State v. Mahan

Court: Ohio Court of Appeals
Date filed: 2011-10-06
Citations: 2011 Ohio 5154
Copy Citations
6 Citing Cases
Combined Opinion
[Cite as State v. Mahan, 2011-Ohio-5154.]


                Court of Appeals of Ohio
                               EIGHTH APPELLATE DISTRICT
                                  COUNTY OF CUYAHOGA


                              JOURNAL ENTRY AND OPINION
                                       No. 95696



                                     STATE OF OHIO

                                              PLAINTIFF-APPELLEE

                                                 vs.



                                      JAMES MAHAN
                                              DEFENDANT-APPELLANT



                                  JUDGMENT:
                            AFFIRMED AND REMANDED


                                   Criminal Appeal from the
                            Cuyahoga County Court of Common Pleas
                                     Case No. CR-525553

        BEFORE:              Sweeney, J., Stewart, P.J., and Celebrezze, J.

        RELEASED AND JOURNALIZED:                      October 6, 2011
                                           2
ATTORNEY FOR APPELLANT

Ronald L. Frey, Esq.
Ian N. Friedman & Associates, L.L.C.
1304 West Sixth Street
Cleveland, Ohio 44113

ATTORNEYS FOR APPELLEE

William D. Mason, Esq.
Cuyahoga County Prosecutor
By: T. Allan Regas, Esq.
        Francine B. Goldberg, Esq.
Assistant County Prosecutors
The Justice Center, 9th Floor
1200 Ontario Street
Cleveland, Ohio 44113




JAMES J. SWEENEY, J.:

       {¶ 1} Defendant-Appellant, James Mahan, appeals from the trial court’s denial of

his motion to suppress and his motion to compel. Appellant also appeals the sentence

imposed upon him. For the reasons that follow, we affirm but remand with instructions

to reclassify defendant as a Tier II sex offender as both parties conceded at oral argument

defendant was improperly classified as a Tier III sex offender.1

       1
        The sentencing transcript reflects that the court informed defendant he
would be labeled a Tier II sex offender. Accordingly, the sentencing journal entry
contains an obvious clerical error to the extent it provides that “defendant is a Tier
III sex offender.”
                                            3
       {¶ 2} In this case, defendant was indicted with 95 counts, including pandering

sexually-oriented matter involving a minor, illegal use of a minor in nudity-oriented

material or performance, and possessing criminal tools. The charges stemmed from the

presence of certain files found on defendant’s home computer as a result of an

investigation conducted by Rick McGinnis (“McGinnis”). McGinnis is an investigator

assigned to Ohio’s Internet Crimes Against Children Task Force (“ICAC”). McGinnis

utilized software known as “Peer Spectre,” which identified an internet protocol (“IP”)

address associated with three files that he recognized from his experience as being child

pornography.    McGinnis prepared an affidavit and obtained a search warrant for

defendant’s residence.

       {¶ 3} During the course of the proceedings, defendant filed a motion to compel

certain information from the state, including a mirror image forensic copy of Peer Spectre

and any and all instruction/operation and/or training manuals associated with Peer

Spectre, and the software’s source code. Defendant believed the information would

reveal the functionality and calibration of the software, and asserted it was material to his

defense in order to challenge the software’s reliability and methodology.

       {¶ 4} In opposition, the state maintained the requested discovery was not subject

to disclosure by the state pursuant to Crim.R. 16. Specifically, the state indicated that

Peer Spectre is maintained under the strict control and ownership of William Wiltse and

is restricted to use by law enforcement. Wiltse supplied an affidavit wherein he averred
                                           4
that “without the source code, it is not possible to authenticate the function of the

application or validate its ‘calibration.’” Wiltse averred that the source code is not

distributed.   Officers are trained how to validate the findings of Peer Spectre by

“conducting similar searches on the Gnutella network using freely available software

applications.” The state confirmed that it did not own or have in its possession a copy of

the source code and maintained that it could not produce what it did not have. The trial

court denied the motion to compel discovery from the state and instructed that defendant

could contact the software company regarding issues pertaining to programming.

