          United States Court of Appeals
                     For the First Circuit

No. 12-1639

                    UNITED STATES OF AMERICA,

                            Appellee,

                               v.

                        BRIAN K. ROGERS,

                      Defendant, Appellant.




          APPEAL FROM THE UNITED STATES DISTRICT COURT
                    FOR THE DISTRICT OF MAINE

          [Hon. George Z. Singal, U.S. District Judge]




                             Before

                       Lynch, Chief Judge,
               Stahl and Thompson, Circuit Judges.




     Robert C. Andrews for appellant.
     Margaret D. McGaughey, Assistant United States Attorney, with
whom Thomas E. Delahanty II, United States Attorney, was on brief,
for appellee.



                         April 30, 2013
           STAHL, Circuit Judge.       Brian Rogers was convicted by a

jury in the District of Maine of possessing child pornography in

violation of 18 U.S.C. § 2252A(a)(5)(B).        Rogers now appeals his

conviction, arguing that the government did not prove that he

knowingly possessed the child pornography that was found on a

laptop he sold to a pawn shop. Rogers also challenges the district

court's award of $3,150 in restitution to a victim depicted in the

pornography; he asserts that the government failed to establish a

causal connection between his conduct and any harm to the victim.

After careful consideration, we affirm both the conviction and the

restitution award.

                       I.   Facts & Background

           The following facts are drawn from the trial record and,

in light of Rogers's challenge to the sufficiency of the evidence

supporting   his   conviction,   are    presented   in   the   light   most

favorable to the jury verdict.     United States v. Valerio, 676 F.3d

237, 240-41 (1st Cir. 2012).

           On July 15, 2008, Rogers's then-wife, Heather Rogers,

sold a laptop computer to Coastal Trading and Pawn in Brunswick,

Maine.   Later that day, she returned with Rogers himself, who sold

a second laptop to the store.      In keeping with Coastal Trading's

usual practice, the clerk asked for, and received, the passwords to

both laptops, to allow the store's staff to access the computers

and restore them to their factory settings.


                                  -2-
          The next day, Coastal Trading's computer technician began

the process of preparing the second laptop for resale.           He turned

it on and entered the password that Rogers had provided.               In an

effort to find the program that would restore the laptop to its

factory settings, he looked in the Windows recycle bin.          There, he

discovered a video file captioned "My 15-Year Old Sister."              This

discovery prompted him to search the laptop for other videos; he

found "quite a few" more.     He viewed portions of a few videos and

saw "[y]oung children involved in sexual acts."             He immediately

notified the store manager, who called the Brunswick police.

          A   few   days   later,   Brunswick   Detective    William    Moir

collected the laptop and the associated sales paperwork from

Coastal Trading and took them to the police station.            Until Moir

came to collect it, the laptop remained in the store's back room,

and no one accessed it.        Moir, who had specialized electronic

forensics training, removed the laptop's hard drive and attached it

to a "write blocker," which allowed him to view the drive's

contents without altering them.           After finding some files with

names "indicative of child pornography," he took the drive to the

Maine State Police Computer Crimes Unit for further analysis.

There, he worked with an analyst to copy and review the contents of

the drive.    They found both videos and still images of children

engaged in sex acts.




                                    -3-
            Detective Moir soon returned to Coastal Trading and

seized the laptop that Heather Rogers had sold to the store on her

first visit.     Nothing of significance was found on that first

computer.   Moir then obtained a search warrant for Rogers's home,

which he and other law enforcement officers executed on July 31.

Heather Rogers was there when they arrived; Brian Rogers returned

home during the search.           When the officers came upon a desktop

computer and a case containing compact discs, they seized both.

            The hard drive of the second laptop -- the one on which

the store employees initially found child pornography -- was

subsequently subjected to a more comprehensive forensic inspection.

