State of Arizona v. Paul David Windsor, Jr.

FILED BY CLERK MAR 30 2010 COURT OF APPEALS DIVISION TWO IN THE COURT OF APPEALS STATE OF ARIZONA DIVISION TWO THE STATE OF ARIZONA, ) ) 2 CA-CR 2009-0090 Appellee, ) DEPARTMENT A ) v. ) OPINION ) PAUL DAVID WINDSOR, JR., ) ) Appellant. ) ) APPEAL FROM THE SUPERIOR COURT OF PIMA COUNTY Cause No. CR-20073224 Honorable Hector E. Campoy, Judge AFFIRMED Terry Goddard, Arizona Attorney General By Kent E. Cattani and Diane Leigh Hunt Tucson Attorneys for Appellee Robert J. Hirsh, Pima County Public Defender By David J. Euchner Tucson Attorneys for Appellant E S P I N O S A, Presiding Judge. ¶1 This case raises the novel issue whether downloading images from a remote source through the Internet constitutes “duplicating,” as opposed to “receiving,” these images for purposes of Arizona‟s sexual exploitation of children statutes. After a jury trial, Paul Windsor was convicted of five counts of sexual exploitation of a minor in violation of A.R.S. § 13-3553(A)(1). He was sentenced to mitigated, consecutive sentences totaling fifty years‟ imprisonment. On appeal, Windsor contends the evidence was insufficient to support his convictions. For the following reasons, we disagree and affirm the convictions and sentences. Factual and Procedural History ¶2 We view the facts in the light most favorable to sustaining the jury‟s verdicts. State v. Huffman, 222 Ariz. 416, ¶ 2, 215 P.3d 390, 392 (App. 2009). One morning in January 2006, staff at a public computer facility located in a University of Arizona library received more than fifty, automatically generated, virus-alert messages from one of the facility‟s computers over the course of several minutes. After a staff member remotely rebooted that computer, another computer began sending similar virus- notification messages. The staff member remotely viewed its screen and saw “sexually suggestive” pictures of children. He then rebooted the computer, “hoping that the [user] would leave.” ¶3 When the second computer continued to send the virus-alert messages, staff members once again remotely accessed its screen and observed that the user was opening the images in a graphics program. A staff member called university police officers, who 2 arrived and found Windsor sitting at the computer with pornographic photographs of children on the screen.1 Subsequent forensic analysis revealed Windsor had downloaded the images from a remote Internet site and saved them in a shared file on the computer‟s hard drive. He was later indicted, arrested, and convicted as outlined above. Discussion ¶4 The sole issue on appeal is whether Windsor‟s conviction was supported by sufficient evidence.2 We will not reverse a conviction unless the state has failed to present substantial evidence of guilt. Substantial evidence is “more than a mere scintilla” and is proof that reasonable persons could accept as convincing beyond a reasonable doubt. State v. Nunez, 167 Ariz. 272, 278, 806 P.2d 861, 867 (1991). ¶5 The statute Windsor was convicted of violating, § 13-3553(A)(1), prohibits “[r]ecording, filming, photographing, developing or duplicating any visual depiction in which a minor is engaged in exploitive exhibition or other sexual conduct.” Windsor does not dispute that the images he accessed were child pornography, but rather contends that his downloading these images did not amount to “[r]ecording, filming, 1 There was trial testimony and an exhibit showing that the screen displayed numerous photographs in a “collage” format. 2 Windsor does not dispute that he failed at trial to move for a judgment of acquittal on this basis pursuant to Rule 20, Ariz. R. Crim. P., and therefore is entitled to a review only for fundamental error. See State v. Stroud, 209 Ariz. 410, n.2, 103 P.3d 912, 914 n.2 (2005). However, a conviction not supported by substantial evidence constitutes fundamental error. Id.; see also State v. Fernandez, 216 Ariz. 545, ¶ 32, 169 P.3d 641, 650 (App. 2007) (court will not ignore fundamental error if it finds it), cert. denied, ___ U.S. ___, 129 S. Ct. 460 (2008). 3 photographing, developing, or duplicating” them. In our recent opinion, State v. Paredes-Solano, 223 Ariz. 284, ¶¶ 9-12, 15, 222 P.3d 900, 904-06 (App. 2009), this court recognized that § 13-3553(A)(1), under which Windsor was charged, and § 13-3553(A)(2), which prohibits “[d]istributing, transporting, exhibiting, receiving, selling, purchasing, electronically transmitting, possessing, or exchanging,” were intended to punish different kinds of harm. Relying on Paredes-Solano, Windsor argues the state was required to prove he committed the distinct crime outlined in the subsection under which he was charged.3 We agree. See Paredes-Solano, 223 Ariz. 284, ¶¶ 16-22, 222 P.3d at 906-08 (reversing conviction where duplicitous indictment did not require unanimous verdict distinguishing between § 13-3553(A)(1) and (A)(2)). ¶6 Accordingly, the convictions cannot be sustained unless the state presented sufficient evidence Windsor engaged in one of the activities proscribed in § 13-3553(A)(1). Because it is undisputed Windsor did not record, film, photograph, or develop any image, the validity of his conviction turns on whether downloading pictures from a remote Internet site constitutes “duplicati[on]” for the purposes of this statute. When called upon to interpret a statute, we consider its plain language, giving meaning to each word and phrase “„so that no part is rendered void, superfluous, contradictory or insignificant.