       {¶ 5} The trial court conducted a hearing on defendant’s motion to suppress and

the motion was denied. Defendant then entered a plea of no contest and was found

guilty. The trial court imposed an aggregate prison sentence of 16 years comprised of the

following: eight year concurrent prison terms on 11 counts to be served consecutively

with eight year concurrent prison terms on 70 other counts; all concurrent with four and

one year prison terms on the remaining counts.

       {¶ 6} Defendant’s appeal presents four assignments of error for our review:

       {¶ 7} “I. The trial court erred when it denied the defendant-appellant’s motion to

suppress.”

       {¶ 8} “Appellate review of a trial court’s ruling on a motion to suppress presents

mixed questions of law and fact. An appellate court is to accept the trial court’s factual

findings unless they are clearly erroneous. We are therefore required to accept the factual
                                            5
determinations of a trial court if they are supported by competent and credible evidence.

The application of the law to those facts, however, is subject to de novo review.” State v.

Polk, (Internal citations omitted) Cuyahoga App. No. 84361, 2005-Ohio-774, at ¶2.

       {¶ 9} Under this asserted error, defendant raises multiple issues that allege that:

(1) the trial court erred in its findings of fact and conclusions of law; (2) the warrantless

use of Peer Spectre constituted an unlawful search in violation of his constitutional rights;

(3) the search warrant was issued without probable cause because it relied on information

obtained from use of Peer Spectre; and (4) the probable cause finding for the search

warrant was based upon an affidavit that contained substantive inaccuracies and

omissions.

       {¶ 10} The trial court conducted an evidentiary hearing on defendant’s motion to

suppress at which McGinnis was the only witness.

       {¶ 11} McGinnis     testified as follows: He obtained training on internet

investigations of child pornography from Fox Valley Technical College, and the training

included peer-to-peer network searches. As part of his training, he was instructed on the

use of Peer Spectre, which is exclusively restricted to law enforcement. Peer Spectre is a

search program that operates on the Gnutella network, which is a public peer-to-peer

network where people share their computer files back and forth. The Gnutella network

enables people to log onto the internet to search, find, retrieve, and download shared files

from other computers, including child pornography. The search will reveal an IP address
                                            6
and SHA1 values,2 and from this information the user can download the desired file from

the computer(s) that offered to share it.

       {¶ 12} McGinnis repeatedly testified that all the information he obtained from

using Peer Spectre he could have obtained using other publicly available software, such

as LimeWire or Phex, the only difference being that with the other software he would

have to manually enter the data to keep searching. McGinnis stated that Peer Spectre

saves time.

       {¶ 13} In short, Peer Spectre conducts an automated search that identifies file

sharing of known or suspected child pornography associated with a specific IP address.

While McGinnis acknowledged that he did not create Peer Spectre and was unaware of

the technical aspects of it, he testified that he was trained how to operate it and

understood that it reads publicly available advertisements from computers that are sharing

files over the Gnutella peer-to-peer network.

       {¶ 14} Each time that Peer Spectre is used by a law enforcement agency anywhere

in the world, the results are compiled in a centralized server. The information that is

logged into the central database includes the IP address, the port that it came from, and


       SHA1 stands for Secure Hash Algorithm 1, which consists of 32 digits and
       2

functions as a file’s digital signature or unique identifier, which cannot be altered.
McGinnis testified that SHA1 values are accurate in identifying a file to the 160th
degree, which is “better than DNA.” There is a certainty exceeding 99.99 percent
that two or more files with the same SHA1 value are identical copies of the same
file          regardless              of           the            file          name.
                                           7
the date and time of the search. Law enforcement agencies are then enabled to query the

information that Peer Spectre recorded into the central server.