Chris Hull, an analyst with the Computer Crimes Unit, used forensic

software to examine the hard drive's contents.              He found two user

accounts on the drive: an account called "Mingan" (also designated

"Admin") and a default "guest" account.             He also found six child

pornography    videos    in   a   "shared"    folder   associated    with   the

"Mingan" user account, and still images depicting child pornography

in the "Temporary Internet Files" and "lost files" folders.                  The

shared folder was created by LimeWire, a peer-to-peer file-sharing

program that Hull found in the recycle bin. The Temporary Internet

Files folder,    as     Hull testified       at   trial,   stores   files   from

frequently visited websites that otherwise would have to be loaded

remotely, with the goal of speeding up the user's web browsing

experience.


                                      -4-
          Hull also examined the "index.dat" file, which records

the computer user's activity, whether it be visiting websites or

opening files on the computer itself.    The index file reflected

numerous visits to websites like "nymphets-first-time-sex.com"

(which was also bookmarked in the laptop's default web browser,

along with "Natural Lolitas" and "innocent-girl.com.").   And Hull

found "cookies" (widely used data packets that allow websites to

recognize returning users1) from various websites, including "son-

porno-schoolgirls," a Yahoo user account called "Brian87_2006," and

the social networking site Myspace (which appeared to be associated

with the same login information as the Yahoo account).      Indeed,

Detective Moir found a Myspace page for a user called "Mingan"; one

of the account's three Myspace "friends" was Heather Rogers, Brian

Rogers's wife.   As it happens, Hull determined that the password

for the user account "Mingan" on the laptop was "Heather," and the

password hint associated with that account was "My baby."

          Additionally, Hull found ten "infections," i.e., malware

programs, on the laptop.     To determine whether they might be

responsible for the presence of child pornography, he installed the

same infections on a test machine that replicated the conditions on

the laptop and let them run for a week.      No child pornography

appeared on the test machine.



     1
          See In re Pharmatrak, Inc., 329 F.3d 9, 14 (1st Cir.
2003) (describing cookies).

                                -5-
                  Hull examined the desktop computer seized from Rogers's

home as well.         Using the same forensic tools he used on the laptop,

he uncovered child pornography images. These files were located in

unallocated space, indicating that the files had been deleted by a

user but not yet overwritten with new data.              He also found two user

accounts on the desktop: "Bunny" and "NEXCOM," the latter of which

was also captioned "Mingan."            Associated with the latter account

were internet bookmarks for websites like "LolitasBBS-freeware" and

"nasty-virgins.org."

                  On October 22, 2008, a grand jury indicted Rogers on one

count of possessing child pornography in violation of 18 U.S.C.

§§ 2252A(a)(5)(B), 2256(8)(A).2 After rulings by both the district

court       and    this   court   related   to   the   suppression   of   certain

statements Rogers made during the search of his house, see United

States v. Rogers, 659 F.3d 74 (1st Cir. 2011), the case went to

trial.       The jury, after hearing testimony about all the events

related above, found Rogers guilty.              The district court sentenced

Rogers to sixty months' imprisonment and eight years' supervised

release.          As discussed in more detail below, the district court


        2
          Rogers was charged with possessing the child pornography
found on the laptop, but not the images found on the desktop. At
trial, he objected to testimony regarding the desktop computer on
the ground that it was other-bad-acts evidence under Federal Rule
of Evidence 404(b). The district judge allowed the testimony on
the ground that it went to intent, knowledge, or absence of
mistake, see Fed. R. Evid. 404(b)(2), and gave a cautionary
instruction to the jury. Rogers has not renewed his evidentiary
argument on appeal.

                                        -6-
also ordered Rogers to pay $3,150 in restitution to "Vicky," a

woman who was depicted in some of the child pornography materials

found on the laptop.

                               II.   Analysis

A.        Sufficiency of the Evidence

          A   sufficiency-of-the-evidence       challenge   to   a   jury's

guilty verdict will not succeed unless no rational jury could have

concluded that the government proved all of the essential elements

of the offense beyond a reasonable doubt.       United States v. Green,

698 F.3d 48, 56 (1st Cir. 2012).       As noted above, we evaluate the

facts and draw all reasonable inferences in favor of the verdict.

Id. We do not weigh evidence or assess credibility. United States

v. Tavares, 705 F.3d 4, 18 (1st Cir. 2013).

