

computer received the first complete piece at 1:02:14 (16 seconds), or the first complete file at

1:02:35 (2 ½ minutes), or all of the four files at 1:12:21 (12 ½ minutes).

       Viewed in the light most favorable to the government, the evidence was sufficient to lead

a reasonable juror to conclude beyond a reasonable doubt that Moran’s search for child

pornography produced a link to the torrent file in question, which Moran activated knowing that

he would receive child pornography in his shared download folder. The district court did not err

in denying Moran’s motions for judgment of acquittal.

                                                III.

       This court reviews a district court’s admission or exclusion of evidence for abuse of

discretion. See United States v. White, 492 F.3d 380, 398 (6th Cir. 2007). But even when there is

an abuse of discretion, we reverse only when the error affects the substantial rights of a party. Id.

(citing Fed. R. Evid. 103(a) and United States v. Whittington, 455 F.3d 736, 738 (6th Cir. 2006)).

       Moran contends that the district court abused its discretion by allowing Viergutz to offer

certain opinion testimony as a computer forensics expert. Specifically, defense counsel objected

to Viergutz’s testimony that the seven files containing child pornography found in a folder called

“users\Sherry\Pictures” had been “purposely put there as opposed to being directly [put] in the

downloads folder by the default settings” of the peer-to-peer software. Moran argues, as he did at

trial, that this opinion should have been excluded because it was outside the scope of the

government’s pretrial disclosures required by Federal Rule of Criminal Procedure 16(a)(1)(G).
Case No. 18-5648                                                                                11
United States v. Brandon Moran

       Upon request, the government must give the defendant “a written summary of any

testimony that the government intends to use under Rules 702, 703, or 705 of the Federal Rules of

Evidence during its case-in-chief at trial.” Fed. Rule Crim. P. 16(a)(1)(G). That summary “must

describe the witness’s opinions, the bases and reasons for those opinions, and the witness’s

qualifications.” Id.; see also United States v. Davis, 514 F.3d 596, 612 (6th Cir. 2008).

       Here, the government’s disclosure identified Mike Viergutz as a computer forensics expert,

provided a copy of his CV, and indicated that Viergutz would testify to the content of the forensics

report that had also been disclosed. In relevant part, the government’s letter also stated:

       Viergutz will testify that when examining the computer seized from the
       Defendant’s home, he discovered images and videos of minors engaged in sexually
       explicit conduct. Viergutz will explain where he found the images, how they came
       to reside there, the file names (some of which are indicative of child pornography),
       and whether the images were deleted. Viergutz will also explain that he located
       files indicating the computer user received and saved child pornography files.

(Emphasis added.) The record reflects that Viergutz’s report was disclosed to the defense,

including the spreadsheet that provided details regarding the files that contained child

pornography. Viergutz was also made available to defense counsel prior to trial. The district court

overruled Moran’s objection, finding that the testimony about where those files were located and

how they got there was covered by the disclosure and was an obvious inference to be drawn from

the spreadsheet of the files found.

       Viergutz’s report does not appear to be in the record, but we know that it included the list

of files containing child pornography with details including the file path locations that were

admitted at trial. Viergutz testified without objection that the version of BitComet on Moran’s

computer directed files to a “downloads” folder as a default. And Viergutz’s testimony that the

files were located in a folder other than the downloads folder fits with the government’s disclosure

that Viergutz would “explain where he found the images[ and] how they came to reside there.”
Case No. 18-5648                                                                                 12
United States v. Brandon Moran

The district court did not abuse its discretion in finding that the basis for that testimony was

adequately disclosed.     Moreover, although the prosecutor’s closing argument referenced

Viergutz’s testimony that a few of child pornography files were found outside of the “downloads”

folder, Moran has not shown that the admission of Viergutz’s opinion that those files had been

deliberately moved affected Moran’s substantial rights.

                                                IV.