       {¶ 15} On May 23, 2008, McGinnis used this technology to search for IP addresses

that were active in Ohio in May of 2008 and had been recorded as sharing known or

suspected child pornography. McGinnis retrieved a “hit list” for the IP addresses at

issue, which identified each file’s SHA1 value, the date and time the file was made

available for sharing, and the file’s size, geographical location, and description. The

records identified a particular IP address as a computer that made available for sharing

known or suspected child pornography on May 12, 2008.              From his experience,

McGinnis recognized some of the SHA1 values as known child pornography. McGinnis

nonetheless personally reviewed each file just to ensure that it was what he believed it to

be. Portions of these files were played during defendant’s suppression hearing and

corroborated McGinnis’s testimony as to their content of child pornography.

       {¶ 16} Each IP address is unique to a certain computer at a given time. McGinnis

subpoenaed the internet service provider (“ISP”) for the subscriber associated with that IP

address at that time. He received the customer name and account holder, which was

defendant, however, this information does not identify who was actually using the

computer at the relevant time. Therefore, McGinnis was not targeting defendant but

instead he sought and obtained a search warrant for the residential address based upon his

belief that a computer at that address contained the suspected contraband.
                                           8
      {¶ 17} McGinnis prepared a lengthy affidavit setting forth the basis upon which he

was seeking the search warrant, which the court subsequently issued. McGinnis stated

that this search warrant was executed in conjunction with approximately 60 other similar

search warrants as part of Operation Safety Net. During the search, the known child

pornography files that had been identified by Peer Spectre were found on defendant’s

computer.

      {¶ 18} McGinnis testified that this was the first time he had used information

gained from Peer Spectre to obtain search warrants, however, he was aware of Peer

Spectre’s accuracy from other law enforcement agencies. By the suppression hearing, it

had become McGinnis’s experience that whenever they located a computer through the

use of Peer Spectre, they found child pornography on the computer unless the hard drive

had been wiped clean. Under cross-examination, McGinnis stated that he could not testify

to the technological processes Peer Spectre uses when it is functioning. However, he

knew that Peer Spectre logs onto the same peer-to-peer network as any other publicly

available software in order to perform its functions. The defense elicited an admission

from McGinnis that he did not know if the files were located in a “shared folder.”

      {¶ 19} While McGinnis more than once testified that he did not know if Peer

Spectre went beyond shared folders of a computer, he consistently confirmed that the

information recorded by Peer Spectre is “identical to the information that you would get

from running a search in LimeWire if you were running it at that time that the IP address
                                            9
had a computer sharing file.” Peer Spectre simply automated the process. There was no

evidence introduced that these publicly available software programs search beyond shared

files on the network; in fact, McGinnis testified that he was unaware of that ever

happening.

       {¶ 20} With regard to defendant’s assignment of error, it is well settled that “the

protections of the Fourth Amendment only extend to places where ‘the defendant can

claim a reasonable expectation of privacy.’” United States v. Norman (Sept. 24, 2010),

M.D. Ala. No. 2:09-CR-118-WKW, quoting Katz v. United States (1967), 389 U.S. 347,

360, 88 S.Ct. 507, 9 L.Ed.2d, 576, other citations omitted. “‘What a person knowingly

exposes to the public, even in his own home or office, is not a subject of Fourth

Amendment protection.’” Id., quoting Katz, 389 U.S. at 351.

       {¶ 21} The state maintains that the use of Peer Spectre without a warrant did not

violate defendant’s constitutional right to be free from unreasonable searches and seizures

because it simply automated the ability to search information that had been placed in the

public domain. In other words, the program searches those files that have been placed in

a public file-sharing network. Therefore, the first issue becomes whether defendant had

a reasonable expectation of privacy in the subject files.

       {¶ 22} At least one federal court that has confronted this issue concluded there is

no reasonable expectation of privacy over files searched using Peer Spectre. Norman,

supra (finding “a ‘search’ is not at issue unless the defendant first establishes that he or
                                           10
she had a reasonable expectation of privacy in the area(s) searched. In other words, Mr.

Norman must establish that he has standing to assert a Fourth Amendment violation in the

first place. This he cannot do”).

