AI Case Brief
Generate an AI-powered case brief with:
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
We are called upon to decide whether, absent a search warrant or probable cause, the contents of a laptop computer may be searched at an international border and, if so, what evidence is sufficient to convict its owner of receiving and possessing child pornography. We also address an error in the jury instructions on the mental state required for knowingly possessing child pornography.
Defendant Stuart Romm connected to the internet from a Las Vegas hotel room and visited websites containing images of child pornography. As Romm viewed the images online and enlarged them on his screen, his computer automatically saved copies of the images to his âinternet cache.â 1 Based on 40 images deleted from his internet cache and two images deleted from another part of his hard drive, 2 Romm was convicted of knowingly receiving and knowingly possessing child pornography in violation of 18 U.S.C. §§ 2252A(a)(2), (a)(5)(B). Romm appeals both of these convictions, as well as his concurrent mandatory minimum sentences of ten and fifteen years.
First, Romm claims the evidence of his crime should have been suppressed as the fruits of an unlawful border search. Second, he challenges the sufficiency of the evidence supporting each of his convictions, arguing he cannot be found guilty of possessing or receiving child pornography, when he merely viewed child pornography without âdownloadingâ 3 any of it to *994 his hard drive. Third, he claims the refusal of his proffered jury instruction on the statutory definition of a âvisual depictionâ deprived him of the right to present a defense. Fourth, he argues that the omission of an element from the jury instructions on âknowing possessionâ and the district courtâs refusal to supplement the instructions in response to a note from the jury together constitute reversible plain error. Fifth, he challenges the enhancement of his sentences based on prior convictions for predicate offenses.
We have jurisdiction pursuant to 28 U.S.C. § 1291, and for the reasons stated herein, affirm Rommâs convictions, but vacate his sentences and remand to the district court for resentencing.
BACKGROUND
From January 23, 2004 to February 1, 2004, Romm attended a training seminar held by his new employer in Las Vegas, Nevada. When the training seminar ended on February 1, 2004, Romm flew from Las Vegas, Nevada to Kelowna, British Columbia on business.
At the British Columbia airport, Canadaâs Border Services Agency discovered that Romm had a criminal history and stopped him for questioning. Romm admitted he had a criminal record 4 and was currently on probation. Agent Keith Brown then asked Romm to turn on his laptop and briefly examined it. When Brown saw several child pornography websites in Rommâs âinternet history,â 5 Brown asked Romm if he had violated the terms of his probation by visiting these websites. Romm answered âYes,â and also said, âThatâs it. My lifeâs over.â
Meanwhile, Canadaâs immigration service had decided not to admit Romm into the country. Romm withdrew his application for entry and was placed under detention until the next flight to Seattle. Agent Brown then informed U.S. Customs in Seattle that Romm had been denied entry and possibly had illegal images on his computer. On February 2, 2004, Romm returned to Seattle. At the Seattle-Tacoma airport, Romm was interviewed by Agents Macho and Swenson of Immigration and Customs Enforcement (âICEâ). 6 The agents told Romm they needed to search his laptop for illegal images, and could arrange for the examination to be completed that night. Romm agreed. He told the agents he had been in sole possession of the laptop for the previous six to eight weeks. He also told the agents he had âdriftedâ away from his âtherapy,â and experienced âoccasional lapsesâ during which he would view child pornography. But Romm repeatedly denied having any child pornography on his laptop.
ICE conducted a preliminary forensic analysis of the hard drive in Rommâs laptop. When the preliminary analysis revealed ten images of child pornography, Agent Macho confronted Romm with this information and asked Romm why he had lied about having images on his computer. Romm looked down, adopted a âconfes *995 sional mode,â made little eye contact with his interrogators, and said that âhe knew[the agents] were gonna find something on the computer.â He also stated the agents had every right to arrest him and would probably do so.
