DocketNumber: 13-17-00491-CR
Filed Date: 10/11/2018
Status: Precedential
Modified Date: 4/17/2021
NUMBER 13-17-00491-CR COURT OF APPEALS THIRTEENTH DISTRICT OF TEXAS CORPUS CHRISTI - EDINBURG JONATHAN DAVID LEWIS, Appellant, v. THE STATE OF TEXAS, Appellee. On appeal from the 130th District Court of Matagorda County, Texas. MEMORANDUM OPINION Before Justices Contreras, Longoria, and Hinojosa Memorandum Opinion by Justice Hinojosa Appellant Jonathan David Lewis appeals his conviction for possession of child pornography, a third-degree felony. See TEX. PENAL CODE ANN. § 43.26 (West, Westlaw through 2017 1st C.S.). A jury found appellant guilty, and the trial court assessed punishment of eight years’ imprisonment in the Texas Department of Criminal Justice– Institutional Division and a $10,000 fine. By two issues, which we have reordered, appellant argues that: (1) the evidence supporting his conviction is legally insufficient; and (2) the trial court erred in denying appellant’s motion to suppress evidence obtained pursuant to a search warrant. We affirm. I. BACKGROUND A. Suppression Hearing 1. Testimony Appellant filed a motion to suppress evidence obtained pursuant to a search warrant, arguing that the supporting affidavit did not establish probable cause. Lee Erickson, a special agent with the Department of Homeland Security, testified at the suppression hearing. Agent Erickson is assigned to child exploitation investigations and his agency is affiliated with the Houston Metropolitan Internet Crimes Against Children (HMICAC) task force. Using specialized software, Agent Erickson monitors files being shared by individuals using peer-to-peer (PTP) networks. PTP networks connect computers using the same PTP software and allow the computers to share files, pictures, videos, games, and programs. 2. Search Warrant Affidavit The trial court admitted Agent Erickson’s search warrant affidavit into evidence. According to the affidavit, PTP networks are “one of the most pervasive distribution methods of child pornography[.]” An individual user receives files on a PTP network through an Internet Protocol (IP) address. An IP address is a unique identifier for a computer accessing the internet. Using a file’s “hash” digital signature, Agent Erickson is able to identify known child pornography files, which are tracked by the National Center 2 for Missing and Exploited Children (NCMEC). While conducting a PTP child pornography inquiry, Agent Erickson identified an IP address sharing at least three known child pornography files. The title for these files contained common child pornography search terms or “tags.” Through an administrative subpoena, Agent Erickson obtained subscriber information from the internet service provider controlling the IP address. The provider identified the IP address as being assigned to an address in Bay City, Texas, where appellant resided. Agent Erickson shared the IP address with Jonathan Cox, an officer with the Pearland Police Department. Using this information, Officer Cox identified four child pornography videos in the PTP share folder by referencing the files’ hash signature. Officer Cox provided Agent Erickson with a compact disc containing the video files. Agent Erickson viewed the videos and determined that they depicted minors engaging in sexual conduct. Next, Agent Erickson visually inspected appellant’s residence. He noted multiple secured wireless network systems in the front and rear of the home. He discovered a pickup truck parked outside and confirmed that it was registered to appellant. Agent Erickson and another agent knocked on the front door of the home and spoke to appellant. As a ruse, Agent Erickson told appellant they were conducting an immigration investigation and showed appellant a picture of an individual they were looking for. Appellant told Agent Erickson that he resided in the home with his wife and daughter. In his affidavit, Agent Erickson requested that a warrant be issued to seize various electronic devices from appellant’s residence that might contain child pornography. 3 3. Trial Court’s Ruling The trial court denied appellant’s motion to suppress, and the case proceeded to trial. B. Trial At trial, Agent Erickson testified concerning his investigation and efforts to secure a search warrant. 