STATE OF NEW JERSEY VS. GERALD D. LAPHAN(14-09-0140, CAMDEN COUNTY AND STATEWIDE)(RECORD IMPOUNDED) ( 2017 )
Menu:
-
RECORD IMPOUNDED NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION This opinion shall not "constitute precedent or be binding upon any court." Although it is posted on the internet, this opinion is binding only on the parties in the case and its use in other cases is limited. R. 1:36-3. SUPERIOR COURT OF NEW JERSEY APPELLATE DIVISION DOCKET NO. A-3437-15T2 STATE OF NEW JERSEY, Plaintiff-Respondent, v. GERALD D. LAPHAN, Defendant-Appellant. _______________________________ Argued October 16, 2017 - Decided November 29, 2017 Before Judges Accurso and Vernoia. On appeal from Superior Court of New Jersey, Law Division, Camden County, Indictment No. 14-09-0140. Thomas J. Gosse argued the cause for appellant. Jana Robinson, Deputy Attorney General, argued the cause for respondent (Christopher S. Porrino, Attorney General, attorney; Ms. Robinson, on the brief). PER CURIAM Defendant Gerald D. Laphan was convicted by a jury of two counts of second-degree endangering the welfare of a child by the offering and distribution of child pornography, N.J.S.A. 2C:24-4b(5)(a); and fourth-degree endangering the welfare of a child by possession of child pornography, N.J.S.A. 2C:24- 4b(5)(b); based largely on a voluntary statement he made to the police following the seizure of two computers found in his bedroom pursuant to a search warrant. Defendant received an eight-year prison term and was required to register under Megan's Law, N.J.S.A. 2C:7-1 to -23. Defendant appeals his conviction, raising the following issues for our consideration: POINT I THE FAILURE TO CONDUCT A RULE 104(C) HEARING ON THE ADMISSIBILITY OF THE DEFENDANT'S TAPED STATEMENT (AUDIO ONLY) MANDATES THAT HIS CONVICTIONS BE REVERSED. (Not raised below.) POINT II THE DEFENDANT'S STATEMENT SHOULD NOT HAVE BEEN ADMITTED INTO EVIDENCE BECAUSE HE DID NOT KNOWINGLY, VOLUNTARILY, AND INTELLIGENTLY WAIVE HIS CONSTITUTIONAL RIGHT AGAINST SELF-INCRIMINATION. THEREFORE, HIS CONVICTIONS MUST BE REVERSED. (Not raised below.) POINT III IN THE EVENT THIS COURT DETERMINES THAT THE DEFENDANT'S STATEMENT WAS VOLUNTARY, NOT ALLOWING THE JURY TO HEAR THE FULL STATEMENT OF THE DEFENDANT AND THE CONTEXT IN WHICH IT WAS GIVEN MADE THE USE OF THE STATEMENT AGAINST THE DEFENDANT PATENTLY UNFAIR. THE ENTIRE STATEMENT (ABSENT THE INTERROGATOR 2 A-3437-15T2 DECLARING THAT DEFENDANT IS GUILTY) SHOULD HAVE BEEN GIVEN TO THE JURY AND THE FAILURE TO DO SO DENIED THE DEFENDANT A FAIR TRIAL. (Not raised below.) POINT IV THE PROSECUTOR'S COMMENTS IN HER SUMMATION THAT DEFENDANT'S FAILURE TO TELL POLICE DURING HIS INTERROGATION THAT HE DID NOT CREATE NOR VIEW THE CONTENTS IN THE FILE SHARING FOLDER (EVEN THOUGH HE WAS NEVER ASKED) AS EVIDENCE OF DEFENDANT'S GUILT IS GROUNDS FOR REVERSAL. POINT V EXCLUSION OF THE TEXT MESSAGE WHICH WOULD HAVE STRONGLY CORROBORATED THE DEFENSE'S CONTENTION THAT THE DEFENDANT WAS NOT AT THE CRIME SCENE WHEN THE CRIMES WERE COMMITTED WAS AN ERROR WHICH DENIED THE DEFENDANT A FAIR TRIAL; THEREFORE, HIS CONVICTIONS MUST BE REVERSED. POINT VI THE PORTIONS OF THE DEFENDANT'S STATEMENT THAT WERE ADMITTED CONTAINED DECLARATIONS BY INVESTIGATORS THAT THE EVIDENCE THE STATE HAD, MADE THE DEFENDANT'S GUILT AS TO ALL CHARGES INDISPUTABLE. THESE DECLARATIONS DENIED THE DEFENDANT A FAIR TRIAL. (Not raised below.) POINT VII REPEATED MISREPRESENTATIONS BY THE STATE AND ITS WITNESSES THAT THE DEFENDANT ADMITTED TO DOWNLOADING CHILD PORNOGRAPHY AND ADMITTED TO OFFERING/DISTRIBUTING CHILD PORNOGRAPHY WHEN THEY KNEW THIS WAS NOT TRUE DENIED THE DEFENDANT A FAIR TRIAL (ESPECIALLY SINCE THE CONCEPT OF DOWNLOADING IS CONFUSING AND WAS 3 A-3437-15T2 CONTINUALLY MISCHARACTERIZED BY THE STATE). (Not raised below.) POINT VIII THE COURT SHOULD HAVE DEFINED "DOWNLOADING" FOR THE JURY SINCE IT IS AN ESSENTIAL ELEMENT OF THE ALLEGED CRIMES OF OFFERING AND DISTRIBUTING CHILD PORNOGRAPHY WITH A COMPUTER AND PROVIDED THE JURY WITH THE STATUTORY DEFINITION OF A "FILE-SHARING PROGRAM." (Not raised below.) Because defendant's statement to police, given after Miranda1 warnings, was redacted and admitted into evidence pursuant to an agreement between his counsel and the prosecution, and his remaining arguments are without merit, we affirm. The State's case at trial consisted of the testimony of members of New Jersey's Internet Crimes Against Children Task Force, who explained how they monitor online networks for child pornography and track individual users on those networks; forensic examiners, who explained what they found on defendant's computers; and two members of the State Police, who took defendant's recorded statement. The Task Force members described how peer-to-peer file sharing over the internet works. They explained that peer-to- peer file-sharing networks allow users with specific free 1 Miranda v. Arizona,