‟” State v. Larson, 222 Ariz. 341, ¶ 14, 214 P.3d 429, 432 (App. 2009), 3 Windsor appears to all but concede that, had the state charged him under § 13-3553(A)(2), sufficient evidence would exist to support his conviction. 4 quoting Pinal Vista Props., L.L.C. v. Turnbull, 208 Ariz. 188, ¶ 10, 91 P.3d 1031, 1033 (App. 2004). ¶7 At trial, the state‟s computer expert testified that downloading involves using the Internet to copy a file from a remote computer, a description consistent with the way courts have construed the term. See, e.g., Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 919-23 (2005) (downloaded files copied from servers or directly from peer-to-peer network); United States v. Sullivan, 451 F.3d 884, 891 (D.C. Cir. 2006) (“every time one user downloads an image, he simultaneously produces a duplicate version of that image”); Salter v. State, 906 N.E.2d 212, 219 (Ind. Ct. App. 2009) (downloading picture means “saving a copy of the image”); Moore v. State, 879 A.2d 1111, 1117 (Md. 2005) (download “means to transfer or copy a file”); People v. Hill, 715 N.W.2d 301, 304 (Mich. Ct. App. 2006) (downloaded material copied from websites). ¶8 As Windsor points out, the word “duplicate” is not defined in the criminal code. The general dictionary definition of that word, however, is “to make an exact copy of.” Webster’s Ninth New Collegiate Dictionary 389 (1991); accord The American Heritage Dictionary 430 (2d college ed. 1982) (“[t]o make an identical copy of”); see State v. Bews, 177 Ariz. 334, 336, 868 P.2d 347, 349 (App. 1993) (“widely respected dictionary” useful when statutory term not defined in statute and “no indication it [was] to be given an unusual meaning”). Based solely on the plain meanings of the terms “download” and “duplicate,” it would appear that one who downloads an image from a 5 remote computer or computer server has duplicated it for the purposes of § 13-3553(A)(1). ¶9 Windsor disputes this construction of the statute. Citing Paredes-Solano, he argues that because “duplicating” is used in § 13-3553(A)(1), it must refer to the “creation or production of a new image,” and the act of downloading is more analogous to the receipt or distribution of an existing image described in § 13-3553(A)(2) than to the creation of a new one.4 But he does not explain how creating an electronic copy of an image is so significantly different from making any other type of duplicate that it should be treated differently under the law. Moreover, our generalized statement of the statute‟s purposes in Paredes-Solano does not alter the plain language of the statute and cannot serve to narrow its application. See State v. Peek, 219 Ariz. 182, ¶¶ 16-17, 195 P.3d 641, 643-44 (2008) (rejecting argument based on case law requiring interpretation contrary to statute‟s plain language). ¶10 Windsor also cites Oregon and Washington statutes similar to § 13-3553(A) and out-of-state cases in which courts upheld the convictions of defendants who had reproduced pornographic images. It appears his intent is to show that other states do not regard the act of downloading an image as “duplicati[on]” for the purposes of their 4 In his opening brief, Windsor likens downloading images to purchasing a magazine containing pornography, arguing that a purchaser could only be guilty of violating § 13-3553(A)(1) by taking the additional step of scanning, photocopying, or faxing the image, “thus creating something entirely new.” But downloading images is more analogous to purchasing materials at a store that requires a person to make his or her own photocopy of the materials to leave with them. 6 respective statutes. But none of the decisions he cites stand for this proposition or even include discussion of this issue. State v. Dimock, 27 P.3d 1048, 1048-49 (Or. Ct. App. 2001), involved a defendant who undisputedly used electronic mail (e-mail) to transmit pornographic images. State v. Knutson, 823 P.2d 513, 515 (Wash. Ct. App. 1991), did not involve computers at all, but rather photographs the defendant had enlarged and reproduced. And the defendants in State v. Betnar, 166 P.3d 554, 556 (Or. Ct. App. 2007), and People v. Hill, 715 N.W.2d 301, 304-05 (Mich. Ct. App. 2006), had duplicated images by placing them on compact discs. That other courts have sustained convictions for acts