STATE OF NEW JERSEY VS. JADE STEPHEN EPLIN (16-10-2424, ATLANTIC COUNTY AND STATEWIDE) (RECORD IMPOUNDED) ( 2021 )


Menu:
  •                                       RECORD IMPOUNDED
    NOT FOR PUBLICATION WITHOUT THE
    APPROVAL OF THE APPELLATE DIVISION
    This opinion shall not "constitute precedent or be binding upon any court ." Although it is posted on the
    internet, this opinion is binding only on the parties in the case and its use in other cases is limited. R. 1:36-3.
    SUPERIOR COURT OF NEW JERSEY
    APPELLATE DIVISION
    DOCKET NO. A-6044-17
    STATE OF NEW JERSEY,
    Plaintiff-Respondent,
    v.
    JADE STEPHEN EPLIN,
    a/k/a JADE S. ELPIN,
    Defendant-Appellant.
    ________________________
    Submitted September 13, 2021 – Decided October 1, 2021
    Before Judges Sumners and Vernoia.
    On appeal from the Superior Court of New Jersey, Law
    Division, Atlantic County, Indictment No. 16-10-2424.
    Mark E. Roddy, attorney for appellant.
    Cary Shill, Acting Atlantic County Prosecutor, attorney
    for respondent (John J. Lafferty, IV, Acting Assistant
    Prosecutor, of counsel and on the brief).
    PER CURIAM
    Tried by a jury, defendant was convicted of third-degree possession or
    viewing child pornography, N.J.S.A. 2C:24-4(b)(5)(b)(iii), arising from child
    pornographic images discovered on his computer when he was a student at
    Stockton State University. He appeals, arguing:
    POINT I
    [DEFENDANT]'S CONVICTION WAS BASED
    UPON EVIDENCE DERIVED FROM AN ILLEGAL
    WIRETAP.
    POINT II
    AN INDIVIDUAL CANNOT CONSENT                       TO
    SOMETHING HE DOES NOT KNOW ABOUT.
    POINT III
    THE TRIAL COURT'S DECISION TO SLAM THE
    DOOR    SHUT   ON   THE    DEFENDANT'S
    SUPPRESSION HEARING DEPRIVED HIM OF AN
    OPPORTUNITY TO LITIGATE THE FOURTH
    AMENDMENT ISSUES IN HIS CASE.
    POINT IV
    ARTICLE 1, PARAGRAPH 1 OF THE NEW
    JE[R]SEY CONSTITUTION OF 1947 PROHIBITS A
    CONVICTION FOR ANY INDIVIDUAL WHO WAS
    SIMPLY "LOOKING" AT SOMETHING. (Not Raised
    Below)
    POINT V
    A-6044-17
    2
    IT WAS ERROR FOR THE TRIAL COURT NOT TO
    GRANT THE MOTION FOR JUDGMENT OF
    ACQUITTAL NOTWITHSTANDING THE JURY
    VERDICT.
    We reject defendant's arguments that his motion to suppress evidence and
    motion for acquittal should have been granted. We conclude that his acceptance
    of the University's computer acceptable use standards policy in employing its
    server to access the internet gave the University the right to monitor his
    computer and retain the child pornographic images linked to his computer. We
    further conclude that there was sufficient evidence from those images as well as
    testimony presented by the State's witnesses for the jury to find defendant guilty
    of possession or control of child pornography.
    We begin by addressing defendant's contention that the child
    pornographic images linked to his computer through the use of the University's
    computer server should have been suppressed because the seizure violated his
    privacy rights under the Fourth Amendment of the U.S. Constitution and Article
    1, paragraph 7 of the N.J. Constitution against unreasonable search and seizure
    of information linked to his computer.      He maintains that the University's
    interception and recording of his internet activity constituted a "wiretap"
    because his internet activity is a "wire communication" under N.J.S.A.
    2A:156A-2(a). He stresses that because the University was operating at the
    A-6044-17
    3
    behest "of the police and the prosecutor's office" without obtaining a "wiretap
    order," the University's wiretap was illegal. He contends he did not consent to
    the wiretap of his internet activity because he was unaware the University was
    monitoring his internet use. He adds that "consent has absolutely no place in a
    wiretap analysis."
    Defendant's contentions erroneously equate the University's conduct with
    wiretapping. The University's monitoring of defendant's internet activity when
    he used its computer server was not a wiretap. The motion judge properly
    applied the University's acceptable use standards policy in finding the
    University had the right to monitor defendant's internet activity because he
    consented to the University's access when he employed its server to go onto the
    internet.
    In her oral decision, the motion judge found support in the following
    pertinent parts of the policy,1 stating:
    "Authorized use of an access to [U]niversity's
    computing and communications facilities is intended
    and permitted solely to support legitimate educational,