1 After the search warrant was issued, Agent Erickson executed the warrant with federal and state law enforcement officials. Agent Erickson located appellant in the rear of the house and informed appellant why he was there. Officers performed a security sweep of the house, while the forensic team began locating computers and other electronic devices. Officer Cox, who was part of the forensic team, used specialized software to determine the contents of the electronic devices. A Dell laptop, which appellant confirmed to be his personal laptop, was in the living room. Officer Cox examined its contents and identified multiple child pornography files. Officer Cox testified that he has received training in using forensic software. The software enables him to perform on-site previews to determine the contents of an electronic device. This allows Officer Cox to identify electronic devices containing contraband. After a suspect device is seized, Officer Cox conducts an in-depth forensic analysis of the devices. Officer Cox seized several devices from appellant’s residence, including the Dell laptop, two hard drives, an iPhone, and two video recorders. Officer Cox discovered multiple child pornography files on the Dell laptop as well as various search terms 1Agent Erickson’s testimony in this regard is largely duplicative of his affidavit testimony, which we detail above. We do not include Agent Erickson’s trial testimony on this topic to avoid redundancy. 4 commonly used to find child pornography. The search terms included variations of “PTHC,” an acronym for preteen hardcore; pedo, which is short for pedophile or pedophilia; and Lolita, which means “a precociously seductive girl.” Lolita, MERRIAM- WEBSTER ONLINE DICTIONARY, https://www.merriam-webster.com/dictionary/Lolita (last visited September 17, 2018). The trial court admitted multiple exhibits containing Officer Cox’s forensic analysis. The exhibits identified search terms, search results, and file names found on the seized devices. The trial court also admitted five video files that were found on the laptop. The videos were published to the jury, and each depicted a child under the age of eighteen engaging in sexual intercourse. Two videos were located in the recycle bin of the laptop. The others were located under “Saved Games” in a folder titled “Y-O.” The trial court admitted two additional exhibits, described as a “data dump” from the seized hard drives. The exhibits showed various files downloaded from PTP software and the files’ location on the hard drive. Officer Cox identified the files as child pornography. Dewayne Lewis, a special agent with Homeland Security, testified that he interviewed appellant in front of the residence. He read appellant his Miranda rights, and appellant agreed to speak to him. According to Agent Lewis, appellant was well versed in concepts such as IP addresses, file sharing, and PTP networks. Appellant admitted that he used PTP networks to access adult pornography. Appellant claimed that some child pornography may have shown up as a search result, but he denied intentionally downloading the files. Appellant told Agent Lewis that he used search terms such as young, Tiny Tasha, and Lola. Appellant stated that if he recognized a file as child 5 pornography, he would delete it. Appellant verified that the Dell laptop located in the living room was his computer. Agent Lewis showed appellant multiple images taken from videos found on the laptop, and appellant claimed to recognize at least two of them. Appellant then acknowledged that there was likely child pornography on his laptop. He told Agent Lewis that he viewed certain child pornography videos all the way through before deleting them. In a later interview at the jail, appellant told Agent Lewis that he recognized other search terms commonly used to download child pornography. Appellant stated that he watched the videos before deleting them due to his morbid curiosity. Jennifer Lewis, appellant’s ex-wife, recalled receiving a call from a Homeland Security agent while at work. Jennifer went home where she saw officers looking at the computers in the house. Jennifer initially bought the Dell laptop for office use, but she later gave it to appellant. Jennifer stated that appellant removed the spare hard drives from junk computers. Appellant testified that he discovered something on his computer last year that should not have been there. A program on his laptop was frozen, and when he exited the program, he saw a file sharing program displaying titles of videos. According to appellant, he opened the downloaded files to confirm they were as the titles described. After doing so, he claimed he deleted the files. Appellant