Romm then described to the agents how he used Google 7 to search for child pornography websites. When he found pictures he liked, Romm would keep them on his screen for five minutes and then delete them. Romm used the terms âsaveâ and âdownloadâ to describe this operation. While staying in his hotel room in Las Vegas, Romm viewed child pornography and masturbated twice, while or shortly after viewing the child pornography; he claimed to have then deleted such images. In all, Romm used the internet for approximately six-and-a-half hours during his week-long stay in Las Vegas.
Results of the Forensic Analysis
At trial, the government called three witnesses to testify about the forensic analysis of the hard drive in Rommâs laptop. First, Agent Camille Sugrue described the preliminary analysis that she conducted with software called âEnCase.â With EnCase, it is possible to recover deleted files, 8 as well as information showing when the files were created, accessed, or modified. In conducting the preliminary analysis, Sugrue found ten images of child pornography. All of the images she found had been deleted from Rommâs hard drive.
Second, Detective Timothy Luckie testified to the results of the full forensic analysis of Rommâs hard drive. Luckie confirmed that all of the child pornography on Rommâs computer had been deleted. The vast majority of the images Luckie found had been deleted from Rommâs internet cache. EnCase did not reveal when the files had been deleted. Luckieâs analysis also showed that Romm had enlarged a few smaller âthumbnailâ 9 images in the internet cache.
Luckie next explained how files in the internet cache are deleted. First, on the default setting, the web browser automatically empties the internet cache when it reaches a given size. Second, the user can instruct the browser to empty the internet cache. Third, users who know where the internet cache is located can go into the cache and manually delete the files, rather than effect the deletions automatically through the web browserâs default setting. EnCase did not reveal the settings on Rommâs web browser, or how his internet cache had been emptied. Luckie opined âthrough experience and training,â however, that Romm either had instructed his browser to empty the cache or had deleted the files manually. Luckie also noted Romm had erased his internet history at 2:25 p.m. on February 2, 2004, the same afternoon that Canadaâs Border Services Agency placed Romm on a flight back to Seattle.
Finally, Luckie testified that files in the internet cache are accessible, albeit âsystem-protected.â A user who knows how to find the internet cache can view the images stored there. Once the user views the image, the user âcan print, rename, [or] save [it] elsewhere, the same thing you can do with any other file.â
*996 The governmentâs third expert witness, Darryl Cosme, exhibited to the jury 42 images of child pornography recovered from Rommâs hard drive. He told the jury the provenance of some images, when each image was saved to the cache, and whether that image was a thumbnail or a full-sized picture. Cosme identified several websites in the internet history as related to child pornography.
Rommâs expert witness, Thomas Keller, testified how the internet cache is âsystem-protected.â According to Keller, âsystem-protectionâ blocks any user from accessing the cache, except by means of âsystem-commands.â If, however, the user executes a system-command notwithstanding the computerâs warning, he can copy the cached image to another location on the hard drive or view the image by copying it into an open program. Keller also testified that people delete their internet history and internet cache for legitimate reasons. Finally, Keller testified he found no evidence Romm ever went into the internet cache, or accessed the files there.
Before trial, Romm moved to suppress the evidence obtained through the border search of his laptop and moved to force the government to elect between multiplicitous counts. The court orally denied both motions. After a four-day trial, the jury deliberated for six hours and found Romm guilty of both possessing and receiving child pornography. At sentencing, the court found Romm had committed a predicate offense under 18 U.S.C. § 2252A(b), and accordingly imposed concurrent mandatory minimum sentences of ten and fifteen years. Romm then filed a timely notice of appeal.