384 U.S. 436,
86 S. Ct. 1602,
16 L. Ed. 2d 694(1966). 4 A-3437-15T2 software programs available on the internet, such as FrostWire, to transfer and download files from the computers of other users on the network. They also explained how they infiltrate those networks using specialized software to find files identified by the National Center for Missing and Exploited Children as containing child pornography. A Task Force member testified he was monitoring that software on January 27, 2012, when he discovered that a user in South Jersey not only possessed files identified by the National Center as child pornography but was sharing those files with other users by keeping them on his computer in a publicly-shared folder. After pinpointing the Internet Protocol (IP) address associated with the files, the detective initiated a single- source download from that user by connecting to that IP address and downloading three video files. After confirming the files contained child pornography, the detective sent a subpoena to the internet service provider owning the IP address for the identity of the subscriber. The provider, Verizon, advised the IP address belonged to a customer in Mount Ephraim. Following record checks and surveillance to identify all persons residing at the Mt. Ephraim address, State Police applied for a search warrant for the residence. A 5 A-3437-15T2 tactical team executed the warrant at 6:00 a.m. on a day in early March. After providing the assembled members of the household with Miranda warnings, the sergeant in charge told the family he was searching for evidence of child pornography. Defendant, a nephew of the couple who owned the home, told the sergeant he could help in the investigation. After defendant advised he had viewed images of children on the computer in his bedroom, defendant was arrested and taken in for questioning. While defendant was being taken into custody, another detective conducted what he described as a forensic "preview" or "snapshot" of the two computers in defendant's bedroom. Using specialized forensic software, the detective testified he was able to identify one of the computers by its Global Unique Identifier as the exact machine from which the police downloaded the three video files on January 27th. The detective was also able to confirm that two of those files were still on defendant's computer, although apparently deleted by the user. State Police examiners ultimately identified 265 files containing child pornography on defendant's computers, 221 videos and 44 photographs. At the station, defendant was again provided his Miranda rights and gave a lengthy recorded statement to police. Before 6 A-3437-15T2 the statement was played for the jury, the judge confirmed on the record that there was "no issue of voluntariness or anything else that I otherwise would have to – to rule on." Both counsel advised the court that the redacted statement was the product of extensive negotiations conducted over several months, with defense counsel confirming "[f]or the record" that they had "com[e] to an agreement on it." In the statement, defendant acknowledged he was under arrest for possession of child pornography "[b]ecause there's illegal things on my laptop." He claimed a friend downloaded the images onto his computer and that "[i]nstead of reporting it[,] I thought I could delete it." Defendant explained he "downloaded FrostWire" because he was "cheap, and [he did not] wanna pay for an Apple card to download . . . music." When asked how many times he knowingly looked at child pornography, defendant replied, "[m]aybe um, a few times I, I did know some, somethin' was ah, not right. I'll man up, and I'll say that I knew a few times. But the other things, no." Defendant explained that he used to download music "on LimeWire" and that "[u]nfortunately, well you can download videos too." He told investigators he "did download music videos" and "did download Torrents, which is ah, movies." After "LimeWire got shut down. . . . a friend recommend[ed] 7 A-3437-15T2 FrostWire." Defendant described FrostWire as "basically the ugly cousin of LimeWire." He claimed when he "typed up random sexual