CONNOLLY, J.
Matthew C. Schuller admitted to periodically searching for, downloading, viewing, and then deleting child pornography computer files. Despite his efforts to delete the files, a forensic examination revealed remnants on his hard drive. Following a bench trial, the district court found Schuller guilty of knowingly possessing child pornography. The issues are (1) whether the investigator's failure to explain in his affidavit that dynamic Internet Protocol (IP) addresses can change tainted the probable cause determination and (2) whether the evidence was sufficient to find that Schuller "knowingly possess[ed]" child pornography as stated in Neb.Rev.Stat. § 28-813.01(1) (Cum. Supp. 2012). We conclude that the investigator's omission did not affect the probable cause determination and that the State adduced sufficient evidence to support Schuller's conviction. We affirm.
In investigating child pornography crimes, law enforcement agencies use third-party databases to identify IP addresses associated with suspected child pornography files. An IP address is a unique number that an Internet service provider assigns to a computer or other device on the Internet.
Law enforcement agencies then use specialized software to automatically browse for and download suspected child pornography files from those IP addresses. Once an IP address is confirmed to have child pornography files, law enforcement agencies subpoena the Internet service provider for the relevant subscriber information. That information generally includes a name and the subscriber's physical address, and then law enforcement agencies obtain a warrant, seize evidence, and make arrests.
Sgt. John Donahue, the lead investigator, followed that process. On July 16, 2011, Donahue used a program called E-Phex to browse IP addresses within his jurisdiction and connected to a computer with a specific IP address. E-Phex obtained a list of that computer's shared files (files available for download through the file-sharing software), which contained one suspected child pornography file. On July 22, Investigator Corey Weinmaster subpoenaed the Internet service provider and requested the subscriber information for that IP address for various times on July 17 and 19. On July 28, the Internet service provider sent the requested information, which identified an individual (presumably Schuller's father) as the account holder, with a specific physical address located on Blackstone Road in Lincoln, Nebraska. Further surveillance of that IP address revealed that an additional 13 suspected child pornography files were linked with that IP address between July 17 and September 21. Donahue downloaded four of those files and confirmed that they were child pornography.
On September 27, 2011, Donahue applied for and received a search warrant. In his affidavit in support of his request, Donahue set out the above facts. He also included other significant information regarding his training, the typical investigation process in these kinds of cases, the type of evidence he hoped to find, and the types of items he wished to seize. A county judge granted his request for a warrant.
On September 30, 2011, Donahue executed the search warrant. During the search, officers located and seized three computers, including Schuller's laptop. Weinmaster seized the laptop, which at the time was running a disk-wiping program. A disk-wiping program overwrites data, which permanently removes it from the hard drive.
Schuller, 20 years old, admitted that he had been using peer-to-peer file-sharing software to download child pornography since he was 14 years old. Schuller admitted that he would search for files using search terms like "pedo" and "boys" to find movies he wanted to watch. He would then download those movies, watch them, and then delete them. "Deleting" a computer file is a misnomer, because doing so does not actually remove it from the computer. Deleting a file only marks the location as available to be overwritten; the file is not actually removed until that happens.
Schuller then accompanied Donahue to the Lincoln Police Department, where he again agreed to speak with Donahue. In this interview, Schuller made the same admissions he had made earlier at his home. In addition, he admitted that when he deleted the files, he used a disk-wiping program (which would overwrite the files) to remove any traces of them from his computer. He also admitted that he knew that what he had been doing was illegal and that his inability to stop doing it was depressing. Eventually, he requested a lawyer and Donahue ended the interview.
The State filed an information against Schuller on December 9, 2011, for possession of child pornography.
