State of Arizona v. Paul David Windsor, Jr. ( 2010 )


Menu:
  •                                                                   FILED BY CLERK
    MAR 30 2010
    COURT OF APPEALS
    DIVISION TWO
    IN THE COURT OF APPEALS
    STATE OF ARIZONA
    DIVISION TWO
    THE STATE OF ARIZONA,                       )
    )       2 CA-CR 2009-0090
    Appellee,   )       DEPARTMENT A
    )
    v.                       )       OPINION
    )
    PAUL DAVID WINDSOR, JR.,                    )
    )
    Appellant.   )
    )
    APPEAL FROM THE SUPERIOR COURT OF PIMA COUNTY
    Cause No. CR-20073224
    Honorable Hector E. Campoy, Judge
    AFFIRMED
    Terry Goddard, Arizona Attorney General
    By Kent E. Cattani and Diane Leigh Hunt                                    Tucson
    Attorneys for Appellee
    Robert J. Hirsh, Pima County Public Defender
    By David J. Euchner                                                         Tucson
    Attorneys for Appellant
    E S P I N O S A, Presiding Judge.
    ¶1           This case raises the novel issue whether downloading images from a remote
    source through the Internet constitutes “duplicating,” as opposed to “receiving,” these
    images for purposes of Arizona‟s sexual exploitation of children statutes. After a jury
    trial, Paul Windsor was convicted of five counts of sexual exploitation of a minor in
    violation of A.R.S. § 13-3553(A)(1).     He was sentenced to mitigated, consecutive
    sentences totaling fifty years‟ imprisonment. On appeal, Windsor contends the evidence
    was insufficient to support his convictions. For the following reasons, we disagree and
    affirm the convictions and sentences.
    Factual and Procedural History
    ¶2           We view the facts in the light most favorable to sustaining the jury‟s
    verdicts. State v. Huffman, 
    222 Ariz. 416
    , ¶ 2, 
    215 P.3d 390
    , 392 (App. 2009). One
    morning in January 2006, staff at a public computer facility located in a University of
    Arizona library received more than fifty, automatically generated, virus-alert messages
    from one of the facility‟s computers over the course of several minutes. After a staff
    member remotely rebooted that computer, another computer began sending similar virus-
    notification messages. The staff member remotely viewed its screen and saw “sexually
    suggestive” pictures of children. He then rebooted the computer, “hoping that the [user]
    would leave.”
    ¶3           When the second computer continued to send the virus-alert messages, staff
    members once again remotely accessed its screen and observed that the user was opening
    the images in a graphics program. A staff member called university police officers, who
    2
    arrived and found Windsor sitting at the computer with pornographic photographs of
    children on the screen.1 Subsequent forensic analysis revealed Windsor had downloaded
    the images from a remote Internet site and saved them in a shared file on the computer‟s
    hard drive. He was later indicted, arrested, and convicted as outlined above.
    Discussion
    ¶4            The sole issue on appeal is whether Windsor‟s conviction was supported by
    sufficient evidence.2 We will not reverse a conviction unless the state has failed to
    present substantial evidence of guilt. Substantial evidence is “more than a mere scintilla”
    and is proof that reasonable persons could accept as convincing beyond a reasonable
    doubt. State v. Nunez, 
    167 Ariz. 272
    , 278, 
    806 P.2d 861
    , 867 (1991).
    ¶5            The statute Windsor was convicted of violating, § 13-3553(A)(1), prohibits
    “[r]ecording, filming, photographing, developing or duplicating any visual depiction in
    which a minor is engaged in exploitive exhibition or other sexual conduct.” Windsor
    does not dispute that the images he accessed were child pornography, but rather contends
    that his downloading these images did not amount to “[r]ecording, filming,
    1
    There was trial testimony and an exhibit showing that the screen displayed
    numerous photographs in a “collage” format.
