-
Opinion issued December 6, 2018 In The Court of Appeals For The First District of Texas ———————————— NO. 01-17-00920-CR NO. 01-17-00921-CR NO. 01-17-00922-CR ——————————— JAMES DOYLE COLLINS, JR., Appellant V. THE STATE OF TEXAS, Appellee On Appeal from the 300th District Court Brazoria County, Texas Trial Court Case Nos. 76666-CR, 76667-CR, 76668-CR MEMORANDUM OPINION A jury found appellant, James Doyle Collins, Jr., guilty of three separate offenses of possession of child pornography1 and assessed his punishment at confinement for five years and a fine of $10,000, confinement for five years and a fine of $10,000, and confinement for ten years and a fine of $10,000, to run concurrently. It then recommended that his ten-year prison sentence be suspended and he be placed on community supervision. The trial court, in accordance with the jury’s recommendation, suspended appellant’s ten-year prison sentence and placed him on community supervision for a period of ten years. In two issues, appellant contends that the evidence is legally insufficient to support his convictions and the trial court erred in denying his motion to suppress his statement. We affirm. Background Pearland Police Department (“PPD”) Detective C. Arnold, a certified cyber-crimes investigator with the Houston Metro Internet Crimes Against Children Task Force (“ICACTF”), testified that he, through the use of computers in his office, monitors certain file-sharing networks that “exist on the internet” in order to 1 See TEX. PENAL CODE ANN. § 43.26(a) (Vernon 2016); appellate cause no. 01-17-00920-CR; trial court cause no. 76666-CR (Offense I); appellate cause no. 01-17-00921-CR; trial court cause no. 76667-CR (Offense II); appellate cause no. 01-17-00922-CR; trial court cause no. 76668-CR (Offense III). 2 investigate the “distribution and receipt of child pornography.”2 Arnold receives “a notification when someone [using a file-sharing network] uploads or downloads a [known] child pornograph[y]” image or video, and upon receiving a notification, he views the image or video to determine whether it constitutes child pornography.3 Arnold then obtains the location of the person using the file-sharing network based on the IP address assigned to that person. 2 Peer-to-peer file sharing is a popular means of obtaining and sharing files free of charge directly from other computer users who are connected to the [i]nternet and who are also using peer-to-peer file[-]sharing software. . . . Once peer-to-peer file[-]sharing software has been downloaded and installed [on a computer] by the user, the user may interface directly with other computers using the same filing[-]sharing software and browse and obtain files that have been made available for sharing. . . . File sharing occurs when one computer, identified by an Internet Protocol (“IP”) address, initiates a search for a responsive file by indicating the term or terms that it seeks to find in the file’s name. This is called a ‘query’ and consists of key words such as ‘child,’ ‘pornography,’ or ‘child pornography.’ . . . Other computers that are using the same file[-]sharing software and connected to the [i]nternet at the time will respond to the query with a ‘query hit message.’ A query hit message identifies the file or files available for sharing which have a word in the file name that matches the search word in the query. . . . After a query hit message is received, the computer user requesting the file must affirmatively select it for download, generally by double clicking on the file’s name. U.S. v. Thomas, Nos. 5:12-cr-37, 5:12-cr-44, 5:12-cr-97,
2013 WL 6000484, at *2– 3 (D. Vt. Nov. 8, 2013) (order). Detective Arnold explained that twenty-six file-sharing networks exist, including “ARES, Limewire, [and] BearWare.” 3 The “alert” that Detective Arnold receives essentially tells him that in the “geographic area that [he is] monitoring,” a particular IP address has “downloaded or uploaded [a certain child-pornography] video[] and picture[].” 3 In regard to appellant, Detective Arnold testified that on March 6, 2015, his computer “made a direct connection and download [of a known child-pornography video] from an IP address in Pearland, [Texas].” When Arnold viewed the video, he determined that it constituted child pornography. At the time, Arnold did not know the identity of appellant, but based on the IP address associated with the downloaded-child-pornography video, he obtained appellant’s physical address. Arnold drove to appellant’s residence in Pearland, Brazoria County, Texas, and determined that he had a secure internet connection.4 Arnold then obtained a search warrant for appellant’s residence.5 On May 12, 2015, Detective Arnold, along with Homeland Security Special Agents D. Lewis and L. Erickson, PPD Detectives D. Vlasek and J. Cox, and two uniformed PPD patrol officers, served a search warrant on appellant at his residence. Upon arriving at appellant’s home, Arnold, along with the other law enforcement officers, “clear[ed] the house” and identified the individuals that were present. 4 Detective Arnold explained that with an “open internet connection . . . someone can [park] in front of your house” and “us[e] your [W]ifi signal [to] access the internet.” However, with a secure internet connection, “no one can . . . use your internet connection without [knowing] your password.” This is important because if another person can “log into your wireless [internet] signal,” then “it would show your IP address and what they[, and not you, were] doing” on their computer. 5 The trial court admitted into evidence Detective Arnold’s affidavit and the search warrant. 4 Arnold and Lewis then interviewed appellant, while Vlasek and Cox “examine[d] and process[ed] all of the electronic[] [devices]” found in appellant’s home.6 Detective Arnold noted that when he and Agent Lewis spoke to appellant, he was not in custody, was free to leave, and was not placed in handcuffs or in any type of restraints. Despite the fact that appellant was not in custody, Arnold informed him of his legal rights, and appellant waived them, agreeing to speak. Arnold did not coerce appellant, threaten him, or make any promises to him. And he recorded the interview with appellant.7 During his interview, which lasted approximately forty-five minutes, appellant stated that he was the only person living in his home and he had downloaded and used, on his electronic devices, certain file-sharing networks,8 6 Detective Arnold explained that Detectives Vlasek and Cox used a “forensic recovery program” to “look[] for obvious signs of child pornography” on appellant’s electronic devices. The other law enforcement officers present at appellant’s home “split up doing searches in each of the rooms [in the house], looking for items that [might have] contain[ed]” child pornography. 7 The trial court admitted into evidence State’s Exhibit 2, appellant’s audio-recorded interview with Detective Arnold and Agent Lewis. 8 Detective Arnold explained that a file-sharing network “doesn’t do anything on its own.” A person “ha[s] to tell it what [to] look[] for,” “ha[s] to tell it to download files,” and “ha[s] to manually open files and view them.” And a file-sharing network does not appear on a person’s computer unless he specifically “download[s] it.” 5 including “ARES,”9 “BearShare and Bear,”10 and “Limewire.”11 When Arnold questioned appellant about certain terms that appellant may have used while searching the file-sharing networks, including the search terms “Vicky”12 and “PTHC,”13 appellant admitted that he had in fact viewed child pornography “out of 9 See Ferguson v. State, Nos. 09-15-00342-CR to 09-15-00345-CR,
2016 WL 4247956, at *1 (Tex. App.—Beaumont Aug. 10, 2016, pet. ref’d) (mem. op., not designated for publication) (defendant used “ARES file[-]sharing network” to download child pornography). Appellant admitted to using the “ARES” file-sharing network in 2015. 10 See Wiand v. United States, Nos. 3:10-CV-1420-M, 3:07-CR-352-M,
2012 WL 1033623, at *1 (N.D. Tex. Jan. 17, 2012) (defendant “admitted he acquired . . . child pornography using a file-sharing program called Bearshare”). 11 See Lubojasky v. State, No. 03-10-00780-CR,
2012 WL 5192919, at *16 n.14 (Tex. App.—Austin Oct. 19, 2012, pet. ref’d) (mem. op., not designated for publication) (“LimeWire is peer-to-peer file[-]sharing software that . . . is often used to download images and videos of child pornography.”). 12 Detective Arnold explained that “Vicky is a common series in child pornography that a lot of people that are seeking child pornography want to get. It [is] a video series . . . [of] a[] 4-year old child[,] whose name is Vicky[,] up to about the age of 11. There are many, many videos over that time period that were made by her stepfather as he was sexually abusing her.” See Gasper v. State, Nos. 01-16-00930-CR, 01-16-00931-CR, 01-16-00932-CR,
2017 WL 4249558, at *4 n.17 (Tex. App.—Houston [1st Dist.] Sept. 26, 2017, no pet.) (mem. op., not designated for publication) (“‘Vicki’ is ‘a series of a child’ and a ‘common search term[]’ for child pornography[.]”); Hicks v. State, Nos. 07-12-00256-CR to 07-12-00276-CR,
2013 WL 4711223, at *2 (Tex. App.—Amarillo Aug. 28, 2013, no pet.) (mem. op., not designated for publication) (noting “the ‘Vicky’ series . . . [is a] series [that is] readily recognized by those who investigate child[-]pornography cases”). 13 Detective Arnold noted that “PTHC is an acronym [that] stands for Pre[-]Teen Hard Core. It’s another common search term that people will use on a file[-]sharing network when looking for child pornography.” See Gasper,
2017 WL 4249558, at *3 n.8 (“‘PTHC’ is a ‘common search term[]’ for child pornography and stands for ‘preteen hard core[.]’”). 6 curiosity” and he had searched for “Vicky,” “PTHC,” and “Baby J”14 when looking for pornography on file-sharing networks. (Internal quotations omitted.) When appellant had searched for “Vicky” on a file-sharing network, “[a] whole bunch of porn showed up.” (Internal quotations omitted.) And when Arnold asked appellant if he had ever searched for a particular age while looking for pornography, appellant stated that he had searched for “12.” (Internal quotations omitted). According to Arnold, appellant had downloaded twenty-five child-pornography images and videos over a four-month period from December 2014 until March 2015. Appellant stated that he would download a child-pornography image or video “to see if the children were real” and this would then “lead [him] to the next one.” (Internal quotations omitted.) In other words, appellant admitted that he had downloaded, viewed, and continued to search for child pornography. Appellant also stated in his interview that he had deleted the child pornography that he had found. And he had looked for “adult porn” or pornography involving “adult women.” (Internal quotations omitted.) Further, when he had 14 Detective Arnold explained that “Baby J” is a “child porn[ography] series video [involving] a toddler or an infant child, probably 2 to 3 years of age.” (Internal quotations omitted.) Detective Cox testified that “Baby J is a common series of child pornography.” (Internal quotations omitted). See Assousa v. State, No. 05-08-00007-CR,