The district court overruled Schuller's motion. The court found no need to address the reliability of SHA1 hash values, because Donahue "personally observe[d] images of child pornography associated with Schuller's IP address and told the County Judge so." Schuller did not appeal this ruling. Regarding Schuller's Franks challenge, the court noted that the file-sharing software assigned a functionally unique identifier to each computer on the network. This identifier, known as the GUID, identified the specific computer making the child pornography files available to download. The court then emphasized that neither the GUID nor the IP
At the bench trial, Donahue was the only witness. Generally, Donahue testified regarding his investigation, the various computer programs and processes involved, his interviews with Schuller, and his forensic examination of Schuller's laptop. Regarding his examination of Schuller's laptop, Donahue explained that he used a program known as Forensic Toolkit. This program essentially copies the target hard drive and then looks for and retrieves all noteworthy images and files on the drive. This includes hidden files, deleted files, and sometimes encrypted files.
Going through the Forensic Toolkit report, Donahue explained that he had found 88 graphic files on the hard drive. These were still images of child pornography. Donahue explained that 10 of these files were not "carved" files, meaning that they were not deleted, in the sense that they were accessible to Schuller. Donahue explained that Schuller could have "copied, printed, e-mailed, [or] saved" these 10 files. He later clarified that Schuller apparently attempted to delete those files, but that some backup function saved them and moved them to another directory in the computer. So, although Schuller could have accessed and manipulated these files, he did not necessarily know they existed or where they were. The other 78 files were "carved," meaning that they had been deleted and that Schuller, an ordinary computer user, no longer had access to these files. Donahue also explained that although the wiping program had been running, the program itself maintained a record of the names of files it had overwritten. These names were consistent with names for child pornography files.
Following the bench trial, the court found Schuller guilty. The court sentenced Schuller to 3 years' probation and ordered him to register as a sex offender.
Schuller assigns, restated, that the court erred in (1) denying his motion to suppress and (2) finding sufficient evidence to find Schuller guilty of knowingly possessing child pornography.
Schuller argues that Donahue's failure to explain in his affidavit that dynamic IP addresses can change tainted the probable cause determination. As such, Schuller argues that under Franks,
A claim that an affidavit is insufficient to justify issuance of a search warrant is a Fourth Amendment claim.
In Franks,
Schuller argues that such is the case here. Schuller argues that dynamic IP addresses (such as in this case) can change, while static IP addresses cannot. Schuller argues that Donahue knowingly and intentionally, or with reckless disregard for the truth, omitted that information from his affidavit and that doing so "tainted the probable cause determination."
We conclude that Donahue's omission was immaterial to the probable cause determination and therefore did not run afoul of Franks. At the hearing, Donahue testified that he monitored the IP address' activity from July 16 to September 27, 2011. Donahue testified that throughout that period, the IP address, and its associated GUID, never changed. Recall that a GUID is a functionally unique identifier assigned by the file-sharing software to each computer on the network. Donahue testified that in other words, the same computer repeatedly shared child pornography using the same IP address. This suggests, as the State argues, that the IP address was assigned to only a single location — Schuller's home — throughout the investigation. This led the district court to conclude, correctly in our view, that "[t]here was never a question that the pornography Donahue identified might have come from somewhere other than a single computer located at [the] Blackstone Road [address]." We agree with the State and the court that, in this case, omitting the challenged information was
We briefly note that Schuller emphasizes that the IP address was initially associated with child pornography files on July 16, 2011, but that police requested the subscriber information for the IP address for July 17 and 19. Schuller argues that "since law enforcement asked for information about the holder of that IP address on a different date, the failure to inform the magistrate that on a different date, that IP address could have been assigned to a different holder, would have undercut the entire theory of the investigation."
We do not agree. Donahue testified that from July 16 to September 27, 2011, neither the GUID nor the IP address ever changed. Considering the subscriber information, the most likely conclusion is that the IP address was also assigned to Schuller's home on July 16. But even were we to agree with Schuller about the alleged uncertainty of the IP address' assigned location on July 16, it would not "undercut the entire theory of the investigation." The fact remains that police observed that IP address sharing child pornography files on July 17 and 19, and further observed that IP address sharing child pornography files at various times up to September 21. As explained above, during those times, there was no real question that the IP address was assigned to Schuller's home, because neither the IP address nor the GUID ever changed during that time. This assigned error has no merit.
