People v. Gumila ( 2012 )


Menu:
  •                            ILLINOIS OFFICIAL REPORTS
    Appellate Court
    People v. Gumila, 
    2012 IL App (2d) 110761
    Appellate Court            THE PEOPLE OF THE STATE OF ILLINOIS, Plaintiff-Appellee, v.
    Caption                    VERNOR GUMILA, Defendant-Appellant.
    District & No.             Second District
    Docket No. 2-11-0761
    Filed                      December 6, 2012
    Held                       Defendant’s conviction for possession of child pornography was upheld
    (Note: This syllabus       over his contentions that the evidence of the Internet browsing history for
    constitutes no part of     his computer showing a history of visits to sites with names suggestive
    the opinion of the court   of child pornography constituted improper other-acts evidence and that
    but has been prepared      the evidence was insufficient to establish that he knowingly and
    by the Reporter of         voluntarily possessed the images found on his computer, since the
    Decisions for the          browsing history suggested defendant sought out and intended to visit
    convenience of the         sites with names suggestive of child pornography and the relevance of
    reader.)
    that evidence outweighed any unfair prejudice.
    Decision Under             Appeal from the Circuit Court of Kane County, No. 07-CF-2980; the
    Review                     Hon. Timothy Q. Sheldon, Judge, presiding.
    Judgment                   Affirmed.
    Counsel on                 Jennifer B. Hulvat, of Hulvat Law Firm, of Oak Brook, for appellant.
    Appeal
    Joseph H. McMahon, State’s Attorney, of St. Charles (Lawrence M.
    Bauer and Marshall M. Stevens, both of State’s Attorneys Appellate
    Prosecutor’s Office, of counsel), for the People.
    Panel                      JUSTICE BIRKETT delivered the judgment of the court, with opinion.
    Justices Burke and Schostok concurred in the judgment and opinion.
    OPINION
    ¶1          Following a bench trial, defendant, Vernor Gumila, was convicted of possession of child
    pornography (720 ILCS 5/11-20.1(a)(6) (West 2008)). The physical evidence at trial
    consisted of (1) several photographic images forensically extracted from defendant’s
    computer, which images defendant did not dispute constituted child pornography; and (2) the
    Internet browsing history for defendant’s computer, which showed a history of visiting Web
    sites with names suggestive of child pornography. Defendant argues that the latter was
    improper other-acts evidence. He also argues that the evidence was insufficient to show that
    he knowingly and voluntarily possessed the images discovered on his computer. We reject
    both contentions and affirm.
    ¶2                                       I. BACKGROUND
    ¶3          On October 10, 2007, after the police executed a search warrant at the residence of
    Shawn Bowlden and seized items in his possession that constituted child pornography, the
    police asked defendant, Bowlden’s roommate, for consent to search his camera and
    computer. Defendant gave consent, and a forensic analysis of the computer’s hard drive
    revealed 13 photographic images that investigators and prosecutors determined were child
    pornography. Defendant was charged with 13 counts of child pornography under section 11-
    20.1(a)(6) of the Criminal Code of 1961 (Code) (720 ILCS 5/11-20.1(a)(6) (West 2008)), one
    count for each image.
    ¶4          At defendant’s bench trial, the State called several police officers as well as Bowlden.
    St. Charles police officer Troy Peacock testified that, on October 10, 2007, he helped execute
    a search warrant at 929 Third Street in St. Charles. The subject of the warrant was Bowlden,
    who was present with defendant. Peacock informed defendant that the police were there
    because Bowlden was suspected of possessing child pornography. The police seized
    numerous items of pornography from Bowlden’s bedroom and arrested him. About two
    -2-
    hours later, Peacock returned to the residence with St. Charles police detective Christie Fry.1
    Peacock had been informed that defendant, too, was suspected of possessing child
    pornography. Peacock and Fry spoke to defendant and asked for consent to take and search
    his camera and computer. Defendant signed a consent form, and Peacock and Fry took
    defendant’s camera and computer from his bedroom.
    ¶5       Bowlden testified that the October 2007 search of his bedroom led to child pornography
    charges against him. He pled guilty to the charges and was sentenced to probation, which he
    was still serving at the time of his testimony. In October 2007, Bowlden and defendant both
    were gymnastics instructors. They roomed together at 929 South Third Street in St. Charles.
    Each had his own bedroom and his own computer that he kept there. In October 2007,
    Bowlden was addicted to pornography, including child pornography, and used his computer
    to view images of pornography on the Internet. Bowlden testified that defendant kept his
    bedroom unlocked and had no password protection for his computer. Occasionally, Bowlden
    would take his computer into defendant’s bedroom to use his modem for Internet access.
    Bowlden, however, never used defendant’s computer.
    ¶6       Fry and St. Charles deputy police chief Steven Huffman described the events following
    defendant’s relinquishment of his camera and computer. Huffman testified that defendant’s
    computer was forensically examined by investigators on the afternoon of October 10. Later
    that afternoon, the examiners told Huffman that 13 images of child pornography were
    recovered from the computer’s hard drive. That evening, Huffman and Fry went to
    defendant’s place of work, a gymnastics studio, and arrested him for possession of child
    pornography. At the police station, defendant executed a Miranda waiver, following which
    Huffman and Fry had a discussion with defendant that fell into two stages. The first was an
    unrecorded discussion, or “pre-interview,” the second an audiotaped statement.
    ¶7       According to Huffman, the unrecorded discussion spanned 30 to 45 minutes. Fry testified
    to the specifics of the discussion:
    “Q. Do you remember what the Defendant told you during that conversation?
    A. Yes, I do.
    Q. Can you briefly summarize it?
    A. He basically–he told me that he was Shawn Bowlden’s roommate at 929 South
    Third Street since about October 2006, and that he was pretty sure that Shawn Bowlden
    had not used his computer ever.
    ***
    Q. And what did you ask him or what did he tell you about his own computer usage?
    A. He said that on a daily basis he would go onto the Internet to look at pornography,
    and for about seven years he said he had been doing that, looking at adult pornography
    on his computer, and for about the past five years he had been looking at child
    pornography on his computer.
    Q. Did you ask him, as it relates to the child pornography, and what sorts of images
    1
    Fry is also referred to as Christine Widlarz in the record and briefs.
    -3-
    he was looking for?
    A. He said that–I asked him if he was aware that the images he was looking at were
    children under the age of 17, and he said that he was. And when I asked him how he
    could tell that they were under the age of 17, he said because of their lack of physical
    development.
    Q. Did you ask him whether or not he was looking for any particular age group
    depicted in the images?
    A. I asked him what age group he was interested in, and he told me that it was
    between 13 and 15 because they were just starting to develop.
    Q. Did he tell you how he went about accessing or looking at these images?
    A. He went–he said that he went to adult and child pornography websites, and then
    he would click on whatever image was interesting to him.
    Q. Did he ever say if he would return to these websites?
    A. He said he would often return to the websites that he was interested in to revisit
    the same pictures that he liked.
    Q. At the conclusion of your conversation with him, did he say anything about how
    he felt about looking at these images?
    A. I asked him if he knew that looking at child abuse images under–you know, child
    pornography images, which is kids under the age of 17[,] was illegal, and he said he did
    know it was illegal and that it was wrong, and we did ask him if he wanted help with that
    problem, and he did state yes.”
    ¶8       Huffman was asked if either he or Fry “indicated to [defendant in the pre-interview] that
    the computer sometimes stores stuff automatically.” Huffman answered, “We may have. I
    don’t recall.”