that would also violate our statute is not germane to Windsor‟s claim that downloading is not duplicating. ¶11 We also reject Windsor‟s contention that interpreting the word “duplicati[on]” in § 13-3553(A)(1) to include downloading would render superfluous the terms “receiving,” “electronically transmitting,” and “possessing,” that appear in § 13-3553(A)(2). Although he does not specifically explain how these words would become meaningless if downloading constitutes duplication, we infer that Windsor‟s 5 primary concern is the term “electronically transmitting.” But there are a number of ways that electronic transmission could entail acts other than downloading, such as using 5 One obviously could receive or possess illicit materials without having downloaded them, such as a photograph or a video recording, and without having either accessed them on the Internet or duplicated them. 7 e-mail to send an image or broadcasting streaming video over the Internet.6 Additionally, we are unconcerned that a defendant who downloaded an image could be found both to possess and to have duplicated it—a possibility faced equally by anyone who knowingly copies proscribed images in any form. Cf. State v. Cheramie, 218 Ariz. 447, ¶¶ 10-11, 189 P.3d 374, 376 (2008) (unlawful possession lesser-included offense of transporting drugs for sale because “we cannot conceive how a person can „transport‟ drugs without having possess[ed them]”). ¶12 We find additional support in State v. Jensen, 217 Ariz. 345, 173 P.3d 1046 (App. 2008), for our conclusion that intentionally downloading an image constitutes something distinct from receiving, possessing, or electronically transmitting it. The issue in Jensen was whether sufficient evidence existed to prove the defendant knowingly had received or possessed child pornography in violation of § 13-3553(A)(2) when his computer‟s memory cache contained automatically saved images that had been accessed via the Internet. Id. ¶¶ 2, 4, 6. In holding the downloaded images could be evidence of receipt, this court discussed the concept of “receiving” information through the Internet, distinguishing that receipt from intentionally downloading a file. Id. ¶ 18 (images automatically stored in computer cache constituted evidence operator voluntarily 6 “Streaming” involves transmitting electronic data in a continuous fashion to disseminate visual or audio content, or both, among receiving devices. See Cable Plus Co., L.P. v. Ariz. Dep’t of Rev., 197 Ariz. 507, ¶ 13, 4 P.3d 1050, 1052-53 (App. 2000) (describing transmission of information by streaming electronic signals); see also UMG Recordings, Inc. v. Veoh Networks, Inc., 620 F. Supp. 2d 1081, 1085 (C.D. Cal. 2008) (distinguishing downloading from streaming). 8 received them by “intentionally accessing websites” “to have them visually appear on the screen”). ¶13 Similarly, we determined that, by visiting websites containing child pornography, the defendant in Jensen had taken “„something given, offered, or transmitted‟” or had “„convert[ed] incoming electro-magnetic waves into visible or audible signals,‟” an act similar to, but separate from, intentionally downloading files onto his computer hard drive. Id. ¶ 13, quoting Webster’s II New Riverside University Dictionary 981 (1994). Implicit in this discussion is the idea that “electronic transmission” is the broadcast of images over the Internet, which one receives by viewing, and that these acts of transmitting and receiving are separate from actively and intentionally making a copy by downloading and saving the images in a specific location on a computer.7 ¶14 At Windsor‟s trial, an FBI computer forensics expert testified that downloading a file from the Internet involves copying the file to a user‟s computer hard drive. And Windsor did not contest that he was responsible for downloading the recovered image files.8 Accordingly, because the state presented evidence that, by 7 In Jensen we did not reach the issue of whether inadvertently cached images constituted knowing possession of child pornography. 217 Ariz. 345, ¶ 18, 173 P.3d at 1052-53. Similarly, here we need not address whether automatically cached copies of images could constitute a knowing duplication because the evidence clearly shows Windsor placed the images in a shared folder of the computer. 8 At trial, Windsor denied knowing what the files contained but did not dispute that he had downloaded them. 9 downloading these images, Windsor intentionally had copied them onto the computer, his conviction for duplicating an exploitative visual representation of a child in violation of § 13-3553(A)(1) was supported by substantial evidence. Disposition ¶15 Windsor‟s convictions and sentences are affirmed. /s/ Philip G. Espinosa PHILIP G. ESPINOSA, Presiding Judge CONCURRING: /s/ Joseph W. Howard JOSEPH W. HOWARD, Chief Judge /s/ Peter J. Eckerstrom PETER J. ECKERSTROM, Presiding Judge 10