Schuller argues that the evidence was insufficient to conclude that he "knowingly possess[ed]" child pornography. He questions the applicability of the common-law principles of constructive possession to computer files downloaded from the Internet, and he argues that even if they do apply, the evidence was insufficient to show control or intent to control child pornography. We conclude that the principles of constructive possession apply here. And because Schuller repeatedly searched for, downloaded, viewed, and deleted child pornography, we conclude that the evidence was sufficient to support a finding that he knowingly possessed it.
We will sustain a conviction in a bench trial of a criminal case if the properly admitted evidence, viewed and construed most favorably to the State, is sufficient to support that conviction.
Section 28-813.01(1) explains that "[i]t shall be unlawful for a person to knowingly possess any visual depiction of sexually explicit conduct ... which has a child ... as one of its participants or portrayed observers." The parties do not dispute that this case involves "visual depiction[s] of sexually explicit conduct" involving a child (child pornography). Instead,
Neb.Rev.Stat. § 28-1463.02 (Cum.Supp. 2012) defines several key words and phrases used in § 28-813.01, such as "child," "sexually explicit conduct," and "visual depiction." But it does not define "knowingly possess." Several doctrines, however, inform our interpretation of that phrase. It is an oft-stated rule that "`[s]tatutory language is to be given its plain and ordinary meaning....'"
Black's Law Dictionary defines "possess" as "[t]o have in one's actual control; to have possession of."
The initial question is whether "possess" in § 28-813.01 includes constructive possession. In other contexts, we have come to different conclusions. For example, in the narcotics context, we have long held that possession may be either actual or constructive.
We conclude that "possess" in § 28-813.01 must include constructive possession. Unlike our prior cases, here we are not discussing tangible objects such as narcotics or a physical weapon. Instead, we are discussing computer files, which are intangible objects. It is difficult to see how a person could actually possess, that is, physically possess, a computer file. As such, if "possess" in § 28-813.01 did not include constructive possession, it would seemingly be impossible to prosecute possession of computer files containing child pornography. This goes against the Legislature's clear intent, as derived from the statutory language. Section 28-1463.02 explains that "[v]isual depiction means live performance or photographic representation and includes any undeveloped film or videotape or data stored on a computer disk or by other electronic means which is capable of conversion into a visual image,... whether made or produced by electronic, mechanical, computer, digital, or other means."
It bears emphasizing that Schuller did not simply click on an innocuous banner advertisement and end up at a child pornography Web site; instead, he installed and used file-sharing software to search for and download child pornography. Donahue testified as to the various steps Schuller would have taken to use the software: "He would have to open up the LimeWire client. He would have to put in search terms that are associated with child pornography. He would view the title of the file, possibly the extension and double click on it to start the program downloading the file." Donahue testified that the forensic examination revealed that Schuller did in fact download the files, which were identifiable child pornography videos.
Once the downloads were complete, Schuller could have done any number of things with the file, such as change its name, relocate it, and, of course, view it, for as many times as he wished. The record shows that Schuller viewed the files and that, once done, he deleted them and used a wiping program to remove all traces of them from his computer, though he was ultimately unsuccessful in doing so. In an interview with Donahue, Schuller admitted essentially all of these facts. All of this shows both control and intent to control, which satisfies the elements of constructive possession. There is also no question that Schuller knowingly possessed those files. His use of the file-sharing software and his confession, among other things, confirm that he acted knowingly.
Also, the evidence was sufficient to satisfy the other elements of the crime. Schuller, in his reply brief, admits that "the uncontested evidence is that he searched the internet for images of child pornography by using file sharing software that allowed him to obtain such images from other computers and view those images on his computer."