    ¶9       As for the recorded statement, both Fry and Huffman asked questions, but Huffman was
    the principal questioner. Both the recording and a transcript were admitted into evidence. The
    recording was played for the trial court but is not in the appellate record. In the transcript,
    defendant is first asked about his livelihood. He states that he has been a gymnastics
    instructor for about 15 years. He used to coach boys but now coaches only girls. His students
    range from age 7 to 18. The questions then turn to defendant’s usage of his home computer,
    and he makes the following material statements:
    (1) Defendant “start[ed] browsing for adult pornography” when he acquired his
    computer about five to seven years ago.
    (2) “[E]veryday [sic]” at his home, defendant would “look at pornographic materials
    on [his] computer through the [I]nternet.”
    (3) “[P]robably everyday [sic]” at his home, defendant would “brows[e] *** for ***
    pornographic images or brows[e] for porn on the [I]nternet.”
    (4) Asked when he “start[e]d looking at *** pornographic images of of [sic] girls
    under the age of 17,” defendant answers that he “[p]robably started running into that stuff
    right away.”
    -4-
    (5) Defendant would “come across images of *** children or girls that [he] kn[e]w
    to be under the age of 17,” and even as young as 12.
    (6) “[T]hese images were of naked girls under 17.”
    (7) Defendant “clearly knew by there [sic] appearance that they were under the age
    of 17.”
    (8) “When [defendant was] looking at images of girls [he] knew to be *** younger
    than 17,” and as young as “12 & 13,” he knew this was “illegal” and “wrong.”
    (9) Defendant does not “look for the web sites *** specifically for children under
    17.”
    (10) Rather, he would “come across these images” by “looking at pictures,” and he
    would “click[ ] on” the images to open and view them.2
    (11) Defendant never “save[d] the images on [the] hard drive on [his] computer,” but
    “assum[ed] that the computer does that on [its] own.”
    (12) Defendant would “go[ ] back and look[ ] at the same images more than once,”
    because “you run through certain web sites [that] will have the same pictures on [them]
    over and over again.”
    (13) Defendant would not “specifically go to that web site to view that image again,”
    but the image “may *** pop up again.”
    (14) Asked “how many times a week would [he] look at *** pornographic images
    of children under the age of 17,” he replies, “As long as I run across them[,] so I guess
    everyday [sic].”
    (15) Defendant has never printed or e-mailed any of the images he views on the
    Internet.
    (16) He has never “paid *** money for a subscription to any *** pornographic web
    sites, adult or child.”
    (17) Defendant has “[p]robably less than 100” “pornographic images of girls under
    the age of 17 *** on [his] hard drive.”
    (18) Defendant has never shared these images on his hard drive with anyone.
    (19) Defendant uses America Online (AOL) accounts nal71 and vmyster120.
    2
    The specific exchange was:
    “[Officer]: When you browse on the [I]nternet for these *** images ***[,] explain
    to me how that [sic] do you look for the web sites *** specifically for children under 17?
    [Defendant]: No.
    [Officer]: Explain to me how you would come across these images.
    [Defendant]: Umm basically I’m I’m [sic] looking at pictures. Not really looking at
    text or anything, just pictures.
    [Officer]: O.K. But you click on the images?
    [Defendant]: Yes.
    [Officer]: To open and to view them?
    [Defendant]: Yes.”
    -5-
    In what follows, we occasionally refer to portions of the recorded statement by the above
    numbers.
    ¶ 10       Huffman testified that the subject of the recorded statement then turned to a young girl
    named Shelby, pictures of whom were found on defendant’s hard drive. Defendant described
    the photos to Huffman as showing Shelby in a bathing suit at the dunes in Michigan in 2005.
    Defendant remarked that “we make a trip there every year” (emphasis added). (Defendant
    was not asked to explain what he meant by “we.”) Defendant believed that Shelby was 14
    years old when he took the photos. Defendant took the photos because he was looking “for
    sexy poses to use for a collage.” Defendant has made “sexy collages” of other “kids.” The
    photos are not for his “personal use,” though he keeps copies of them. Defendant claimed
    that Shelby’s parents were aware of the photos and that he gave them a disk containing them.
    ¶ 11        In his testimony, Huffman described the photos of Shelby. One photo showed her “on
    her hands and knees with her butt extended towards the camera, with her looking back at the
    camera.” There were other photos of her “bending over for the camera in a provocative way.”
    Huffman testified that, after the State’s Attorney’s office reviewed the photos, it determined
    that they were not illegal.
    ¶ 12       Both Huffman and Fry testified regarding the content of, and relationship between, the
    recorded and unrecorded statements. As to the content of the recorded statement, Huffman
    acknowledged that the phrase “come across,” which appears in remarks (5) and (10), was his
    phrase, not defendant’s. Huffman agreed that the phrase “basically means that you can be
    looking for things that are legal to look at and you might see something that’s illegal in the
    course of that.” Regarding remarks (12) and (13), Huffman agreed that to view a “pop up”
    image is “different from saving an image or knowing an image is on your hard drive and
    going back and relocating that image over and over again.” By “pop up,” Huffman took
    defendant to mean that “the picture was more of a random kind of thing, that he would come
    across pictures and he would recognize them as being something he had seen before.”
    Huffman recognized that, when defendant was asked (to use defense counsel’s paraphrase)
    “how often he would look at or see images of child pornography or of people under the age
    of 17,” defendant “basically” said, “[O]nly whenever I run across it,” and he “never told
    [Huffman] [that] he was out there looking for it.”
    ¶ 13       Huffman testified that in taking the recorded statement it was important to ask defendant
    to reaffirm “certain things” that he said in the unrecorded statement. Huffman believed that
    “all things that were important in terms of [his] investigation are contained in the [recorded
    statement].”
    ¶ 14       Huffman admitted that he never confronted defendant with the photos of child
    pornography that were taken from his hard drive, even though they were available on the
    night of October 10, 2007, during the recorded and unrecorded statements. Huffman also
    admitted that he never asked defendant if he found images of child pornography sexually
    gratifying, though this would have been a “relevant consideration” in the investigation.
    ¶ 15       Fry also testified to the content of the two statements. Fry stated that the aim of engaging
    a suspect in an unrecorded discussion before taking any recorded statement is to “[m]ake sure
    that [the suspect has] his story straight and [that] he doesn’t go back and forth.” She
    -6-
    acknowledged, however, that the following remarks were in defendant’s unrecorded
    statement but not in his recorded statement: (A) he has been looking at child pornography
    on the Internet for the past five years; (B) he would often return to Web sites to view the
    same images; (C) he was attracted to children between the ages of 13 and 15 because they
    were just starting to develop; and (D) he could tell from their lack of development that
    children were under the age of 17. Fry agreed that item (C) would have been “a critical piece
    of information” to include in the recorded statement. (She was not asked about the
    importance of items (A), (B), and (D).) Fry acknowledged that she was present during the
    recorded statement and could have asked questions on any points that she believed should
    have been addressed. Asked why she did not ask defendant to reconfirm points (A) through
    (D), Fry explained that suspects speak more freely when they know that they are not being
    recorded. For example, in the recorded statement, defendant’s answers were “shorter” and
    he eventually became defensive and less cooperative. Fry was then asked why the police
    would ever record an interview with a suspect. She answered, “You have to ask [Huffman]
    about that. That’s protocol.”