word[s] in the [program's] search bar" that: everything came up, it came up um, college girls, girls gone wild. Um, basically, in the his . . . if you could think of, came up in that title, whatever you know. I clicked everything. Everything, everything, everything. Clicked it all. Didn't need read the titles. Clicked it. However, you know, something came up. This P[re]T[een] crap. Gained your curiosity. You know when you clicked it, it said ah, eighteen year old fondle something, whatever. But when you clicked it, the girl wasn't eighteen. You could just tell off the bat. And it gains your curiosity. Like it, it's not like it's [a] sick twisted thing you have going, it just gains your curiosity, like what the hell is this? It's something that you don't see everyday. It's something, you know, it just went from there. I, no one really taught, I could give you the titles that came up, when you type in that one word. It came up um, the nymph, [inaudible] nymphent comes up, nymphets, which is a female, young, you know, it's I looked it up. Although defendant claimed he got started with his friend downloading things onto his computer, he admitted "that was a year or some ago" and was not related to matters he was being asked about. When presented with a screenshot of what detectives found in his shared folder, defendant said, "this was my shared, this, is yeah, this is mine." 8 A-3437-15T2 A forensic examiner with the FBI assigned to the New Jersey Regional Forensics Laboratory described how he imaged the hard drives of defendant's computers, located possible images and videos of child pornography and evidence of the file-sharing programs LimeWire and FrostWire. The examiner explained how he used a virtual machine, a piece of software that allows the user to see the computer exactly "how the user would see it, the shortcuts that they created, the icons and files that they created. . . . just like if I were to turn on the laptop and start it up." The examiner identified screenshots of defendant's FrostWire program as it would have appeared to defendant on the date his computer was seized, which reflected in yellow highlighting that he was "sharing 12 files." Using other forensic tools, the examiner was able to testify that on January 26, 2012, beginning at 11:00 p.m., the day before a member of the Internet Crimes Against Children Task Force first detected child pornography on defendant's computer, the user of the computer downloaded the FrostWire program and the three child pornography files detected and accessed the following day. Following those downloads, the user accessed defendant's Facebook account and visited adult pornography and dating websites into the early morning hours. 9 A-3437-15T2 The examiner conceded on cross-examination that defendant's computers were not password protected and that anyone in his household could have accessed his computers and logged in under his user name. The examiner also confirmed that two of the three files investigators accessed on January 27th had been deleted from defendant's computer by the time State Police executed its search warrant several weeks later. The defense theory was that someone else downloaded the illegal images to defendant's computer. The defense presented defendant's girlfriend and his grandmother, who testified that defendant was not at his aunt and uncle's house in Mt. Ephraim on the dates the State claimed child pornography files were downloaded to defendant's computer in 2012. During January and February 2011, when defendant claimed the friend who downloaded the images to his computer was staying at his aunt and uncle's house, another relative of defendant's testified defendant spent weekends at her house in Pennsylvania assisting in her landscaping and excavating business. The witness explained that most of her employment records were lost in a flood in 2012, but that she saw a document relating to monies she owed defendant for work during 2011 that enabled her to testify with certainty that he was at her house on those dates. 