          18 U.S.C. § 2252A(a)(5)(B) creates criminal penalties for

any person who "knowingly possesses, or knowingly accesses with

intent to view, any . . . computer disk, or any other material that

contains an image of child pornography" that was produced or

transported in interstate commerce, including via computer.          Here,

it is undisputed that the images found on the laptop constituted

child pornography and that the interstate commerce element was

satisfied.    Rogers's challenge focuses instead on the question of

knowing possession.    To satisfy the statute's knowing-possession

requirement, the government must show that Rogers possessed, and

knew he   possessed,   child    pornography.     See United      States   v.


                                     -7-
X-Citement Video, Inc., 513 U.S. 64, 78 (1994); United States v.

Hilton, 167 F.3d 61, 75 (1st Cir. 1999), disapproved of on other

grounds by Ashcroft v. Free Speech Coal., 535 U.S. 234 (2002).

            To begin with, there can be no serious dispute that the

child pornography found on the laptop was downloaded knowingly and

deliberately.     The web browser's cookies and indexed history

indicated that someone had used the browser to make numerous visits

to   websites   related     to,   or   with   names    indicative     of,    child

pornography,    including     "nymphets-first-time-sex.com,"           "Natural

Lolitas," and "innocent-girl.com."            See United States v. Pruitt,

638 F.3d 763, 767 (11th Cir. 2011) (conviction was supported by "a

record of visits to websites with a child-pornography connection");

accord United States v. Ramos, 685 F.3d 120, 132 (2d Cir. 2012);

United States v. Kain, 589 F.3d 945, 949 (8th Cir. 2009).              Further,

the discovery of child pornography in the Temporary Internet Files

folder suggests that those images were downloaded when a user

visited websites hosting them.          Cf. Kain, 589 F.3d at 948.          And, as

the government observes, the fact that a user bookmarked some of

these websites supports the conclusion that they were visited

deliberately.    Cf. United States v. Kornhauser, No. 12-135-CR L,

2013   WL   1197751,   at    *2   (2d    Cir.   Mar.    26,   2013)    (summary

affirmance); United States v. McNealy, 625 F.3d 858, 870 (5th Cir.

2010).




                                        -8-
                To be sure, we must be cognizant of "the prevalence and

sophistication of some computer viruses and hackers that can prey

upon innocent computer users" by placing child pornography on their

machines, but "the specter of spam, viruses, and hackers must not

prevent the conviction of the truly guilty."                    Pruitt, 638 F.3d at

766-67.         Here, Hull's forensic analysis of the computer, which

included running the malware "infections" discovered on the laptop

on   a       test   machine   for   over   a     week,    all   but       ruled   out   the

possibility that the images had been downloaded by a virus without

the user's knowledge.           And child pornography (along with a similar

pattern of web browsing) was found on the desktop computer seized

from Rogers's home, further diminishing the possibility that the

presence of the images and videos on the laptop was inadvertent.

Lastly, some of the files were found in the laptop's recycle bin,

suggesting that someone deliberately attempted to delete them (and

thus knew they had been downloaded).                See Ramos, 685 F.3d at 132;

United States v. Bass, 411 F.3d 1198, 1202 (10th Cir. 2005).                             On

this record, there is no real possibility that this case involved

unknowing possession.           Cf. Note, Child Pornography, the Internet,

and the Challenge of Updating Statutory Terms, 122 Harv. L. Rev.

2206,        2211-14   (2009)    (describing       ways    that       a    person   could

unintentionally possess or receive child pornography).3


         3
          There was also no testimony realistically suggesting that
the images could have been downloaded or installed after Rogers
sold the laptop to Coastal Trading. The pawn shop's employees and

                                           -9-
          The only remaining question is whether the government

proved that the person who knowingly possessed the images and

videos was Rogers himself.    We think it did.   The user account

"Mingan," which was the only user-created account on the laptop,

was strongly associated with Rogers, and child pornography videos

were found in the shared folder associated with that user account.