       {¶ 23} In Norman, the court observed, “courts addressing this issue have uniformly

held that there is no reasonable expectation of privacy in files made available to the

public through peer-to-peer file-sharing networks.” Id., citing United States v. Stults

(C.A.8, 2009), 575 F.3d 834, 842-843; United States v. Ganoe (C.A.9, 2008), 538 F.3d

1117, 1127; United States v. Perrine (C.A.10, 2008), 518 F.3d 1196, 1205; United States

v. Laduea (Apr. 7, 2010), D.Mass. No. 09-40021-FDS; United States v. Brese (Apr. 9,

2008), W.D.Okla. No. CR-08-52-D.

       {¶ 24} Defendant asserts that McGinnis’s inability to testify as to the specific

functionality of Peer Spectre wrongly placed the burden of proof on him. However,

defendant has not challenged or refuted the evidence that indicated the files from an IP

address assigned to his computer were being shared over a peer-to-peer network on May

12, 2008, and therefore he has not established a reasonable expectation of privacy. Where

there is no reasonable expectation of privacy over the shared files, the technical aspects of

the law enforcement software are not at issue. Norman, supra.

       {¶ 25} Next we address defendant’s argument that, as a means of establishing

probable cause, McGinnis’s affidavit could not be based on information he obtained

through Peer Spectre in the absence of testimony concerning the technical functionality of
                                            11
the software. However, “probable cause is a fluid concept — turning on the assessment

of probabilities in particular factual contexts — not readily, or even usefully, reduced to a

neat set of legal rules.” Illinois v. Gates (1983), 462 U.S. 213, 232, 103 S.Ct. 2317, 76

L.Ed.2d 527; State v. Akers, Butler App. No. CA2007-07-163, 2008-Ohio-4164.

       {¶ 26} Crim.R. 41(C) provides in part:

       {¶ 27} “(1) A warrant shall issue on either an affidavit or affidavits sworn to

before a judge of a court of record or an affidavit or affidavits communicated to the judge

by reliable electronic means establishing the grounds for issuing the warrant. The

affidavit shall name or describe the person to be searched or particularly describe the

place to be searched, name or describe the property to be searched for and seized, state

substantially the offense in relation thereto, and state the factual basis for the affiant’s

belief that such property is there located. * * *

       {¶ 28} “(2) * * * The finding of probable cause may be based upon hearsay in

whole or in part, provided there is a substantial basis for believing the source of the

hearsay to be credible and for believing that there is a factual basis for the information

furnished. * * *.”

       {¶ 29} The gravamen of defendant’s position is that probable cause was lacking

because McGinnis was unable to testify as to the technical functionality of Peer Spectre

and whether it was somehow able to search beyond what is shared, because he did not

know Peer Spectre’s standard of error. Defendant has not provided us with a single
                                            12
authority, in Ohio or otherwise, that found suppression was warranted where law

enforcement obtained a search warrant based on the use of technology that searches open

peer-to-peer networks.      Instead, defendant equates information gathered from Peer

Spectre to information gathered from a confidential informant.          As such, defendant

maintains, McGinnis was required to set forth underlying circumstances from which he

concluded that the software was credible or reliable.

       {¶ 30} Assuming without deciding that the use of computer software is equivalent

to obtaining information from a confidential informant, the affidavit supplied a probable

cause basis to believe that the software was credible and reliable.

       {¶ 31} In Gates v. Illinois (1983), 462 U.S. 213, 217, 103 S.Ct. 2317, 76 L.Ed.2d

527, the United States Supreme Court considered “the application of the Fourth

Amendment to a magistrate’s issuance of a search warrant on the basis of a partially

corroborated anonymous informant’s tip.” In Gates, the Court reasoned, “[a]n informant’s

‘veracity,’ ‘reliability,’ and ‘basis of knowledge’ are all highly relevant in determining the

value of his report. * * * [T]hese elements * * * should be understood simply as closely

intertwined issues that may usefully illuminate the common sense, practical question

whether there is ‘probable cause’ to believe that contraband or evidence is located in a

particular place.” Id. at 230.