10 A-3437-15T2 The document used to refresh the witness's recollection was a photograph of a text message from defendant to his grandfather asking him to write down the weekends defendant was working in January and February 2011 so he would be sure to get paid for his time. Although the court permitted defendant to use the text message to refresh the witness's recollection, the document was not admitted because it was hearsay not subject to any exception. In closing, defendant's counsel argued that defendant discovered some illegal images on his computer and deleted what he saw, consistent with his statement to the police. Counsel used the statement to argue defendant had been forthright about seeing some of the images placed on his computer by a friend, and that defendant's interrogators lied to him about what they found on his computer in urging him to admit that he downloaded the images. Counsel contended defendant never admitted to downloading any illegal images and criticized the police for not investigating the friend responsible for all the illegal material found on defendant's computers. He argued defendant was not tech savvy, did not understand the concept of shared files and had no intent to offer or distribute child pornography. 11 A-3437-15T2 The prosecution made extensive use of defendant's statement in its summation, re-playing several excerpts. The prosecutor argued the forensic experts identified 265 files containing child pornography on defendant's two computers, refuting any claim that defendant accidentally accessed the material his friend had downloaded the year before and quickly deleted it. The State conceded some files had been deleted, but asserted defendant continued to download child pornography until January 26, 2012, long after his friend moved out. As previously noted, the jury convicted defendant on all counts charged. The issues defendant raises in Points I, II, III, and VI relating to the admission at trial of his redacted statement to police are without sufficient merit to warrant extended discussion in a written opinion. R. 2:11-3(e)(2). Defendant did not raise a challenge to the voluntariness of his statement to the police in the trial court. He instead advised the court he agreed with the prosecution that the statement should be admitted at trial with the redactions his counsel negotiated. Accordingly, the issues he now raises as to the failure of the court to conduct a N.J.R.E. 104 hearing on the statement's admissibility, the voluntariness of the statement, the failure to play the entire statement for the jury 12 A-3437-15T2 and the failure to redact certain statements made by his interrogators are all barred by the doctrine of invited error. See N.J. Div. of Youth & Family Servs. v. M.C. III,
201 N.J. 328, 340 (2010) (explaining that "'[t]he doctrine of invited error operates to bar a disappointed litigant from arguing on appeal that an adverse decision below was the product of error, when that party urged the lower court to adopt the proposition now alleged to be error'") (quoting Brett v. Great Am. Recreation,
144 N.J. 479, 503 (1996)). As the Supreme Court explained in State v. Jenkins, "a defendant cannot beseech and request the trial court to take a certain course of action, and upon adoption by the court, take his chance on the outcome of the trial, and if unfavorable, then condemn the very procedure he sought . . . claiming it to be error and prejudicial."
178 N.J. 347, 358 (2004) (citation and internal quotation marks omitted). That is precisely what defendant attempts here. It is clear from reading the record that defendant used the statement in crafting his defense to the charges. His counsel urged the statement showed defendant was honest in admitting to police he stumbled onto illegal images downloaded to his computer by a friend, and that he tried to delete those images from his computer, not offer or distribute them to others. 13 A-3437-15T2 Counsel argued the statement also showed police never bothered to investigate defendant's claim about the friend once defendant admitted to viewing the images, concluding "[t]hey had their man." Instead, interrogators minimized the trouble defendant was in, told him they knew he was guilty and tried to browbeat him into admitting he downloaded the images, which, counsel argued, the statement proved he never did. Having made the statement a critical element of his defense, defendant is precluded from arguing its admission requires reversal of his conviction. See State v. A.R.,
213 N.J. 542, 561-63 (2013). We further reject the claim defendant raises in Point IV that the prosecutor's comments in summation regarding defendant's failure to disavow the contents of the files on his shared folder in the course of his interrogation violated his right to silence. As the Court recently explained in State v. Kucinski, once a defendant has waived his right to remain silent, "cross-examination regarding facts to which he testified at trial, but omitted in his statement to police, was proper."
