-
J-S17016-21 NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P. 65.37 COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF : PENNSYLVANIA v. : : BRIAN HOPERSBERGER : : Appellant : No. 1027 MDA 2020 Appeal from the Judgment of Sentence Entered May 11, 2020, in the Court of Common Pleas of Luzerne County, Criminal Division at No(s): CP-40-CR-0004572-2015. BEFORE: STABILE, J., KUNSELMAN, J., and PELLEGRINI, J.* MEMORANDUM BY KUNSELMAN, J.: FILED: OCTOBER 8, 2021 Brian Hopersberger appeals from the judgment of sentence of 20 to 40 years’ incarceration. A jury convicted him of possessing over 100 digital files of child pornography, distributing three of those files to police, and using his home computer to do so.1 We affirm. On July 11, 2015, through law-enforcement-specific, BitTorrent software,2 investigators identified child pornography being made publicly available from someone’s Internet-ready device. Officers identified a specific IP address as the source of this child pornography. The investigators ____________________________________________ * Retired Senior Judge assigned to the Superior Court. 1 See 18 Pa.C.S.A. §§ 6312(c), 6312(d), and 7512(a). 2 This software is a peer-to-peer, file-sharing program that exchanges digital data between users across the globe. Unlike public, BitTorrent programs, which download piecemeal data from various users simultaneously, the law- enforcement-specific, BitTorrent program downloads entire files from one computer at a time. J-S17016-21 downloaded three videos of child pornography from the target IP address: hence, the three counts of dissemination. A few weeks later, in furtherance of their investigation, officers executed a search warrant for Hopersberger’s Luzerne County home. He was not there at the time, but his brother, Philip Hopersberger, was. Philip informed the officers that he lived with Hopersberger, they had separate bedrooms, the computer in Hopersberger’s bedroom belonged to Hopersberger, and he (i.e., Philip) “doesn’t even know how to use a computer.” N.T., 2/12,20, at 191. The lead investigator believed Philip and eliminated him as suspect. See id. Within Hopersberger’s bedroom, police found a computer wired directly to the modem. They also discovered a thumb drive on the desk next to the computer tower. The agents seized the tower and thumb drive. The preliminary evaluation of the computer tower located 116 thumbnail images of child pornography under the computer’s username “John.” Id. at 49, 55. “John” was the only username on the computer. The examination also located a tax document listed as Brian D. Hopersberger in the same folder as some of the pornography. The computer had the BitLord, peer-to-peer, file-sharing program, with an installation date of December 14, 2014. Id. at 49. This software was compatible with the BitTorrent software that law enforcement had previously used to download the three videos of child pornography. Evaluation of the computer’s “recycle bin” disclosed a folder listed “LS” which contained 15 movies of child pornography. These files had been moved -2- J-S17016-21 to the recycle bin on May 16, 2015. Furthermore, the investigation revealed 110 thumbnails of child pornography, of which 106 were notably “child erotica.” Id. at 145-47. Significantly, a computer-forensic expert also evaluated the computer’s Internet activity and observed a history reflecting the use of the BitTorrent website and BitTorrent files indicative of child pornography. The expert explained that the user of the computer had searched on various days of the week, at all hours of the day, and that the searches used child-pornography terms. One of the terms, “Cbaby,” stood out, because it was in the name of one of the files the police downloaded on July 11, 2015. Id. at 162-63. The expert’s analysis also demonstrated that only Hopersberger had ever used the computer for e-mails and Facebook from July through August of 2015. Id. at 165-66. The username “BrianHops71@gmail” was used, which listed a phone number and address and an access time of June 2, 2015. Id. at 166. The address associated with that account was Hopersberger’s residence. Based upon all of the foregoing and other evidence of record, the expert opined as follows: [G]oing through the Internet analysis, I didn’t see evidence of anyone else, besides [Hopersberger using the computer], and I noted prolonged use of [his] e-mail account and his Facebook account . . . there was prolonged searches of child pornography over the course of months, days, and weeks at various times. There was nothing that would have indicated that anyone else had been using this computer system. -3- J-S17016-21 Furthermore, based on the location of this computer, which was in Brian Hopersberger’s room, plugged into the wall, if someone else were to have been using this computer system, they would have had to have been in his room at various times, various days, weeks, and months. It’s just not reasonable. Id. at 168-69. Crediting the expert and the rest of the Commonwealth’s evidence, the jury convicted Hopersberger on all counts, and the trial court sentenced him as described above. This timely appeal followed. Hopersberger raises one appellate issue: “Did the Commonwealth fail to establish, beyond a reasonable doubt, that [he] disseminate, downloaded, and/or possessed child pornography in violation of [the relevant statutes]?” Hopersberger’s Brief at 4. In Hopersberger’s view, the Commonwealth failed to identify him as the individual who possessed and distributed child pornography from his bedroom