       {¶ 32} “Sufficient information must be presented to the magistrate to allow that

official to determine probable cause; his action cannot be a mere ratification of the bare
                                           13
conclusions of others.” Id. at 239. For example, an officer’s statement that he has

received “reliable information from a credible person” and does “believe” that contraband

would be found at a home, is insufficient standing alone to create probable cause to

support a search warrant. Id. Conversely, “an affidavit relying on hearsay ‘is not to be

deemed insufficient on that score, so long as a substantial basis for crediting the hearsay

is presented.’ * * * [E]ven in making a warrantless arrest an officer ‘may rely upon

information received through an informant, rather than upon his direct observations, so

long as the informant’s statement is reasonably corroborated by other matters within the

officer’s knowledge.’” Id. at 242.

       {¶ 33} Gates directs appellate courts to employ a totality of the circumstances

analysis to determine whether probable cause supported the issuance of a search warrant.

Id. at 238. Gates also provides that “after-the-fact scrutiny by courts of the sufficiency of

an affidavit should not take the form of de novo review. A magistrate’s ‘determination of

probable cause should be paid great deference by reviewing courts.’” Id. at 236, other

citation omitted; see, also, State v. George (1989), 45 Ohio St.3d 325, 330.

       {¶ 34} There is a presumption of the validity of a warrant affidavit, which the

defendant can overcome by an offer of proof showing the affidavit contained a knowing,

intentional, or reckless falsity. State v. Roberts (1980), 62 Ohio St.2d 170, 178, citing

Franks v. Delaware, 438 U.S. 154, 98 S.Ct. 2674, 57 L.Ed.2d 667. However, the validity

of the affidavit will not be overcome by such showing if, when the “affidavit material
                                           14
alleged to be false is excluded from the affidavit, there remains sufficient content in the

affidavit to support a finding of probable cause.” Id., citing Franks, 438 U.S. at 171-172.

       {¶ 35} The questions before us are (1) whether, under the totality of the

circumstances, the affidavit provided a substantial basis for the judge’s conclusion that

there was a fair probability that child pornography would be found on a computer in the

defendant’s residence, and (2) whether there remains sufficient content in the affidavit to

support the warrant after any false information is excluded. In each regard, we find in the

affirmative.

       {¶ 36} McGinnis’s affidavit and testimony adequately provided a substantial basis

for concluding that the information obtained from Peer Spectre was credible and reliable,

including, but not limited to the following: McGinnis has many years of experience

investigating internet child pornography. He was aware of Peer Spectre’s accuracy based

on information he learned from other agencies. He was trained specifically on the use of

Peer Spectre and knew that Peer Spectre searches peer-to-peer, or file sharing, networks.

McGinnis had used other software programs to search peer-to-peer networks and obtained

the same information he got from using Peer Spectre. He has never known the other

programs to search beyond shared files.

       {¶ 37} McGinnis located an IP address recorded as sharing files on May 12, 2008,

three of which he recognized as being child pornography from his years of experience.

He independently corroborated this by viewing the files. McGinnis obtained the account
                                            15
holder information associated with that IP address from the ISP. Accordingly, there was

a sufficient factual basis to establish probable cause to believe that a computer containing

child pornography files was located at defendant’s residence.

       {¶ 38} Defendant maintains that probable cause is lacking unless law enforcement

downloaded or confirmed that the suspect files from the computer were contraband

before obtaining the search warrant. In order to support a probable cause determination,

the totality of the circumstances need only indicate a fair probability, not a certainty, that

the contraband will be found at the place to be searched. United States v. Cartier (C.A.8,

2008), 543 F.3d 442. In Cartier, the court upheld the denial of a motion to suppress

where the FBI relied on information supplied by the Spanish Guardia that defendant had

downloaded child pornography from a peer-to-peer file sharing network. Cartier, like

defendant, argued that probable cause for the search warrant was lacking because the FBI

had not verified the reliability of the software prior to obtaining the warrant. The court

rejected the argument finding the evidence established that the FBI knew the Spanish

Guardia “to be a reliable law enforcement agency that used a trustworthy means of

computer forensics.” Id. at 446.         McGinnis’s testimony likewise establishes his

knowledge that Peer Spectre is a trustworthy source of information used by law

enforcement agencies.