The password hint for the "Mingan" account was "My baby" and the

password itself was Rogers's wife's name (Heather). Rogers himself

provided this password to Coastal Trading when he sold the laptop,

and has not pointed to evidence suggesting that anyone else knew

it.   Further, Detective Moir discovered a Myspace profile named

"Mingan," one of whose Myspace friends was Heather Rogers.     The

Myspace profile appeared to share login information with a Yahoo

account that the laptop had been used to access: Brian87_2006.

Brian, of course, is Rogers's name, and he was born in 1987.   See

United States v. Boll, 635 F.3d 340, 341 (8th Cir. 2011) (the fact

that a computer was registered to "Terry," the defendant's first

name, supported the conclusion that he knowingly possessed child

pornography found on it); United States v. Koch, 625 F.3d 470, 478

(8th Cir. 2010) (conviction was supported by the fact that "user



all the law enforcement personnel who handled the laptop testified
that the computer was not altered in any way after Rogers left it
at the store. Further, the laptop's operating system indicated
that the child pornography files had been created well before
Rogers sold the computer to Coastal Trading (although, as Rogers
points out, such information is not impervious to manipulation).

                               -10-
names    on    both   the   computer    and    flash   drive     [on    which   child

pornography were found] were variations on [the defendant's] first

name").       The web browser's cookies showed access to the same Yahoo

account, along with visits to the disturbingly named websites

discussed above.       The web browser also included a bookmark for the

U.S. Navy's website; Rogers was a member of the Navy at the time of

his arrest.4

               In   light   of   all   this    evidence,   and    the    reasonable

inferences that can be drawn from it, we think the jury's decision

to convict was wholly rational.               The evidence amply established

that Rogers possessed and used the laptop, and supported the

reasonable inference that he was the one who searched for and

knowingly downloaded the child pornography.                Rogers's suggestions

that someone else somehow downloaded or placed the images and

videos on the laptop are simply not supported by any evidence

adduced at trial.           Hull's testimony all but extinguished the

possibility that a virus put the images and videos there, and there


     4
          Less forceful is the government's suggestion that Rogers
must have been the laptop's user because it contained computer
games with "pugilistic" names like "Dungeons and Dragons" and
"World of Warcraft," which the government says are not "games that
might appeal to a female," i.e., Heather Rogers. As best we can
tell, this argument is simply based on outmoded assumptions about
what sort of entertainment appeals to women. See Nick Breckon,
Nielsen Estimates 400,000+ Female World of Warcraft Players in US,
Shack News (Apr. 8, 2009 2:27 p.m.), http://www.shacknews.com/
article/58076/nielsen-estimates-400000-female-world (last visited
Apr. 25, 2013) (reporting that a Nielsen Company survey found
428,621 female World of Warcraft players in the United States).


                                        -11-
was no suggestion that a third party could have done it after

Rogers sold the laptop.      Nor was there any testimony that, before

the computer's sale, anyone other than Brian and Heather Rogers had

access to it (assuming that she even knew the password, which is

certainly possible but is not established by any evidence in the

record). Thus constrained, Rogers is forced to posit that his now-

ex-wife was responsible for the child pornography found on the

laptop, but that assertion finds essentially no support in the

record, and the jury was entitled to dismiss it.        Consequently, we

reject Rogers's challenge to the sufficiency of the evidence

supporting his conviction. Cf. United States v. Salva-Morales, 660

F.3d 72, 75 (1st Cir. 2011) (per curiam).

B.         Restitution

           The district court ordered Rogers to pay $3,150 in

restitution to "Vicky," a woman whose abuse at the hands of her

father at age ten or eleven was depicted in two minutes of video

found on the laptop.        The order was made pursuant to 18 U.S.C.

§ 2259, which prescribes a mandatory restitution scheme for victims

of certain crimes, including the possession, transportation, or

distribution   of   child    pornography.    The   statute   calls   for

restitution of "the full amount of the victim's losses," including

medical   services;   therapy    or   rehabilitation;   transportation,

housing, or child care costs; lost income; attorneys' fees and

costs; and "any other losses suffered by the victim as a proximate


                                  -12-
result of the offense."       Id. § 2259(b)(1), (3).          The "victim" is

"the individual harmed as a result of a commission of a crime."