2009 WL 1416759, at *2 (Tex. App.—Dallas May 21, 2009, pet. ref’d) (mem. op., not designated for publication) (“Baby J series” constituted “known child-porn series[,] involving an infant child.” (internal quotations omitted)). 7 “tr[ied] to download movies,” appellant stated that “suddenly porn would [just] come up.” (Internal quotations omitted.) Appellant also stated that he had not realized that child pornography had actually been downloaded onto his computer. However, appellant admitted to looking at child pornography from 2011–2014. And at the end of his interview, he affirmed that he had “looked at child porn[ography],” explaining that he was “done looking at it” because he was “no longer curious.” (Internal quotations omitted.) Detective Arnold further testified that law enforcement officers found child pornography on more than one electronic device in appellant’s home. In fact, they found over 900 child-pornography images and videos on appellant’s electronic devices and discovered that appellant had been viewing and downloading child pornography over “a four-year period.” Arnold opined that the large volume of child pornography found on appellant’s electronic devices indicated that he had not been accidentally downloading child pornography. One electronic device contained 727 child-pornography images, a second device contained sixteen child-pornography images, and a third device contained 168 child-pornography images. Detective Arnold explained that appellant had also been “distribut[ing] child pornography,” noting that he had shared a child-pornography video with Arnold’s computer. Specifically, on March 6, 2015, appellant had a child-pornography video in his “unique share folder” on the “ARES” file-sharing network, Arnold’s computer 8 “connected to [appellant’s] share folder[,]” and Arnold “got the video from [appellant].” Arnold did concede that he did not know who specifically was using appellant’s computer at the time that the child-pornography video was shared. However, appellant had told Arnold that he lived by himself and “[h]e was the one searching and . . . looking at the[] [child-pornography] videos.” Detective Cox, a computer forensic analyst with the ICACTF, testified that on May 12, 2015, he, along with other law enforcement officers, served a search warrant on appellant at his residence. Cox, as a computer forensic analyst, was responsible, along with Detective Vlasek, for “preview[ing]” or “[t]riag[ing]” any electronic devices found in appellant’s home, including “hard drives, laptops, flash drives, [and] camera cards,” to determine whether they contained “any evidence of child pornography.” “[E]vidence of child pornography” could include file-sharing networks, “child[-]pornography files themselves,” and “link files which would show any . . . files that [had been recently] opened on” a particular electronic device. In regard to the electronic devices found in appellant’s home, Detective Cox noted that, while “preview[ing]” or “[t]riag[ing],” he did not find any actual child-pornography files on appellant’s devices, but he found “link files” with “titles that were consistent with child[-]pornography files.”15 And Cox found file-sharing 15 See U.S. v. Brown, No. 10-20233,
2012 WL 5948085, at *2 (E.D. Mich. Nov. 28, 2012) (order) (in regard to offense of possession of child pornography, noting “the Government presented evidence that someone viewed child pornography on the 9 networks on multiple electronic devices in appellant’s home. Although Cox did not find actual child-pornography files while “[t]riag[ing]” appellant’s electronic devices, he “found evidence that child porn[ography] had been on some of the devices that [he was] look[ing] at.” Cox noted that law enforcement officers seized several electronic devices from appellant’s home so that “full forensic[] [analysis could be] done . . . at a later date by a forensic officer.” Detective Vlasek, a former computer forensic analyst with the ICACTF, testified that on May 12, 2015, he, along with other law enforcement officers, served a search warrant on appellant at his residence. Vlasek and Detective Cox were responsible for “preview[ing]” or “triag[ing]” the contents of the electronic devices found in appellant’s home. And while “preview[ing]” or “triag[ing]” the devices, he found “link files” and “quite a few” of “peer-to-peer [file-sharing] programs.” Vlasek explained that “link files” and “linked to” “[a]nything that [a] user [of an electronic device] has viewed, opened, [or] executed,” and based on the titles of the “link files” found on appellant’s electronic devices, Vlasek determined that they related to child pornography. Vlasek opined that the file-sharing networks and “link files” “indicat[ed] that child pornography exist[ed]” on appellant’s electronic desktop computer by way of a link file found on the . . . computer hard drive”); United States v. Koch, No. 3:08-cr-0105-JAJ,
2009 WL 10697501, at *2–5 (S.D. Iowa July 6, 2009) (order) (considering presence of “[l]ink files relating to child pornography” in determining defendant’s guilt). 10 devices. And law enforcement officers seized electronic devices from appellant’s home that day. Following the seizure of appellant’s electronic devices, Detective Vlasek completed a forensic analysis and found downloaded child pornography on three electronic devices: (1) a “gray desktop computer,” (2) a “Dell desktop” computer, and (3) a “PNY flash drive.” In total, he found “[r]oughly 900” child-pornography images and videos on appellant’s electronic devices. In regard to the “gray desktop computer,” Detective Vlasek testified that it contained 168 downloaded child-pornography images and twenty-five child-pornography videos.16 Vlasek viewed the child-pornography images and videos and confirmed that they did indeed constitute child pornography. The majority of the images and videos found on the “gray desktop computer” were “in the thumbnail database,” which indicated that they had been viewed. Detective Vlasek further noted that he had discovered, on the “gray desktop computer,” the “ARES” file-sharing network. And he determined that the majority of the child-pornography images and videos found on the “gray desktop computer” 16 The trial court admitted into evidence State’s Exhibit 4, a list of 366 child-pornography images and videos found on the “gray desktop computer.” Detective Vlasek explained that some of the child-pornography images and videos appear several times on the list because they had been downloaded several times. State’s Exhibit 4 reveals that the child-pornography images and videos found on the “gray desktop computer” had been downloaded in 2008, 2010, and 2011. 11 had been downloaded using that program. According to Vlasek, although the child-pornography images and videos that he recovered from the “gray desktop computer” had been deleted, the “ARES” file-sharing network had not. Detective Vlasek further explained that he was able to recover the titles of the child-pornography images and videos that had been downloaded on the “gray desktop computer,” which included the following: “Six-year-old Larissa Fucked 124s 1,” “Ten-year-old LS Magazine Issue LSM,”17 “PTHV, Lolifuck, 10-year-old Handjob,” “W18 Lolitas, Folladas”18 “Eight-year-old Real Child Porn Pre[-]Teen Pedo PTHD kiddy incest anal cum,” and “Kid Sex, . . . PTHC, King Pass, hussyfan, Baby J, Jenny, Baby shiv 2.”19 (Internal quotations omitted.) Vlasek also recovered the “search terms” that had been “inputted” into the “ARES” file-sharing network 17 Detective Arnold testified that “LSM” was “an infamous photography studio in Europe that specialized in child pornography.” The studio “would take series of pictures of kids, usually between the ages of 4 years old up to about 15 [years old] in various states of undress.” Arnold opined that “if you’re actually . . . searching for the letters ‘LSM,’ you’re looking for this European company that filmed children involved in sexual conduct.” Detective Cox further explained that “LSM” is “a series of child pornography. See U.S. v. Laub, No. 12-40103-01-JAR,
2014 WL 1400669, at *1 & n.2 (D. Kan. Apr. 10, 2014) (“[L]sm” constitutes “a common label or term present in files or documents containing images of child pornography” (internal quotations omitted)). 18 See Gasper,
2017 WL 4249558, at *3 n.9 (“‘Lolita’ and ‘Loli’ are ‘common search terms’ for child pornography.”). 19 See Solon v. United States, Nos. 2:11-CV-303-CAB, 07-CR-032-CAB,
2013 WL 12321956, at *14 n.10 (D. Wyo. May 24, 2013) (order) (video title containing “Babyshivid,” among other terms, “le[ft] little doubt [that] the content relate[d] to child pornography”). 12 on the “gray desktop computer,” which included the following: “Baby J,” “LSM,” “Kiddie,”20 “Pedo,”21 “Kinderfuck,” “Kiddie Pedo,” “King Pass,”22 “Kiddie Porn,” “Kids,” “[9]YO,”23 and “TPSF.”24 (Internal quotations omitted.) When asked whether he found “those search terms . . . [on] computers seized out of [appellant’s] home,” Vlasek responded, “Yes.” Further, during Detective Vlasek’s testimony, the trial court admitted into evidence State’s Exhibits 6 and 7, certain child-pornography images and videos that were found on the “gray desktop computer” seized from appellant’s home.25 Vlasek noted that these images and videos were indicative of the other child-pornography images that he found on the other electronic devices seized from appellant’s home. 20 See Lubojasky,
2012 WL 5192919, at *16 n.14 (“[K]iddie” constitutes “[a] known child pornography search term[]” (internal quotations omitted)). 21 See
id. (“PEDO” constitutes“[a] known child pornography search term[]” (internal quotations omitted)); Brackens v. State,
312 S.W.3d 831, 834 (Tex. App.—Houston [1st Dist.] 2009, pet. ref’d) (“‘Pedo’ . . . short for pedophile or pedophilia.”). 22 Detective Cox testified that “King Pass” is “a term that [he] find[s] on many child[-]pornography files,” and Detective Arnold explained that “King Pass” is a “term that . . . [is] attached in commonly looked-for child[-]pornography videos.” (Internal quotations omitted.) 23 See Laub,
2014 WL 1400669, at *1 (filename containing “9 yo” referenced age of child and indicative of child pornography (internal quotations omitted)); Solon,
2013 WL 12321956, at *14 n.10 (video title containing “10yo and 9yo lolitas,” among other terms, “le[ft] little doubt [that] the content relate[d] to child pornography” (internal quotations omitted)). 24 The trial court admitted into evidence State’s Exhibit 5, a list of the search terms inputted into the “ARES” file-sharing network on the “gray desktop computer.” 25 Detective Vlasek testified that State’s Exhibit 7 depicted “[a] little girl,” named “Vicky.” 13 In regard to the “Dell desktop” computer, Detective Vlasek testified that it contained sixteen “complete[ly] download[ed]” child-pornography images and the “ARES” file-sharing network, all of which had been deleted. Vlasek recovered the titles of certain images that had been downloaded to the “Dell desktop,” which included the following: “King Pass,” “Old Cousin Fucks Little Cousin, Rare, New divx 2,” “PTHC, valya 10-year, 2 Sound,” “Babyshivid, Five-year old,” “Webcam, 14-year Boy,” and “Way Fuck, PTHC, 3-year mom, dad Fuck.”26 (Internal quotations omitted.) In regard to the “PNY flash drive,” Detective Vlasek explained that it contained 727 downloaded child-pornography images, which had been deleted, and three file-sharing networks, i.e., “ARES,” “Limewire,” and “Vuze.”27 Vlasek viewed the 727 child-pornography images to confirm that they indeed constituted child pornography. The only items on the flash drive were child-pornography images. 26 The trial court also admitted into evidence State’s Exhibit 3, a list of nine titles of child-pornography images found on the “Dell computer.” State’s Exhibit 3 states that these images were downloaded on July 25, 2014. 27 See United States v. Walley, Nos. 8:13-cr-304-T-23AEP, 8:15-cv-344-T-23AEP,