    ¶ 16        As to police interrogations generally, Fry acknowledged that one police interview tactic
    is to initially “minimize” the conduct under investigation and to “soften it up a little bit so
    the suspect might think that they’re less culpable.” Fry denied, however, that the goal of an
    interrogation is to obtain a confession rather than to find the truth.
    ¶ 17        The State’s final witness was Du Page County sheriff’s deputy David Sand, who testified
    as an expert in computer forensic examination. Sand stated that the St. Charles police had
    asked him to examine the hard drive of defendant’s computer. Sand recovered from the hard
    drive 13 files, each of which contained a single image of what Sand ascertained was child
    pornography. Sand recovered nine files from the allocated space within the hard drive and
    four files from the unallocated space.
    ¶ 18        Sand explained that the allocated space within a hard drive contains files that are
    accessible to the user through a computer’s file-browsing utility, such as Windows Explorer.
    Every file in allocated space contains data that tells the name of the file, the date it was
    created, and the file path describing where the file is situated on the hard drive. The
    unallocated space of a hard drive is space “where there is not a specific file that is available
    for use by the operating system.” Files in allocated space remain there until deleted, at which
    point they are transferred to unallocated space. Sand explained that unallocated space is not
    reserved for any particular file; it consists of space that contains no data at all as well as
    space occupied by data from deleted files. Unallocated space is automatically overwritten as
    the computer needs more allocated space. Sand testified that once a file in allocated space
    is deleted and transferred to unallocated space, it can no longer be located with a standard
    file-browsing utility; rather, specialized recovery software is needed. Since data in
    unallocated space might be overwritten at any time as the need arises, a file in unallocated
    space can be partially or wholly unrecoverable. Files that exist in unallocated space are
    known as “lost” or “orphan” files. A lost file can still retain its name, creation date, and file
    path.
    ¶ 19        Sand testified that, using specialized recovery software, he recovered from the
    unallocated space of defendant’s hard drive four lost files, each containing an image of child
    -7-
    pornography. Each had a creation date of January 14, 2007. Sand testified that he did not, nor
    was he asked to, examine whether defendant’s computer had specialized software for the
    recovery of lost files.
    ¶ 20        Sand further testified that all nine files that he recovered from the allocated space within
    defendant’s hard drive were contained in a folder reserved for temporary internet files (TIFs).
    Sand explained that, when a user visits a Web page that displays an image or text, the
    functions available to the user include (1) saving that image or text to the location of the
    user’s choice on the computer’s hard drive; (2) saving it to external media, such as a CD
    ROM; (3) printing it; or (4) e-mailing it to others. In addition to the copy that a user can
    make on his own initiative, the computer automatically stores a copy of the image or text as
    a TIF. No user action is necessary for the creation of a TIF. The folder where TIFs are kept
    is also known as the “web cache.” Sand explained that the storage of images or text from a
    previously viewed Web page enables the computer to load the page more quickly when it is
    revisited. Also, TIFs permit the user to view Web site images or text without having to
    access the Internet. The user can locate the TIF folder or web cache with a standard file-
    browsing utility, like Windows Explorer. Sand explained that, once the user locates the
    desired file within the TIF folder, he can perform any of the functions he could have
    performed when the file was first loaded on the computer screen (e.g., save to another
    location, print, or e-mail). The nine TIFs of child pornography that Sand recovered had
    creation dates ranging from July 9, 2006, to October 10, 2007 (the single TIF from October
    10, 2007, the date that defendant was arrested, had a creation time of 9:58 a.m.).
    ¶ 21        Sand admitted on cross-examination that he was unable to ascertain who was using
    defendant’s computer when the 13 pornographic images were stored on the hard drive.
    ¶ 22        All 13 files recovered from defendant’s computer were admitted into evidence with no
    defense objection. The defense did object, however, to evidence of the Internet browsing
    history on defendant’s computer. This history consisted of “Favorites” and “Cookies.”
    ¶ 23        Sand explained that he recovered “Favorites” from the AOL accounts nal71 and
    vmyster120, both of which defendant, in his recorded statement, admitted using. Sand
    explained that the Favorites option on Internet-browsing software permits the user to save
    the addresses of preferred Web sites. When the user wishes to visit one of those sites, he
    need only click on the Favorites tab designated for that site, and the browser will go directly
    there. Thus, the Favorite acts as an Internet shortcut, eliminating the need for the user to
    search for the Web site again or type its name into the browser’s address bar. Sand testified
    that, when he reviewed the Favorites in defendant’s AOL accounts, he saw Web sites with
    names containing “terms or words that are associated with child pornography or a sexual
    interest in children,” such as “Lolita” and “preteen.”
    ¶ 24        Some of the Favorites admitted into evidence are in the form of Web addresses such as
    “LittleVirginz.com.” Others are titles or descriptors such as “Petite Teen Girls,” “Teen
    Naked Chicks, Teen Hot Sex,” and “Welcome to Teen Cam Girls Site.” Sand acknowledged
    that he did not attempt to link the Favorites in defendant’s AOL accounts to the 13
    pornographic images recovered from defendant’s hard drive. Sand also admitted that, though
    the Favorites were associated with defendant’s AOL accounts, Sand could not determine for
    -8-
    certain who was accessing an account when any given Favorite was created.
    ¶ 25       Sand further explained that a “Cookie” consists of data that a Web site sends through its
    server to the browsing computer, where the data is stored in the TIF folder. Cookies are
    saved automatically, without any action by the user. Web sites use Cookies to gather
    information about the browsing history of the computer. Moreover, the Cookie itself contains
    information, such as the date it was created, the Web site that created it, and the number of
    times the site was visited by that computer. Sand recovered from defendant’s TIF folder
    numerous Cookies from Web sites with names containing terms that, in Sand’s experience,
    are associated with child pornography. Sand identified “preteen” and “Lolita” as examples
    of such terms.
    ¶ 26       The Cookies found by Sand recorded the number of times that defendant’s computer
    visited the sites that originally sent the Cookies. Some of the more frequently visited sites
    were preteen.newpussypics.com (visited 24 times), lolitalovers.net (35 times),
    sexyschoolgirls.net (55 times), and lolitadolls.info (85 times). Another Cookie was
    associated with the site lolitampegs.com/st/, which was visited 31 times. Sand explained that
    an “mpeg” is a video file.
    ¶ 27       Unlike the Favorites, which were associated with defendant’s AOL accounts, the Cookies
    were associated only with defendant’s computer, and Sand admitted that he could not
    determine who was using the computer either when a particular Cookie was created or when
    a Web site that had left a Cookie was revisited. Also, as with the Favorites, Sand did not
    attempt to link the Cookies with any of the 13 images recovered from defendant’s computer.
    ¶ 28       Based on this absence of linkage, defendant argued that the Cookies and Favorites were
    irrelevant and inadmissible. The trial court overruled the objection and admitted the Cookies
    and Favorites. The court found, without elaboration, that the evidence was relevant.
    ¶ 29       At the close of the State’s evidence, the defense moved for a directed finding on the
    ground that the State had failed to prove that defendant knowingly possessed any of the
    images. In opposing that motion, the State argued that defendant’s Cookies and Favorites,
    associated as they were with Web sites of child pornography, indicated that he was “the type
    of individual who is out there seeking this type of material” and, therefore, that the presence
    of child pornography on his hard drive was not fortuitous. The trial court denied the motion
    for a directed finding. Later, the State incorporated into its closing argument the remarks it
    had made in opposing the motion for a directed finding.