227 N.J. 603, 623 (2017) (citing United States v. Fambro,
526 F.3d 836, 842 (5th Cir.) ("A defendant cannot have it both ways. If he talks, what he says or omits is to be judged on its merits or[ ] demerits, and not on some artificial standard that only the part that helps him can be later referred to." (quoting 14 A-3437-15T2 United States v. Goldman,
563 F.2d 501, 503 (1st Cir. 1977), cert. denied,
434 U.S. 1067,
98 S. Ct. 1245,
55 L. Ed. 2d 768(1978))), cert. denied,
555 U.S. 1050,
129 S. Ct. 625,
172 L. Ed. 2d 617(2008)). Similarly here, there was nothing improper in the prosecutor's use of defendant's statement, both what he said and what he did not say, in her closing remarks. We likewise are not persuaded that statements "by the [S]tate and its witnesses that the defendant admitted to downloading child pornography and admitted to offering/distributing child pornography" were misrepresentations that denied defendant a fair trial, as he argues in Point VII of his brief. Although defense counsel argued defendant never admitted to downloading or distributing child pornography in his statement, parts of that statement could fairly be construed as admissions that he downloaded illegal images of children to his computers and left those images in a shared file that could be accessed by others.2 Accordingly, we view the statements as only 2 For example, defendant talked about a video involving "[t]his little girl" who "looked just like my daughter," who was four years old. Defendant claimed the video disgusted him, stating, "[w]hat that sick son of a bitch did to her." When defendant claimed he "click[ed] out of it immediately," the interrogator confronted him saying, "you watched it long enough to see what he did and you watched it long enough to hear what he said." Defendant replied, "[n]o, no, no, no. I didn't fully download it." Defendant also told interrogators that he installed 15 A-3437-15T2 fair comment on the evidence and not mischaracterizations of the record. See State v. Cole,
229 N.J. 430, 457 (2017). We find no error in the trial court's refusal to admit the text message used to refresh defendant's relative's recollection as to when defendant stayed at her house in 2011, which defendant raises in Point V. N.J.R.E. 612 permits an adverse party to introduce those portions of the writing which relate to the testimony of the witness for the purpose of impeaching the witness, but provides no right in the party calling the witness to introduce the writing as substantive evidence on any issue. See Showalter v. Barilari, Inc.,
312 N.J. Super. 494, 514 (App. LimeWire, "cause I downloaded music." Describing to the interrogators how he went from downloading music to having illegal images of children on his computer, defendant explained that in FrostWire, "you can click images um all types, just Torrents and crap like that, download whatever. . . . Well you go to all types and you type in a song name that represents a sexual position or sexual body part, videos come up. . . . You put that up there, wow all these girls ah, these videos come up, click the video, then you just go back and click images, type in a image with ah title, somethin' come up. And that's how you get introduced to it." As to his shared folder, when the interrogator explained that "the files we're interested in when . . . we're looking to see what's in your folder when we start seeing P[re]T[een]H[ard]C[ore], PTHC, PTHC, PTHC," defendant acknowledged what he was being shown was "a snapshot of [his] shared folder." When the interrogator confirmed "that's, that's your folder there," defendant responded, "Yeah, I know. I, like I said I tried deleting the crap and doing the forgive and forget part but . . . ." 16 A-3437-15T2 Div. 1998). The document, a purported photograph of a text message sent from defendant to his grandfather, was obviously hearsay offered to prove the truth of the matter asserted, that defendant was not at home when illegal images were downloaded to his computer. Although defendant argues it could have been admitted as a business record, N.J.R.E. 803(c)(6), even were that so, a point we do not concede, it was not offered as such, and no apparent effort was made to subpoena the text from defendant's cell phone carrier, the only entity that might keep such a record in the ordinary course of its business. Finally, we reject defendant's argument, raised in Point VIII, that the court should have defined "downloading" and "file-sharing" for the jury. Defendant argues the failure to define those terms "in this case, where proofs were laden with technical terms and concepts, likely left the jury confused and left [it] believing that the State had no standard to reach or burden to prove anything in this area." Because defendant failed to object to the court's charge, we review his argument on this point under the plain error standard, meaning we disregard such errors unless "clearly capable of producing an unjust result." R. 2:10-2; State v. Daniels,
