Jason Owens was charged with one count of transporting child pornography in violation of 18 U.S. Code §§ 2252A(a) and 2256 and one count of possessing child pornography in violation of the same statutes. U.S. v. Owens, 2010 WL 988834 (U.S. District Court for the Northern District of Mississippi 2010) (U.S. v. Owens 2010). A jury convicted him of transporting child pornography but acquitted him of possessing child pornography. U.S. v. Owens, 2010.
Owens appealed, claiming “the evidence [presented at trial] was insufficient to establish beyond a reasonable doubt that he knowingly transferred the images from his firstname.lastname@example.org account into his Shiloe26 Photobucket account on October 1, 2007.” U.S. v. Owens, 2013 WL 336704 (U.S. Court of Appeals for the 5th Circuit 2013) (U.S. v. Owens 2013).
More precisely, in appealing his conviction for transporting child pornography, Owens argued that he
could not have transferred the images because September 20, 2007, was Yahoo's cut-off date for transferring photos from its photo service to another photo website. He suggests the images migrated from the Yahoo account to the Photobucket account on October 1, 2007, spontaneously or accidentally without any affirmative act by him. He also promotes a theory that someone else used his work computer to transfer the images while he was at home with a spider bite on October 1, 2007.
U.S. v. Owens 2013.
The earlier district court judge’s opinion, which denied Owens’ motion for a new trial or for a judgment of acquittal, outlines the essential facts in the case:
Evidence at trial suggested Owens maintained images of male child pornography in an online account with Yahoo! Photos under the user name jasonz—email@example.com (`jasonz—14’). He also stored non-pornographic images at Yahoo! Photos under the user name firstname.lastname@example.org (`shiloe26’).
In 2008, Yahoo! Photos informed its customers that it would no longer store images and asked the customers to elect a new storage site. According to [Owens’] testimony, he elected to move the shiloe26 images to Photobucket. Yahoo! Photos then transferred or migrated a set of non-pornographic images from [his]shiloe26 account to his new Photobucket account. Over one month later, Yahoo! Photos migrated a batch of images from [Owens’] jasonz—14 account to [his] Photobucket account.
This migration included images of child pornography, but [Owens] denies having requested the migration. Federal agents later found a number of the migrated images of child pornography in thumbnail format on the work computer to which [Owens] was assigned. The computer's hard drive also contained non-pornographic images belonging to [him].
U.S. v. Owens, 2010.
When Owens was interviewed by the FBI during the investigation of his possible involvement with child pornography, he told them that, among other things, he
first became involved in the Yahoo groups containing child pornography in approximately 2000. He . . . went through a painful divorce in 1999, and began viewing child pornography after his divorce. He . . . viewed child pornography for several years, and then stopped. He . . . had not participated in viewing child pornography in several years. Owens also stated that he never had a computer at home, as he always had access to the Internet at his office.
When questioned about the . . . child pornography found on his computer at PT Corporation, Owens advised he received an email from Yahoo stating that Yahoo photos service was being discontinued, and offered Owens several other online photograph warehousing services for him to transfer his photos that were in his Yahoo account.
Owens chose www.photobucket.com and opened an account to transfer only his photographs in theSHILOE26@yahoo.com account. According to records received, these photos were migrated from Yahoo photos to www.photobucket.com on August 21, 2007, and October 1, 2007.
According to Owens, he was unaware the images of child pornography were transferred to the www.photobucket.com account. Owens [said] he did not intentionally transfer these images. When asked about the fact that the[y] . . . had been downloaded and viewed on the PT Corporation computer, Owens advised that he must have viewed the images of child pornography when he was viewing his other family and friends' photographs on the newly opened www.photobucket.com account.
Brief of Appellee, U.S. v. Owens, 2012 WL 4783904 (emphasis in the original). (At the time, Owens “was employed with PT Corp., located in Cleveland, Mississippi.” Brief of Appellee, U.S. v. Owens. The company cooperated in the investigation. Brief of Appellee, U.S. v. Owens.)
In reviewing the evidence presented at trial and the district court’s denial of Owens’ motion for a new trial or a judgment of acquittal, the Court of Appeals found that “[w]hen the evidence, all reasonable inferences therefrom, and all credibility determinations are viewed in the light most favorable to the Government, the evidence before the jury was sufficient for a reasonable jury to find beyond a reasonable doubt that Owens caused the transfer of the images of child pornography.” U.S. v. Owens 2013.
