[Cite as State v. Diaz, 2013-Ohio-1449.]
Court of Appeals of Ohio
EIGHTH APPELLATE DISTRICT
COUNTY OF CUYAHOGA
JOURNAL ENTRY AND OPINION
No. 98808
STATE OF OHIO
PLAINTIFF-APPELLEE
vs.
CARLOS DIAZ
DEFENDANT-APPELLANT
JUDGMENT:
AFFIRMED
Criminal Appeal from the
Cuyahoga County Court of Common Pleas
Case No. CR-532195
BEFORE: S. Gallagher, P.J., Rocco, J., and McCormack, J.
RELEASED AND JOURNALIZED: April 11, 2013
ATTORNEY FOR APPELLANT
Michael J. Manuszak
2905 Paxton Road
Shaker Heights, OH 44120
ATTORNEYS FOR APPELLEE
Timothy J. McGinty
Cuyahoga County Prosecutor
By: Denise J. Salerno
Assistant Prosecuting Attorney
The Justice Center, 8th Floor
1200 Ontario Street
Cleveland, OH 44113
SEAN C. GALLAGHER, P.J.:
{¶1} Defendant-appellant, Carlos Diaz (“defendant”), was convicted, after a bench
trial, of 32 counts 1 of pandering sexually oriented matter involving a minor with
forfeiture specifications and one count of possessing criminal tools, also with a forfeiture
specification. In this appeal, he contends that his convictions were based upon
insufficient evidence. For the reasons that follow, we affirm.
{¶2} Defendant presents two assignments of error, which we address together
because they involve the same analysis of law and fact.
Assignment of Error No. 1
The trial court erred in denying Appellant’s Rule 29 Motion for Acquittal
where there was insufficient evidence to identify the Appellant as the
perpetrator of the crimes herein.
Assignment of Error No. 2
The trial court erred in finding Appellant guilty under O.R.C.
§2903.322(A)(1) & (2) in trading, online downloading and online
distribution and disseminating of videos and photographs of child
pornography, particularly by way of downloading child pornographic video
through file sharing networks.
{¶3} In both assignments of error, defendant argues that the state’s evidence was
insufficient to support his convictions. Defendant believes there was insufficient
evidence as to his identity as the perpetrator of the crimes. He also contends that the
1
Eight counts involved violations of R.C. 2907.322(A)(2), and the remaining counts
involved violations of R.C. 2907.322(A)(1). All counts are felonies of the second degree.
state did not establish that he knew there was peer-to-peer software on his computer
equipment or that his computer was used to advertise or disseminate the prohibited
material.
{¶4} When an appellate court reviews a claim of insufficient evidence, “‘the
relevant inquiry is whether, after viewing the evidence in a light most favorable to the
prosecution, any rational trier of fact could have found the essential elements of the crime
proven beyond a reasonable doubt.’” State v. Leonard, 104 Ohio St.3d 54,
2004-Ohio-6235, 818 N.E.2d 229, ¶ 77, quoting State v. Jenks, 61 Ohio St.3d 259, 574
N.E.2d 492 (1991), paragraph two of the syllabus. A motion for acquittal under Crim.R.
29(A) is governed by the same standard used for determining whether a verdict is
supported by sufficient evidence. State v. Tenace, 109 Ohio St.3d 255, 2006-Ohio-2417,
847 N.E.2d 386, ¶ 37.
{¶5} The applicable standard requires a determination as to whether there was any
evidence that, if believed, would support convictions against defendant for violations of
R.C. 2907.322(A)(1) and (2), which provide:
(A) No person, with knowledge of the character of the material or
performance involved, shall do any of the following:
(1) Create, record, photograph, film, develop, reproduce, or publish any
material that shows a minor participating or engaging in sexual activity,
masturbation, or bestiality;
(2) Advertise for sale or dissemination, sell, distribute, transport,
disseminate, exhibit, or display any material that shows a minor
participating or engaging in sexual activity, masturbation, or bestiality[.]