    ¶ 30       The trial court found defendant guilty on the counts corresponding to the nine TIF
    images, but found him not guilty on the counts corresponding to the four lost files. The court
    discussed extensively two recent cases on section 11-20.1(a)(6) of the Code: People v.
    Josephitis, 
    394 Ill. App. 3d 293
     (2009), and People v. Scolaro, 
    391 Ill. App. 3d 671
     (2009).
    The court found both cases “on all fours [with] the case at bar.” Citing the definition of
    “possession” in the case law and the definition of “voluntary” possession in section 11-
    20.1(b)(5) of the Code (720 ILCS 5/11-20.1(b)(5) (West 2008)), the court said:
    “The Court has viewed the [C]ookies and the Court has viewed the web pages for which
    the Defendant reached out, and they are replete with websites of child pornography.
    The Court has seen the images that were brought up on Defendant’s computer, and
    -9-
    the Court has listened carefully to the Defendant’s confession that he did have child
    pornography.
    The Court finds that in the [TIF] folders, Counts 4, 6, 7, 8, 9, 10, 11, 12, 13, there
    was an ability to retrieve those for viewing, but on Counts 1, 2, 3, and 5, those are lost
    files and that same ability was not present.”
    ¶ 31       Defendant filed this timely appeal.
    ¶ 32                                     II. ANALYSIS
    ¶ 33       Defendant’s two arguments on appeal are, first, that the Cookies and Favorites were
    improper propensity evidence and, second, that the State failed to prove that he knowingly
    and voluntarily possessed child pornography under sections 11-20.1(a)(6) and (b)(5) of the
    Code. There are two important evidentiary points that defendant does not dispute: first, that
    the nine photographic images for which he was convicted were child pornography as defined
    by section 11-20.1(a)(6), and, second, that the Cookies and Favorites were associated with
    Web sites depicting child pornography.
    ¶ 34                           A. Admission of Cookies and Favorites
    ¶ 35       We first address defendant’s claim that the trial court erred by admitting evidence of the
    Cookies and Favorites found on his hard drive. Defendant argues that, because the State
    never established that the images of child pornography on his hard drive originated from the
    Web sites connected with the Cookies and Favorites, the sole purpose of the evidence was
    to show that defendant was disposed to seeking Web sites of child pornography. We
    disagree.
    ¶ 36       Our analysis begins with a matter of procedure. Defendant admits that he did not preserve
    this argument for appeal, because, while he raised it at trial, he did not reassert it in a posttrial
    motion. See People v. Enoch, 
    122 Ill. 2d 176
    , 186 (1988) (to preserve an issue for appeal,
    defendant must both object at trial and raise the issue in a posttrial motion). He urges us to
    reach the argument under the plain-error doctrine, which bypasses normal forfeiture
    principles and allows a reviewing court to consider unpreserved claims of error in specific
    circumstances. See People v. Thompson, 
    238 Ill. 2d 598
    , 613 (2010); Ill. S. Ct. R. 615(a) (eff.
    Jan. 1, 1967) (“Any error, defect, irregularity, or variance which does not affect substantial
    rights shall be disregarded. Plain errors or defects affecting substantial rights may be noticed
    although they were not brought to the attention of the trial court.”). Plain-error review is
    permitted when:
    “(1) a clear or obvious error occurred and the evidence is so closely balanced that the
    error alone threatened to tip the scales of justice against the defendant, regardless of the
    seriousness of the error, or (2) a clear or obvious error occurred and that error is so
    serious that it affected the fairness of the defendant’s trial and challenged the integrity
    of the judicial process, regardless of the closeness of the evidence.” People v. Sargent,
    
    239 Ill. 2d 166
    , 189 (2010).
    “The initial step in conducting plain-error analysis is to determine whether error occurred at
    -10-
    all.” People v. Walker, 
    232 Ill. 2d 113
    , 124 (2009). This requires a substantive review of the
    issue. 
    Id. at 125
    . Reaching the substance of defendant’s argument, we hold that the admission
    of the Cookies and Favorites was not error.
    ¶ 37        The common-law rule is that evidence of crimes, wrongs, or acts by the defendant aside
    from the crime(s) for which he is being tried is inadmissible if the prior conduct is relevant
    solely to establish the defendant’s propensity to commit an offense such as the one charged.
    People v. Bobo, 
    375 Ill. App. 3d 966
    , 971 (2007). Evidence of other crimes or acts is
    admissible for a host of purposes other than to show propensity. People v. Moser, 
    356 Ill. App. 3d 900
    , 913 (2005). Such evidence may permissibly show:
    “ ‘modus operandi, motive, knowledge, intent, absence of mistake or accident,
    defendant’s state of mind, absence of an innocent mind frame or the presence of criminal
    intent, circumstances or context of defendant’s arrest, placement of defendant in
    proximity to the time and place of the crime, identification of the weapon used in a
    crime, consciousness of guilt, to show a common design, scheme or plan, circumstances
    of a crime charged that would otherwise be unclear, whether a crime charged was
    actually committed, opportunity or preparation, a defendant’s dislike or attitude toward
    the victim, to explain an otherwise implausible fact relating to the crime charged, to
    contradict on rebuttal a defendant’s denials, to disprove a defense of entrapment and to
    disprove an alibi defense.’ ” 
    Id.
     (quoting People v. Millighan, 
    265 Ill. App. 3d 967
    , 972-
    73 (1994)).
    Even other-acts evidence that is relevant for a proper purpose is inadmissible if its probative
    value is substantially outweighed by the danger of unfair prejudice. People v. Walker, 
    211 Ill. 2d 317
    , 337-38 (2004). Whether to admit other-acts evidence lies within the sound
    discretion of the trial court. People v. Robinson, 
    167 Ill. 2d 53
    , 63 (1995). An abuse of
    discretion occurs only when the ruling is arbitrary, fanciful, or unreasonable. People v. Illgen,
    
    145 Ill. 2d 353
    , 364 (1991).
    ¶ 38        The State, arguing strictly under the common-law rule,3 asserts that the Cookies and
    Favorites were admissible to show intent. We agree. To explain, we must examine the
    elements of possession of child pornography as they are defined in section 11-20.1(a)(6) of
    the Code, which states:
    “(a) A person commits the offense of child pornography who:
    3
    The State does not cite section 115-7.3 of the Code of Criminal Procedure of 1963 (725
    ILCS 5/115-7.3 (West 2008)), which partly supersedes the common-law rule by allowing admission
    of propensity evidence in certain prosecutions. Among them are prosecutions for child pornography
    (725 ILCS 5/115-7.3(a)(1) (West 2008)).
    Notably, Rule 404 of the Illinois Rules of Evidence (Ill. R. Evid. 404 (eff. Jan. 1, 2011))
    codifies the common-law rule as well as several statutory provisions, including section 115-7.3.
    While the common-law and statutory standards that Rule 404 was designed to embody were in force
    when defendant was tried, Rule 404 itself did not go into effect until after defendant’s trial. See
    People v. Villa, 
    2011 IL 110777
    , ¶ 32 (Illinois Rules of Evidence not applicable because the
    defendant was tried before the effective date of the rules).
    -11-
    ***
    (6) with knowledge of the nature or content thereof, possesses any film,
    videotape, photograph or other similar visual reproduction or depiction by computer
    of any child *** whom the person knows or reasonably should know to be under the
    age of 18 ***, engaged in any activity described in subparagraphs (i) through (vii)
    of paragraph (1) of this subsection[.]” 720 ILCS 5/11-20.1(a)(6) (West 2008).