2018 WL 1519047, at *1 (M.D. Fla. Mar. 28, 2010) (order) (defendant admitted to downloading “a couple hundred child[-]pornograph[y] images and a few videos . . . through Vuze, a peer-to-peer [file-sharing] network” (internal quotations omitted)). 14 Detective Vlasek conceded that he did not know who had specifically downloaded the child-pornography images and videos that he found on the electronic devices seized from appellant’s home. Nor could he testify as to who specifically entered in the “search terms” into the file-sharing networks. Further, every child-pornography image or video that he found on appellant’s electronic devices had been “deleted” at some point. However, Detective Vlasek also explained that there were no other persons in appellant’s home when the search warrant was served, he was not aware that anyone else lived in the home with appellant, and appellant was “in possession of” the “gray desktop computer,” the “Dell computer,” and the “PNY flash drive” when the search warrant was served. Further, Vlasek noted that appellant would have seen the title of any file before he “click[ed] the button to download it.” And he opined, based on the filenames, that it would not be surprising that the files would contain child pornography. When Vlasek was asked whether he could “tell . . . that [appellant had] actually looked at any of th[e] child pornography,” Vlasek responded “Yes, actually, I can.”28 In his audio-recorded interview with Detective Arnold and Agent Lewis, admitted into evidence as State’s Exhibit 2, appellant stated that he was the only 28 However, Detective Vlasek noted that he was unable to tell whether the child-pornography image or video had been viewed for “one minute, ten seconds, one second, or an hour.” 15 person living in his home29 and he owned several computers. Specifically, appellant noted that he had a “Dell desktop” computer in the game room/den of his house and a “homemade” desktop computer in his bedroom. He further admitted that he had used certain file-sharing networks, including “Limewire,” “ARES,” and “BearShare.” And he had primarily used the “ARES” file-sharing network on the “Dell desktop” computer. Appellant conceded that he had “come across” child pornography, while using the “ARES” file-sharing network, noting that “sometimes, a whole bunch of stuff [would] just pop[] up” when he would generally search for “porn.” Appellant admitted that he would actually see the titles of the files prior to downloading them from the file-sharing network, and he would have to “click” on a particular image or video in order to download it. Appellant stated that when he saw a child-pornography file on the “ARES” file-sharing network, he would delete it.30 Further, during the interview, when Detective Arnold told appellant that he had a child-pornography video in his share folder on the “ARES” file-sharing network, appellant stated that it would have been “caught up in some other stuff” that he had downloaded. And although appellant stated that he would “delete” any child-pornography that appeared on the “ARES” file-sharing network, he also stated 29 Appellant noted that his two sons had previously lived with him, but they were now married and living elsewhere. One son lives in Florida. 30 Appellant stated that he used the “ARES” file-sharing network between December 2014 and March 2015. 16 that he would delete it after he had “seen . . . what it was.” Further, appellant admitted to “looking” for child pornography because he was curious about it. And he confirmed that he had searched for “porn,” “PTHC,” “Vicky,” and the age of “12.” According to appellant, when he had searched for “Vicky,” “a whole bunch of” pornography involving “younger girls” appeared. And he searched for the age of “12” to see if there was pornography involving “underage girls.” Appellant also stated that “a lot” of the files that he saw said “young women,” which he thought meant women who were nineteen or twenty years old. But, he also recalled seeing child-pornography images or videos involving ten-year-old and twelve-year-old children, and he wondered if they were real. This curiosity led appellant to look at more child-pornography images and videos because he was “wonder[ing].” When Arnold asked appellant if he had a “curiosity” for child pornography in 2011, 2012, 2013, and 2014, appellant responded, “I guess so, just every once in a while.” According to appellant, he would look at child pornography and then stop. Appellant stated that he had used several different computers at different times, and he did not know whether law enforcement officers would find evidence of child pornography before 2011. According to appellant, he had “satisfied” his curiosity related to child pornography.31 31 At the end of the interview, Detective Arnold told appellant that he could go back inside of his house, sit downstairs, “relax,” and “hang out” while law enforcement officers finished looking at his electronic devices. Arnold also told appellant that 17 Sufficiency of Evidence In his second issue, appellant argues that the evidence is legally insufficient to support his convictions because the State did not prove that he intentionally and knowingly possessed child pornography. We review the legal sufficiency of the evidence by considering all of the evidence in the light most favorable to the jury’s verdict to determine whether any “rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt.” Jackson v. Virginia,
443 U.S. 307, 318–19,
99 S. Ct. 2781, 2788– 89 (1979); Williams v. State,
235 S.W.3d 742, 750 (Tex. Crim. App. 2007). Our role is that of a due process safeguard, ensuring only the rationality of the trier of fact’s finding of the essential elements of the offense beyond a reasonable doubt. See Moreno v. State,
755 S.W.2d 866, 867 (Tex. Crim. App. 1988). We give deference to the responsibility of the fact finder to fairly resolve conflicts in testimony, weigh evidence, and draw reasonable inferences from the facts.
Williams, 235 S.W.3d at 750. However, our duty requires us to “ensure that the evidence presented actually supports a conclusion that the defendant committed” the criminal offense of which he is accused.
Id. officers wouldlikely take some of his electronic devices “back [to] the station” so that appellant did not have to “spend the entire day” with officers in his home. Appellant was permitted to watch television while the officers were in his home. He was not arrested on May 12, 2015, and the officers left his home at the conclusion of their search. 18 We note that in reviewing the legal sufficiency of the evidence, a court must consider both direct and circumstantial evidence, as well as any reasonable inferences that may be drawn from the evidence. See Clayton v. State,
235 S.W.3d 772, 778 (Tex. Crim. App. 2007); see also Wise v. State,
364 S.W.3d 900, 903 (Tex. Crim. App. 2012) (evidence-sufficiency standard of review same for both direct and circumstantial evidence). Circumstantial evidence is just as probative as direct evidence in establishing the guilt of an actor, and circumstantial evidence alone can be sufficient to establish guilt.
Clayton, 235 S.W.3d at 778; Hooper v. State,
214 S.W.3d 9, 13 (Tex. Crim. App. 2007). For evidence to be sufficient, the State need not disprove all reasonable alternative hypotheses that are inconsistent with a defendant’s guilt. See
Wise, 364 S.W.3d at 903; Cantu v. State,
395 S.W.3d 202, 207–08 (Tex. App.—Houston [1st Dist.] 2012, pet. ref’d). Rather, a court considers only whether the inferences necessary to establish guilt are reasonable based upon the cumulative force of all the evidence when considered in the light most favorable to the jury’s verdict.
Wise, 364 S.W.3d at 903;
Hooper, 214 S.W.3d at 13. Appellant argues that the State did not prove that he intentionally and knowingly possessed child pornography because the “ARES peer-to-peer [file-sharing] network” that he used “automatically download[ed] files to a shared folder that other users of ARES could access” and “most users are not even aware that the files are being shared from their computers”; he did not “possess[] . . . any 19 specialized software to recover deleted files”; “it is . . . possible for a person who believes that he is viewing only adult pornography to inadvertently download child pornography” or to be “redirected to a child pornography site without his knowledge”; “there is no evidence . . . that . . . he was indeed the person who accessed the [i]nternet files, knew that the[] files were being automatically downloaded and saved to his hard drive”; the search of his home did not reveal any “sexually explicit materials . . . depicting children”; and there is no evidence that he “had [ever] corresponded or met with another person to share information and identities of their victims,” “maintained or ran his own photographic production and reproduction equipment,” rented or used a “safe deposit box[] or other storage facility[y],” “collected, read, copied or maintained . . . lists of persons [with] similar sexual interests,” “kept the names of any children he may have been involved with,” “maintained diaries of any sexual encounters with children,” “cut pictures of any children out of any . . . publications . . . [to] use as a means of fantasy relationships,” “collected . . . writings on the subject of sexual activities with any children” or “on the subject of sexual activity,” “used sexual aids . . . in the seduction of any victims,” “used any drugs or alcohol as a means of inducement to get any child to a particular location,” “maintained artifacts . . . which depicted any children . . . in nude poses or sexual acts,” “kept mementoes,” “maintained any World Wide Web site,” or “used many screen names.” Further, appellant asserts that “[t]he fact that every 20 single file depicting child pornography [that was found on appellant’s electronic devices] had been deleted . . . evidences a lack of intent.” A person commits the offense of possession of child pornography if he knowingly or intentionally possesses visual material that visually depicts a child, younger than eighteen years of age at the time the image of the child was made, who is engaging in sexual conduct, and the person knows that the material depicts the child in this manner. TEX. PENAL CODE ANN. § 43.26(a) (Vernon 2016);
Wise, 364 S.W.3d at 903; Krause v. State,
243 S.W.3d 95, 110 (Tex. App.—Houston [1st Dist.] 2007, pet. ref’d). A person acts “intentionally” or with intent “with respect to the nature of his conduct or to a result of his conduct when it is his conscious objective or desire to engage in the conduct or cause the result.” TEX. PENAL CODE ANN. § 6.03(a) (Vernon 2011). A person acts “knowingly” or with knowledge of the nature of his conduct or circumstances “when he is aware of the nature of his conduct or that the circumstances exist.”