       {¶ 39} Defendant’s first assignment of error is overruled.
                                           16
       {¶ 40} “II. The Trial Court erred when it denied the defendant-appellant’s motion

to compel and failed to hold a hearing or issue findings of fact or conclusions of law.”

       {¶ 41} The granting or denial of a motion to compel discovery is reviewed under

an abuse-of-discretion standard. The inquiry is whether the trial court’s decision is

unreasonable, arbitrary, or unconscionable. State ex rel. V. Cos. v. Marshall (1998), 81

Ohio St.3d 467, 469, 692 N.E.2d 198.

       {¶ 42} The trial court denied defendant’s motion to compel a mirror image forensic

copy of Peer Spectre used in the investigation, any and all instruction/operation and/or

training manuals associated with the software, and Peer Spectre’s source code. The

court’s order instructed defendant to contact the software company regarding issues

pertaining to the programming of Peer Spectre.

       {¶ 43} Defendant had urged the court to compel production of the information

from the state pursuant to Crim.R. 16(B)(1)(c),3 which provided:

       {¶ 44} “(c) Documents and tangible objects. Upon motion of the defendant the

court shall order the prosecuting attorney to permit the defendant to inspect and copy or

photograph books, papers, documents, photographs, tangible objects, buildings or places,

or copies or portions thereof, available to or within the possession, custody or control of

the state, and which are material to the preparation of his defense, or are intended for use


       Amendments to Crim.R. 16 took effect on July 1, 2010 and now set forth
       3

equivalent        provisions           in           Crim.R.         16(B)(3).
                                           17
by the prosecuting attorney as evidence at the trial, or were obtained from or belong to

the defendant.” (Emphasis added.)

       {¶ 45} Defendant also cites to the provisions of Crim.R. 16, which require the

production of mental examinations and scientific tests within the possession, custody or

control of the state, evidence known or which may become known to the state that is

favorable to defendant, and material relevant to either guilt or punishment.

       {¶ 46} The information sought by defendant is not a mental examination or

scientific test and was not subject to production on that basis.          While defendant

speculates that the information may have been favorable to him in challenging the

reliability of the software’s results, the state maintains that it did not have possession,

custody or control of the information. The evidence supports the state’s position. Peer

Spectre’s owner, Wiltse, averred in his affidavit that Peer Spectre is copyrighted, the

source code is not distributed to anyone, and the use of Peer Spectre is restricted to

trained law enforcement officers. Wilste averred that defendant could not discern how

the software application used by the state operated without the source code.

       {¶ 47} Alternatively, the state contends the information is not material to the

defense, and the release of the restricted use software would compromise a worldwide

network of trained law enforcement personnel and possibly the database.

       {¶ 48} Defendant asserts that the information would enable him to challenge the

reliability of the results of the software.   However, the evidence establishes that an
                                          18
expert would be unable to test the reliability of the software without the source code,

which was not available to, or accessible by, the state. At least one federal court has

denied a similar request for production of the FBI’s proprietary enhanced LimeWire

program, finding that its production would not yield any information material to the

defense, particularly because the source code was locked and, therefore, the expert could

not discern how it operates. See United States v. Budziak (May 14, 2009), N.D.Cal. No.

CR08-00284. That logic applies equally here.

       {¶ 49} Because the state was not in possession of the source code, and without it

one cannot discern how the software operates, the trial court did not abuse its discretion

by denying the motion to compel, and this assignment of error is overruled.

       {¶ 50} “III. The defendant-appellant’s right to due process of law as guaranteed by

Article 1, Section 10 of the Ohio State Constitution and the Fourteenth Amendment to the

United States Constitution was violated when he was sentenced to sixteen (16) years.”

       {¶ 51} “IV.   The court’s imposition of consecutive sentences, without making

appropriate findings and reasons as required by R.C. §2929.14, violated the

defendant-appellant’s right to due process of law as guaranteed by Article I, Section 10 of

the Ohio State Constitution and the Fourteenth Amendment to the United States

Constitution.”