    Section 11-20.1(b)(5) of the Code (720 ILCS 5/11-20.1(b)(5) (West 2008)) incorporates a
    voluntariness component into the element of possession:
    “The charge of child pornography does not apply to a person who does not voluntarily
    possess a film, videotape, or visual reproduction or depiction by a computer in which
    child pornography is depicted. Possession is voluntary if the defendant knowingly
    procures or receives a film, videotape, or visual reproduction or depiction for a sufficient
    time to be able to terminate his or her possession.”
    ¶ 39       Since the Code does not define “possess,” courts construing the meaning of possessory
    elements in crimes under the Code have often consulted Black’s Law Dictionary, because
    “[i]n determining the meaning of undefined terms in a statute, a court may turn to the
    dictionary for assistance” (Alvarez v. Pappas, 
    229 Ill. 2d 217
    , 225 (2008)). See People v.
    Ward, 
    215 Ill. 2d 317
    , 325 (2005) (consulting Black’s Law Dictionary to construe the
    possessory element of the crime of distributing harmful materials to a minor (720 ILCS
    5/11–21 (West 2000))); Josephitis, 394 Ill. App. 3d at 299 (consulting Black’s Law
    Dictionary to construe the possessory element of child pornography); Scolaro, 391 Ill. App.
    3d at 679 (same). Black’s Law Dictionary defines “possession” as “[t]he fact of having or
    holding property in one’s power; the exercise of dominion over property.” Black’s Law
    Dictionary 1201 (8th ed. 2004).
    ¶ 40       Notably, both Scolaro and Josephitis concentrated on the meaning of “possess” in
    sections 11-20.1(a)(6) and (b)(5) without addressing how, if at all, that meaning is modified
    by the terms “procures” and “receives” in section 11-20.1(b)(5). Neither term appears to be
    defined in the Code. The primary meaning of “procurement” in Black’s Law Dictionary is
    “the act of getting or obtaining something.” Black’s Law Dictionary 1244 (8th ed. 2004).
    Black’s Law Dictionary does not define “receive,” but another source states its two primary
    definitions as “to take possession or delivery of” and to “knowingly accept.” Webster’s Third
    New International Dictionary 1894 (1993). As we read subsections (a)(6) and (b)(5),
    “receives” and “procures” do not affect the definition of “possess” but, rather, were included
    to reinforce that possession can be achieved by active (“procures”) or passive (“receives”)
    means.
    ¶ 41       Borrowing concepts from drugs and weapons cases, the Josephitis court held that
    possession of child pornography can be actual or constructive. Actual possession “does not
    require present personal touching of the illicit material but, rather, present personal dominion
    over it.” People v. Schmalz, 
    194 Ill. 2d 75
    , 82 (2000). “Constructive possession exists
    without actual personal present dominion over [contraband], but with an intent and capability
    to maintain control and dominion.” People v. Frieberg, 
    147 Ill. 2d 326
    , 361 (1992). Mere
    presence in the vicinity of contraband cannot establish constructive possession. People v.
    -12-
    Scott, 
    367 Ill. App. 3d 283
    , 285 (2006).4 Josephitis did not expound on what, generally, will
    constitute actual or constructive possession of electronic images of child pornography.
    ¶ 42        Here, the Cookies and Favorites were admissible for a purpose other than to show
    defendant’s propensity to commit a crime such as possession of child pornography. The
    defense at trial was that defendant did not seek out the images of child pornography saved
    as TIFs but, rather, those images appeared by happenstance on his computer screen as he
    browsed for adult pornography. The Cookies and Favorites, however, suggest that defendant
    sought out, intended to revisit, and indeed did revisit sites with names and descriptions
    suggestive of child pornography. Other crimes or acts are admissible to show, inter alia,
    intent, knowledge, and absence of mistake or accident. Defendant’s demonstrated interest
    in child pornography tended to show that his accessing of illicit images was knowing and
    voluntary rather than inadvertent.
    ¶ 43        To explain further, we discuss in detail Josephitis and Scolaro. Both cases are from the
    First District Appellate Court and, so, are not binding on this court. We follow them because
    their analyses are sound.
    ¶ 44        In both Josephitis and Scolaro, images of child pornography were discovered in the TIF
    folder or web cache of the defendant’s hard drive, and there was expert testimony that the
    images would have been saved automatically as TIFs when the Web pages that displayed
    them were loaded onto the computer screen. Josephitis, 394 Ill. App. 3d at 296-97; Scolaro,
    391 Ill. App. 3d at 674, 676. Each defendant admitted to the police that he subscribed to Web
    sites that displayed images of child pornography, and that he visited the sites and viewed
    images of child pornography. Josephitis, 394 Ill. App. 3d at 296; Scolaro, 391 Ill. App. 3d
    at 673-74. The defendant in Josephitis further admitted that he not only viewed but also
    “ ‘stored’ ” images from the child-pornography Web sites. Josephitis, 394 Ill. App. 3d at 296.
    The defendant in Scolaro admitted not only that he subscribed to and visited sites of child
    pornography, but also that he received images of “young boys, fully naked” from individuals
    in chat rooms, and that he sometimes sent such pictures to others. Scolaro, 391 Ill. App. 3d
    at 674.
    ¶ 45        Also, in both Josephitis and Scolaro, the police showed the defendant the TIF images of
    child pornography that were recovered from his computer, and the defendant identified them
    as being among the images he previously viewed on the Web sites of child pornography to
    which he subscribed. Josephitis, 394 Ill. App. 3d at 296; Scolaro, 391 Ill. App. 3d at 674.
    ¶ 46        Each defendant claimed, however, that there was no evidence that he was aware that his
    computer was automatically storing copies of Internet images as they loaded on the screen,
    or that he otherwise had knowledge of the TIF images. Josephitis, 394 Ill. App. 3d at 300-01;
    4
    These principles are summarized in Illinois Pattern Jury Instructions, Criminal, No. 4.16
    (4th ed. 2000):
    “Possession may be actual or constructive. A person has actual possession when he
    has immediate and exclusive control over a thing. A person has constructive possession
    when he lacks actual possession of a thing but he has both the power and the intention to
    exercise control over a thing [either directly or through another person].”
    -13-
    Scolaro, 391 Ill. App. 3d at 677. The court in Josephitis acknowledged that “the mere
    presence of images or files in the cache is not sufficient to support a finding of possession.”
    Josephitis, 394 Ill. App. 3d at 306. Similarly, the court in Scolaro held the State to its burden
    of “prov[ing] that defendant knowingly possessed child pornography in the cache folder of
    his computer.” Scolaro, 391 Ill. App. 3d at 676.
    ¶ 47       A careful reading of Josephitis and Scolaro reveals a distinction in how the presence of
    a TIF image can prove possession of child pornography. To demonstrate this, we set forth
    the core portions of the court’s analysis in each case. First, the court in Scolaro reasoned:
    “Here the record shows that the child pornography was saved as temporary files on
    defendant’s home computer. Defendant ‘reached out’ for images by subscribing to Web
    sites that contained images of child pornography. Defendant admitted to forwarding
    images to others and receiving images of fully naked boys. Even if there had been no
    indication in the record that defendant had copied, printed, e-mailed, or sent images to
    others, defendant had the ability to do so when he was viewing the downloaded Web
    pages. [Citation.]” Scolaro, 391 Ill. App. 3d at 680.