    2
    Windsor does not dispute that he failed at trial to move for a judgment of
    acquittal on this basis pursuant to Rule 20, Ariz. R. Crim. P., and therefore is entitled to a
    review only for fundamental error. See State v. Stroud, 
    209 Ariz. 410
    , n.2, 
    103 P.3d 912
    ,
    914 n.2 (2005). However, a conviction not supported by substantial evidence constitutes
    fundamental error. Id.; see also State v. Fernandez, 
    216 Ariz. 545
    , ¶ 32, 
    169 P.3d 641
    ,
    650 (App. 2007) (court will not ignore fundamental error if it finds it), cert. denied, ___
    U.S. ___, 
    129 S. Ct. 460
    (2008).
    3
    photographing, developing, or duplicating” them.        In our recent opinion, State v.
    Paredes-Solano, 
    223 Ariz. 284
    , ¶¶ 9-12, 15, 
    222 P.3d 900
    , 904-06 (App. 2009), this court
    recognized that §      13-3553(A)(1), under which Windsor            was charged, and
    § 13-3553(A)(2), which prohibits “[d]istributing, transporting, exhibiting, receiving,
    selling, purchasing, electronically transmitting, possessing, or exchanging,” were
    intended to punish different kinds of harm. Relying on Paredes-Solano, Windsor argues
    the state was required to prove he committed the distinct crime outlined in the subsection
    under which he was charged.3 We agree. See Paredes-Solano, 
    223 Ariz. 284
    , ¶¶ 
    16-22, 222 P.3d at 906-08
    (reversing conviction where duplicitous indictment did not require
    unanimous verdict distinguishing between § 13-3553(A)(1) and (A)(2)).
    ¶6           Accordingly, the convictions cannot be sustained unless the state presented
    sufficient evidence Windsor engaged in one of the activities proscribed in
    § 13-3553(A)(1). Because it is undisputed Windsor did not record, film, photograph, or
    develop any image, the validity of his conviction turns on whether downloading pictures
    from a remote Internet site constitutes “duplicati[on]” for the purposes of this statute.
    When called upon to interpret a statute, we consider its plain language, giving meaning to
    each word and phrase “„so that no part is rendered void, superfluous, contradictory or
    insignificant.‟” State v. Larson, 
    222 Ariz. 341
    , ¶ 14, 
    214 P.3d 429
    , 432 (App. 2009),
    3
    Windsor appears to all but concede that, had the state charged him under
    § 13-3553(A)(2), sufficient evidence would exist to support his conviction.
    4
    quoting Pinal Vista Props., L.L.C. v. Turnbull, 
    208 Ariz. 188
    , ¶ 10, 
    91 P.3d 1031
    , 1033
    (App. 2004).
    ¶7             At trial, the state‟s computer expert testified that downloading involves
    using the Internet to copy a file from a remote computer, a description consistent with the
    way courts have construed the term. See, e.g., Metro-Goldwyn-Mayer Studios Inc. v.
    Grokster, Ltd., 
    545 U.S. 913
    , 919-23 (2005) (downloaded files copied from servers or
    directly from peer-to-peer network); United States v. Sullivan, 
    451 F.3d 884
    , 891 (D.C.
    Cir. 2006) (“every time one user downloads an image, he simultaneously produces a
    duplicate version of that image”); Salter v. State, 
    906 N.E.2d 212
    , 219 (Ind. Ct. App.
    2009) (downloading picture means “saving a copy of the image”); Moore v. State, 
    879 A.2d 1111
    , 1117 (Md. 2005) (download “means to transfer or copy a file”); People v.
    Hill, 
    715 N.W.2d 301
    , 304 (Mich. Ct. App. 2006) (downloaded material copied from
    websites).