ANALYSIS
I. BORDER SEARCH
First, we address whether the forensic analysis of Rommâs laptop falls under the border search exception to the warrant requirement. We review the legality of a border search de novo. United States v. Okafor, 285 F.3d 842, 845 (9th Cir.2002). Under the border search exception, the government may conduct routine searches of persons entering the United States without probable cause, reasonable suspicion, or a warrant. See United States v. Montoya de Hernandez, 473 U.S. 531, 538, 105 S.Ct. 3304, 87 L.Ed.2d 381 (1985). For Fourth Amendment purposes, an international airport terminal is the âfunctional equivalentâ of a border. See Okafor, 285 F.3d at 845 (citing Al meida-Sanchez v. United States, 413 U.S. 266, 272-73, 93 S.Ct. 2535, 37 L.Ed.2d 596 (1973)). Thus, passengers deplaning from an international flight are subject to routine border searches.
Romm argues he was not subject to a warrantless border search because he never legally crossed the U.S.-Canada border. We have held the government must be reasonably certain that the object of a border search has crossed the border to conduct a valid border search. See United States v. Corral-Villavicencio, 753 F.2d 785, 788-89 (9th Cir.1985); United States v. Tilton, 534 F.2d 1363, 1366-67 (9th Cir. 1976); United States v. Garcia, 415 F.2d 1141, 1144 (9th Cir.1969). In all these cases, however, the issue was whether the person searched had physically crossed the border. There is no authority for the proposition that a person who fails to obtain legal entry at his destination may freely reenter the United States; to the contrary, he or she may be searched just like any other person crossing the border. See United States v.1903 Obscene Magazines, 907 F.2d 1338, 1341 (2d. Cir.1990) (seizure of a shipment of magazines rejected by Canada âclearly permissibleâ as a border search); People v. DeLoach, 58 Misc.2d 896, 297 N.Y.S.2d 220, 222-23 (1969) (travelers denied entry by Canada *997 for refusal to pay a duty properly searched without a warrant); see also United States v. Adams, 1 F.3d 1566, 1577-78 (11th Cir. 1993); United States v. Stanley, 545 F.2d 661, 666 (9th Cir.1976).
Nor will we carve out an âofficial restraintâ 10 exception to the border search doctrine, as Romm advocates. We assume for the sake of argument that a person who, like Romm, is detained abroad has no opportunity to obtain foreign contraband. Even so, the border search doctrine is not limited to those cases where the searching officers have reason to suspect the entrant may be carrying foreign contraband. Instead, â âsearches made at the border ... are reasonable simply by virtue of the fact that they occur at the border.â â United States v. Flores-Montano, 541 U.S. 149, 152-53, 124 S.Ct. 1582, 158 L.Ed.2d 311 (2004) (quoting United States v. Ramsey, 431 U.S. 606, 616, 97 S.Ct. 1972, 52 L.Ed.2d 617 (1977)). Thus, the routine border search of Rommâs laptop was reasonable, regardless whether Romm obtained foreign contraband in Canada or was under âofficial restraint.â
Finally, and for the first time in his reply brief, Romm argues the search of his laptop was too intrusive on his First Amendment interests to qualify as a âroutineâ border search. See generally Okafor, 285 F.3d at 846 (noting the difference between routine and non-routine searches). We decline to consider this issue here because âarguments not raised by a party in its opening brief are deemed waived.â See Smith v. Marsh, 194 F.3d 1045, 1052 (9th Cir.1999). Therefore, evaluating the border search of Rommâs laptop solely as a routine search, we hold the district court correctly denied Rommâs motion to suppress. 11
II. SUFFICIENCY OF THE EVIDENCE
Next, Romm challenges the sufficiency of the evidence that he committed the acts of âpossessingâ and âreceivingâ child pornography. The sufficiency of the evidence is reviewed de novo. See United States v. Shipsey, 363 F.3d 962, 971 n. 8 (9th Cir.2004). âThere is sufficient evidence to support a conviction if, âviewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt.â â Id. (quoting Jackson v. Virginia, 443 U.S. 307, 319, 99 S.Ct. 2781, 61 L.Ed.2d 560 (1979)). Romm concedes there was sufficient evidence for the jury to find he acted with the requisite mental state of âknowingly,â but rather contends that the act he committed was merely the viewing of child pornography, not the possession or receipt *998 of it. We disagree. In the electronic context, a person can receive and possess child pornography without downloading it, if he or she seeks it out and exercises dominion and control over it. See United States v. Tucker, 305 F.3d 1193, 1204 (10th Cir.2002), cert. denied, 537 U.S. 1223, 123 S.Ct. 1335, 154 L.Ed.2d 1082 (2003) (âTucker II â). Here, we hold Romm exercised dominion and control over the images in his cache by enlarging them on his screen, and saving them there for five minutes before deleting them. While the images were displayed on Rommâs screen and simultaneously stored to his laptopâs hard drive, he had the ability to copy, print, or email the images to others. Thus, this evidence of control was sufficient for the jury to find that Romm possessed and received the images in his cache.