Id. § 6.03(b).“Possession” means “actual care, custody, control, or management.”
Id. § 1.07(a)(39)(Vernon Supp. 2018) (internal quotations omitted). A defendant commits a possession offense only if he voluntarily possesses the contraband.
Id. § 6.01(a)(Vernon 2011). Possession is voluntary “if the possessor knowingly obtains or receives the [contraband] possessed or is aware of his control of the [contraband] for a sufficient time to permit him to terminate his control.”
Id. 21 §6.01(b); see also Williams v. State,
313 S.W.3d 393, 397 (Tex. App.—Houston [1st Dist.] 2009, pet. ref’d). Proof of a culpable mental state almost invariably depends on circumstantial evidence, and a trier of fact can infer knowledge from all the circumstances, including the acts, conduct, and remarks of the accused. See Hernandez v. State,
819 S.W.2d 806, 810 (Tex. Crim. App. 1991); Dillon v. State,
574 S.W.2d 92, 94–95 (Tex. Crim. App. 1978). If contraband is not found on a person or is not in a location that is under the exclusive control of a single person, mere presence at the location where the contraband is found is insufficient by itself to establish actual care, custody, or control of the contraband. See Evans v. State,
202 S.W.3d 158, 162 (Tex. Crim. App. 2006). “However, presence or proximity, when combined with other evidence, either direct or circumstantial . . . , may well be sufficient to establish [possession] beyond a reasonable doubt.”
Id. Accordingly, afact finder may infer that a defendant intentionally or knowingly possessed contraband not in his exclusive possession if there are sufficient independent facts and circumstances justifying such an inference. Tate v. State,
500 S.W.3d 410, 413–14 (Tex. Crim. App. 2016). In other words, evidence that links the defendant to the contraband suffices for proof that he possessed it knowingly. Brown v. State,
911 S.W.2d 744, 747 (Tex. Crim. App. 1995); Wilson v. State,
419 S.W.3d 582, 587–88 (Tex. App.—San Antonio 2013, no pet.). It is not the number of links that is important, but rather the logical 22 force the links have in establishing the elements of the offense.
Evans, 202 S.W.3d at 162. In Wise, the Texas Court of Criminal Appeals noted the “peculiarities of determining knowing or intentional possession of computer pornography” and concluded that “each case must be analyzed on its own
facts.” 364 S.W.3d at 904– 05. Thus, the court held that in computer-pornography cases, “like all criminal cases, a court must assess whether the inferences necessary to establish guilt are reasonable based upon the cumulative force of all the evidence considered in the light most favorable to the verdict.”
Id. at 905.Sufficient evidence to support a jury’s determination that a defendant had knowledge of child pornography on his electronic devices may include evidence: (1) the child pornography was found in different computer files, showing that the images or videos had been copied or moved; (2) the child pornography was found on an external hard drive or a removable storage device, which would indicate that the images or videos were deliberately saved on the external device; (3) the child-pornography stored on the computer and the external hard drive were stored in similarly named folders; (4) the names of the folders containing child pornography necessarily were assigned by the person saving the files; or (5) numerous images or videos of child pornography were recovered from the defendant’s electronic devices. See Ballard v. State,
537 S.W.3d 517, 523 (Tex. App.—Houston [1st Dist.] 2017, 23 no pet.);
Krause, 243 S.W.3d at 111–12; see also Savage v. State, Nos. 05-06-00174-CR, 05-06-00175-CR,
2008 WL 726229, at *5 (Tex. App.—Dallas Mar. 19, 2008, pet. ref’d) (not designated for publication). Detective Arnold testified on March 6, 2015, his computer, which “monitor[ed] file[-]sharing networks for the transmission of child pornography,” “made a direct connection and download[ed]” a child-pornography video “from an IP address in Pearland, [Texas].” Based on the IP address, Arnold determined that the downloaded child-pornography video had originated from appellant’s residence, which had a secure internet connection. On May 12, 2015, Detective Arnold and other members of the ICACTF searched appellant’s home for evidence of child pornography. There, law enforcement officers found child pornography on more than one electronic device. In fact, they found over 900 child-pornography images and videos on appellant’s electronic devices. And forensic analysis of the devices showed that appellant had been viewing and downloading child pornography over “a four-year period.” According to Arnold, one electronic device found in appellant’s home contained 727 child-pornography images, a second electronic device contained sixteen child-pornography images, and a third electronic device contained 168 child-pornography images. See
Ballard, 537 S.W.3d at 523–24 (evidence sufficient where electronic devices seized from defendant’s residence contained “several 24 hundred [child-pornography] videos”); Savage,
2008 WL 726229, at *7 (evidence sufficient where “numerous images of child pornography were recovered from [defendant’s] computer”);
Krause, 243 S.W.3d at 111–12 (evidence sufficient where defendant owned “CD’s, computers, and hard drives that stored images of children engaged in sexual conduct”). Arnold opined that the large volume of child pornography on appellant’s electronic devices indicated that he had not accidentally downloaded child pornography. See Gasper v. State, Nos. 01-16-00930-CR, 01-16-00931-CR, 01-16-00932-CR,
2017 WL 4249558, at *7 (Tex. App.—Houston [1st Dist.] Sept. 26, 2017 no pet.) (mem. op., not designated for publication) (evidence sufficient where law enforcement officer opined defendant had not accidentally downloaded child pornography). Detective Arnold explained that appellant had also been “distribut[ing] child pornography,” noting that he had actually shared a child-pornography video with Arnold’s computer. Specifically, on March 6, 2015, appellant had a child-pornography video in his “unique share folder” on the “ARES” file-sharing network, Arnold’s computer “connected to [appellant’s] share folder[,]” and Arnold “got the video from [appellant].” Although Arnold did not know who specifically was using appellant’s computer at the time that the child-pornography video was shared with Arnold’s computer, appellant had told Arnold that he lived by himself and “[h]e was the one searching and . . . looking at the[] [child-pornography] 25 videos.” See Gasper,
2017 WL 4249558, at *7 (evidence sufficient where electronic devices found in home owned by defendant and he owned and used devices);
Ballard, 537 S.W.3d at 523–24 (evidence sufficient where defendant “primary user” of computer). Further, during his interview Detective Arnold and Agent Lewis, appellant stated that he had downloaded and used certain file-sharing networks, including “ARES,”32 “BearShare and Bear,”33 and “Limewire,”34 on the electronic devices in his home.35 See Gasper,
2017 WL 4249558, at *7 (evidence sufficient where defendant admitted to using peer-to-peer file-sharing network “that c[ould] be used to obtain child pornography”); Lubojasky v. State, No. 03-10-00780-CR,
2012 WL 5192919, at *16 n.14 (Tex. App.—Austin Oct. 19, 2012, pet. ref’d) (mem. op., not designated for publication) (peer-to-peer file-sharing network “often used to download images and videos of child pornography”). And when Arnold questioned appellant about certain terms that he may have searched for on a file-sharing 32 See Ferguson,
2016 WL 4247956, at *1. Appellant admitted to using “ARES” in 2015. 33 See Wiand,
2012 WL 1033623, at *1. 34 See Lubojasky
2012 WL 5192919, at *16 n.14. 35 Detective Arnold explained that a file-sharing network “doesn’t do anything on its own.” A person “ha[s] to tell it what [to] look[] for,” “ha[s] to tell it to download files,” and “ha[s] to manually open files and view them.” And a file-sharing network does not appear on a person’s computer unless he specifically “download[s] it.” 26 network, including “Vicky”36 and “PTHC,”37 appellant admitted that he had in fact viewed child pornography “out of curiosity” and he had searched for “Vicky,” “PTHC,” and “Baby J.”38 See Gasper,
2017 WL 4249558, at *11 (evidence sufficient where defendant “admitted to seeing certain child-pornography terms while searching for pornography, and he knew the meaning of the[] terms”); see also Wenger v. State,
292 S.W.3d 191, 200–01 (Tex. App.—Fort Worth 2009, no pet.) (evidence sufficient to support defendant intentionally or knowingly disseminated child pornography where he admitted to searching by inputting search terms like “young” and “Lolita” (internal quotations omitted)). According to appellant, searching for “Vicky” on a file-sharing network prompted “[a] whole bunch of porn [to] show[] up.” (Internal quotations omitted.) And when Arnold asked appellant 36 Detective Arnold explained that “Vicky is a common series in child pornography that a lot of people that are seeking child pornography want to get. It [is] a video series . . . [of] a[] 4-year old child[,] whose name is Vicky[,] up to about the age of 11. There are many, many videos over that time period that were made by her stepfather as he was sexually abusing her.” See Gasper,
2017 WL 4249558, at *4 n.17; Hicks,
2013 WL 4711223, at *2. 37 Detective Arnold noted that “PTHC is an acronym [that] stands for Pre[-]Teen Hard Core. It’s another common search term that people will use on a file[-]sharing network when looking for child pornography.” See Gasper,
2017 WL 4249558, at *3 n.8. 38 Detective Arnold explained that “Baby J” is a “child porn[ography] series video [involving] a toddler or an infant child, probably 2 to 3 years of age.” (Internal quotations omitted.) Detective Cox testified that “Baby J is a common series of child pornography.” (Internal quotations omitted). See Assousa,
2009 WL 1416759, at *2. 27 whether he had ever searched for a particular age when looking for pornography, appellant stated that he had searched for “12.” (Internal quotations omitted). Further, appellant told Detective Arnold that he would download a child-pornography image or video “to see if the children were real” and this would then “lead [him] to the next one.” (Internal quotations omitted.) In other words, appellant admitted that he had downloaded, viewed, and continued to search for child pornography. Appellant further admitted that he had looked at child pornography from 2011–2014. And at the end of his interview, appellant affirmed that he had “looked at child porn[ography],” explaining that he was “done looking at it” because he was “no longer curious.” (Internal quotations omitted.) See Gasper,