    The reasoning in Josephitis was analogous:
    “[T]he mere presence of images or files in the cache is not sufficient to support a finding
    of possession. However, these files, even absent knowledge of their presence or how to
    control them may be proper evidence of past possession. With analysis and testimony of
    a forensic expert, it may be established that a defendant viewed images at a certain time
    and date. In this case testimony and evidence were provided that defendant actively
    sought out the illicit Web sites, paid for access, maintained the Web sites among his
    ‘favorites,’ and viewed numerous photos of child pornography in the three weeks leading
    to his arrest. The evidence also demonstrated that defendant had the opportunity to e-
    mail, save, print, copy, or otherwise manipulate the images while he viewed them.
    *** [E]vidence of an extensive search or paying for access and viewing images on
    a computer establishes both knowledge and dominion and control to support a possession
    finding. Based on the testimony at trial, defendant actively sought out and paid for access
    to child pornography Web sites and viewed over 700 images that were found in the cache
    files of defendant’s computer with various origin dates from two months prior up to the
    date defendant’s computer was confiscated. This is sufficient to show that defendant had
    knowledge of the contents and possession for a period long enough to terminate
    possession.” (Emphasis added.) Josephitis, 394 Ill. App. 3d at 306.
    ¶ 48       Josephitis and Scolaro distinguish between possession of a TIF image and “past
    possession” (Josephitis’s phrase) of the original image as it appeared to the defendant on his
    computer screen, and of which the TIF image is a copy. Both theories of possession began
    with the TIF images. First, the TIFs served as proof that the defendant viewed the original
    images. The inference was enabled by evidence that the TIF folder consisted of copies of
    Internet images stored automatically as the images were loaded onto the defendant’s
    computer screen. As Josephitis and Scolaro show, however, even if the images did at one
    time appear on the defendant’s computer screen, the State still must prove that the defendant
    knowingly and voluntarily possessed the images. The element of knowledge in sections 11-
    -14-
    20.1(a)(6) and (b)(5) requires the State to demonstrate that the images did not appear on the
    screen by accident but, rather, were sought out by the defendant because of their content.
    ¶ 49        In Josephitis and Scolaro, there was both direct and circumstantial evidence of
    knowledge. The direct evidence consisted of the fact that, when the police showed the
    defendant the TIF images that were the basis of the criminal charges, the defendant identified
    them as among the images that he had viewed in visiting the Web sites of child pornography
    to which he subscribed. Josephitis, 394 Ill. App. 3d at 296; Scolaro, 391 Ill. App. 3d at 674.
    The circumstantial evidence in the cases was diverse. First, in each case the defendant
    admitted that he subscribed to, and visited, Web sites of child pornography, where he viewed
    images. Josephitis, 394 Ill. App. 3d at 295-96; Scolaro, 391 Ill. App. 3d at 673-74. The
    defendant in Josephitis further admitted that he “ ‘stored’ ” images viewed on the Web sites.
    Josephitis, 394 Ill. App. 3d at 296. The defendant in Scolaro also admitted that he had
    exchanged, over the Internet, images of “young boys, fully naked.” Scolaro, 391 Ill. App. 3d
    at 674.
    ¶ 50        As for the mechanics of the possession itself, the defendants in both Josephitis and
    Scolaro argued that the viewing of an Internet image cannot alone constitute possession
    under sections 11-20-1(a)(6) and (b)(5), but that there must also be evidence that the viewer
    exercised dominion or control over the image by, e.g., copying, printing, e-mailing, or saving
    it. See Josephitis, 394 Ill. App. 3d at 301; Scolaro, 391 Ill. App. 3d at 676. Disagreeing, both
    courts deemed it sufficient that the defendant had the “opportunity” (Josephitis, 394 Ill. App.
    3d at 306) or “ability” (Scolaro, 391 Ill. App. 3d at 680) to exercise those functions while
    viewing the image. The courts were not explicit, but both appeared to hold that the
    possession was constructive, not actual.
    ¶ 51        Section 11-20.1(b)(5) requires that possession of the original image be voluntary as well
    as knowing. The element of voluntariness is satisfied by proof that the knowing procurement
    or reception was “for a sufficient time to be able to terminate *** possession.” 720 ILCS
    5/11-20.1(b)(5) (West 2008). Thus, where the only proof of possession is that the defendant
    viewed the image while he had the ability (unexercised) to print it, save it, etc., the defendant
    will have had to linger over the original image longer than necessary to terminate his
    possession, as by closing the Web site.
    ¶ 52        TIF images not only can serve as indirect evidence of possession of the original images,
    but can themselves be the basis for liability. Scolaro held that the defendant knowingly and
    voluntarily possessed the TIF images themselves. The court cited the presence of specialized
    file-elimination software as evidence that the defendant was aware that TIFs of pornographic
    images were automatically created as he viewed them on Web sites. Scolaro, 391 Ill. App.
    3d at 680. In Josephitis, the court appeared to agree with the defendant that there was “no
    evidence that he knew that the pornographic images were automatically saved on his
    computer,” and therefore the defendant was liable only for “past possession” of the original
    images. Josephitis, 394 Ill. App. 3d at 301, 306. Josephitis and Scolaro together demonstrate
    that, though a TIF can serve as proof that the defendant viewed the original image, it is
    analytically possible for a defendant to knowingly and voluntarily possess the original image
    without knowingly and voluntarily possessing the TIF.
    -15-
    ¶ 53       Defendant is correct that the State did not specifically link the Cookies and Favorites to
    any of the nine TIF images on which defendant’s convictions were based. Neither, however,
    did the State in Josephitis or Scolaro connect any of the TIF images to the Web sites that the
    defendants admitted visiting, but the courts nonetheless found the defendants’ browsing
    histories relevant to show that the viewing of the original images was not inadvertent, but by
    design. See Josephitis, 394 Ill. App. 3d at 306 (“In this case testimony and evidence were
    provided that defendant actively sought out the illicit Web sites, paid for access, maintained
    the Web sites among his ‘favorites,’ and viewed numerous photos of child pornography in
    the three weeks leading to his arrest.”); Scolaro, 391 Ill. App. 3d at 680 (“Defendant ‘reached
    out’ for images by subscribing to Web sites that contained images of child pornography.”).
    Similarly, here the Cookies and Favorites, which reflected an intense interest in child
    pornography, lessened the probability that the nine TIF images were fortuitously present on
    defendant’s hard drive.
    ¶ 54       This case involves relatively new technology, but the rules of evidence that govern here
    are of an old vintage. The case law fully establishes that the State may adduce evidence of
    the defendant’s proclivities or past conduct in order to prove intent or knowledge in the case
    sub judice. See, e.g., Bobo, 375 Ill. App. 3d at 971-72 (proof of the defendant’s apparent foot
    fetish allowed to establish intent to gratify himself by manipulating the victim’s foot during
    the sexual attack); People v. Hart, 
    338 Ill. App. 3d 983
    , 992-93 (2003) (to prove that the
    defendant intended to steal a briefcase from a department store, though he had not left the
    store before being stopped by store employees, the State was allowed to introduce the
    defendant’s prior uncharged theft of a trench coat occurring 12 days before at the same
    store); People v. Juarbe, 
    318 Ill. App. 3d 1040
    , 1054-55 (2001) (to prove that the defendant
    had knowledge of, and intent to deliver, drugs concealed inside the armrest of his car, the
    State was allowed to introduce evidence that the residence that the defendant had just left
    before being stopped by officers was a “ ‘stash house,’ ” known for drug activity, that the
    defendant had visited the house several times in the four months before his stop and arrest,
    and that the defendant’s fingerprints were found on drug packaging materials within the
    residence); People v. Parrott, 
    244 Ill. App. 3d 424
    , 432 (1993) (where the defendant, who
    had been committed as a sexually dangerous person, was alleged to have violated the terms
    of his conditional release by having unsupervised contact with children or adolescents, and
    children testified that the defendant approached them, asked for sex, and produced from a
    bag several pictures of nude persons having sex, but the defendant testified that the encounter
    was innocent, the State was allowed to introduce evidence of sexually explicit materials
    contained in the bag that the defendant was carrying); United States v. Chambers, 
    642 F.3d 588
    , 595 (7th Cir. 2011) (in trial for attempted child enticement based on the defendant’s
    sexually explicit chat-room discussion with undercover officer and transfer of images of
    child pornography to the officer, proper other-acts evidence included (1) the defendant’s
    sexually explicit chat-room conversations with other undercover officers, which showed
    motive, intent, and absence of mistake; and (2) images of child pornography found on his
    computer, which showed “his ability to transport child pornography to [the undercover
    agent]” and “his sexual inclination toward children”).