Possession of Child Pornography
As we explain below, whether Romm âreceivedâ the images in his cache depends on whether he knowingly took possession of them. Thus, we begin by analyzing his conviction for knowingly possessing child pornography. It is a federal crime to âknowingly possess[ ] any book, magazine, periodical, film, videotape, computer disk, or any other material that contains an image of child pornography....â 18 U.S.C. § 2252A(a)(5)(B). âChild pornographyâ is defined as a âvisual depiction,â id. § 2256(8), and the term âvisual depictionâ âincludes undeveloped film and videotape, and data stored on computer disk or by electronic means which is capable of conversion into a visual image.â Id. § 2256(5) (emphasis added).
Rommâs first argument is that files in the internet cache are not âvisual depictionsâ and, therefore, lie beyond the reach of 18 U.S.C. § 2252A. Specifically, Romm argues the files in the cache are not âdata ... which is capable of conversion into a visual image,â because they must be copied to another location on the disk before they are fully accessible. As Rommâs 8274 expert witness, Thomas Keller, testified, the cache is a âsystem-protectedâ area, which the operating system tries to prevent users from accessing by displaying a warning that access involves an âunsafeâ system-command. The user can, however, override the warning, and open and view the cached files, by executing a system-command. The following testimony by Keller is pertinent here:
Q â What would a user of Windows XP Pro have to do to view [the cached] image if off line?
A â If heâs off line, ..., you have to physically move that image to another file folder. You could either drag it to another one, copy it and paste it to an open window [or] to [ ] some kind of [ ] software that would allow you to see images or cut it and paste it to another folder.
Keller further explained the user could perform the above operation by right-clicking his mouse and choosing from among a limited set of system-commands. Thus, the user can access the files in the cache, and once he accesses them, the user can, according to the governmentâs expert, âprint, rename, [or] save [the files] elsewhere, the same thing you can do with any other file.â
In essence, Rommâs argument is that the cached files do not become âvisual depictionsâ until the user takes the additional step of converting them into ordinary files. The statute, however, speaks of data files that are capable of conversion into a viewable form, not data files that are immediately viewable without any further affirmative steps. See 18 U.S.C. § 2256(5). Here, Romm could convert the image files in his internet cache into a viewable form by right-clicking his mouse. *999 Also, when Romm had the images displayed on his screen that were contemporaneously stored to the cache, he could copy, print, or email them to another person, just as with ordinary files. Therefore, we hold there was sufficient evidence from which the jury could find that the images stored in Rommâs internet cache were âvisual depictions.â 12
Second, Romm challenges the sufficiency of evidence of his control over the images in the internet cache. We begin with the text of 18 U.S.C. § 2252A. We interpret the term âknowing possessionâ according to its plain meaning, and presume Congress intended to apply traditional concepts of possession. See United States v. Mohrbacher, 182 F.3d 1041, 1048-49 (9th Cir.1999); Tucker II, 305 F.3d at 1204. âPossessionâ is â[t]he fact of having or holding property in oneâs power; the exercise of dominion over property.â BLACKâS LAW DICTIONARY 1183 (7th Ed.1999). Thus, to establish possession, â â[t]he government must prove a sufficient connection between the defendant and the contraband to support the inference that the defendant exercised dominion and control over [it].â â United States v. Carrasco, 257 F.3d 1045, 1049 (9th Cir.2001) (quoting United States v. Gutierrez, 995 F.2d 169, 171 (9th Cir.1993) (internal quotation marks and alterations omitted)).