To understand why it reached that conclusion, it is necessary to review the evidence presented at trial, as summarized by the district court judge, who noted, first, that
[c]ertain elements are not seriously disputed. First, the boys depicted in the images migrated from Owens's Yahoo! Photos account to his Photobucket account were obviously minors, and federal agents confirmed that two of the victims had been identified and were eight years old. Second, the depictions . . . constitute pornography as defined by the statute. Finally, the images were transported in interstate commerce.
U.S. v. Owens, 2010.
The district court judge also noted that while “these elements are easily established, the issue at trial focused on whether Owens knowingly transported the images”, i.e., whether he acted with the requisite mens rea. U.S. v. Owens, 2010. He found that with regard to this element of the offense, “the jury had ample evidence to convict”, which included
• Owens's confession that he saved child pornography at Yahoo! Photos;
• Records from Yahoo! Photos documenting that the images it migrated to Photobucket (and were later found on Owens's computer) were originally uploaded during the time period Owens admitted storing child pornography in his Yahoo! Photos account;
• Owens's three inconsistent accounts of the origins of the child pornography stored in his Yahoo! Photos account;
• Testimony that the static IP address for the images matched the computer system at Owens's place of employment;
• Testimony from a representative of Yahoo! Photos that migrations required authorization from the user;
• Testimony from a representative of Yahoo! Photos that they did not migrate images without a request;
• Testimony from representatives of Yahoo! Photos and Photobucket that both accounts were password protected and that the user must select the destination and then correctly input the passwords for both accounts before migration occurs;
• The absence of anyone other than Owens who knew both account names and passwords;
• Testimony from all of Owens's co-workers that they did not request the migration or view images on his computer;
• Testimony from FBI Agent Newsome that, in 2008, Owens provided the correct Yahoo! Photos password that would be necessary to migrate the images, despite Owens's contention that he had not accessed the account in several years;
• Testimony from Owens's expert that billions of images were migrated and from a representative of Photobucket that there were no reports of anyone receiving the wrong pictures or having pictures migrated without their request;
• Evidence of a consciousness of guilt, including (1) testimony that Owens destroyed key records and (2) testimony that Owens asked a co-worker to provide an alibi the co-worker thought was not accurate.
U.S. v. Owens, 2010.
The district judge noted that “[l]ater in his motion,” Owens made a
more precise argument, contending the Government failed in its burden of showing that he knowingly transmitted the images from the computer in question on the date in question. This too falls short. The evidence established that the illegal migration of images occurred on October 1, 2007, a day Owens claims to have been away from work and away from his work computer.
First, credible evidence the jury was free to believe suggests he was at work on that day and attempted to fabricate an alibi. Second, even if he was away, it appears that the request to migrate could come from any computer, provided the user knew the passwords for the Yahoo! Photos and Photobucket accounts. Finally, Owens's own expert agreed that the migration would not necessarily occur on the same day it was requested.
U.S. v. Owens, 2010 (emphasis in the original).
(In its opinion, the Court of Appeals noted that, as to Owens’ claim to have been at home when the transfer occurred, his credibility was “undermined by the disappearance of his employer's records that would have confirmed his absence, by the work-related instant messages sent from Owens's account that day, and by his co-worker's testimony that Owens asked him to provide inaccurate information to support his claim that he was home.” U.S. v. Owens 2013.)
In ruling on Owens’ arguments on appeal, the Court of Appeals explained that the jury
heard testimony, including an admission by Owens, that he was the subscriber of the email@example.com account and the Shiloe26 Photobucket account. Evidence established that the accounts were password protected.
The jury heard how the transfer of images between the accounts required an affirmative act by the subscriber, a virtual `handshake’ in which the subscriber was required to manually enter both his Yahoo and Photobucket user names and passwords, even when that information was saved on his computer. A Yahoo representative also testified that Yahoo would not transfer images unless the subscriber first selected the particular images and requested the transfer.
While other employees of PT Brokers may have used Owens's work computer, there was no evidence that someone else maintained the passwords to the two accounts, and his co-workers explicitly testified that they did not access Owens's digital photo albums, view or save child pornography on his computer or his Yahoo or Photobucket accounts, or view pornography websites on his computer.
U.S. v. Owens 2013.
The court therefore held that there was no support “for the theory that the images of child pornography spontaneously transferred between Owens's two accounts” or for the alternative “theory that someone else caused the images to be moved from the Yahoo account into the Photobucket account.” U.S. v. Owens 2013. As a result, it affirmed Owens’ conviction and sentence. U.S. v. Owens 2013.