182 N.J. 80, 95 (2004). 17 A-3437-15T2 Defendant was charged with violating N.J.S.A. 2C:24- 4b(5)(a) and 2C:24-4b(5)(b), which at the time of his crimes provided3 as follows: (a) Any person who knowingly receives for the purpose of selling or who knowingly sells, procures, manufactures, gives, provides, lends, trades, mails, delivers, transfers, publishes, distributes, circulates, disseminates, presents, exhibits, advertises, offers or agrees to offer, through any means, including the Internet, any photograph, film, videotape, computer program or file, video game or any other reproduction or reconstruction which depicts a child engaging in a prohibited sexual act or in the simulation of such an act, is guilty of a crime of the second degree. (b) Any person who knowingly possesses or knowingly views any photograph, film, videotape, computer program or file, video game or any other reproduction or reconstruction which depicts a child engaging in a prohibited sexual act or in the simulation of such an act, including on the Internet, is guilty of a crime of the fourth degree. 3 The statute was restructured in 2013 to provide, among other things, that a person commits a crime if, by any means, including the Internet, he knowingly distributes or possesses an item depicting the sexual exploitation or abuse of a child or stores and maintains such an item using a file-sharing program. See L. 2013, c. 136, § 1. The amended statute includes definitions of "distribute," "file-sharing program," "item depicting the sexual exploitation or abuse of a child" and "peer-to-peer network." Ibid. 18 A-3437-15T2 Contrary to the arguments made throughout defendant's brief, neither "downloading" nor "file-sharing" is an element of those crimes, and thus were not required to be separately charged. See R. 1:8-7(b); State v. Green,
318 N.J. Super. 361, 375 (App. Div. 1999), aff'd,
163 N.J. 140(2000). As Judge Lisa explained in State v. Lyons, the acts prohibited by the operative words in the former N.J.S.A. 2C:24- 4b(5)(a), although not defined in the Code, carried with them a commonly understood plain meaning.
417 N.J. Super. 251, 260 (App. Div. 2010). Analyzing the various amendments to the statute as "evinc[ing] a clear legislative intent to prohibit 'any means' of dissemination of child pornography, specifically including over the Internet and specifically including computer 'files' containing such materials," we held in Lyons that "[c]onsideration of the terms in the statute in light of these legislative initiatives impels us to conclude that the terms should be construed very broadly."
Id. at 262. Accordingly, we disagree with defendant's premise that he could not have been convicted of either offering or distributing child pornography without having "downloaded" illegal images to his computer. As in Lyons, "[t]he evidence of what defendant did, while knowing what he knew, is the kind of conduct targeted by these enactments. Defendant used the modern technology of computers 19 A-3437-15T2 and the Internet, with a file sharing network, to provide and offer child pornography he possessed in his shared folder."
Ibid.Although those aspects of the State's case describing the efforts of law enforcement to detect child pornography on the internet and track its purveyors were highly technical, the testimony about the various ways an individual with a computer views, downloads and shares music, photos and videos over the internet would be readily understood by most jurors. See State v. Miller,
449 N.J. Super. 460, 468 (App. Div. 2017). We could in no event conclude the judge's decision to instruct the jury in accordance with the model charges for possessing, offering and distributing child pornography was clearly capable of producing an unjust result here. R. 2:10-2. Rather, defendant's failure to interpose a timely objection to the court's charge "constitutes strong evidence that the error belatedly raised here was actually of no moment." State v. Tierney,
356 N.J. Super. 468, 481 (App. Div.) (quotation omitted), certif. denied,
176 N.J. 72(2003). Affirmed. 20 A-3437-15T2
Document Info
Docket Number: A-3437-15T2
Filed Date: 11/29/2017
Precedential Status: Non-Precedential
Modified Date: 4/18/2021