described various acts of sexual conduct involving minors that were depicted in the videos. Appellant testified that he lied to Agent Lewis when he said he used certain search terms. Appellant denied downloading the files, speculating that someone else, possibly his neighbor, had used his 6 computer to do so. Appellant claimed that he had never used the spare hard drives that contained child pornography. Officer Cox testified in rebuttal that a picture of appellant’s daughter was saved to one of the spare hard drives alongside child pornography files. The jury returned a guilty verdict. This appeal followed. II. LEGAL SUFFICIENCY By his first issue, appellant argues the evidence supporting his conviction was legally insufficient. A. Standard of Review and Applicable Law The standard for determining whether the evidence is legally sufficient to support a conviction is whether, after viewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt. Johnson v. State,364 S.W.3d 292
, 293–94 (Tex. Crim. App. 2012) (citing Jackson v. Virginia,443 U.S. 307
, 319 (1979)); see Brooks v. State,323 S.W.3d 893
, 898–99 (Tex. Crim. App. 2010) (plurality op.). The fact-finder is the exclusive judge of the credibility of witnesses and of the weight to be given to their testimony.Brooks, 323 S.W.3d at 899
; Lancon v. State,253 S.W.3d 699
, 707 (Tex. Crim. App. 2008). Reconciliation of conflicts in the evidence is within the fact-finder’s exclusive province. Wyatt v. State,23 S.W.3d 18
, 30 (Tex. Crim. App. 2000). We resolve any inconsistencies in the testimony in favor of the verdict. Bynum v. State,767 S.W.2d 769
, 776 (Tex. Crim. App. 1989). The legal sufficiency standard of review is the same for both direct and 7 circumstantial evidence. Hooper v. State,214 S.W.3d 9
, 13 (Tex. Crim. App. 2007). For the evidence to be sufficient, the State need not disprove all reasonable alternative hypotheses that are inconsistent with the defendant’s guilt. Wise v. State,364 S.W.3d 900
, 903 (Tex. Crim. App. 2012). Rather, we consider whether the inferences necessary to establish guilt are reasonable based upon the cumulative force of all the evidence.Hooper, 214 S.W.3d at 13
. We measure the sufficiency of the evidence by the elements of the offense as defined by a hypothetically correct jury charge. Cada v. State,334 S.W.3d 766
, 773 (Tex. Crim. App. 2011) (citing Malik v. State,953 S.W.2d 234
, 240 (Tex. Crim. App. 1997)). Such a charge is one that accurately sets out the law, is authorized by the indictment, does not unnecessarily increase the State’s burden of proof or unnecessarily restrict the State’s theories of liability, and adequately describes the particular offense for which the defendant was tried.Id. Under a
hypothetically correct jury charge in this case, the State was required to prove that (1) appellant (2) knowingly or intentionally (3) possessed (4) visual material that visually depicts a child younger than eighteen years of age at the time the image of the child was made (5) who is engaging in sexual conduct, and (6) appellant knew that the material depicts a child younger than eighteen engaging in sexual conduct. See TEX. PENAL CODE ANN. § 43.26(a). 2 2 “Sexual conduct” includes “sexual contact, actual or simulated sexual intercourse, deviate sexual intercourse, sexual bestiality, masturbation, sado-masochistic abuse, or lewd exhibition of the genitals, the anus, or any portion of the female breast below the top of the areola.” TEX. PENAL CODE ANN. § 43.25(a)(2) (West, Westlaw through 2017 1st C.S.); seeid. § 43.26(b)(2)
(West, Westlaw through 2017 1st C.S.). “Visual material” means either (a) any film, photograph, videotape, negative, or slide or any photographic reproduction that contains or incorporates in any manner any film, photograph, videotape, negative, or slide, or (b) any disk, diskette, or other physical medium that allows an image to be displayed on a computer or 8 Appellant’s sufficiency argument is limited to whether he possessed the requisite mental state. “A person acts intentionally, or with intent, with respect to the nature of his conduct or to a result of his conduct when it is his conscious objective or desire to engage in the conduct or cause the result.”Id. § 6.03(a)
(West, Westlaw through 2017 1st C.S.). “A person acts knowingly, or with knowledge, with respect to the nature of his conduct or to circumstances surrounding his conduct when he is aware of the nature of his conduct or that the circumstances exist.”Id. § 6.03(b).