2017 WL 4249558, at *11 (evidence sufficient where defendant admitted to “‘open[ing]’ files containing child pornography and ‘look[ing] at’ them” (alterations in original));
Wilson, 419 S.W.3d at 590(evidence sufficient where defendant, in his interview, stated he “inadvertently viewed [child-pornography] images and would quickly ‘back out,’” “just clicked on [certain] images to ‘verify’ that they were of underage children,” “viewed images he knew were of underage children because he was ‘curious,’” and “looked at [child-pornography] images out of sympathy for the children”); Bethards v. State, No. 10-09-00016-CR,
2011 WL 2937875, at *6 (Tex. App.—Waco July 20, 2011, no pet.) (mem. op., not designated for publication) (evidence sufficient where defendant admitted to “intentionally 28 search[ing] for child pornography . . . because he was curious and was looking for information on whether the websites were legal”). Detective Vlasek, a former computer forensic analyst with the ICACTF, testified that on May 12, 2015, he, while “preview[ing]” or “triag[ing]” the contents of the electronic devices found in appellant’s home, found “link files” and “quite a few” of “peer-to-peer [file-sharing] programs.” See Gasper,
2017 WL 4249558, at *8–9 (evidence sufficient where forensic analysis of electronic devices revealed peer-to-peer file-sharing network and child-pornography images and videos); Lubojasky,
2012 WL 5192919, at *16 n.14 (peer-to-peer file-sharing network “often used to download images and videos of child pornography”). Vlasek explained that “link files” are “linked to” “[a]nything that the user [of the electronic device] has viewed, opened, [or] executed,” and based on the titles of the “link files,” Vlasek was able to determine that they related to child pornography. 39 Vlasek opined that the file-sharing networks and “link files” found on appellant’s electronic devices “indicat[ed] that child pornography exist[ed].” Detective Vlasek completed a full forensic analysis of the electronic devices seized from appellant’s home, and he found downloaded child pornography on three devices: (1) a “gray desktop computer,” (2) a “Dell desktop” computer, and (3) a “PNY flash drive.” In total, he found “[r]oughly 900” child-pornography images 39 See Brown,
2012 WL 5948085, at *2; Koch,
2009 WL 10697501, at *2–5. 29 and videos on appellant’s electronic devices. See Gasper,
2017 WL 4249558, at *8– 10 (evidence sufficient to establish defendant intentionally or knowingly possessed child pornography where full forensic analysis revealed large amount of child pornography on electronic devices seized from defendant’s home);
Ballard, 537 S.W.3d at 523–24 (evidence sufficient where electronic devices seized from defendant’s residence contained “several hundred [child-pornography] videos”);
Krause, 243 S.W.3d at 111–12 (evidence sufficient where defendant owned “CD’s, computers, and hard drives that stored images of children engaged in sexual conduct”); see also Bogany v. State, Nos. 14-10-00138-CR to 14-10-00146-CR,
2011 WL 704359, at *4–6 (Tex. App.—Houston [14th Dist.] Mar. 1, 2011, pet. ref’d) (mem. op., not designated for publication) (size of child-pornography collection on defendant’s computer “large enough to be obvious to the owner of the computer”). In regard to the “gray desktop computer,” Detective Vlasek testified that it contained 168 downloaded child-pornography images and twenty-five child-pornography videos.40 See
Ballard, 537 S.W.3d at 523–24 (“[T]he fact that 40 State’s Exhibit 4, admitted into evidence, constituted a list of 366 child-pornography images and videos found on the “gray desktop computer.” Detective Vlasek explained that some of the images and videos appear several times on the list because they had been downloaded several times. State’s Exhibit 4 reveals that the child-pornography images and videos found on the “gray desktop computer” had been downloaded in 2008, 2010, and 2011. 30 hundreds of files of child pornography were recovered from [defendant’s] computer is . . . circumstantial evidence that he knowingly possessed child pornography.”); Savage,
2008 WL 726229, at *7 (evidence sufficient where “numerous images of child pornography were recovered from [defendant’s] computer”); see also Bogany,
2011 WL 704359, at *4–6 (size of child-pornography collection on defendant’s computer “large enough to be obvious to the owner of the computer”). Vlasek viewed the child-pornography images and videos found on the “gray desktop computer” and confirmed that they did indeed constituted child pornography. And he explained that the majority of the images and videos found on the “gray desktop computer” were “in the thumbnail database,” indicating that the image or video had been viewed. Detective Vlasek further noted that he had discovered, on the “gray desktop computer,” the “ARES” file-sharing network. And he determined that the majority of the child-pornography images and videos found on the “gray desktop computer” had been downloaded using that program. See Zaratti v. State, No. 01-04-01019-CR,
2006 WL 2506899, at *6 (Tex. App.—Houston [1st Dist.] Aug. 31, 2006, pet. ref’d) (mem. op., not designated for publication) (evidence sufficient where computer expert located several child-pornography files in peer-to-peer file-sharing database). According to Vlasek, the child-pornography images and videos that he recovered from the “gray desktop computer” had been deleted, but the 31 “ARES” file-sharing network had not. See Gasper,
2017 WL 4249558, at *7, *9– 11 (evidence sufficient although defendant had deleted or attempted to delete child-pornography files); Assousa v. State, No. 05-08-00007-CR,
2009 WL 1416759, at *4 (Tex. App.—Dallas May 21, 2009, pet. ref’d) (not designated for publication) (“Logically, one cannot destroy what one does not possess and control. Indeed, the ability to destroy is definitive evidence of control.” (internal quotations omitted)); Fridell v. State, Nos. 09-04-200 CR, 09-04-201 CR,
2004 WL 2955227, at *3 (Tex. App.—Beaumont Dec. 22, 2004, pet. ref’d) (mem. op., not designated for publication) (“[A]ttempts to erase [child-pornography] material from the computer . . . show[s] that [defendant’s] possession of child pornography was knowing or intentional.”). Detective Vlasek further explained that he was able to recover the titles of the child-pornography images and videos that had been downloaded on the “gray desktop computer,” which included the following: “Six-year-old Larissa Fucked 124s 1,” “Ten-year-old LS Magazine Issue LSM,”41 “PTHV, Lolifuck, 10-year-old 41 Detective Arnold testified that “LSM” was “an infamous photography studio in Europe that specialized in child pornography.” The studio “would take series of pictures of kids, usually between the ages of 4 years old up to about 15 [years old] in various states of undress.” Arnold opined that “if you’re actually . . . searching for the letters ‘LSM,’ you’re looking for this European company that filmed children involved in sexual conduct.” Detective Cox further explained that “LSM” is “a series of child pornography. See Laub,
2014 WL 1400669, at *1 & n.2. 32 Handjob,” “W18 Lolitas, Folladas,”42 “Eight-year-old Real Child Porn Pre[-]Teen Pedo PTHD kiddy incest anal cum,” and “Kid Sex, . . . PTHC, King Pass, hussyfan, Baby J, Jenny, Baby shiv 2.”43 (Internal quotations omitted.) See
Ballard, 537 S.W.3d at 523–24 (“explicit titles” of child-pornography files found on defendant’s computer suggested knowing possession of child pornography);
Wenger, 292 S.W.3d at 201(noting “explicitly descriptive names of the . . . files themselves” in determining sufficiency of evidence). Vlasek also recovered the “search terms” that had been “inputted” into the “ARES” file-sharing network on the “gray desktop computer,” which included the following: “Baby J,” “LSM,” “Kiddie,”44 “Pedo,”45 “Kinderfuck,” “Kiddie Pedo,” “King Pass,”46 “Kiddie Porn,” “Kids,” “[9]YO,”47 and “TPSF.”48 (Internal quotations omitted.) When asked whether he found “those search terms . . . [on] computers seized out of [appellant’s] home,” Vlasek 42 See Gasper,
2017 WL 4249558, at *3 n.9. 43 See Solon,
2013 WL 12321956, at *14 n.10. 44 See Lubojasky,
2012 WL 5192919, at *16 n.14. 45 See id.;
Brackens, 312 S.W.3d at 834. 46 Detective Cox testified that “King Pass” is “a term that [he] find[s] on many child[-]pornography files,” and Detective Arnold explained that “King Pass” is a “term that . . . [is] attached in commonly looked-for child[-]pornography videos.” (Internal quotations omitted.) 47 See Laub,
2014 WL 1400669, at *1; Solon,
2013 WL 12321956, at *14 n.10. 48 State’s Exhibit 5, admitted into evidence, constituted a list of the search terms inputted into the “ARES” file-sharing network on the “gray desktop computer.” 33 responded, “Yes.” And he noted that appellant would have seen the title of any file before he would have “click[ed] the button to download it.” Further, during Detective Vlasek’s testimony, the trial court admitted into evidence State’s Exhibits 6 and 7, certain child-pornography images and videos that were found on the “gray desktop computer” seized from appellant’s home.49 Vlasek noted that these images and videos were indicative of the other child-pornography images that he found on the other electronic devices seized from appellant’s home. In regard to the “Dell desktop” computer, Detective Vlasek testified that it contained sixteen “complete[ly] download[ed]” child-pornography images and the “ARES” file-sharing network. See Gasper,
2017 WL 4249558, at *8–9; Lubojasky,
2012 WL 5192919, at *16 n.14; Savage,
2008 WL 726229, at *7;
Krause, 243 S.W.3d at 111–12. However, the sixteen child-pornography images and the file-sharing network recovered from the “Dell desktop” had been deleted. See Gasper,
2017 WL 4249558, at *7, *9–11; Assousa,
2009 WL 1416759, at *4; see also Fridell,
