Com. v. McNulty, J. ( 2016 )


Menu:
  • J-S10013-16
    NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P. 65.37
    COMMONWEALTH OF PENNSYLVANIA                       IN THE SUPERIOR COURT OF
    PENNSYLVANIA
    Appellee
    v.
    JAMES P. MCNULTY
    Appellant                   No. 1767 EDA 2015
    Appeal from the Judgment of Sentence May 28, 2015
    In the Court of Common Pleas of Philadelphia County
    Criminal Division at No(s): CP-51-CR-0003422-2014
    BEFORE: GANTMAN, P.J., BENDER, P.J.E., and PLATT, J.*
    MEMORANDUM BY GANTMAN, P.J.:                           FILED MARCH 04, 2016
    Appellant, James P. McNulty, appeals from the judgment of sentence
    entered in the Philadelphia County Court of Common Pleas, following his
    convictions of two counts of dissemination of child pornography, one count
    of criminal use of communication facility, and fifty counts of possession of
    child pornography.1 We affirm.
    In its opinion, the trial court fully and correctly sets forth the relevant
    facts and procedural history of this case. Therefore, we have no reason to
    restate them.
    Appellant raises the following issue for our review:
    ____________________________________________
    1
    18 Pa.C.S.A. §§ 6312(c), 7512(a), and 6312(d), respectively.
    _____________________________
    *Retired Senior Judge assigned to the Superior Court.
    J-S10013-16
    WHETHER THE EVIDENCE WAS INSUFFICIENT AS A
    MATTER OF LAW TO PROVE THAT APPELLANT COMMITTED
    DISSEMINATION OF PHOTOS OF CHILD SEX ACTS, ONE
    COUNT OF CRIMINAL USE OF COMMUNICATION FACILITY,
    AND FIFTY COUNTS OF POSSESSION OF CHILD
    PORNOGRAPHY[,] THE [LOCATION] WHERE APPELLANT
    KNOWINGLY DISSEMINATED AND POSSESSED COMPUTER
    DEPICTIONS OF CHILDREN UNDER THE AGE OF 18 OR
    THAT HE USED OR CONTROLLED A COMPUTER OR THE
    IMAGES OF CHILD PORNOGRAPHY[?]
    (Appellant’s Brief at 5).2
    A challenge to the sufficiency of the evidence implicates the following
    legal principles:
    The standard we apply in reviewing the sufficiency of the
    evidence is whether viewing all the evidence admitted at
    trial in the light most favorable to the verdict winner, there
    is sufficient evidence to enable the fact-finder to find every
    element of the crime beyond a reasonable doubt. In
    applying [the above] test, we may not weigh the evidence
    and substitute our judgment for the fact-finder.            In
    addition, we note that the facts and circumstances
    established by the Commonwealth need not preclude every
    possibility of innocence.        Any doubts regarding a
    defendant’s guilt may be resolved by the fact-finder unless
    the evidence is so weak and inconclusive that as a matter
    of law no probability of fact may be drawn from the
    ____________________________________________
    2
    To the extent Appellant challenges the sufficiency of the evidence for his
    criminal use of communication facility conviction, Appellant failed to raise
    this issue in his Rule 1925(b) statement. Appellant’s failure to raise this
    issue before the trial court explains why the court’s opinion addressed the
    sufficiency of the evidence only for Appellant’s dissemination of child
    pornography and possession of child pornography convictions. Additionally,
    Appellant’s failure to raise this issue in his Rule 1925(b) statement
    constitutes waiver of the issue on appeal.         See Commonwealth v.
    Poncala, 
    915 A.2d 97
    , 100 (Pa.Super. 2006), appeal denied, 
    594 Pa. 678
    ,
    
    932 A.2d 1287
    (2007) (explaining failure to raise issue in court-ordered Rule
    1925(b) statement results in waiver of issue on appeal).
    -2-
    J-S10013-16
    combined circumstances. The Commonwealth may sustain
    its burden of proving every element of the crime beyond a
    reasonable doubt by means of wholly circumstantial
    evidence. Moreover, in applying the above test, the entire
    record must be evaluated and all evidence actually
    received must be considered. Finally, the [finder] of fact
    while passing upon the credibility of witnesses and the
    weight of the evidence produced, is free to believe all, part
    or none of the evidence.