In Mohrbacher, 182 F.3d at 1048-1051, we held that a defendant who downloaded child pornography could be prosecuted for receiving child pornography, but not for transporting it. Our reasoning in Mohrb-acher also clearly implied that a defendant who downloads child pornography can be prosecuted for knowing possession of child pornography. See id. at 1048. Recently, in United States v. Gourde, 440 F.3d 1065, 1070-73 (9th Cir.2006) (en bane), we addressed the evidence necessary to uphold a search warrant for child pornography located on a defendantâs computer. There, we found the search warrant valid based on the defendantâs continued, paying membership in a child pornography website, and the likelihood that â[illegal] images were almost certainly retrievable from his computer if he had ever received or downloaded them.â Id. at 1071. Even though the affidavit supporting the warrant did not attest that the defendant had downloaded any files, it nonetheless provided the requisite â âfair probabilityâ Gourde had, in fact, received or downloaded images.â Id. (citing Illinois v. Gates, 462 U.S. 213, 240, 103 S.Ct. 2317, 76 L.Ed.2d 527 (1983)). Neither Gourde nor Mohrb-acher, however, answers the question before us today: whether a defendant may be convicted of possessing and receiving images of child pornography found in the internet cache.
Of our sister circuits, only the Tenth Circuit has addressed whether a defendant can be convicted of possessing child pornography accessed from the internet and contemporaneously stored to the internet cache. See Tucker II, 305 F.3d at 1204-05. In Tucker II, the defendant was convicted of possessing thousands of images of child pornography in his internet cache *1000 and deleted from his hard drive. Id. at 1198; see also United States v. Tucker, 150 F.Supp.2d 1263, 1265-66 (D.Utah 2001) (âTucker Iâ), aff'd by Tucker II, 305 F.3d at 1204-05. In Tucker, the defendant also saved one image to his hard drive, and had either copied or attempted to copy a set of images to a floppy diskette. See Tucker I, 150 F.Supp.2d at 1265-66. The Tenth Circuit held that the images in Tuckerâs internet cache furnished sufficient evidence to support his conviction for possession of child pornography. See Tucker II, 305 F.3d at 1199, 1204-05. Specifically, the evidence at trial established the defendantâs unfettered access to the internet cache, his intent to seek the images out, and his knowledge of his web browserâs caching function. See id. Therefore, since Tucker âknew his browser cached the image files,â the Tenth Circuit held that âeach time Tucker intentionally sought out and viewed child pornography with his Web browser he knowingly acquired and possessed the images.â Id. at 1205. 13 We agree generally with Tuckerâs analysis. It is true that the images possessed by the defendant must be âcontain [-ed]â on a âcomputer disk or other [tangible] material.â 18 U.S.C. § 2252A(a)(5)(B); United States v. Lacy, 119 F.3d 742, 747-48 (9th Cir.1997). It is also true that âa defendant may be convicted [of possessing child pornography] only upon a showing that he knew that the [disks] contained an unlawful visual depiction.â See id. Therefore, to possess the images in the cache, the defendant must, at a minimum, know that the unlawful images are stored on a disk or other tangible material in his possession.
However, Romm exercised control over the cached images while they were contemporaneously saved to his cache and displayed on his screen. At that moment, as the expert testimony here established, Romm could print the images, enlarge them, copy them, or email them to others. No doubt, images could be saved to the cache when a defendant accidentally views the images, as through the occurrence of a âpop-up,â 14 for instance. But that is not the case here.