Id. § 2259(c).

             We first considered restitution to a child pornography

victim under § 2259 in United States v. Kearney, 672 F.3d 81 (1st

Cir. 2012), cert. dismissed, 133 S. Ct. 1521 (2013), which also

involved restitution to Vicky.5       In Kearney, we identified three

issues related to the restitution inquiry: (1) whether someone is

a   victim   of   a child   pornography    offense;     (2)   what   causation

requirement applies to identify the compensable losses suffered by

the victim as a result of the offense; and (3) what amount of

restitution is reasonable.        Id. at 93.      We held that Vicky was

plainly a victim of Kearney's crime because she was harmed by the

continuing    possession    and   dissemination    of    child    pornography

containing her image, which he perpetuated.              Id. at 94.     As to

causation, we joined a number of other circuits in applying a

proximate causation standard (although the circuits' applications

of that standard have varied), and found "that the proximate cause

requirement was satisfied here, because Kearney's actions resulted

in identifiable losses as outlined in the expert reports and

Vicky's victim impact statements."          Id. at 99-100.       Finally, we

upheld the district court's award of $3,800 as reasonable.                 We


      5
          Unfortunately, video of Vicky's abuse has been widely
disseminated online, leading to numerous child pornography cases in
which material depicting her has played a role.

                                    -13-
found no error in the district court's decision to base the

restitution award on amounts that Vicky had received in other

cases, and we noted that "the restitution award was small, both in

absolute terms and as a proportion of the total amount of the

restitution request," id. at 101, which came to $226,546.10, id. at

86.

          Having sketched the terrain, we turn to the restitution

award in this case.     "We review orders of restitution for abuse of

discretion,   reviewing    legal    questions       de   novo   and   subsidiary

findings of fact for clear error."          Id. at 91.     Here, our analysis

is straightforward.       As Rogers's counsel acknowledged at oral

argument, Vicky's restitution request in this case was supported by

precisely the same set of materials that she submitted in Kearney:

"affidavits   and   a   letter    provided     by   Vicky's     attorney,    with

attached documentation."         Id. at 85.    Here, as in Kearney, those

materials amply established "that Vicky has suffered immensely

. . . from the continued dissemination and viewing of" material

depicting her abuse.     Id.     Given that the underlying crimes in the

two   cases   are   similar,      that   the   materials        supporting    the

restitution requests are identical, and that there is no evidence

that Vicky has been made whole, we see no basis to reach a result

here that differs from the one we reached in Kearney.                 Certainly,

Rogers cannot show that the district court abused its discretion by




                                     -14-
ordering him to pay slightly less than Kearney had to pay on such

a similar record.

           Indeed,    rather   than   asserting   that   this   case   is

materially different from Kearney,6 Rogers devotes much of his

energy to arguing that we should have adopted a stricter causation-

of-harm standard like that employed by some other courts.          E.g.,

United States v. McGarity, 669 F.3d 1218, 1269-70 (11th Cir.),

cert. denied, 133 S. Ct. 374 (2012).      But Kearney remains binding

on us.   United States v. Troy, 618 F.3d 27, 35 (1st Cir. 2010); see

also United States v. Chiaradio, 684 F.3d 265, 284 (1st Cir. 2012)

(applying Kearney).     We acknowledge that Kearney left unanswered

some questions about how the restitution analysis works; for

example, the district court and the attorneys in this case wrestled

conscientiously with the question of how to settle on a precise

amount to award the victim.       Future cases may call for further

refinement of the causation and reasonableness inquiries. But this

case, which Rogers has not seriously attempted to distinguish from

Kearney, does not.     Consequently, we affirm the district court's

award of $3,150 in restitution.

                           III.   Conclusion

           For the foregoing reasons, we affirm Rogers's conviction

and the district court's restitution award.


     6
          For example, Rogers does not attempt to distinguish the
notice of his offense that Vicky's attorney received in this case
from the notice given in Kearney. See 672 F.3d at 85 & n.4, 100.

                                  -15-