    Commonwealth v. Jones, 
    874 A.2d 108
    , 120-21 (Pa.Super. 2005)
    (quoting Commonwealth v. Bullick, 
    830 A.2d 998
    , 1000 (Pa.Super.
    2003)).
    After a thorough review of the record, the briefs of the parties, the
    applicable law, and the well-reasoned opinion of the Honorable Barbara A.
    McDermott, we conclude Appellant’s issue on appeal merits no relief. The
    trial court opinion comprehensively discusses and properly disposes of the
    question presented. (See Trial Court Opinion, filed August 7, 2015, at 7-12)
    (finding: facts established Appellant’s control over entire residence at 743
    Watkins Street where agents discovered child pornography; specifically,
    Appellant confirmed he and his brother were only occupants of that address,
    search of Pennsylvania Justice Network verified that Appellant and his
    brother resided at that address, and agents recovered personal documents
    in Appellant’s name from computer desk at that address; facts also
    established Appellant knowingly possessed and controlled child pornography
    found on computers at 743 Watkins Street; search of computers seized from
    dining room at that address revealed 4 personal documents in Appellant’s
    -3-
    J-S10013-16
    name, 508 child pornography images, 3 child pornography videos, and 100
    link files indicative of child pornography; search of computers seized from
    Appellant’s bedroom at that address revealed video of Appellant titled
    “MeInCoat,” photo of Appellant titled “FacePic,” 844 child pornography
    images, and 2 videos indicative of child pornography; importantly, 956 of
    1466 child pornography files found on computers seized from that address
    were stored under usernames marked “JAMES” and no child pornography
    files were discovered under usernames “JUSTIN”; of 510 child pornography
    files stored under generic usernames, agents discovered items on those
    computers    that   identified   Appellant   as   user;   additionally,   evidence
    established Appellant had intent to exercise control over child pornography
    files; specifically, Appellant made several comments in presence of agents
    which implied his use of computers and his knowledge that computers
    contained illegal content; under totality of circumstances, sufficient evidence
    existed to establish that Appellant knowingly possessed child pornography
    discovered on computers confiscated from 743 Watkins Street; sufficient
    evidence also existed to prove Appellant possessed child pornography for
    purpose of dissemination; on September 15 and 18, 2013, Special Agent
    Tabak downloaded two child pornography videos from individual using file-
    sharing program to offer child pornography for download on BitTorrent
    network; Special Agent Tabak determined that individual who shared child
    pornography had used IP address associated with Appellant’s residence;
    -4-
    J-S10013-16
    examination of computer confiscated from Appellant’s bedroom indicated it
    was computer used to download two child pornography videos copied by
    Special Agent Tabak; further examination of computer revealed that user
    had searched for, downloaded, and viewed those two child pornography
    videos on September 14, 2013; significantly, Appellant admitted he had
    used file-sharing program on computers located at 743 Watkins Street; thus,
    sufficient evidence also existed to support Appellant’s dissemination of child
    pornography conviction).   Accordingly, we affirm on the basis of the trial
    court’s opinion.
    Judgment of sentence affirmed.
    Judgment Entered.
    Joseph D. Seletyn, Esq.
    Prothonotary
    Date: 3/4/2016
    -5-
    Circulated 02/22/2016 11:02 AM
    IN THE COURT OF COMMON PLEAS
    FIRST JUDICIAL DISTRICT OF PENNSYLVANIA
    CRIMINAL TRIAL DIVISION
    COMMONWEALTH OF PENNSYLVANIA                                                CP-51-CR-0003422-2014
    CP-51-CR-0003422-2014     Comm.    v.   McNulty, James P
    Opinion
    v.