The evidence was also sufficient to conclude that Schuller's knowing possession occurred within the timeframe alleged in the information. Not only were his IP address and GUID associated with child pornography files during that time, but Schuller admitted to having searched for, downloaded, viewed, and deleted child pornography files a couple days before his arrest. The evidence was sufficient to support finding, beyond a reasonable doubt, that Schuller knowingly possessed child pornography
We find these arguments unpersuasive. First, this is not a case of "mere viewing." In the "cache" file context, one commentator
Second, we agree that just because child pornography was downloaded onto a computer does not necessarily mean that there was knowing possession. Take, for example, a person who was legally browsing adult pornography online but mistakenly clicked on a link leading him to a child pornography Web site, which he immediately closed. The record shows that, in such a situation, child pornography would be downloaded to the computer's "cache" folder as temporary Internet files, through no further action by the user. In such a case, the person would not be guilty of knowingly possessing child pornography — he neither downloaded the files knowingly nor constructively possessed them, because there was no intent to control them. But again, as with Schuller's "mere viewing" argument, that is not what we have here. Schuller repeatedly searched for, downloaded, viewed, and then deleted child pornography files.
Third, as explained above, the record shows sufficient evidence to conclude that Schuller intended to control child pornography files. It is true that Donahue agreed that there was no evidence that Schuller "copied, saved, emailed, [or] put on a hard drive or disk" child pornography files. But we understand Donahue's testimony to be that, outside of specifically downloading the child pornography files, Schuller did not otherwise copy, save, e-mail, or put them on a hard drive or disk. To conclude otherwise, as Schuller implicitly suggests, would simply be wrong. By intentionally downloading the files through the file-sharing software, Schuller saved those files onto his hard drive; they were
We also do not agree that Schuller's deleting the files could indicate only "an intention to
Finally, in his reply brief and at oral argument, Schuller argued that the partial dissent in People v. Flick
In Flick, the partial dissent noted that for the defendants to have constructively possessed certain images, they had to have had not only the ability or power to exercise dominion or control, but also the intent to exercise that dominion or control. It argued that while the defendants could have "print[ed], resiz[ed], sav[ed], shar[ed], post[ed], e-mail[ed], or delet[ed]" the images, there was no evidence that they intended to do so and, therefore, there was no evidence of constructive possession.
But as we explained above, that is not correct. The record shows that Schuller used file-sharing software to intentionally
We conclude that Schuller's reliance on Flyer is also misplaced. There, the Ninth Circuit reversed a defendant's conviction for possession of child pornography. The particular files were located in the unallocated space of a computer; in other words, they had been deleted. The Ninth Circuit noted that "[e]ven if retrieved, all that can be known about a file in unallocated space (in addition to its contents) is that it once existed on the computer's hard drive. All other attributes — including when the file was created, accessed, or deleted by the user — cannot be recovered."
As such, the Ninth Circuit reversed the conviction.
But as one federal district court noted,
It is important to note that the government charged the defendant in Flyer with possessing child pornography only "on or about April 13, 2004," the day that the government seized his desktop computer. The desktop computer (1) did not have file-sharing software (unlike his laptop) and (2) contained only deleted images. And, as explained above, the government conceded there was no evidence that the defendant knew of those images, that he
In contrast, here the information does not focus on the day police seized the computer. As the State acknowledged at oral argument, had that been the case, it would have been exceedingly difficult (if not impossible) to prove knowing possession of the deleted files, because the evidence showed that Schuller could not access those files and likely did not even know they were there. But, it is important that the information alleges that Schuller knowingly possessed child pornography at various times from July 15 to September 30, 2011. Unlike Flyer, the allegations in this case did not rest solely on the knowing possession of the deleted images; rather, the deleted images were also evidence of Schuller's prior possession, i.e., when he searched for, downloaded, and viewed child pornography (and before he deleted it).
We conclude that the district court did not err in denying Schuller's motion to suppress. That dynamic IP addresses can change was immaterial to the probable cause determination in this case. We also conclude that the evidence was sufficient to support Schuller's conviction for knowingly possessing child pornography. We affirm.
AFFIRMED.