    ¶ 55       The Cookies and Favorites tended to show that defendant knowingly and voluntarily
    -16-
    possessed not only the original images, but also the TIFs. Defendant admitted in the recorded
    statement that he was aware that his computer automatically saved images as he viewed them
    on the Internet. Moreover, defendant’s remark (also in his recorded statement) that he
    possessed on his hard drive “probably” fewer than 100 pornographic images of girls younger
    than 17 can reasonably be read as an admission to specific knowledge of some prohibited
    images on his hard drive. The Cookies and Favorites bolstered these admissions by serving
    to explain not only why defendant would have such TIFs on his hard drive in the first
    instance, but also why he had not terminated his possession by deleting them.
    ¶ 56       Defendant argues that a certain remark made by the State below contradicts its present
    assertion that the Cookies and Favorites served a purpose other than to show propensity. In
    opposing the motion for a directed finding, the State argued as follows (we have italicized
    the specific language that defendant identifies):
    “So what are some of the things that are on [defendant’s] favorites? What are some
    of his Favorite websites? Some of the ones I would point out are petite teen girls, teen
    funs, tight delights, petite nympha, young petite nympha and her pretty thumbs
    collection, happy teens, Lolita Mpegs. And this is a very important one. We heard [Sand]
    testify that Lolita is a term specifically associated with child pornography, and that Mpeg
    was a description of a video file.
    Now, I know that none of the charged images are movie files, but it’s important. You
    know, it goes back to Josephitis and Scolaro, we have to prove that he specifically sought
    out the prohibited images. And someone who has Lolita Mpegs on their Favorites is the
    type of individual who is out there seeking this type of material.” (Emphasis added.)
    Defendant construes the State’s phrase “type of individual” as an admission that the evidence
    was relevant only to show propensity. See People v. Donoho, 
    204 Ill. 2d 159
    , 170 (2003) (the
    risk associated with other-acts evidence is that the fact finder will convict the defendant
    simply because he is “a bad person deserving punishment”). The context, however, shows
    that the State was using the Cookies and Favorites to prove intent, namely, that the TIF
    images were not present by accident but, rather, were “specifically sought out” by defendant.
    Moreover, this was a bench trial, so even if the State offered the Cookies and Favorites for
    an improper purpose, we would conclude, because there is no indication to the contrary, that
    the trial court considered the Cookies and Favorites only for a proper purpose. See People
    v. Groel, 
    2012 IL App (3d) 090595
    , ¶ 43 (reviewing court presumes that the trial court
    followed the law unless the record shows otherwise). In any event, we may affirm the
    admission of evidence on any basis appearing in the record, regardless of whether it was
    relied on by the trial court. Donaldson v. Central Illinois Public Service Co., 
    313 Ill. App. 3d 1061
    , 1075 (2000). We evaluate the Cookies and Favorites based on their objective
    relevance, not the relevance accorded them by the State or even the trial court.
    ¶ 57       Finally, we recognize that, even if other-acts evidence is relevant for a proper purpose,
    it must be excluded if its probative value is substantially outweighed by the danger of unfair
    prejudice. Defendant, however, does not argue under this standard until his reply brief, where
    again he seeks to establish that the State itself believed that defendant’s browsing history was
    mere propensity evidence. Again, this argument fails. Furthermore, it is manifest that the
    -17-
    relevance of the Cookies and Favorites far surpassed any potential for unfair prejudice.
    ¶ 58       We conclude that the trial court did not err in admitting the Cookies and Favorites. Since
    there was no error, there can be no plain error. People v. Bannister, 
    232 Ill. 2d 52
    , 79 (2008).
    ¶ 59                                 B. Sufficiency of the Evidence
    ¶ 60       Defendant’s second and final argument on appeal is that the evidence was inadequate to
    establish his guilt. We disagree.
    ¶ 61       A challenge to the sufficiency of the evidence in a criminal trial requires us to determine
    whether, after viewing the evidence in the light most favorable to the prosecution, any
    rational trier of fact could have found the defendant guilty beyond a reasonable doubt. People
    v. Wheeler, 
    226 Ill. 2d 92
    , 114 (2007). We will reverse a criminal conviction only if the
    evidence was so unreasonable, improbable, or unsatisfactory as to create a reasonable doubt
    of the defendant’s guilt. People v. Rowell, 
    229 Ill. 2d 82
    , 98 (2008).
    ¶ 62       Defendant questions, first, the reliability of the unrecorded statement as described in
    Fry’s testimony. He submits that the incriminatory remarks it contains were the product of
    “extensive leading and suggestiveness.” Defendant, however, does not attempt to identify
    any specific instance of a suggestive or leading question, but relies on conjecture alone. Our
    own review of the statement reveals no hint that the officers suggested particular language
    to defendant.
    ¶ 63       Defendant further asserts that the recorded statement is “conveniently missing critical
    elements and alleged admissions” that were included in his unrecorded statement, such as
    that he sought out Web sites of pornography involving children within a certain age range
    (ages 13 to 15), that he would “click on whatever image was interesting to him,” and that he
    would return to the Web sites “that he was interested in to revisit the same pictures he liked.”
    Defendant asserts that it is “highly suspect” that his recorded statement contains no
    comparable admissions. Defendant also finds it significant that the State never asked
    Huffman to corroborate Fry’s testimony regarding the unrecorded statement. Lastly,
    defendant claims that the trial court failed to distinguish between the recorded and
    unrecorded statements in its ruling, but referred to them collectively as defendant’s
    “confession.”
    ¶ 64       On the last point, we note that defense counsel did, in fact, identify for the trial court the
    disparities between the statements, and argued that the unrecorded statement was unreliable.
    Evidently, the trial court tacitly rejected this argument. Defendant’s remaining points all
    touch on the soundness of the court’s credibility determination. The court below was in a far
    better position to observe the witnesses and assess their believability. Wheeler, 
    226 Ill. 2d at 114
    . Defendant has identified no point on which deference to the trial court is
    inappropriate. Moreover, as we explain below, defendant’s recorded statement contains
    sufficiently incriminatory admissions to support, together with the Favorites and Cookies,
    his conviction of possession of child pornography.
    ¶ 65       Defendant next maintains that the evidence in this case did not approach the strength of
    the State’s proof in Josephitis and Scolaro. There are factual differences between this case
    and those authorities, but they are not decisive. As a threshold matter, there was sufficient
    -18-
    evidence to exclude the possibility that the Cookies, Favorites, and nine TIF images of child
    pornography were attributable to some user other than defendant. The Favorites were
    associated with defendant’s password-protected AOL accounts. As for the Cookies and the
    TIF images, the only other potential user who could have been responsible for them was
    Bowlden, but he testified that he owned his own computer and never used defendant’s.