    JAMES MCNULTY
    111111111111111
    7329486551
    Ill I II I Ill
    OPINION
    McDermott, J.                                                                                August 7, 2015
    Procedural History
    On January 7, 2014, the defendant, James McNulty, was arrested and charged with two
    counts of Dissemination of Photos of Child Sex Acts, one count of Criminal Use of
    Communication Facility, and fifty counts of Possession of Child Pornography. On June 17, 2014,
    the defendant entered into a non-negotiated guilty plea to two counts of Dissemination of Photos
    of Child Sex Acts, one count of Criminal Use of Communication Facility, and twenty-five counts
    of Possession of Child Pornography, before the Honorable Ann Butchart. Judge Butchart
    deferred sentencing until August 14, 2014, for the completion of pre-sentence and mental health
    reports. On August 14, 2014, the defendant filed a Motion to Withdraw his guilty plea, and on
    the same date, Judge Butchart granted the defendant's Motion.
    On March 26, 2015, the case was transferred to this Court for trial. After a bench trial the
    same date, this Court found defendant guilty of all charges and revoked bail. On May 28, 2015,
    after a hearing, this Court determined the defendant was not a sexually violent predator. That
    same day, this Court sentenced defendant to concurrent terms of imprisonment of two to four
    years for both counts of Dissemination of Photo of Child Sex Acts, a consecutive term of
    imprisonment of two to four years for Criminal Use of Communication Facility, and one year of
    probation for ten counts of Possession of Child Pornography, each to run consecutive to the
    other, for a total sentence of four to eight years of imprisonment followed by ten years of
    probation. No further penalty was imposed on the forty remaining charges of Possession of Child
    Pornography ..
    On June 12, 2015, the defendant filed a Notice of Appeal to the Superior Court. On June
    16, 2015, this Court ordered the defendant to file a Statement of Matters Complained of on
    Appeal pursuant to Pa.R.A.P. 1925(b). On June 25, 2015, the defendant filed a timely Statement.
    On September 15, 2013, Special Agent Duane Tabak of the Pennsylvania Attorney
    General's Office's Child Predator Section conducted an investigation to identify individuals
    possessing and sharing child pornography using the BitTorrent file-sharing network.' On
    September 15, 2013, and again on September 18, 2013, Special Agent Tabak made a direct
    connection to a computer utilizing the IP address 68.82.141.16. This IP address was operating on
    the BitTorrent Network and was making child pornography publicly available for download.
    Special Agent Tabak successfully downloaded two video files depicting children, under the age
    of eighteen years old, engaging in sexual acts. N.T. 3/26/2015 at 45-47.
    On October 24, 2013, Special Agent Tabak obtained a court order directing Comcast to
    release the subscriber information associated with IP address 68.82.141.16 for the dates of
    September 15 and September 18. On October 28, 2013, Special Agent Tabak received
    information pursuant to the order indicating that Wang Chang of743 Watkins Street in
    I
    BitTorrent is a file sharing Network that allows users to download and share files with others via the internet. N.T.
    3/26/2015 at 39.
    2
    Philadelphia was the subscriber to that IP address. On December 16, 2013, Special Agent Tabak
    prepared a search warrant for 743 Watkins Street. N.T. 3/26/2015 at 52-53, 56, 58-59.
    On December 16, 2013, Agent Kurt Smith, the Philadelphia Regional Supervisor from
    the Attorney General's Office's Child Predator Section, executed the search warrant on 743
    Watkins Street. Agent Smith spoke with the defendant who confirmed that he and his brother,
    Justin McNulty, lived at 743 Watkins Street.2 During the search of the residence, Agent Daniel
    Block testified to overhearing the defendant tell his brother the following statements: "I've
    downloaded some extreme stuff, but I always thought they were adults;" "No matter what,
    they're going to find something illegal;" "This is horrible shit. They got all my hard drives. How
    am I going to show my face around my kids now;" "I didn't get to say good-bye to my kids and
    my ass is getting locked up;" and "They are ta1cing my IBM. Fuck." N.T. 3/26/2015 at 85-86,
    107-08.
    Law enforcement recovered seventy-five computer related items from the McNulty
    residence including multiple computers, loose hard drives, and other media storage devices. Law
    enforcement also seized a photo ID, a vehicle title, and other paperwork belonging to the
    defendant on the computer desk in the first-floor dining room. 3 There was no documentation
    pertaining to Justin McNulty in the vicinity of the computers. From what Agent Smith believed
    to be Justin McNulty's room, agents recovered a Comcast bill dated September 12, 2013, that
    was addressed to Wang Chang. From what Agent Smith believed to be the defendant's bedroom,
    agents recovered one Apple computer, one Apple Mac computer tower and one external storage
    device. When Agent Smith informed the defendant that the search was related to child
    2
    Agent Smith later confirmed the defendant and Justin McNulty's addresses through Pa. Justice Network. N.T.