    ¶8             As Windsor points out, the word “duplicate” is not defined in the criminal
    code. The general dictionary definition of that word, however, is “to make an exact copy
    of.” Webster’s Ninth New Collegiate Dictionary 389 (1991); accord The American
    Heritage Dictionary 430 (2d college ed. 1982) (“[t]o make an identical copy of”); see
    State v. Bews, 
    177 Ariz. 334
    , 336, 
    868 P.2d 347
    , 349 (App. 1993) (“widely respected
    dictionary” useful when statutory term not defined in statute and “no indication it [was]
    to be given an unusual meaning”). Based solely on the plain meanings of the terms
    “download” and “duplicate,” it would appear that one who downloads an image from a
    5
    remote computer or computer server has duplicated it for the purposes of
    § 13-3553(A)(1).
    ¶9            Windsor disputes this construction of the statute. Citing Paredes-Solano,
    he argues that because “duplicating” is used in § 13-3553(A)(1), it must refer to the
    “creation or production of a new image,” and the act of downloading is more analogous
    to the receipt or distribution of an existing image described in § 13-3553(A)(2) than to
    the creation of a new one.4 But he does not explain how creating an electronic copy of an
    image is so significantly different from making any other type of duplicate that it should
    be treated differently under the law. Moreover, our generalized statement of the statute‟s
    purposes in Paredes-Solano does not alter the plain language of the statute and cannot
    serve to narrow its application. See State v. Peek, 
    219 Ariz. 182
    , ¶¶ 16-17, 
    195 P.3d 641
    ,
    643-44 (2008) (rejecting argument based on case law requiring interpretation contrary to
    statute‟s plain language).
    ¶10           Windsor also cites Oregon and Washington statutes similar to § 13-3553(A)
    and out-of-state cases in which courts upheld the convictions of defendants who had
    reproduced pornographic images. It appears his intent is to show that other states do not
    regard the act of downloading an image as “duplicati[on]” for the purposes of their
    4
    In his opening brief, Windsor likens downloading images to purchasing a
    magazine containing pornography, arguing that a purchaser could only be guilty of
    violating § 13-3553(A)(1) by taking the additional step of scanning, photocopying, or
    faxing the image, “thus creating something entirely new.” But downloading images is
    more analogous to purchasing materials at a store that requires a person to make his or
    her own photocopy of the materials to leave with them.
    6
    respective statutes. But none of the decisions he cites stand for this proposition or even
    include discussion of this issue. State v. Dimock, 
    27 P.3d 1048
    , 1048-49 (Or. Ct. App.
    2001), involved a defendant who undisputedly used electronic mail (e-mail) to transmit
    pornographic images. State v. Knutson, 
    823 P.2d 513
    , 515 (Wash. Ct. App. 1991), did
    not involve computers at all, but rather photographs the defendant had enlarged and
    reproduced. And the defendants in State v. Betnar, 
    166 P.3d 554
    , 556 (Or. Ct. App.
    2007), and People v. Hill, 
    715 N.W.2d 301
    , 304-05 (Mich. Ct. App. 2006), had
    duplicated images by placing them on compact discs. That other courts have sustained
    convictions for acts that would also violate our statute is not germane to Windsor‟s claim
    that downloading is not duplicating.
    ¶11          We also reject Windsor‟s contention that interpreting the word
    “duplicati[on]” in § 13-3553(A)(1) to include downloading would render superfluous the
    terms “receiving,” “electronically transmitting,” and “possessing,” that appear in
    § 13-3553(A)(2). Although he does not specifically explain how these words would
    become meaningless if downloading constitutes duplication, we infer that Windsor‟s
    5
    primary concern is the term “electronically transmitting.”       But there are a number of
    ways that electronic transmission could entail acts other than downloading, such as using
    5
    One obviously could receive or possess illicit materials without having
    downloaded them, such as a photograph or a video recording, and without having either
    accessed them on the Internet or duplicated them.