       Finally, Moran argues that reversible error occurred because the district court failed to

adequately respond to the jury’s question. When, as here, an objection was made, we review the

district court’s response to the jury’s question for an abuse of discretion. United States v. Fisher,

648 F.3d 442, 446-47 (6th Cir. 2011). This court “may reverse a judgment only if the instructions,

viewed as a whole, were confusing, misleading and prejudicial.” United States v. Clark, 988 F.2d

1459, 1468 (6th Cir. 1993).

       If the jury is confused about an important legal issue not covered in the jury instructions,

“a district court abuses its discretion by not clarifying the issue.” Fisher, 648 F.3d at 447 (citing

United States v. Nunez, 889 F.2d 1564, 1567-69 (6th Cir. 1989)). However, the judge “should

refrain from straying beyond the purpose of jury instructions by answering jury questions that seek

collateral or inappropriate advice.” Id. (citing United States v. Combs, 33 F.3d 667, 670 (6th Cir.

1994)). And “the court must be careful not to invade the jury’s province as fact-finder.” Nunez,

889 F.2d at 1569.

       During deliberations, the jury sent the following written request: “We would like to see

the BitComet search history with key words that the state showed @ the end of her rebut[al]. That

is if it is entered into evidence. Juror 607.” It was clear to everyone—then and now—that the jury

was referring to the BitComet logs admitted as Exhibits 10a and 10b. Because neither of those
Case No. 18-5648                                                                                              13
United States v. Brandon Moran

logs represented a search history, defense counsel proposed that the jury be told that there was no

BitComet search history. The government argued that the court’s response should not highlight

or comment on the absence of evidence, particularly because it was clear what evidence the jury

was asking to see. Rejecting defense counsel’s proposed language, the district judge sent the jury

the following handwritten response:

        What was shown by the prosecutor during her rebuttal closing was a printout of
        Gov’t Exh 10a & 10b, which you have on a disc in evidence. Exh 10a is the
        BitComet “my history” spreadsheet and Exh 10b is the BitComet “my shares”
        spreadsheet.

(The jury’s question did not involve a legal issue requiring clarification, and the district court’s

answer was an eminently appropriate attempt to respond to the jury’s request without commenting

on the evidence. The response also emphasized what the exhibits actually were—as opposed to

what they were not. 5

        Moran argues on appeal that the additional clarification he requested was necessary

because the existence of a BitComet search history had been suggested, albeit unintentionally, by

the prosecutor during closing arguments. The record does not support this contention. First, the

passage Moran quotes actually referred to the FrostWire spreadsheet of torrent files found on

Moran’s computer (Exhibit 9). And, the prosecutor’s argument in that regard was that the jury

could infer from the names of some of the torrent file that were downloaded to Moran’s computer

that Moran had searched for child pornography on the various peer-to-peer networks.

        Second, the prosecutor also separately described the two exhibits in question as “evidence

that Detective Viergutz was also able to glean directly from BitComet.” Specifically, she argued

that one showed “the titles of the files that were in his MyShares folder” and that the “history of



5
 Defense counsel requested that the court respond: “There is not a BitComet search history. On rebuttal, the United
States showed a copy of Exhibits 10A and 10B, BitComet MyShares and MyHistory.”
Case No. 18-5648                                                                                 14
United States v. Brandon Moran

BitComet” showed the file paths, file size, and the titles of “the files that he had on his computer,

that he got from BitTorrent, that he downloaded via BitComet, and that he was making available

for sharing with others.” Defense counsel argued in closing that the government could not prove

what Moran had searched for when he downloaded the torrent associated with the four files that

the state computer received; that the torrent itself did not have a name indicative of child

pornography; and that the file names would not have been visible when Moran decided to

download them. So, in rebuttal, the prosecutor pointed to “the names of the torrent files” in the

“records BitComet was keeping on the defendant’s computer.”

       The jury was urged to look at the BitComet logs showing Moran’s downloads and shared

files to evaluate his assertions of accidental, inadvertent, or unintentional downloads of child

pornography. The district judge did not abuse his discretion in answering the jury’s question about

the evidence in the way he did, and the instructions as a whole were not confusing, misleading, or

prejudicial.

                                             *       *       *

       AFFIRMED.