    3/26/2015 at 87.
    3
    The computers were found in the first-floor main room which combined both the living room and dining room.
    N.T. 3/26/2015 at 93-94.
    3
    pornography, the defendant responded, "people get twenty years for downloading." N.T.
    3/26/2015 at 61, 92, 96-97, 101.
    On November 24, 2014, Agent Braden Cook of the Attorney General's Forensic Unit
    examined the items seized from the defendant's residence. According to Agent Cook, nine items
    contained child pornography. An examination of an eMachines computer tower confiscated from
    the dining room of the McNulty residence revealed a user profile marked "JAMES." Under this
    user profile, Agent Cook discovered three child pornography videos and eighty-six Torrent files,
    indicative of child pornography, that were downloaded on January 31, 2011, and stored under the
    folder marked "Vuze."4 N.T. 3/26/2015 at 124, 134-35, 137.
    From an Apple Mac Minicomputer, seized from the dining room, Agent Cook recovered
    508 child pornography images under the user profile marked "FirstLast." Also under this user
    profile, Agent Cook discovered four business documents belonging to the defendant including: a
    rejection letter from the Patent and Trademark Office addressed to the defendant and dated May
    14, 2013; a letter addressed to Mr. Kurt Hughes from the defendant; an amendment name change
    document; and articles of amendment for "Holoco Incorporated," listing the defendant as
    Chairman and sole director. There was no relevant information discovered under the user profiles
    marked "GateVistaJames" and "VaioPrintJames." N.T. 3/26/2015 at 165-67.
    Agent Cook examined a Compaq Presario C500 laptop computer, also confiscated from
    the dining room. There were two non-default user profiles associated with this laptop computer,
    one marked "JAMES" and the other marked "JUSTIN." Agent Cook retrieved twenty-four link
    files that were indicative of child pornography stored under the user profile "JAMES." Agent
    4
    Vuze is a file-sharing program accessible on the BitTorrent network that allows users to share electronic files. N.T.
    3/26/2015 at 38.
    4
    Cook did not discover any child pornography stored under the user profile "JUSTIN." N.T.
    3/26/2015 at 168-69.
    An examination of an Apple Power Mac G5 computer tower that agents seized from the
    defendant's bedroom revealed a user profile marked "JAMES." Under this user profile, Agent
    Cook discovered a Vuze file-sharing program and 843 child pornographic pictures that were
    downloaded on August 3, 2009. N.T. 3/26/2015 at 140-41.
    Agent Cook examined an Apple iMac computer, also recovered from the defendant's
    bedroom, which revealed one child pornographic picture downloaded on January 12, 2012, and
    stored under a non-default user profile marked "USER." Elsewhere on this computer, Agent
    Cook discovered the two videos that Special Agent Tabak successfully downloaded on
    September 15, 2013 and September 18, 2013. Special Agent Tabak determined that both videos
    were searched and downloaded on September 14, 2013, and further determined that both videos
    were viewed on this computer. In an attempt to identify the user of this profile, Agent Cook
    examined other files located on this computer and found a video of the defendant with the file
    name "MelnCoat" and a picture of the defendant with the file name "FacePic." N.T. 3/26/2015 at
    152, 154, 161-164.
    On December 16, 2013, law enforcement issued an arrest warrant for the defendant. On
    January 7, 2014, the defendant surrendered. N.T. 3/26/2015 at 98-99.
    Justin McNulty, the defendant's brother, testified on the defendant's behalf that Justin
    McNulty operated a computer repair business in his home. Justin McNulty recalled working on
    four customers' computers on December 16, 2013, and indicated that most of the computers
    confiscated from the first floor belonged to his customers. According to Justin McNulty, his
    employee, James Smith, who had been installing operating systems on the customers' computers
    5
    since 2002, was responsible for putting "JAMES" as the primary default account on these
    computers. Justin McNulty testified that the defendant carried his own laptop around with him
    and had used a separate Wi-Fi system from Clear Channel since 2005. Justin McNulty and his
    neighbor Wang Chang agreed to put the cable Wi-Fi service from Comcast in Wang Chang's
    name, creating an open network for both parties to use. N.T. 3/26/2015 at 182, 185-87, 198, 202.