       {¶ 52} The third and fourth assignments of error are overruled.
                                           19
       {¶ 53} The two-fold analysis for reviewing sentences is first to determine whether

the trial court complied with all applicable rules and statutes when imposing the sentence

such that the sentence is not “clearly and convincingly contrary to law,” and if so, second,

to examine if the trial court’s sentence constitutes an abuse of its discretion. State v.

Kalish, 120 Ohio St.3d 23, 2008-Ohio-4912, 896 N.E.2d 124, ¶4.

       {¶ 54} Defendant contends his sentence is not supported by clear and convincing

evidence and is contrary to law. He also argues that the trial court abused its discretion

by imposing a 16-year sentence.

       {¶ 55} The trial court imposed the maximum sentence of eight years on 81 counts

of the indictment. Then the court grouped the offenses into categories. The court

segregated Counts 1 through 11, which involved images defendant made available for

sharing, from Counts 12 through 81, which were based on images/videos found on

defendant’s computer hard drive that depicted children involved in sexual acts. For all

counts in each grouping, defendant received maximum but concurrent eight-year prison

terms, however, the sentences in Counts 1 through 11 were to be served consecutively to

the sentences in counts 12 through 81, for an aggregate term of 16 years in prison. The

court then imposed a four year prison sentence for Counts 82 through 94, which involved

images that depicted nude children but did not involve any sexual acts, and imposed a

one-year prison term on the final count for possessing criminal tools, i.e., the computer.
                                          20
The court ordered those sentences to be served concurrently with the 16-year prison

term.4

         {¶ 56} Defendant argues that the maximum sentence on 82 counts, as well as the

imposition of consecutive sentences, was not supported by sufficient reasoning and does

not comport with the purposes of felony sentencing set forth in R.C. 2929.11 and

2929.12. The court was not, and is not presently, required to make findings on the record

prior to imposing maximum or consecutive sentences. State v. Foster, 109 Ohio St.3d 1,

2006-Ohio-856, 845 N.E.2d 470; State v. Hodge, 128 Ohio St.3d 1, 2010-Ohio-6320, 941

N.E.2d 768.5     Rather, the court is bound to consider Ohio’s felony sentencing statutes.

Foster, 2006-Ohio-856; see, also, State v. Mathis, 109 Ohio St.3d 54, 62, 2006-Ohio-855,

846 N.E.2d 1.

         {¶ 57} In imposing its sentence, the court noted that it is “well-known the

defendant has otherwise been a law-abiding, productive citizen.” The record reflects a

long marriage to his wife and that they raised a daughter who is successful. Defendant’s

wife, daughter, and others in their community continued to support him throughout these

proceedings and advocated on his behalf at sentencing. According to the record,


       The sentencing order further addressed forfeiture specifications and terms of
         4

postrelease   control,   which    are    not    at    issue     in    this   appeal.


         We note that on September 30, 2011, amendments to Ohio’s sentencing law
         5

will                                  take                                 effect.
                                           21
defendant immediately commenced treatment, which he continued throughout the two

years the matter was pending in the lower court, reportedly attending more than 100

meetings and participating in group and individual therapy. Defendant maintained gainful

employment until his arrest, after which he sought and obtained new employment. The

state emphasized the fact that defendant’s career was largely spent around young children

as an aquatics instructor, suggesting this should be considered within the context of his

offenses. The court noted that defendant had never been accused of engaging in the type

of conduct depicted in the images he possessed or shared, and he could not be sentenced

based upon potential future offenses. A polygraph test indicated that he had never

molested any children. Defendant’s Static-99 score placed him in the lowest possible

category for recidivism risk.    Defendant cooperated with police, although the state

insisted that he minimized his culpability by indicating the individuals involved were girls

between 12 and 18, rather than younger.

       {¶ 58} The court emphasized that defendant’s conduct victimized the subjects of

the child pornography every time the media is viewed, shared, or downloaded.