By his own admission to ICE, Romm repeatedly sought out child pornography over the internet. When he found images he âliked,â he would âview them, save them to his computer, look at them for about five minutes [] and then delete them.â Either while viewing the images or shortly thereafter, Romm twice masturbated. He described his activities as the âsavingâ and âdownloadingâ of the images. While the images were displayed on screen and simultaneously stored to his cache, Romm could print them, email them, or save them as copies elsewhere. Romm could destroy the copy of the images that his browser stored to his cache. And ac *1001 cording to detective Luekie, Romm did just that, either manually, or by instructing his browser to do so. Forensic evidence showed that Romm had enlarged several thumbnail images for better viewing. In short, given the indicia that Romm exercised control over the images in his cache, there was sufficient evidence for the jury to find that Romm committed the act of knowing possession.
Romm contends that the rule of lenity must caution us against construing the terms âpossessionâ and âreceiptâ in 18 U.S.C. § 2252A to encompass cached internet files. The rule of lenity, which is rooted in considerations of notice, requires courts to limit the reach of criminal statutes to the clear import of their text and construe any ambiguity against the government. See, e.g., Ladner v. United States, 358 U.S. 169, 177, 79 S.Ct. 209, 3 L.Ed.2d 199 (1958); McBoyle v. United States, 283 U.S. 25, 27, 51 S.Ct. 340, 75 L.Ed. 816 (1931); United States v. Napier, 861 F.2d 547, 548 (9th Cir.1988). Here, however, the statute employs the well-known concepts of âpossessionâ and âreceipt,â each of which depends on the evidence of control. Thus, this is not a case where the language of the criminal statute is ambiguous or, by its plain meaning, too narrow to embrace the governmentâs theory of prosecution.
In a recent dissent, one of our colleagues has drawn on the rule of lenity to opine that images saved to the cache are neither âreceivedâ nor âpossessedâ within the meaning of 18 U.S.C. § 2252. See Gourde, 440 F.3d at 1080-82 (Kleinfeld, J., dissenting). Assuming a lack of control over the images saved to the cache, our colleague has opined that a person who looks at child pornography over the internet no more âreceivesâ it, than a visitor to the Louvre âreceivesâ a visualization of the Mona Lisa. See id. at 1082. However, as the record here indicates, Romm had access to, and control over, the images that were displayed on his screen and saved to his cache. He could copy the images, print them or email them to others, and did, in fact, enlarge several of the images. This control clearly differentiates Rommâs conduct from that of a visitor to the Louvre who gazes on the Mona Lisa, even if we put aside the stringent museum rules against photographing or copying without museum permission.
In short, we hold there was sufficient evidence for the jury to conclude that the images in the cache were âvisual depictionsâ because they could be accessed and viewed by Romm. Further, given Rommâs ability to control the images while they were displayed on screen, and the forensic and other evidence that he actually exercised this control over them, there was sufficient evidence to support the juryâs finding that Romm possessed three or more images of child pornography. Coupled with Rommâs conceded knowledge that the images were saved to his disk, the prosecution produced sufficient evidence to establish every element of knowingly possessing child pornography under 18 U.S.C. § 2252A.