    Justin McNulty also presented alibi evidence that he picked up the defendant on Tuesday,
    September 10, 2013, from his probation meeting and transported him to Kelly Baran's residence
    in New Jersey. He believed the defendant remained in New Jersey until Friday, September 13,
    2013, at which time he picked up the defendant and drove him to his residence at 743 Watkins
    Street in Philadelphia, where the defendant remained for the weekend. Justin McNulty then
    drove the defendant back to New Jersey on Sunday, September 15, 2013, where the defendant
    remained until September 20, 2013. N.T. 3/26/2015 at 205-06.
    Kelly Baran, the mother of the defendant's children, testified on behalf of the defense.
    Baran testified that in September of 2013, the defendant would stay with her at her home located
    in National Park, New Jersey and with his brother in Philadelphia. Baran stated that the
    defendant was in New Jersey the week before his daughter's birthday on September 20, 2013,
    and departed the night of September 20, 2013. N.T. 3/26/2015 at254-55, 257, 259.
    The defendant testified to being in New Jersey on the 15 and 18 of September, 2013. The
    defendant admitted to using the computers agents confiscated from 7 4 3 Watkins Street, but
    specified that he worked primarily on a computer that he kept in his possession. The defendant
    denied downloading any child pornography on any computers and stated that he never set up the
    user profile "JAMES." N.T. 3/26/2015 at 224-25, 229-30, 237, 240.
    6
    The defendant claims that the evidence was insufficient to support his convictions
    because the Commonwealth failed to establish the defendant knowingly disseminated or
    possessed computer depictions of children engaging in a prohibited sexual act or that the
    defendant knowingly controlled child pornography.
    Evidence presented at trial is sufficient when, viewed in the light most favorable to the
    Commonwealth as the verdict winner, the evidence and all reasonable inferences derived
    therefrom are sufficient to establish all elements of the offense beyond a reasonable doubt.
    Commonwealthv. Baumhammers, 
    960 A.2d 59
    , 68 (Pa. 2008). The Commonwealth may sustain
    its burden of proving every element of the crime beyond a reasonable doubt by means of wholly
    circumstantial evidence: Commonwealth v. Estepp, 
    17 A.3d 939
    , 943 (Pa. Super. 2011) (citing
    Commonwealth v. Brooks, 
    7 A.3d 852
    , 856-57 (Pa. Super. 2010)). The fact-finder is free to
    believe all, part, or none of the evidence, and credibility determination rest solely within the
    purview of the fact-finder. Commonwealth v. Treiber, 
    874 A.2d 26
    , 30 (Pa. 2005).
    The defendant claims that the evidence is insufficient to prove he controlled child
    pornography. 18 Pa.C.S. § 6312(d) establishes that a person is guilty of Sexual Abuse of
    Children if:
    Any person intentionally views or knowingly possesses or controls
    any book, magazine, pamphlet, slide, photograph, film, videotape,
    computer depiction or other material depicting a child under the
    age of 18 years engaging in a prohibited sexual act or in the
    simulation of such act.
    Commonwealth. v. Diodoro, 
    970 A.2d 1100
    , 1107 (Pa. 2009). The Commonwealth need not
    establish that an individual controlled the child pornography to prove a violation of the statute if
    it can prove that a defendant knowingly possessed the child pornography. 
    Id. at 1107.
    7
    Possession can be proven by showing actual possession or by showing constructive
    possession. Commonwealth v. Thompson, 
    93 A.3d 478
    , 490 (Pa. Super. 2014). Courts have
    defined constructive possession as "the ability to exercise a conscious dominion over the
    material; the power of control and the intent to exercise that control." Commonwealth v. Hanson,
    
    82 A.3d 1023
    , 1035 (Pa. 2013).