Defendant recognized this harm, which he discussed during his allocution. Defendant

stated he had an addiction, which escalated as he focused on younger and younger

subjects. The court cited this admission during sentencing. Defendant acknowledged

the heinous nature of the crimes, which was echoed by the state as well as the court. The

state described other sexually explicit content found on defendant’s computer, including
                                          22
96,000 photographs.     Furthermore, the parties stipulated that the state was seeking

sentencing regarding the 52 victims who formed the basis for defendant’s indictment.

       {¶ 59} The record establishes that defendant’s conduct was “relentless and

ongoing” for a period of eight years until he was stopped by law enforcement

intervention.   With respect to the images found on defendant’s computer, the court

expressed, “[e]verything you could possibly imagine occurred on this computer. And

everything you could possibly imagine was shared with other individuals.”

       {¶ 60} Defendant asserts that his sentence is inconsistent with sentences imposed

for similar crimes by similar offenders. He refers us to sentencing journal entries from

other cases in this district where individuals convicted of multiple counts of pandering

sexually-oriented matter involving a minor received lesser sentences than his, ranging

from community control sanctions to four years in prison. According to defendant, all of

those individuals were also indicted as a result of Operation Safety Net. However, these

journal entries tell us little, if anything, of the offender characteristics and provide no

information beyond the convictions and terms of the sentences.

       {¶ 61} On the other hand, our research has revealed that in at least one other case

an individual who was indicted in the same investigation received the same 16-year

sentence as defendant, which this court upheld. See State v. Cooper, Cuyahoga App. No.

93308, 2010-Ohio-1983, ¶19-21.
                                          23
      {¶ 62} Cooper was indicted following an investigation by Ohio’s ICAC, which

indicated he was using file sharing software to access child pornography. Cooper,

2010-Ohio-1983, ¶4. Cooper pled guilty to four counts of pandering sexually-oriented

material involving a minor and possessing criminal tools. Cooper also cooperated with

the investigation and gave a statement to police. Similar to this case, Cooper’s ex-wife

spoke on his behalf at sentencing, indicating that “he has been working hard to get help.”

Cooper, like defendant, was actively involved in AA and was obtaining counseling prior

to his sentencing. He expressed remorse for his behavior, which was noted as being

“considerable.”    While a similarly situated offender, Cooper was convicted of

significantly fewer counts than defendant but still received a 16-year prison term.

Defendant’s sentence was consistent with Cooper’s sentence.

      {¶ 63} We acknowledge that a 16 year prison term imposed on a first-time

offender who has, by all accounts, led an otherwise productive, law abiding life is a harsh

sentence and is perhaps not one that we may have imposed. Nonetheless, the sentence

was significantly less than what the court could have imposed based on defendant’s 95

convictions. There was ample testimony in the record of the harm that has been, and

continues to be, inflicted upon the victims who are the subjects of the material being

viewed in these types of cases. The images, once uploaded, continue to circulate on the

internet where individuals, like defendant, view them and make them available for

viewing by others. The wide range of sentences that have been apparently imposed on
                                            24
defendants convicted of similar offenses is the result of the discretion vested in the trial

court. Defendant’s sentence was within the statutory range, lawful, and supported by the

record, thus we cannot say it was unconscionable or otherwise an abuse of the trial court’s

discretion.

       {¶ 64} The third assignment of error is overruled.

       {¶ 65} Judgment affirmed, and the case is remanded to correct the sentencing

journal entry to accurately reflect defendant’s classification as a Tier II sex offender.

       It is ordered that appellee recover of appellant its costs herein taxed.

       The Court finds there were reasonable grounds for this appeal.

       It is ordered that a special mandate issue out of this Court directing the Common

Pleas Court to carry this judgment into execution. The defendant's conviction having

been affirmed, any bail pending appeal is terminated. Case remanded to the trial court

for execution of sentence.

       A certified copy of this entry shall constitute the mandate pursuant to Rule 27 of

the Rules of Appellate Procedure.




JAMES J. SWEENEY, JUDGE

MELODY J., STEWART, P.J., and
FRANK D. CELEBREZZE, JR., J., CONCUR