Receiving Child Pornography
Since Romm knowingly possessed the files in the internet cache, it follows that he also knowingly received them. Federal law makes it a crime to âknowingly receiv[e] or distribuye] ... any child pornography that has been mailed, or shipped or transported in interstate or foreign commerce.... â 18 U.S.C. § 2252A(a)(2). Generally, federal statutes criminalizing the receipt of contraband require a âknowing acceptance or taking of possessionâ of the prohibited item. See United States v. Lipps, 659 F.2d 960, 962 (9th Cir.1981) (per curiam) (construing 18 U.S.C. § 922(h)); see also, e.g., United *1002 States v. Ladd, 877 F.2d 1083, 1087 (1st Cir.1989) (receiving counterfeit money); United States v. Strauss, 678 F.2d 886, 893-94 (11th Cir.1982) (receiving stolen property). Moreover, we have applied this principle to 18 U.S.C. § 2252âs prohibitions on receiving and possessing child pornography. See Mohrbacher, 182 F.3d at 1048 (âAn individual who ... takes possession or accepts delivery of the visual image; ... has therefore certainly received it.â). Specifically, in Mohrbacher, we held that downloading child pornography constitutes both the act of possession and receipt. Id. Here, we have held that the files stored to the cache were possessed by Romm, and thus, that the caching of files, on the facts of this case, is analogous to downloading for the purpose of possession. By analogy, it follows under Mohrbacher that knowingly taking possession of the files in the cache also constitutes the âknowing receiptâ of those files. Therefore, we hold that the evidence was sufficient to sustain Rommâs conviction for receiving child pornography. 15
III. JURY INSTRUCTIONS
A. Refusal of Rommâs Proffered Instruction on âVisual Depictionâ
Next, Romm claims the district court deprived him of the right to present his theory of the case by refusing his proffered jury instruction on the statutory definition of âvisual depiction.â If the defense theory has a basis in fact and law, the failure to give a proffered jury instruction on that theory is per se reversible error. See United States v. Escobar de Bright, 742 F.2d 1196, 1201 (9th Cir.1984). However, âit is not reversible error to reject a defendantâs proposed instruction on his theory of the case if other instructions, in their entirety, adequately cover that defense theory.â United States v. Mason, 902 F.2d 1434, 1438 (9th Cir.1990). We review de novo whether the jury instructions adequately cover the defenseâs theory of the case. See United States v. Duran, 59 F.3d 938, 941 (9th Cir.1995).
During the jury instructions conference, Romm proposed that the court instruct the jury on the legal definition of âvisual depictionâ and require the jury to find whether Romm knowingly received âvisual depictionsâ onto the hard drive of his laptop computer. This instruction was necessary, Romm argued, to cover the âstorageâ element of the offense. The court refused Rommâs proffered instruction because âstorage is not an elementâ of the offense and because Romm had, in any event, conceded that the cached files were âvisual depictionsâ by stipulating that the cached files were âchild pornography.â We need not address Rommâs stipulation, however, because we hold that the instructions given adequately covered Rommâs theory of the case. The jury was instructed that âa person has received something if they [sic ] have knowingly come into possession of it.â The instructions defined âpossessionâ as âknowing] of [an objectâs] presence and ha[ving] the power and intention to control it.â The courtâs definition of âreceiving,â as knowingly taking possession, thus required the jury to find whether Romm had possession and control over the images in the cache. Rommâs âvisual depictionsâ defense was premised on the notion that files in the cache are too inaccessible to be the object of âpossessionâ or âreceiptâ under § 2252A. In essence, he challenged whether he had access to and control over the images in the cache. The instructions on receiving, by incorporating *1003 a finding of control, encompassed Rommâs theory of the case.
B. Instructions on the Mens Rea of Knowing Possession
Next, Romm claims the jury instructions on the elements of knowing possession are plainly erroneous under our decision in Lacy, 119 F.3d at 747-50. He also challenges the district courtâs refusal to supplement those instructions in response to a note from the jury expressing confusion over whether Romm had to know the images were located on his disk.
Since Romm failed to object on either ground, we review for plain error.
See, e.g., United States v. Redo,
371 F.3d 1093, 1099-1102 (9th Cir.2004). Under this standard, we have discretion to reverse only if there is (1) error, (2) that is âplainââi.e., obviousâunder current law, and (3) that âaffect[s] [Rommâs] substantial rights.â
See United States v. Olano,
507 U.S. 725, 732-34, 113 S.Ct. 1770, 123 L.Ed.2d 508 (1993). If these three elements of plain error are established, we will exercise our discretion to reverse only if (4) leaving the error uncorrected would â âseriously affect[ ] the fairness, integrity or public reputation of judicial proceedings.â â
Id.
at 736, 113 S.Ct. 1770 (quoting
United States v. Atkinson,
Additional Information