“A person acts knowingly, or with knowledge, with respect to a result of his conduct when he is aware that his conduct is reasonably certain to cause the result.”Id. The Texas
Penal Code defines “possession” of contraband as “actual care, custody, control, or management.”Id. § 1.07(a)(39)
(West, Westlaw through 2017 1st C.S.). B. Analysis Appellant contends that though there was evidence of deleted child pornography files, there was no evidence that he had the ability to access the deleted files. Therefore, according to appellant, he did not intentionally or knowingly possess child pornography. Appellant’s argument misrepresents the evidence before the jury and is contrary to controlling precedent. In Wise, the Texas Court of Criminal Appeals noted the “peculiarities of determining knowing or intentional possession of computerpornography.” 364 S.W.3d at 904
. The Court concluded that “each case must be analyzed on its own facts.”Id. at 905.
Thus, the Court held that in computer-pornography cases, “like all criminal cases, other video screen and any image transmitted to a computer or other video screen by telephone line, cable, satellite transmission, or other method.Id. § 43.26(b)(3).
9 a court must assess whether the inferences necessary to establish guilt are reasonable based upon the cumulative force of all the evidence considered in the light most favorable to the verdict.”Id. Sufficient evidence
to support a jury’s determination that the defendant intentionally or knowingly possessed images of child pornography on his computer may include evidence that: (1) the images of child pornography were found in different computer files, showing the images were copied or moved; (2) the images of child pornography were found on an external hard drive or CD, which indicates the images were deliberately saved on the external devices; (3) the images stored on the computer and the external hard drive were stored in similarly named folders; (4) the names of the folders containing the images of child pornography necessarily were assigned by the person saving the file; or (5) the defendant’s computer contained numerous images of child pornography. Ballard v. State,537 S.W.3d 517
, 523 (Tex. App.—Houston [1st Dist.] 2017, pet. struck) (citing Krause v. State,243 S.W.3d 95
, 110–12 (Tex. App.— Houston [1st Dist.] 2007, pet. ref’d)). Here, contrary to appellant’s assertion, there were multiple undeleted videos found on appellant’s laptop and hard drives. A forensic examination of the seized devices revealed several videos depicting children engaging in sexual conduct. Only two of the videos were found in the laptop’s recycle bin. The others were stored under “Saved Games” in a folder titled “Y-O.” There were also commonly used child pornography search terms stored on the laptop’s PTP software. The search results for the PTP software contained explicit titles relating to child pornography. The evidence established that appellant was the primary user of the laptop. Appellant admitted to viewing multiple 10 child pornography videos, although he claimed to have deleted them. The fact that other child pornography videos remained in a specific folder on the laptop supports an inference that appellant knowingly and intentionally possessed child pornography. SeeBallard, 537 S.W.3d at 524
;Krause, 243 S.W.3d at 111
–12. Further, the presence of common child pornography search queries found on the laptop is circumstantial evidence that appellant acted knowingly and intentionally. SeeBallard, 537 S.W.3d at 524
;Krause, 243 S.W.3d at 111
–12. Agents also discovered child pornography on the disconnected hard drives. This evidence supports an inference that appellant acted knowingly and intentionally in deliberately saving the illicit files to the external devices. SeeBallard, 537 S.W.3d at 524
;Krause, 243 S.W.3d at 112
. Appellant suggested through his testimony that the child pornography files could have been placed on his laptop by another person. However, the State need not disprove all reasonable alternative hypotheses that are inconsistent with appellant’s guilt. SeeWise, 364 S.W.3d at 903
. Further, appellant’s explanation fails to account for the child pornography found on the disconnected hard drives. The jury reasonably could have rejected appellant’s alternative hypothesis. SeeWise, 364 S.W.3d at 906
–08;Ballard, 537 S.W.3d at 524