{¶6} Rick McGinnis (“McGinnis”) is an investigator assigned to Ohio’s Internet
Crimes Against Children Task Force (“ICAC”). He participated in the investigation that
led to defendant’s arrest in this case, and he utilized law enforcement software known as
Peer Spectre.
{¶7} Peer Spectre is a search program that operates on the Gnutella network,
which is a public peer-to-peer network where people share their computer files back and
forth. The Gnutella network enables people to log onto the Internet to search, find,
retrieve, and download shared files from other computers, including child pornography.
The search will reveal an IP address and SHA1 values,2 and from this information, the
user can download the desired file from the computer(s) that offered to share it. Peer
Spectre conducts an automated search that identifies file sharing of known or suspected
child pornography associated with a specific IP address.
{¶8} Each time that Peer Spectre is used by a law enforcement agency anywhere in
the world, the results are compiled in a centralized server. The information that is logged
into the central database includes the IP address, the port that it came from, and the date
and time of the search. Law enforcement agencies are then enabled to query the
information that Peer Spectre recorded into the central server.
2
SHA1 stands for Secure Hash Algorithm 1, which consists of 32 digits and functions as a
file’s digital signature or unique identifier, which cannot be altered. McGinnis testified that SHA1
values are accurate in identifying a file to the 160th degree, which is “better than DNA.” There is a
certainty exceeding 99.99 percent that two or more files with the same SHA1 value are identical
copies of the same file regardless of the file name. If any part of a file is altered in any way, the
SHA1 is changed.
{¶9} McGinnis identified state’s exhibit No. 1 as being an IP activity report, which
references a specific IP address, SHA1 values, and contains dates ranging from April 28,
2009 to May 6, 2009. From that, he was able to identify movies and images of child
pornography being associated with that IP address. McGinnis created state’s exhibit No.
13, which is a disk with copies of the child pornography files that he had identified from
state’s exhibit No. 1.
{¶10} After a few of the videos were played in open court, the defense stipulated
that state’s exhibit No. 13 showed “a minor participating or engaging in sexual activity,
masturbation or bestiality” for purposes of Counts 1 through 31 of the indictment.
However, the defense did not stipulate that the videos and images belonged to defendant
or that he had recorded them.
{¶11} McGinnis learned, from records subpoenaed from Time Warner, that
defendant’s son, Randy, was the subscriber for the relevant IP address. Randy’s address
was an apartment in Brook Park, Ohio. Police conducted surveillance of that residence
and obtained a search warrant. McGinnis participated in executing the search warrant on
September 10, 2009, at 9:19 a.m. During the search, the following items were seized: an
Enermax black computer, a Buffalo hard drive, and a Hitachi hard drive.
{¶12} McGinnis testified that the files identified by Peer Spectre are located in a
person’s computer in a “shared file” after being downloaded from the Gnutella network.
{¶13} Luis Vargas testified that defendant is related to Vargas’s stepfather. Vargas
calls defendant his uncle. Vargas had spent the night at defendant’s residence on five or
six occasions in 2009 with his cousin Julio. Vargas and Julio were about 12 and 15 years
old, respectively. Defendant lived at the apartment in Brook Park that was the subject of
the search warrant in this case. Vargas said defendant lived alone in this one-bedroom
apartment. Defendant had a computer in his bedroom and would show the boys adult
pornography. Defendant would not allow the boys to use his computer. Although
defendant told Vargas he “didn’t have the internet,” Vargas testified that he saw
defendant accessing YouTube and Google. Vargas never saw anyone besides defendant
using the computer.
{¶14} Investigator Rice is an investigator with the Cuyahoga County Prosecutor’s
office and is assigned to the ICAC task force. He is trained as a computer forensic
examiner, and the defense stipulated to his expertise in computer forensic analysis. He
participated in the investigation in this case and was present at the search of the residence
in September 2009. Investigator Rice testified that child pornography was found on
several computer drives that were seized during the search. He was able to determine the
file names, the date they were created on the computer hard drive, and when each was last
accessed from that computer. For example, one file on the Western Digital hard drive
was created on May 11, 2009, at 1:48 p.m. and was last accessed on August 13, 2009, at
7:30 p.m. The defense stipulated to the contents of the videos as involving children
engaging in sexual activity for purposes of Counts 9 through 32.