    7
    e-mail to send an image or broadcasting streaming video over the Internet.6 Additionally,
    we are unconcerned that a defendant who downloaded an image could be found both to
    possess and to have duplicated it—a possibility faced equally by anyone who knowingly
    copies proscribed images in any form. Cf. State v. Cheramie, 
    218 Ariz. 447
    , ¶¶ 10-11,
    
    189 P.3d 374
    , 376 (2008) (unlawful possession lesser-included offense of transporting
    drugs for sale because “we cannot conceive how a person can „transport‟ drugs without
    having possess[ed them]”).
    ¶12           We find additional support in State v. Jensen, 
    217 Ariz. 345
    , 
    173 P.3d 1046
    (App. 2008), for our conclusion that intentionally downloading an image constitutes
    something distinct from receiving, possessing, or electronically transmitting it. The issue
    in Jensen was whether sufficient evidence existed to prove the defendant knowingly had
    received or possessed child pornography in violation of § 13-3553(A)(2) when his
    computer‟s memory cache contained automatically saved images that had been accessed
    via the Internet. 
    Id. ¶¶ 2,
    4, 6. In holding the downloaded images could be evidence of
    receipt, this court discussed the concept of “receiving” information through the Internet,
    distinguishing that receipt from intentionally downloading a file.       
    Id. ¶ 18
    (images
    automatically stored in computer cache constituted evidence operator voluntarily
    6
    “Streaming” involves transmitting electronic data in a continuous fashion to
    disseminate visual or audio content, or both, among receiving devices. See Cable Plus
    Co., L.P. v. Ariz. Dep’t of Rev., 
    197 Ariz. 507
    , ¶ 13, 
    4 P.3d 1050
    , 1052-53 (App. 2000)
    (describing transmission of information by streaming electronic signals); see also UMG
    Recordings, Inc. v. Veoh Networks, Inc., 
    620 F. Supp. 2d 1081
    , 1085 (C.D. Cal. 2008)
    (distinguishing downloading from streaming).
    8
    received them by “intentionally accessing websites” “to have them visually appear on the
    screen”).
    ¶13              Similarly, we determined that, by visiting websites containing child
    pornography, the defendant in Jensen had taken “„something given, offered, or
    transmitted‟” or had “„convert[ed] incoming electro-magnetic waves into visible or
    audible signals,‟” an act similar to, but separate from, intentionally downloading files
    onto his computer hard drive. 
    Id. ¶ 13,
    quoting Webster’s II New Riverside University
    Dictionary 981 (1994).        Implicit in this discussion is the idea that “electronic
    transmission” is the broadcast of images over the Internet, which one receives by
    viewing, and that these acts of transmitting and receiving are separate from actively and
    intentionally making a copy by downloading and saving the images in a specific location
    on a computer.7
    ¶14              At Windsor‟s trial, an FBI computer forensics expert testified that
    downloading a file from the Internet involves copying the file to a user‟s computer hard
    drive.       And Windsor did not contest that he was responsible for downloading the
    recovered image files.8      Accordingly, because the state presented evidence that, by
    7
    In Jensen we did not reach the issue of whether inadvertently cached images
    constituted knowing possession of child pornography. 
    217 Ariz. 345
    , ¶ 
    18, 173 P.3d at 1052-53
    . Similarly, here we need not address whether automatically cached copies of
    images could constitute a knowing duplication because the evidence clearly shows
    Windsor placed the images in a shared folder of the computer.
    8
    At trial, Windsor denied knowing what the files contained but did not dispute that
    he had downloaded them.
    9
    downloading these images, Windsor intentionally had copied them onto the computer, his
    conviction for duplicating an exploitative visual representation of a child in violation of
    § 13-3553(A)(1) was supported by substantial evidence.
    Disposition
    ¶15           Windsor‟s convictions and sentences are affirmed.
    /s/ Philip G. Espinosa
    PHILIP G. ESPINOSA, Presiding Judge
    CONCURRING:
    /s/ Joseph W. Howard
    JOSEPH W. HOWARD, Chief Judge
    /s/ Peter J. Eckerstrom
    PETER J. ECKERSTROM, Presiding Judge
    10