    Constructive possession can be proven by circumstantial evidence and the requisite
    knowledge and intent may be inferred from examination of the totality of the circumstances.
    Commonwealth v. Parker, 
    847 A.2d 745
    , 750 (Pa. Super. 2004). For example, in Commonwealth
    v. Davidson, the Superior court held that the evidence was sufficient to establish that defendant
    knowingly possessed images of child pornography that were found on his computer. The
    Commonwealth presented evidence that the defendant was the owner and administrator of the
    computer and each of the twenty-eight pornographic photographs appeared in more than one
    place on the defendant's computer. Commonwealth v. Davidson, 
    860 A.2d 575
    , 581 (Pa. Super.
    2004) aff'd, 
    938 A.2d 198
    (Pa. 2007).
    Similarly, in Commonwealth v. Koehler, the Superior Court held that the evidence was
    sufficient to support the defendant's convictions of Sexual Abuse of Children and Possession of
    Child Pornography. There, the evidence consisted of a screen name and a systems properties
    name all referring in some respects to the defendant's proper name. The evidence also
    demonstrated that the defendant had ownership, use, and the ability to access the computer and
    the child pornography. Based on the totality of the circumstances, the court reasonably inferred
    that the defendant was the person who possessed the child pornography. Commonwealth v.
    Koehler, 
    914 A.2d 427
    , 437 (Pa. Super. 2006).
    8
    Other factors utilized by courts to determine whether a defendant possessed child
    pornography include: the defendant's ability to retain, download, save or print the image, the
    defendant's assertive steps that led to the downloading of child pornography images, and the
    defendant's knowledge of the existence of the images of child pornography. 
    Diodoro, 970 A.2d at 1107
    (holding that the evidence was sufficient to find the defendant guilty of Possession of
    Child Pornography where the defendant had 340 images of child pornography images stored on
    his hard drive.)
    In the instant case, the evidence establishes that the defendant knowingly possessed the
    child pornography discovered on the computers confiscated from 743 Watkins Street. The
    defendant resided at 743 Watkins Street and confirmed that he and his brother were the only
    occupants of the residence. N.T. 3/26/2015 at 87. Agent Smith conducted a search on the
    Pennsylvania Justice Network ("JNET") which verified that Justin and James McNulty were the
    residents of 743 Watkins Street. 
    Id. In addition,
    agents recovered mailing and personal
    documents addressed to the defendant from the computer desk located in the dining room
    identifying his address as 743 Watkins Street. 
    Id. at 95-96.
    Such facts are sufficient to prove the
    defendant had control over the entire premises, including the areas where the computers
    containing child pornography were located.
    The pornographic files Agent Cook discovered on the seized computers provided further
    support that the defendant had control and access to the child pornography. From the eMachines
    computer tower, the Apple Mac Minicomputer and the Compaq Presario laptop computer, all
    seized from the dining room, Agent Cook collectively retrieved four personal documents
    belonging to the defendant, 508 child pornography images, three child pornographic videos, and
    100 link files indicative of child pornography. N.T. 3/26/2015 at 134, 137-38, 166, 168. From the
    9
    Apple Power Mac GS computer tower and Apple iMac computer, both confiscated from the
    defendant's bedroom, Agent Cook collectively discovered a video of the defendant named
    "MelnCoat," a photograph of the defendant named "FacePic," 844 pornographic images, and
    two video files indicative of child pornography. 
    Id. at 140,
    152, 163.
    956 out of the 1,466 child pornography files found by Agent Cook were stored under
    folders or user names marked "JAMES." No pornographic material was found under the user
    profile marked "JUSTIN" N.T. 3/26/2015 at 169. For the 510 child pornography files stored
    under generic user profiles, Agent Cook discovered items that identified the defendant as the
    user of these computers. On the Apple iMac computer seized from the defendant's bedroom,
    Agent Cook discovered a video of the defendant with the file name "MelnCoat," and a picture of
    the defendant with the file name "FacePic." 
    Id. at 163.
    On the Apple Mac minicomputer
    confiscated from the dining room, Agent Cook discovered four business documents belonging to
    the defendant. This evidence provides indicia of the defendant's control and ownership of the
    child pornography. 
    Id. at 166.