. Viewing the totality of the evidence and inferences in a light most favorable to the verdict, we conclude that the jury could have reasonably found beyond a reasonable doubt that appellant knowingly and intentionally possessed the child pornography found on the digital devices in his home. SeeWise, 364 S.W.3d at 906
–08; Ballard,537 11 S.W.3d at 524
; Krause, 243. We overrule appellant’s first issue. III. SEARCH WARRANT AFFIDAVIT By his second issue, appellant argues the trial court abused its discretion in denying his motion to suppress evidence obtained pursuant to the search warrant. A. Standard of Review and Applicable Law An appellate court normally reviews a trial court’s ruling on a motion to suppress by using a bifurcated standard of review, giving almost total deference to the historical facts found by the trial court and reviewing de novo the trial court’s application of the law. Amador v. State,221 S.W.3d 666
, 673 (Tex. Crim. App. 2007). However, when assessing the sufficiency of an affidavit for a search warrant, the reviewing court is limited to the four corners of the affidavit. Hankins v. State,132 S.W.3d 380
, 388 (Tex. Crim. App. 2004). Accordingly, when we review the magistrate’s decision to issue a warrant, we apply a highly deferential standard because of the constitutional preference for searches to be conducted pursuant to a warrant as opposed to a warrantless search. Swearingen v. State,143 S.W.3d 808
, 810–11 (Tex. Crim. App. 2004) (citing Illinois v. Gates,462 U.S. 213
, 234–37 (1983)). We must interpret the affidavit in a common sense and realistic manner, recognizing that the magistrate was permitted to draw reasonable inferences. Davis v. State,202 S.W.3d 149
, 154 (Tex. Crim. App. 2006). A search warrant may not legally issue unless it is based on probable cause. U.S. CONST. amend. IV; TEX. CONST. art. I, § 9; TEX. CODE CRIM. PROC. ANN. art. 1.06 (West, Westlaw through 2017 1st C.S.). To obtain a warrant, law enforcement must present to a magistrate a sworn affidavit setting forth sufficient facts to establish probable cause that 12 a specific offense has been committed, among other requirements. TEX. CODE CRIM. PROC. ANN. art. 18.01(c) (West, Westlaw through 2017 1st C.S.). Probable cause exists when, under the totality of the circumstances, there is a fair probability that contraband or evidence of a crime will be found at the specified location, and the facts stated in a search warrant affidavit are “so closely related to the time of the issuance of the warrant that a finding of probable cause is justified.” State v. McLain,337 S.W.3d 268
, 272 (Tex. Crim. App. 2011). “The focus is not on what other facts could or should have been included in the affidavit; the focus is on the combined logical force of facts that are in the affidavit.” State v. Duarte,389 S.W.3d 349
, 354–55 (Tex. Crim. App. 2012). As long as the issuing magistrate had a substantial basis for concluding that probable cause existed, we will uphold that magistrate’s probable cause determination.McLain, 337 S.W.3d at 271
. B. Analysis Appellant generally argues that Agent Erickson’s affidavit did not establish probable cause that child pornography would be found at his residence. In his affidavit, Agent Erickson details how he identified a particular IP address sharing known child pornography files. Agent Erickson learned from the internet service provider controlling the IP address that the address was tied to appellant’s residence. Agent Erickson viewed video files shared by the IP address and confirmed that they were child pornography. He then visited the residence and discovered that it had a secured wireless network. A vehicle parked at the home was registered to appellant. Agent Erickson also talked to appellant and confirmed that he resided at the home with his wife and daughter. 13 We conclude that the facts and circumstances submitted to the magistrate within the “four corners” of the affidavit provide a substantial basis for the magistrate’s conclusion that child pornography would probably be found at appellant’s residence at the time the warrant was issued. Thus, the affidavit was sufficient to establish probable cause. Seeid. at 272.
We overrule appellant’s second issue. IV. CONCLUSION We affirm the trial court’s judgment. LETICIA HINOJOSA Justice Do not publish. TEX. R. APP. P. 47.2(b). Delivered and filed the 11th day of October, 2018. 14