2004 WL 2955227, at *3. Vlasek explained that he was able to recover titles of certain images that had been downloaded to the “Dell desktop,” which included the following: “King Pass,” “Old Cousin Fucks Little Cousin, Rare, New divx 2,” 49 According to Detective Vlasek, State’s Exhibit 7 depicted “[a] little girl” named “Vicky.” 34 “PTHC, valya 10-year, 2 Sound,” “Babyshivid, Five-year old,” “Webcam, 14-year Boy,” and “Way Fuck, PTHC, 3-year mom, dad Fuck.”50 (Internal quotations omitted.) See
Ballard, 537 S.W.3d at 523–24 (“explicit titles” of child-pornography files found on defendant’s computer suggested knowing possession of child pornography);
Wenger, 292 S.W.3d at 201(noting “explicitly descriptive names of the . . . files themselves” in determining sufficiency of evidence). In regard to the “PNY flash drive,” Detective Vlasek testified that it contained 727 downloaded child-pornography images, which had been deleted, and three file-sharing networks, i.e., “ARES,” “Limewire,” and “Vuze.”51 See Gasper,
2017 WL 4249558, at *7, *9–11; Assousa,
2009 WL 1416759, at *4; Fridell,
2004 WL 2955227, at *3; see also Lubojasky,
2012 WL 5192919, at *16 n.14. Vlasek viewed the 727 child-pornography images to confirm that they indeed constituted child pornography. See Gasper,
2017 WL 4249558, at *8–9; Savage,
2008 WL 726229, at *7; see also Bogany,
2011 WL 704359, at *4–6 (size of child-pornography collection on defendant’s computer “large enough to be obvious to the owner of the computer”). The only items on the flash drive were child-pornography images. See 50 State’s Exhibit 3, admitted into evidence, constituted a list of nine titles of child-pornography images found on the “Dell computer.” State’s Exhibit 3 states that these images were downloaded on July 25, 2014. Detective Vlasek noted that appellant would have seen the title of a file before “click[ing] the button to download it.” 51 See Walley,
2018 WL 1519047, at *1. 35
Ballard, 537 S.W.3d at 524(“[E]vidence supports an inference that [defendant] possessed child pornography knowingly because it . . . [was] saved deliberately to the[] external devices.”); Savage,
2008 WL 726229, at *6 (child-pornography images found on “loose hard drive” and “zip disks,” indicating “deliberately saved on the external devices”);
Krause, 243 S.W.3d at 111–12 (child pornography found on external hard drive, indicating images “deliberately saved to the[] external device[]”). Although Detective Vlasek conceded that he did not know who had specifically downloaded the child-pornography images and videos that he found on the electronic devices seized from appellant’s home or who had entered in the “search terms” into the file-sharing networks, he explained that there were no other persons in appellant’s home when the search warrant was served, he was not aware that anyone else lived in the home with appellant, and appellant was “in possession of” the “gray desktop computer,” the “Dell computer,” and the “PNY flash drive” when the search warrant was served. In his audio-recorded interview with Detective Arnold and Agent Lewis, appellant stated that he was the only person living in his home and he had a “Dell desktop” computer in the game room/den of his house and a “homemade” desktop computer in his bedroom. He admitted that he had used certain file-sharing networks, including “Limewire,” “ARES”, and “BearShare.” And he had primarily 36 used the “ARES” file-sharing network on the “Dell desktop” computer. See Gasper,
2017 WL 4249558, at *7 (evidence sufficient where defendant admitted to using a peer-to-peer file-sharing network “that c[ould] be used to obtain child pornography”); Lubojasky,
2012 WL 5192919, at *16 n.14. Appellant stated that he had “come across” child pornography, while using the “ARES” file-sharing network, noting that “sometimes, a whole bunch of stuff [would] just pop[] up” when he would generally search for “porn.”52 See Gasper,
2017 WL 4249558, at *11 (evidence sufficient where defendant stated “it was ‘possible’ that by downloading pornography in ‘mega pack[s]’ or ‘movie pack[s],’ he had ‘picked up child pornography’” (alterations in original));
Wilson, 419 S.W.3d at 590(evidence sufficient where defendant, in his interview, stated he “inadvertently viewed [child-pornography] images”); Zaratti,
2006 WL 2506899, at *5–6 (evidence sufficient even though defendant argued because “his computer contained considerably more files of legal adult pornography than unlawful child pornography, it was possible that he could have downloaded the child pornography unintentionally”). Appellant admitted that he would actually see the titles of the files prior to downloading them from the file-sharing network, and he would have to “click” on a particular image or video in order to download it. Appellant stated that 52 Appellant conceded that he had used the “ARES” file-sharing network between December 2014 and March 2015. 37 when he saw a child-pornography file on the “ARES” file-sharing network, he would delete it. See Gasper,
2017 WL 4249558, at *7, *9–11; Assousa,
2009 WL 1416759, at *4; Fridell,
2004 WL 2955227, at *3. Further, during appellant’s interview, Detective Arnold told him that he had a child-pornography video in his share folder on the “ARES” file-sharing network, and appellant stated that it would have been “caught up in some other stuff” that he had downloaded. See Gasper,
2017 WL 4249558, at *11;
Wilson, 419 S.W.3d at 590; Zaratti,
2006 WL 2506899, at *5–6. Although appellant stated that he would “delete” the child-pornography that appeared on the “ARES” file-sharing network, he also stated that he would delete it after he had “seen . . . what it was.” Further, appellant admitted to “looking” for child pornography because he was curious about it. See Gasper,
2017 WL 4249558, at *11 (evidence sufficient where defendant admitting to “‘open[ing]’ files containing child pornography and ‘look[ing] at’ them” (alterations in original));
Wilson, 419 S.W.3d at 590(evidence sufficient where defendant, in his interview, stated he “inadvertently viewed [child pornography] images and would quickly ‘back out,’” “just clicked on [certain] images to ‘verify’ that they were of underage children,” “viewed images he knew were of underage children because he was ‘curious,’” and “looked at [child pornography] images out of sympathy for the children”); Bethards,
2011 WL 2937875, at *6 (evidence sufficient where defendant admitted to “intentionally 38 search[ing] for child pornography . . . because he was curious and was looking for information on whether the websites were legal”). And he confirmed that he had searched for “porn,” “PTHC,” “Vicky,” and the age of “12.” According to appellant, when he searched for “Vicky,” “a whole bunch of” pornography involving “younger girls” appeared. And he searched for the age of “12” to see if there was pornography involving “underage girls.” See Gasper,
2017 WL 4249558, at *11 (evidence sufficient where defendant “admitted to seeing certain child-pornography terms while searching for pornography, and he knew the meaning of the[] terms”); see also
Wenger, 292 S.W.3d at 200–01 (evidence sufficient to support defendant intentionally or knowingly disseminated child pornography where he admitted to searching by inputting search terms like “young” and “Lolita” (internal quotations omitted)). Appellant also stated that “a lot” of the files that he saw said “young women,” which he thought meant women who were nineteen or twenty years old. But, he recalled seeing child-pornography images or videos involving ten-year-old and twelve-year-old children, and he wondered if they were real. This curiosity led appellant to look at more child-pornography images and videos because he was “wonder[ing].” Further, when Detective Arnold asked appellant if he had a “curiosity” for child pornography in 2011, 2012, 2013, and 2014, appellant responded, “I guess so, just every once in a while.” Appellant explained that he would look at child 39 pornography and then stop, and he had used several different computers at different times. According to appellant, he had “satisfied” his curiosity related to child pornography. To the extent that appellant asserts that a person other than himself could have been responsible for downloading the child-pornography images and videos found on the electronic devices seized from his home, we note that the State need not disprove all reasonable alternative hypotheses that are inconsistent with appellant’s guilt. See Gasper,
2017 WL 4249558, at *11;
Wise, 364 S.W.3d at 903;
Ballard, 537 S.W.3d at 522, 524. Further, to the extent that appellant, at times, in his interview with Detective Arnold and Agent Erickson, may have denied downloading child pornography, it was for the jury to determine his credibility and the weight to be given such evidence. See Adames v. State,
353 S.W.3d 854, 860 (Tex. Crim. App. 2011); Brooks v. State,
323 S.W.3d 893, 899 (Tex. Crim. App. 2010). And appellant’s assertion that “[t]he fact that every single file depicting child pornography [that was found on appellant’s electronic devices] had been deleted . . . evidences a lack of intent,” is simply incorrect. See Gasper,
2017 WL 4249558, at *7, *9–11; Assousa,
2009 WL 1416759, at *4; Fridell,
2004 WL 2955227, at *3. Viewing all of the evidence and inferences in the light most favorable to the jury’s verdict, we conclude that the evidence is sufficient for a rational fact finder to 40 have found beyond a reasonable doubt that appellant knowingly or intentionally had care, custody, control, or management of the child pornography found on the electronic devices seized from his house. Accordingly, we hold that the evidence is legally sufficient to support appellant’s convictions. We overrule appellant’s second issue. Suppression of Statement In his first issue, appellant argues that the trial court erred in denying his motion to suppress State’s Exhibit 2, his audio-recorded interview with Detective Arnold and Agent Lewis, because “a reasonable and prudent person would [have] believe[d]” that he was “under arrest” at the time of his interview and his “[s]tatements [w]ere the [r]esult of [i]nterrogation.” We review a trial court’s denial of a motion to suppress evidence under a bifurcated standard of review. Turrubiate v. State,
399 S.W.3d 147, 150 (Tex. Crim. App. 2013). We review the trial court’s factual findings for an abuse of discretion and the trial court’s application of the law to the facts de novo.