computer. He offers various contentions in an attempt to undermine the Commonwealth’s evidence, predominately based on his testimony during the defense’s case-in-chief. See id. at 17 (Hopersberger indicating that (1) the name on the IP address and the phone number was similar to and/or associated with his son; (2) that his son moved out in the winter of 2015; and (3) that he resided in the home, not only with Philip, but also with Diane Krasinksi and, for a time, his son, also named Brian Hopersberger). However, by relying upon his own, self-serving testimony, Hopersberger ignores our scope of review for this issue. For a sufficiency-of-the-evidence -4- J-S17016-21 claim, “our standard of review is de novo; however, our scope of review is limited to considering the evidence of record, and all reasonable inferences arising therefrom, viewed in the light most favorable to the Commonwealth as the verdict winner.” Commonwealth v. Rushing,
99 A.3d 416, 420–21 (Pa. 2014). Hopersberger would have us credit only his testimony and view it in in the light most favorable to himself. This we may not do. See
id.Instead, as Hopersberger conceded, the jury, “while passing upon the credibility of witnesses and the weight of the evidence produced, is free to believe all, part, or none of the evidence.” Hopersberger’s Brief at 14 (quoting Commonwealth v. Gooding,
818 A.2d 546, 549 (Pa. Super. 2003)). Here, the jury refused to credit Hopersberger’s rendition of events. Thus, neither he nor this Court may rely upon his testimony to challenge the sufficiency of the Commonwealth’s case-in-chief. Turning to the evidence therein, we find sufficient proof to sustain the 110 crimes for which Hopersberger stands convicted. First, in Pennsylvania, it is a crime when someone “knowingly . . . distributes . . . to others, any . . . computer depiction . . . depicting a child under the age of 18 years engaging in a prohibited sexual act or in the simulation of such act.” 18 Pa.C.S.A. § 6312(c). It is also a crime if one “intentionally views or knowingly possesses or controls any . . . photograph, film, videotape, computer depiction . . . depicting a child under the age of 18 years engaging in a prohibited sexual act or in the simulation of such act . . . .” 18 Pa.C.S.A. § 6312(d). -5- J-S17016-21 Additionally, a person may not use “a communication facility to commit . . . any crime which constitutes a felony under this title.” 18 Pa.C.S.A. § 7512(a). A “communication facility” is an “instrumentality used or useful in the transmission of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted, in whole or in part, including, but not limited to, telephone, wire, radio, electromagnetic, photoelectronic, or photo- optical systems or the mail.” 18 Pa.C.S.A. § 7512(c). Thus, an Internet-ready device, such as Hopersberger’s home computer, is a “communication facility.” Limiting our review, as we must, to the evidence most favorable to the Commonwealth, we accept that the 100+ digital files at bar were child pornography, and they were on the computer and/or in the jump drive recovered from Hopersberger’s bedroom. The forensic-computer expert reviewed the metadata from those seized devices and pinpointed file creation times and Internet searches for child pornography. These occurred continuously during Hopersberger’s nearly year-long ownership of the computer; they occurred at all hours of the day and night, on weekdays and weekends. As noted above, the expert testified that “based on the location of this computer, which was in Brian Hopersberger’s room, plugged into the wall, if someone else were to have been using this computer system, they would have had to have been in his room at various times, various days, weeks, and months.” N.T., 2/12/20, at 168-69. Thus, the expert anticipated Hopersberger’s alibi --that someone snuck into his bedroom, and that person -6- J-S17016-21 repeatedly downloaded, viewed, and disseminated child pornography on and from Hopersberger’s desktop computer and on his jump drive, without his knowledge. The expert dismissed this alibi as unreasonable. This expert opinion, which the jury could accept at face value, was, alone, sufficient evidence to conclude that Hopersberger knew exactly what materials were on his computer and jump drive, because he put them there. Indeed, it would strain credulity to think that anyone other than Hopersberger would have the around-the-clock, unlimited access to the computer and jump drive in Hopersberger’s bedroom. The random dates and times at which the user accessed child pornography on the bedroom computer and the repetitiveness of that access are strong circumstantial evidence leading to the reasonable inference that Hopersberger, in fact, was the person who knowingly downloaded, viewed, and disseminated more than 100 files of child pornography. All remaining arguments to the contrary in Hopersberger’s Brief, which we need not reiterate here, go to the weight of the Commonwealth’s evidence, not to its sufficiency. See Hopersberger’s Brief at 17-19. “We will not now weigh the evidence and substitute our judgment for that of the jury.” Commonwealth v. Blystone,
617 A.2d 778, 780 (Pa. Super. 1992). It was the jury’s prerogative to resolve the weight of the evidence. The jury did so in favor of the Commonwealth. Judgment of sentence affirmed. -7- J-S17016-21 Judgment Entered. Joseph D. Seletyn, Esq. Prothonotary Date: 10/08/2021 -8-
Document Info
Docket Number: 1027 MDA 2020
Judges: Kunselman
Filed Date: 10/8/2021
Precedential Status: Non-Precedential
Modified Date: 11/21/2024