{¶15} Investigator Rice also found file-sharing programs on the equipment seized
from the residence. When LimeWire is installed, it creates a folder that is called
“shared.” This is the file that is used when a person is online to connect with, and share
content, with other peers. “Carlos port” was the file path associated with it on the hard
drive. Investigator Rice also found FrostWire, another file-sharing program, on an HP
Pavilion desktop computer.
{¶16} During cross-examination, Investigator Rice indicated that it is possible for
viruses to be placed in people’s files where data can be disguised and sent without the
recipient’s knowledge of its content unless they opened it. In this case, the child
pornography files were downloaded, accessed again at later times, and none of them had
been deleted.
{¶17} Investigator Rice confirmed that persons with proper training and skill can
hack into computers and place things on other people’s computers without their
knowledge. Investigator Rice has seen computers that have been remotely accessed,
which leaves artifacts that evidence the remote access. He used the Forensic Tool Kit
created by AccessData to determine whether defendant’s equipment had been remotely
accessed. Investigator Rice did not find any artifacts or evidence that defendant’s
equipment had been remotely accessed by anyone.
{¶18} In this case, there was no evidence that someone else was using defendant’s
wireless connection without his knowledge because the actual files were found on his
equipment.
{¶19} Detective Jamie Bonnette assisted in the execution of the search warrant.
He interviewed defendant, who denied any knowledge of child pornography on the
computers. There was a woman present in the home who did not speak or understand
English. Defendant initially said she lived with him but later said she did not. Det.
Bonnette felt it was possible that she did live there. Defendant also indicated a man
named Emanuel Rivera lived in the apartment previously but had moved to Puerto Rico.
Defendant said his son, Randy, had not lived in the apartment for a year.
{¶20} Defendant said he had two computers: a laptop and a PC. He told Det.
Bonnette that he was the only person who used the computers. Defendant denied using
FrostWire or LimeWire and said he did not use them because they caused viruses. Det.
Bonnette felt that defendant was being evasive.
{¶21} The court denied defendant’s motion for acquittal and rendered its verdict
finding defendant guilty on all counts. The court noted that defendant’s primary defense
was that he was not the person who imported or placed the child pornography on the
computers. The court found that the state had proved that he was the person who
downloaded the child pornography beyond a reasonable doubt. The court referred to
some evidence in support of this finding, including that defendant had told police he lived
alone. The court also cited Vargas’s testimony, which indicated the defendant did not
allow him to use the computer and Vargas only saw defendant using the computer.
While there was some evidence that other people had lived in the apartment, the court
expressed “no substantial belief that they had any access to the computer.”
{¶22} The evidence establishes that the child pornography files were downloaded
and re-accessed at a later time. That fact, coupled with the evidence that defendant was
the only person who used the computers, provided evidence as to defendant’s knowledge
of the child pornography contents of the files.
{¶23} While defendant suggests that a computer virus could have caused the child
pornography to be placed on his computer without his knowledge, there is no evidence to
support this theory. The computers were searched for evidence of remote access, and
none was found.
{¶24} There was sufficient evidence to support appellant’s convictions, and his
assignments of error are overruled.
{¶25} Judgment affirmed.
It is ordered that appellee recover from appellant costs herein taxed.
The court finds there were reasonable grounds for this appeal.
It is ordered that a special mandate issue out of this court directing the common
pleas court to carry this judgment into execution. The defendant’s convictions having
been affirmed, any bail pending appeal is terminated. Case remanded to the trial court
for execution of sentence.
A certified copy of this entry shall constitute the mandate pursuant to Rule 27 of
the Rules of Appellate Procedure.
SEAN C. GALLAGHER, PRESIDING JUDGE
KENNETH A. ROCCO, J., and
TIM McCORMACK, J., CONCUR