Id. The trialcourt is the sole and exclusive trier of fact and judge of the witnesses’ credibility and may choose to believe or disbelieve all or any part of the witnesses’ testimony. Maxwell v. State,
73 S.W.3d 278, 281 (Tex. Crim. App. 2002); State v. Ross,
32 S.W.3d 853, 855 (Tex. Crim. App. 2000). If, as in this case, the trial court makes express findings of fact, we review the evidence in the light most favorable to the trial court’s ruling 41 and determine whether the evidence supports the fact findings. See Valtierra v. State,
310 S.W.3d 442, 447 (Tex. Crim. App. 2010). A trial court’s findings on a motion to suppress may be written or oral. See State v. Cullen,
195 S.W.3d 696, 699 (Tex. Crim. App. 2006); State v. Groves,
837 S.W.2d 103, 105 n.5 (Tex. Crim. App. 1992). We give almost total deference to the trial court’s determination of historical facts, particularly when the trial court’s fact findings are based on an evaluation of credibility and demeanor.
Valtierra, 310 S.W.3d at 447. We review the trial court’s legal ruling de novo unless its explicit findings that are supported by the record are also dispositive of the legal ruling. State v. Kelly,
204 S.W.3d 808, 818 (Tex. Crim. App. 2006). We will sustain the trial court’s ruling if it is reasonably supported by the record and is correct on any theory of law applicable to the case.
Valtierra, 310 S.W.3d at 447–48. In determining whether the trial court’s ruling on a motion to suppress is supported by the record, we generally consider only the evidence adduced at the hearing on the motion unless the suppression issues have been consensually relitigated by the parties during the trial on the merits. Rachal v. State,
917 S.W.2d 799, 809 (Tex. Crim. App. 1996). Prior to trial, appellant moved to suppress “[a]ny statements . . . allegedly made by [him]” or “[a]ny video and/or audio recordings made of [him]” “[a]t the time of any conversations between [him] and law enforcement officers,” i.e., appellant’s audio-recorded interview with Detective Arnold and Agent Lewis. 42 Following a suppression hearing, the trial court denied appellant’s motion, and, orally, on the record, issued the following findings of fact and conclusions of law53: Under Article 38.22 of the Texas Code of Criminal Procedure, I’ll find under Subsection 5 that the statement that has been provided was not a statement that was given or stems from custodial interrogation. I will find that [appellant] at that time who was not arrested was not physically deprived of his freedom of action in any significant way; that he was not told he could not leave; and that although there were a number of officers there who were there as was presented by Detective Arnold for purposes of evaluating those items that would need to be seized and/or searched and the other officers that were there for officer safety, that presence did not create a situation that would lead a reasonable person to believe that his freedom of movement had been significantly restricted. In fact, there was no indication that he was restricted from leaving at all. Further, I will find that if there is any indication, and there’s not, that there was a custodial interrogation, I will further find that the [legal] warnings were complied with as provided for in 38.22; that there was an electronic recording that was not visual but was audio only; that prior to any statements being provided that [appellant] was provided with his [legal] warnings as set out in 38.22, and as he just testified that he freely and voluntarily knowingly waived his rights and began to visit with Detective Arnold. 53 See TEX. CODE CRIM. PROC. ANN. art. 38.22, § 6 (Vernon Supp. 2018) (“If [a] statement has been found to have been voluntarily made and held admissible as a matter of law and fact by the court in a hearing in the absence of the jury, the court must enter an order stating its conclusion as to whether or not the statement was voluntarily made, along with the specific finding of facts upon which the conclusion was based, which order shall be filed among the papers of the cause.”); Urias v. State,
155 S.W.3d 141, 142 (Tex. Crim. App. 2005). A trial court may dictate its findings and conclusions into a reporter’s record that is included in the appellate record. See Mbugua v. State,
312 S.W.3d 657, 668 (Tex. App.—Houston [1st Dist.] 2009, pet. ref’d). 43 The recording is capable of making an accurate recording. The operator was competent and the recording hasn’t been altered in any respect. All of the voices on the recording are identified and that prior to 20 days of the date of these proceedings that audio was provided to counsel for review and listening. And as such, even if there had been custodial interrogation, it would be -- it would not be suppressed and would be permitted to be admitted. But as I indicated, I’m finding under Subsection 5 that this does not stem from custodial interrogation and, therefore, is admissible. Appellant first argues that he was “under arrest” at the time of his interview with Detective Arnold and Agent Lewis because “[a] large number of law enforcement officers entered [his] residence early in the morning and exercised physical control over [him]”; the officers “sought out [a]ppellant and escorted him outside [of] his home and into a police vehicle waiting in the street”; “he was accompanied by at least two detectives who interrogated him for nearly an hour”; he was “aware [that] he was the focal point of the investigation”; he testified that “he believed [that] he was in custody”; he was “denied access to food, drink, and a restroom break while in the police vehicle”; and “[a] reasonably prudent person would certainly believe [that he] w[as] about to be transported to jail” and “would not feel [that he] would be able to invoke [his] constitutional right to counsel, to remain silent, or [to] terminate the interrogation.” The United States Constitution prohibits the use of statements made by a criminal defendant against himself if they are obtained through custodial 44 interrogation without the necessary procedural safeguards to secure the Fifth Amendment right against self-incrimination. Miranda v. Arizona,
384 U.S. 436, 444,
86 S. Ct. 1602, 1612 (1966); Jones v. State,
119 S.W.3d 766, 772 (Tex. Crim. App. 2003). Similarly, the Texas Code of Criminal Procedure precludes the State’s use of the statements of a criminal defendant against himself obtained through a custodial interrogation without compliance with procedural safeguards. TEX. CODE CRIM. PROC. ANN. art. 38.22 (Vernon Supp. 2018). Notably, however, an individual’s Fifth Amendment rights do not come into play if the person is not in custody and any investigation is not yet custodial, and neither Miranda nor article 38.22 warnings are required before questioning. Herrera v. State,
241 S.W.3d 520, 526 (Tex. Crim. App. 2007); Melton v. State,
790 S.W.2d 322, 326 (Tex. Crim. App. 1990); White v. State,
395 S.W.3d 828, 834 (Tex. App.—Fort Worth 2013, no pet.). “Custody” for purposes of article 38.22 is consistent with the meaning of “custody” for purposes of Miranda. Gardner v. State,
433 S.W.3d 93, 98 (Tex. App.—Houston [1st Dist.] 2014, pet. ref’d). The appropriate inquiry as to whether a person is in “custody,” for purposes of their right to receive legal warnings, is “whether there is a ‘formal arrest or restraint on freedom of movement’ of the degree associated with a formal arrest.” California v. Beheler,
463 U.S. 1121, 1125, 103 S. Ct. 3517, 3520 (1983) (quoting Oregon v. Mathiason,
429 U.S. 492, 495,
97 S. Ct. 711, 714 (1977)); see also Gardner v. State,
306 S.W.3d 274, 293–94 (Tex. Crim.
45 Ohio App. 2009). A “custodial interrogation” is “questioning initiated by law enforcement officers after a person has been taken into custody or otherwise deprived of his freedom . . . in any significant way.” See
Herrera, 241 S.W.3d at 525. The determination of custody is made on a case-by-case basis considering all the surrounding circumstances. Dowthitt v. State,
931 S.W.2d 244, 255 (Tex. Crim. App. 1996). A person is in custody only if, under the circumstances, an objectively reasonable person would believe that his freedom of movement was restrained to the degree associated with a formal arrest.
Id. at 254.Generally, a person’s detention may constitute custody for purposes of Miranda and article 38.22: (1) when an individual is physically deprived of his freedom of action in any significant way; (2) when a law enforcement officer tells the person that he is not free to leave; (3) when a law enforcement officer creates a situation that would lead a reasonable person to believe that his freedom of movement has been significantly restricted; and (4) there is probable cause to arrest the person and law enforcement officers do not tell the person that he is free to leave.
Id. at 255.In the first three situations, the restriction upon freedom of movement must amount to the degree associated with an arrest rather than an investigative detention.
Id. Under thefourth situation, the existence of probable cause must be manifested to the person.
Id. Such aconcession, however, does not automatically establish a custodial interrogation; rather, it is a factor to consider, together with 46 other circumstances, to determine whether a reasonable person would believe that he is under restraint to a degree associated with an arrest.
Id. Additional circumstancesto consider in determining whether an interrogation is custodial include whether the criminal defendant arrived at the interrogation place voluntarily, the length of the interrogation, any request by the defendant to see relatives or friends, and the degree of control exercised over him. Gardner v.
State, 433 S.W.3d at 98; Ervin v. State,
333 S.W.3d 187, 205 (Tex. App.—Houston [1st Dist.] 2010, pet. ref’d). We may also examine such things as “the location of the questioning, statements made during the interview, the presence or absence of physical restraints during the questioning, and the release of the [defendant] at the end of the questioning.” Howes v. Fields,
565 U.S. 499, 509,
132 S. Ct. 1181, 1189 (2012) (internal citations omitted); see also Copeland v. State, No. 06-17-00193-CR,
2018 WL 1801324, at *5 (Tex. App.—Texarkana Apr. 17, 2018, no pet.) (mem. op., not designated for publication). Simply because an interrogation begins as “noncustodial” does not preclude custody from arising later if the conduct of law enforcement officers causes “a consensual inquiry to escalate into [a] custodial interrogation.”
Dowthitt, 931 S.W.2d at 255. A defendant bears the burden at trial of proving that his statements were the product of a custodial interrogation.