    administrative, and mission-centered institution."
    1
    The record before us does not provide a full copy of the University's acceptable
    use standards policy.
    A-6044-17
    4
    And this is in bold. "The [U]niversity may regularly
    review access logs of servers and network devices to
    ensure appropriate utilization."
    Standard (1) of this appropriate use [policy] says as
    follows: "(1) Forms of expression that are not protected
    by First Amendment and, therefore, are subject to
    appropriate restrictions and/or referral to authorities by
    the [U]niversity include obscene material, child
    pornography, or other material that violates local, state,
    or federal statutes."
    And I'm reading this directly from the privacy standard.
    Standard (3) says as follows: "Appropriate use of
    accessible materials. The [U]niversity reserves the
    right to inspect the content of electronic files when it
    has reasonable belief that the content of material would
    violate university policy, state[,] or federal law. The
    [U]niversity retains the right to review the content of
    any files when the content of such files is likely to be
    material to the alleged violation or in a death, illness,
    or separation of a user.         The contents of the
    [U]niversity's email and electronic communication
    systems may be subject to disclosure under subpoena or
    other written request made pursuant to authorized
    procedures, including requests made pursuant to the
    Open Public Records Act."
    [Emphasis added.]
    The judge further noted that in using the University's server to access the
    internet, "defendant does not have to agree to the terms in the agreement, simply
    — [he] had the opportunity . . . to disagree with the terms of the agreement
    simply by not using the [U]niversity's network."
    A-6044-17
    5
    Defendant does not argue that he accessed the internet from a non-
    University server. Because he was on notice that the University––to ensure
    compliance with its internet acceptable use standards policy––had the right to
    review his internet activity when he used its server, there was no violation of
    defendant's federal or state constitutional rights. Defendant accordingly had no
    expectation of privacy given his acceptance of the University's policy. There
    was no restriction on the University recording and sharing with the State what
    it obtained when monitoring defendant's internet use.
    In sum, the motion judge's factual findings are supported by credible
    evidence in the record, see State v. Lamb, 
    218 N.J. 300
    , 313 (2014) (citing State
    v. Elders, 
    192 N.J. 224
    , 243 (2007)), and we discern no basis to upset the denial
    of defendant's suppression motion.
    We also see no merit to defendant's argument that he was entitled to an
    evidentiary hearing to determine his motion to suppress, and that we should
    reverse "[his] conviction and direct the trial court to conduct a full evidentiary
    hearing on the facts and circumstances surrounding the wiretap." Based on the
    record provided, defendant never made a request for a hearing. When the judge
    asked defense counsel to state, "what you're seeking and why you're seeking it,"
    counsel gave a factual synopsis of how the University obtained the child
    A-6044-17
    6
    pornographic images linked to defendant's computer, acknowledging "[t]here’s
    actually not much [facts] in dispute," and why it violated defendant's privacy
    rights. Because there was no request for a hearing, we review for plain error.
    State v. Santamaria, 
    236 N.J. 390
    , 404 (2019) (citing R. 2:10-2).
    Defendant fails to establish that there were material facts in dispute that
    needed to be resolved in an evidentiary hearing. See State v. Green, 
    346 N.J. Super. 87
    , 90-91 (App. Div. 2001) (holding that mere allegation of a warrantless
    search, coupled with the State's burden to justify it, does not constitute a material
    dispute of fact requiring an evidentiary hearing). The judge maintained the sole
    issue in the motion was whether defendant had a privacy expectation from using
    the University's server.    And, as noted above, we agree with her that the
    University's monitoring of defendant's computer was permissible because he
    accepted the University's acceptable use standards policy, which allowed it to
    monitor his activity when he accessed its server to go onto the internet.
    Finally, we reject defendant's contention that the trial judge––who did not