    Additionally, the evidence established that the defendant had the intent to exercise
    control over the child pornography. Intent to exercise control over material may be established
    by knowledge of its presence. Commonwealth v. Bricker, 
    882 A.2d 1008
    , 1016 (Pa. Super.
    2005). According to both Agent Smith and Agent Block, the defendant admitted: (1) "They got
    all my hard drives ... "; (2) "I've downloaded some extreme stuff, but I always thought they
    were adults"; and (3) "People get twenty years for downloading." N.T. 3/26/2015 at 89, 107-08.
    The defendant's comments provide evidence that the computer hard drives belonged to him and
    that he knew the computers contained illegal content. In reviewing the totality of the
    10
    circumstance, the evidence establishes that the defendant knowingly possessed material
    depicting children engaging in prohibited sexual acts.
    Next, the defendant claims that evidence was insufficient to show that he possessed child
    pornography for the purpose of dissemination. To be convicted under 18 Pa.C.S. § 6312(c), the
    Commonwealth must prove beyond a reasonable doubt, that: (1) there was a depiction of an
    actual child engaged in a prohibited sexual act or simulation of such act; (2) the child must be
    under the age of 18; and (3) defendant knowingly sold, distributed delivered, disseminated,
    transferred, displayed or exhibited the depiction to others, or possessed the depiction for the
    purpose of sale, distribution, delivery, dissemination, transfer, display or exhibition to others.
    Commonwealth. v. McCue, 
    487 A.2d 880
    , 883 (Pa. Super. 1985). The meaning of "disseminate"
    includes the act of spreading, sending, fostering general knowledge of, broadcasting, or
    publicizing. Commonwealth v. Hacker, 
    959 A.2d 380
    , 389 (Pa. Super. 2008) rev'd on other
    grounds, 
    15 A.3d 333
    (Pa. 2011).
    As 
    discussed supra
    , the evidence sufficiently established the defendant knowingly
    possessed the pornographic files. The evidence also establishes that the defendant knowingly
    disseminated depictions of child pornography. On the 15 and 18 of September, 2013, Special
    Agent Tabak downloaded two child pornography files from an individual using a Vuze file-
    sharing program to offer child pornography on the BitTorrent Network. N.T. 3/26/2015 at 45-47.
    Special Agent Tabak determined that the individual offering the pornography utilized an IP
    address associated with the defendant's residence. Id at 159.
    An examination of an Apple iMac computer confiscated from the defendant's bedroom
    indicated that this computer was used to download the two video files Special Agent Tabak
    copied on the 15 and 18 of September, 2013. According to Agent Cook, these video files were
    11
    searched for, downloaded, and viewed on this Apple iMac computer on September 14, 2013,
    using a Vuze file-sharing program. 
    Id. at 159,
    160, 162.
    The defendant admitted to using the computers located at 743 Watkins Street, and further
    admitted to using a Vuze file-sharing program. N.T. 3/26/2015 at 232. This Court concluded that
    the defendant, who had two personal files stored on the same Apple iMac computer that also
    contained the two child pornography videos Special Agent Tabak downloaded on September 15
    and 18, 2013, was the user of the computer and the individual who offered the file for public
    download on the BitTorrent Network. Therefore, the evidence is sufficient to establish the
    defendant disseminated child pornography using a Vuze file-sharing program.
    For the foregoing reasons, defendant's judgment of sentence should be affirmed.
    BY THE COURT,
    Barbara A. McDermott, J.
    12
    Commonwealth       v. James McNulty, CP-Sl-CR-0003422-2014
    PROOF OF SERVICE
    I hereby certify that I am this day serving the foregoing filing upon the person(s), and in the
    manner indicated below, which service satisfies the requirements of Pa. R. Crim. P. 114:
    Philadelphia District Attorney's Office
    Three South Penn Square
    Philadelphia, PA 19107
    Attn: Hugh Burns, Esquire
    Type of Service:             Hand Delivery
    John McMahon, Esquire
    13 9 N. Croskey Street
    Philadelphia, PA 19103
    Type of Service:             Certified Mail
    Dated: August 7, 2015
    Amifj)---
    Law Clerk to the
    Honorable Barbara A. McDermott