Herrera, 241 S.W.3d at 526. 47 At the suppression hearing, Detective Arnold testified that on May 12, 2015, he and Agent Lewis interviewed appellant in a silver Dodge Durango sport utility vehicle (“SUV”) that was parked outside of appellant’s residence. In addition to Arnold and Lewis, Detectives Vlasek and Cox, Agent Erickson, and two uniformed PPD law enforcement officers were present at appellant’s home that day to aid in the serving of a search warrant on appellant. These additional individuals did not participate in appellant’s interview. Instead, they secured the scene and searched for electronic devices or “anything tending to show that child pornography was present” in appellant’s home. Before interviewing appellant, Detective Arnold identified himself, as did Agent Lewis, and Arnold told appellant that he was not under arrest. Although appellant was not “in custody,” Arnold “read him his [legal] rights,” including informing him that he had a “right to remain silent” and “anything [that] he said c[ould] and w[ould] be used against him in a [c]ourt of law.” Arnold did not tell appellant that he was recording their conversation. At the time of the interview, Arnold did not know whether appellant had child pornography on any electronic devices in his home; he only knew that “child pornography [had] c[o]me from an IP address that returned to [appellant’s] physical [home] address.” In other words, at the time of appellant’s interview, Arnold was “not a hundred precedent sure that 48 [appellant] even possessed child pornography.” During the course of the interview, appellant admitted to possessing child pornography. Following appellant’s interview, Detective Arnold and Agent Lewis walked appellant back inside his home. They, along with Detectives Vlasek and Cox, Agent Erickson, and the two uniformed PPD law enforcement officers, then remained at appellant’s home “[s]till searching, identifying . . . electronic evidence,” and “triaging th[at] evidence,” in order to “eliminate” those electronic devices in appellant’s home that did not contain child pornography. As the officers searched his home, appellant, following his interview, sat in “a common area” of the home with a uniformed PPD officer. According to Arnold, however, that officer was “not sitting on top of [appellant]”54 and he was free to leave the home. In fact, the law enforcement officer sat with appellant for safety purposes only, specifically to prevent appellant from “run[ning] around the house,” “access[ing] . . . weapons,” or “interfer[ing] with the piles of electronic evidence that [were] being processed by the forensic analysts.” After officers completed their search of appellant’s home and seized certain electronic devices, they left appellant at his home. Appellant was not 54 The other uniformed PPD officer stood at the front door of appellant’s home “to prevent people coming back into the house once they [had] le[ft].” 49 arrested that day, and at no point, during the entirety of the time that law enforcement officers were at his home, was appellant ever placed in handcuffs.55 Appellant testified that on May 12, 2015, law enforcement officers arrived at his residence “early in the morning” to search his home pursuant to a search warrant. Appellant spoke with Detective Arnold that day, although he did not know, at the time, that Arnold was recording his interview. Appellant’s interview lasted thirty-five to forty minutes, he was “read . . . [his] rights” prior to the interview, and he chose to speak to Arnold. Appellant was not threatened or coerced into speaking with Arnold, but he felt intimated. During the interview, appellant informed law enforcement officers that there were firearms in his home. After his interview, appellant did not feel that he could leave his home because a law enforcement officer sat next to him by the pool table in his house and he was told “to sit there . . . and not to move.” However, only one officer stayed with appellant, while the other officers searched the home. None of the law enforcement officers told appellant that he could leave, but appellant received water when 55 Appellant’s audio-recorded interview further reveals that at the end of the interview, Detective Arnold told appellant that he could go back inside of his house, sit downstairs, “relax,” and “hang out” while law enforcement officers finished looking at his electronic devices. Arnold also told appellant that officers would likely take some of his electronic devices “back [to] the station” so that he did not have to “spend the entire day” with officers in his home. Law enforcement officers permitted appellant to watch television, did not arrest him on May 12, 2015, and left his home at the conclusion of their search. 50 requested. And although he never asked to use the restroom, he knew that he could do so. Appellant believed that he was under arrest. However, he was not placed in handcuffs, and he was not told that he “under arrest” that day. (Internal quotations omitted.) The question we must determine in regard to custody is whether, under the circumstances, an objectively reasonable person would believe that his freedom of movement was restrained to the degree associated with a formal arrest.
Dowthitt, 931 S.W.2d at 254; Wilson v. State,
442 S.W.3d 779, 784 (Tex. App.—Fort Worth 2014, pet. ref’d). Initially, we note that appellant’s subjective belief that he was “under arrest” is irrelevant. See Bartlett v. State,
249 S.W.3d 658, 669 (Tex. App.— Austin 2008, pet. ref’d); Hernandez v. State, No. 01-13-00245-CR,
2014 WL 3607849, at *9 (Tex. App.—Houston [1st Dist.] July 22, 2014, no pet.) (mem. op., not designated for publication). Further, here, after law enforcement officers arrived at him home to execute a search warrant, appellant voluntarily agreed to speak with Detective Arnold and Agent Lewis. The interview, which lasted approximately thirty-four minutes, took place in a silver Dodge Durango SUV that was parked outside of appellant’s residence with only Detective Arnold and Agent Lewis present. Cf.
Ervin, 333 S.W.3d at 208(“[T]he four hour period of time at the police station does not constitute a length of time that would cause a reasonable person to believe she was in custody . . . .”); see 51 also Copeland,
2018 WL 1801324, at *6 (facts tending to show interrogation noncustodial included short length of interview). Appellant was never placed in handcuffs or restrained in any way before, after, or during his interview, and Arnold told appellant that he was not being arrested. See Taylor v. State,
509 S.W.3d 468, 481 (Tex. App.—Austin 2015, pet. ref’d) (defendant not in custody where he voluntarily agreed to interview and told not being arrested);
Ervin, 333 S.W.3d at 211(defendant not in custody where she voluntarily gave statements to law enforcement officers and remained unhandcuffed throughout statements);
Gardner, 433 S.W.3d at 99(defendant not in custody when he willingly accompanied law enforcement officers to patrol car and never handcuffed). The entire interview was conducted in a non-confrontational manner, and appellant was not pressured or coerced into speaking with Arnold and Lewis. See Copeland,
2018 WL 1801324, at *6 (facts tending to show interrogation noncustodial included “only one law enforcement officer present during the questioning,” interview conducted in “non-confrontational tone,” and officer “did not pressure or coerce confession” from defendant). Although appellant was not offered water or access to the restroom during the interview, he also did not request either. See
id. (facts tendingto show interrogation noncustodial included defendant making no requests to leave room for any reason); State v. Perez, No. 14-16-00690-CR,
2017 WL 5505855, at *7 (Tex. App.—Houston 52 14th Dist.] Nov. 16, 2017, no pet.) (mem. op., not designated for publication) (considering defendant “did not ask for food or drink”);
Gardner, 433 S.W.3d at 99(defendant did not ask to use telephone and officers did not refuse to allow defendant to use telephone). Upon reentering his home after his interview, appellant requested water, which he received. And appellant admitted that he knew that he would be permitted to use the restroom if he had needed to do so. See Colvin v. State,
467 S.W.3d 647, 658–59 (Tex. App.—Texarkana 2015, pet. ref’d) (defendant not denied food, water, or other facilities tended to show interrogation noncustodial); Johnson v. State,
299 S.W.3d 491, 495 (Tex. App.—Tyler 2009, no pet.) (defendant’s “requests for water and breaks were heeded”). Further, prior to his interview, Detective Arnold was “not a hundred percent sure that [appellant] even possessed child pornography.” See Nickerson v. State,
478 S.W.3d 744, 754–55 (Tex. App.—Houston [1st Dist.] 2015, no pet.) (defendant not in custody where he voluntarily agreed to give statement, treated fairly, and officers not certain he committed offense prior to interview). And although appellant admitted to possessing child pornography during the course of his interview, this is not dispositive of the custody determination. See Trejos v. State,
243 S.W.3d 30, 46–47 (Tex. App.—Houston [1st Dist.] 2007, pet. ref’d) (defendant not in custody although he “admitted . . . his role in [complainant’s] death,” officer considered him to be suspect, and his statements made during interview provided sufficient probable 53 cause to arrest him); Garcia v. State,
106 S.W.3d 854, 858–59 (Tex. App.—Houston [1st Dist.] 2003, pet. ref’d) (defendant not in custody, despite statements giving officers probable cause to arrest him). Following appellant’s interview, he was walked back inside his home. See
Taylor, 509 S.W.3d at 481(defendant not in custody where not arrested and left at conclusion of interview);
Ervin, 333 S.W.3d at 211(defendant not in custody where she returned home after making statement). And Detective Arnold told appellant that he could sit downstairs, “relax,” and “hang out” while officers finished examining his electronic devices. Because, at the time, law enforcement officers were still searching the home and collecting evidence, appellant sat in “a common area” of the home with a uniformed PPD officer for safety purposes and to avoid any interference with the officers’ search. See
Gardner, 433 S.W.3d at 99(defendant not in custody although “officers escorted [him] to avoid any interference with the officers executing the search warrant”); cf. Turner v. State,
252 S.W.3d 571, 580 (Tex. App.—Houston [14th Dist.] 2008, pet. ref’d) (placing defendant in handcuffs for officer safety purposes did not mean in custody). Appellant had, after all, informed law enforcement officers that he had firearms in his home. According to Detective Arnold, appellant, at all times, was free to leave. Arnold informed appellant that law enforcement officers would likely seize some the electronic devices found in the home so that appellant did not have to “spend the 54 entire day” with officers. Officers permitted appellant to watch television while they searched the home, did not arrest appellant on May 12, 2015, and left appellant at his home at the conclusion of their search. See
Gardner, 433 S.W.3d at 99(“[O]fficers left [defendant’s] home after executing the warrant and did not arrest [defendant] until several weeks later . . . . This fact weighs heavily in favor of finding that [defendant] was not in custody [at the time of his interview].”). Having examined the totality of the circumstances, we conclude that there is nothing in the record to suggest a restraint of appellant’s freedom of movement of the degree associated with a formal arrest. Accordingly, we hold that the trial court did not err in denying appellant’s motion to suppress his statement. We overrule appellant’s first issue. Conclusion We affirm the judgments of the trial court. Terry Jennings Justice Panel consists of Justices Jennings, Higley, and Massengale. Massengale, J., concurring solely in the judgment. Do not publish. TEX. R. APP. P. 47.2(b). 55
Document Info
Docket Number: 01-17-00922-CR
Filed Date: 12/6/2018
Precedential Status: Precedential
Modified Date: 12/7/2018