    decide the motion to suppress––erred in not granting the motion for acquittal
    because "the State's proofs did not rise to the level of proof beyond a reasonable
    doubt." Specifically, defendant argues the State failed to prove that he possessed
    or observed the child pornographic images linked to his computer. He also
    A-6044-17
    7
    maintains, for the first time, the Legislature did not criminalize someone for
    "merely 'looking at something,'" apparently referring to the child pornographic
    images.
    When reviewing a trial judge's denial of a motion of acquittal, we consider
    whether "based on the entirety of the evidence and after giving the State the
    benefit of all its favorable testimony and all the favorable inferences drawn from
    that testimony, a reasonable jury could find guilt beyond a reasonable doubt."
    State v. Williams, 
    218 N.J. 576
    , 594 (2014) (citing State v. Reyes, 
    50 N.J. 454
    ,
    458-59 (1967)). That deferential standard was met here.
    In accordance with N.J.S.A. 2C:24-4(b)(5)(b)(iii), "[a] person commits a
    crime of the third degree if he knowingly possesses, knowingly views, or
    knowingly has under his control, through any means, including the Internet, less
    than 1,000 items depicting the sexual exploitation or abuse of a child." Our
    review of the trial record informs us that the State presented sufficient evidence
    for the jury to find defendant possessed or had control over child pornographic
    images in violation of the statute.
    Defendant's friend Katherine Cairns testified that while she was in
    defendant's dormitory room, she declined his offer to see child pornography he
    had on his computer. Defendant, majoring in computer science, further told
    A-6044-17
    8
    Cairns he had the capability to change his computer's IP address so that when
    he viewed child pornography, there would be no indication that it was on his
    computer.
    After Cairns reported her conversation with defendant to the University
    police, Robert Heinrich, the University's Chief Information Officer in charge of
    the Division of Information Technology Services, was instructed to monitor
    defendant's internet activity. Heinrich directed Brian Gormley, the University's
    Associate   Director    of     Network       Telecommunications     and   Network
    Infrastructure, to monitor defendant's internet activity and network traffic, and
    to "maintain those logs."       Heinrich also testified about the University's
    acceptable use standards policy.
    A three-month investigation ensued, resulting in Gormley finding that
    defendant   encrypted    his    network       traffic,   which   prevented––except
    occasionally––Gormley from observing defendant's internet searches and
    viewings on the University's network. However, Gormley was eventually able
    to view a large amount of child pornography that was accessed by defendant's
    computer. He collected the data from the University's network, kept it on a
    separate server in its original format, and turned it over to the Atlantic County
    Prosecutor's Office. Gormley could neither confirm that defendant accessed
    A-6044-17
    9
    specific photos after the child pornographic website was accessed nor that
    defendant accessed any of the thumbnails of pornography depicted on the
    website.
    Through the testimony of Prosecutor's Office Detective Christopher
    Hallett, the State displayed thirty-five files of individual thumbnails of child
    pornographic images that Gormley testified were accessed by defendant's
    computer through the University network. Hallett stated that after defendant's
    computer and cell phone were seized, an encryption software running on
    defendant's computer was discovered, which prevented anyone from locating
    what was on his computer.
    Defendant did not testify, nor did he present any witnesses. His arguments
    that the State's evidence did not prove his guilt beyond a reasonable doubt are
    unconvincing. Contrary to defendant's contention, his conviction was not based
    on the State's assertion that he viewed child pornographic images, but as evinced
    by this use of the University's network, the aforementioned State's evidence
    clearly showed that he possessed or controlled child pornographic images as
    prohibited by N.J.S.A. 2C:24-4(b)(5)(b)(iii).    The motion for acquittal was
    properly denied.
    A-6044-17
    10
    Affirmed.
    A-6044-17
    11
    

Document Info

Docket Number: A-6044-17

Filed Date: 10/1/2021

Precedential Status: Non-Precedential

Modified Date: 10/1/2021