    Defendant produced no evidence challenging Bowlden’s testimony.
    ¶ 66        We proceed, then, from the well-grounded premise that defendant was the sole user of
    his computer when the nine TIF images of child pornography were saved to his web cache.
    As Josephitis and Scolaro demonstrate, a TIF image of child pornography can be the basis
    of liability for possession of the TIF image, the original image, or both, but in all cases the
    possession must be both knowing and voluntary. To recapitulate our analysis of the
    governing law (supra ¶¶ 44-54), a defendant who knowingly views an Internet image of child
    pornography while aware of the automatic caching of Internet images, and who retains the
    TIF image longer than is necessary to terminate possession, is liable for possession of the TIF
    image itself.5 Alternatively, if the defendant knowingly views an Internet image of child
    pornography while unaware of the TIF function, but, with the ability to save, copy, print, e-
    mail, or otherwise manipulate the image, views it longer than is necessary to terminate
    possession of it, the defendant is liable for possession of the original image. For possession
    of the TIF or the original image to be knowing, the defendant must have searched out or
    received the original image because of its content. That the image was viewed by design can
    be proved by direct or circumstantial evidence.
    ¶ 67        Here, the trial court found defendant guilty on the counts corresponding to the nine TIF
    images, because defendant was able to “retrieve the [TIFs] for viewing.” The court found
    defendant not guilty of possession of the lost files, because “that same ability was not
    present.” Evidently, the court’s criterion was whether defendant could access the images of
    child pornography at the time of his arrest. The TIF images met this criterion, but the original
    images and lost files did not. Our review, however, “is of the trial court’s judgment, not its
    reasoning,” and so “the trial court’s judgment may be sustained for any appropriate reason
    regardless of whether the trial court relied on those grounds and regardless of whether the
    trial court’s reasoning was correct.” People v. Johnson, 
    231 Ill. App. 3d 412
    , 419 (1992). As
    our preceding discussion makes clear, the trial court’s view of possession was too narrow,
    as TIF images can serve as evidence of past possession of original images that were no
    longer accessible to the defendant at the time of his arrest.
    ¶ 68        Here there was sufficient evidence that defendant possessed both the TIFs and the
    original images to which the TIFs corresponded. Defendant, as we previously discussed,
    questions the reliability of the unrecorded statement. We therefore begin our discussion with
    the recorded statement and hold that it, combined with the Cookies and Favorites, contains
    sufficient evidence that defendant knowingly and voluntarily possessed child pornography.
    First, the trial court may well have found incredible defendant’s claims that he would simply
    5
    Conceivably, a defendant can become aware of a TIF without having viewed the original
    image.
    -19-
    happen upon images of child pornography while browsing for adult pornography and that,
    although he would “go[ ] back and look[ ] at the same images [of child pornography] more
    than once,” the only reason he was successful in seeing the same images again was that they
    would “pop up” again.
    ¶ 69       Second, regardless of how defendant came across images of child pornography, he
    admitted that he would “click on” such images in order to “open” (presumably, enlarge) them
    for better viewing. Thus, defendant went beyond a mere glance, apparently focusing his
    attention on images of child pornography for their content. That defendant would enjoy such
    images is confirmed by the Cookies and Favorites, according to which defendant not only
    visited numerous different Web sites of child pornography, some upwards of 100 times, but
    also designated several as preferred Web sites. The Cookies and Favorites are a compelling
    witness to defendant’s interest in, if not obsession with, child pornography, and his
    willingness to access it on the Internet. When defendant viewed the original images, he had,
    like the defendants in Josephitis and Scolaro, the ability to print, copy, e-mail, save, send,
    and otherwise exercise control over the images. The recorded statement also supports the
    inference that defendant, given his demonstrated interest in the material, lingered over the
    images “for a sufficient time to be able to terminate [his] possession” (720 ILCS 5/11-
    20.1(b)(5) (West 2008)). Together with the Cookies and Favorites, the recorded statement
    establishes that defendant knowingly and voluntarily possessed the original images of child
    pornography as he viewed them on his computer screen.
    ¶ 70       The recorded statement also establishes that defendant knowingly and voluntarily
    possessed the TIF images. Regarding the images of child pornography that he would “come
    across,” defendant was asked, “[D]o you save these images on your hard drive on your
    computer?” He answered, “No. I’m just assuming that the computer does that on [its] own.”
    When asked how many pornographic images of children under 17 were on his hard drive,
    defendant answered, “Probably less than 100.” This answer can reasonably be construed as
    an admission to specific knowledge of some prohibited images on the hard drive.
    Presumably, this was the evidence from which the trial court concluded that defendant was
    aware of the TIF images. We have no grounds for overturning that factual finding. Evidently,
    the court also found, though tacitly, that defendant possessed the TIFs “for a sufficient time
    to be able to terminate [his] possession” (720 ILCS 5/11-20.1(b)(5) (West 2008)). This
    finding was well grounded, given defendant’s knowledge of the TIFs and the length of time
    that they had remained on his hard drive before his arrest (the oldest TIF was dated July 9,
    2006, and even the newest, dated October 10, 2007, was created several hours before
    defendant’s arrest).
    ¶ 71       As for the unrecorded statement, it contains the more direct admissions of a deliberate
    search for child pornography. Defendant admitted that, for the past five years, he had been
    seeking Web sites featuring girls under 17 and that his preferred age range was 12 to 15,
    which is when children “were just starting to develop.” When visiting those Web sites, he
    would “click on” images of child pornography that interested him, and he would revisit sites
    to view the same images again. The Cookies and Favorites powerfully corroborate these
    admissions. While either the recorded statement or the unrecorded statement would, in
    conjunction with the Cookies and Favorites, present more than adequate evidence that
    -20-
    defendant knowingly and voluntarily possessed the original images, together the statements
    present overwhelming proof of possession of those images.
    ¶ 72       On the question of possession of the TIFs, the unrecorded statement neither confirms nor
    denies that defendant had knowledge of the automatic caching function of his computer. As
    we noted, adequate proof that defendant knew of that function lay in the recorded statement.
    The unrecorded statement does, however, suggest that, if defendant was aware of the TIF
    function, it would not have been surprising that defendant still possessed TIFs of child
    pornography at the time of his arrest, such was his interest in the material.
    ¶ 73       We acknowledge that the only arguably direct evidence that defendant knowingly and
    voluntarily possessed images of child pornography was his stated belief that fewer than 100
    pornographic images of girls under 17 were saved on his hard drive. Despite defendant’s
    emphatic insistence to the contrary, the lack here of such direct evidence as there was in
    Josephitis and Scolaro is not decisive. Illinois case law (supra ¶ 54) is replete with
    prosecutions in which the State was permitted to prove by circumstantial evidence, including
    other-acts evidence, such elements or factors as intent, knowledge, and absence of mistake
    or accident. Nothing in section 11-20.1(a)(6) or (b)(5) of the Code suggests that the crime
    of possession of child pornography is any exception.
    ¶ 74       We uphold defendant’s convictions of possession of child pornography.
    ¶ 75                                  III. CONCLUSION
    ¶ 76      For the foregoing reasons, we affirm the judgment of the circuit court of Kane County.
    ¶ 77      Affirmed.
    -21-